<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Hacking, but Legal]]></title><description><![CDATA[Independent investigations into security, technology, and democracy—free to read, funded by members.]]></description><link>https://www.hackingbutlegal.com</link><image><url>https://substackcdn.com/image/fetch/$s_!ZcdC!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eaf71e4-63f5-4ded-bf46-56b7ec78f94a_390x390.png</url><title>Hacking, but Legal</title><link>https://www.hackingbutlegal.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 29 Apr 2026 00:21:18 GMT</lastBuildDate><atom:link href="https://www.hackingbutlegal.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jacqueline Singh]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jackie@hackingbutlegal.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jackie@hackingbutlegal.com]]></itunes:email><itunes:name><![CDATA[Jackie Singh]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jackie Singh]]></itunes:author><googleplay:owner><![CDATA[jackie@hackingbutlegal.com]]></googleplay:owner><googleplay:email><![CDATA[jackie@hackingbutlegal.com]]></googleplay:email><googleplay:author><![CDATA[Jackie Singh]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[They Hired Me, Hazed Me, and Fired Me by Mail ]]></title><description><![CDATA[Inside the network that helped shape the Stuxnet narrative and built companies entrusted with America's critical infrastructure]]></description><link>https://www.hackingbutlegal.com/p/they-hired-me-hazed-me-and-fired</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/they-hired-me-hazed-me-and-fired</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Tue, 14 Apr 2026 18:38:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1CmV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This is Part two of Hacking, but Legal&#8217;s Blavatnik series. Read Part one: &#8220;<strong><a href="https://www.hackingbutlegal.com/p/exclusive-where-the-wests-cyber-chiefs">Where the West&#8217;s Cyber Chiefs Land, and Who Pays for the Landing</a></strong>&#8221;.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1CmV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1CmV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1CmV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1CmV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1CmV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1CmV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg" width="1456" height="905" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:905,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1CmV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1CmV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1CmV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1CmV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676456dc-6598-4153-ab7e-61316cafcab4_2863x1779.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong>A <a href="https://www.siemens.com/en-us/products/simatic/s7-300/">Siemens</a> SIMATIC S7-300 programmable logic controller, the family of industrial controllers Stuxnet was designed to target. Ulli1105, <a href="https://creativecommons.org/licenses/by-sa/2.5">CC BY-SA 2.5</a>, via <a href="https://commons.wikimedia.org/wiki/File:S7300.JPG">Wikimedia Commons</a></strong></em></figcaption></figure></div><p>This is the story of a magazine article about a computer worm, a network of intelligence professionals who built companies around America&#8217;s critical infrastructure, and the months I spent inside one of those companies before being fired by a letter left in my mailbox. The connection between these threads is not that one caused the other, but that I was inside the second before I understood the first, and understanding the first is what eventually made the second make sense.</p><p>On the very first morning I reported to Accenture as a Senior Manager &#8212; newly hired to lead the FusionX team, one of the most respected <strong><a href="https://en.wikipedia.org/wiki/Red_team">red-teaming</a></strong> operations in American cybersecurity &#8212; co-founder Tom Parker stepped out of an elevator, strode through the glass doors, took one look at me, and said, &#8220;Who are YOU?&#8221; I gave my name and my title, and politely informed him I was a new hire starting that day. He grimaced, said nothing further, and walked away.</p><p>That was early June. By November of that same year, I would be terminated without cause by a letter mailed to my Manhattan apartment. In the intervening months, I had not been permitted to do the job I had been hired to do: lead a team of elite consultants to help solve the Fortune 500&#8217;s most pressing technical security concerns. A direct report who had followed me from a previous employer and I were assigned a single foreign financial client, taken off that job without explanation, and given nothing else. He has since confirmed this account. I was then placed on administrative leave, also without explanation &#8212; my equipment seized, my access revoked, and presence maintained just enough to be monitored while we were both excluded from everything of consequence.</p><p>I initially mentally framed what happened in common terms: I was the only dark-skinned woman in the group, and some of the hostility I encountered felt like it might have something to do with that. The cybersecurity industry has a well-documented problem with both racism and sexism, and I have been on the receiving end of both throughout my career. I <strong><a href="https://www.businessinsider.com/biden-cybersecurity-jackie-singh-hackers-culture-2020-11">spoke publicly</a></strong> about sexism and discrimination in the field after working on the Biden campaign in 2020. When the <strong><a href="https://www.vice.com/en/article/hackers-blame-women-and-sjws-end-of-derbycon-security-conference/">DerbyCon security conference shut down</a></strong> in 2019 after women and minorities raised concerns about harassment, the community blamed the people who spoke up &#8212; including me, just for having been quoted in the story.</p><p>What I experienced at FusionX was part of that broader pattern. But the deeper story, which I have reconstructed from public records, patent filings, corporate registrations, my own email inbox, and the documented career trajectories of the people involved, concerns what FusionX actually was, who controlled it, and the web of intelligence community veterans, oligarch capital, and privatized state power standing behind a company entrusted with the security architectures of U.S. government agencies and major multi-national corporations.</p><div><hr></div><h2>The Article That Knew Too Much</h2><p>On October 5, 2010, Tablet Magazine published a brief essay on the Stuxnet worm, &#8220;<em><strong><a href="https://www.tabletmag.com/sections/israel-middle-east/articles/modern-warfare-too">Modern Warfare, Too</a></strong></em>&#8221; by Michael Tanji. The worm had recently been discovered infecting <strong><a href="https://en.wikipedia.org/wiki/Industrial_control_system">industrial control systems</a></strong> worldwide with a pronounced concentration in Iran. Tanji&#8217;s byline identified him as &#8220;a former supervisory intelligence officer who worked on information warfare issues at the Defense Intelligence Agency.&#8221;  The article appeared in a curated &#8220;<em><strong><a href="https://www.tabletmag.com/sections/news/articles/web-wars">Web Wars!</a></strong></em>&#8221; series alongside a companion piece by <strong><a href="https://en.wikipedia.org/wiki/Yossi_Melman">Yossi Melman</a></strong>, the veteran Israeli intelligence correspondent for Haaretz, whose connections to the Mossad establishment are well documented. In 2020, Donald Trump elevated Melman&#8217;s account of the <strong><a href="https://www.cnn.com/2020/11/27/middleeast/iran-top-nuclear-scientist-killed-intl/index.html">killing</a></strong> of the head of Iran&#8217;s nuclear program on Twitter. </p><p>Israeli journalist <strong><a href="https://he.wikipedia.org/wiki/%D7%A9%D7%9E%D7%A2%D7%95%D7%9F_%D7%90%D7%A8%D7%9F">Shimon Aran</a></strong>, who served in the IDF&#8217;s <strong><a href="https://en.wikipedia.org/wiki/Unit_8200">Unit 8200</a></strong>, claimed to have notified Melman of the retweet, and that he was &#8220;very surprised..&#8221;</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/simonarann/status/1332381461190758401&quot;,&quot;full_text&quot;:&quot;<span class=\&quot;tweet-fake-link\&quot;><span class=\&quot;tweet-fake-link\&quot;>@yossi_melman</span></span> <span class=\&quot;tweet-fake-link\&quot;>@realDonaldTrump</span> Yes! \nI was the 1st one to inform my good friend <span class=\&quot;tweet-fake-link\&quot;><span class=\&quot;tweet-fake-link\&quot;>@yossi_melman</span></span> that president <span class=\&quot;tweet-fake-link\&quot;>@POTUS</span> retweeted his tweets about the assassination of <span class=\&quot;tweet-fake-link\&quot;>#Fakhrizadeh</span>\nHe was  very surprised..\n\n&#1490;&#1488;&#1492; &#1489;&#1495;&#1489;&#1512;&#1497; &#1497;&#1493;&#1505;&#1497; &#1502;&#1500;&#1502;&#1503; &#1506;&#1500; &#1513;&#1492;&#1504;&#1513;&#1497;&#1488; &#1496;&#1512;&#1488;&#1502;&#1508; &#1510;&#1497;&#1497;&#1509; &#1488;&#1514; &#1510;&#1497;&#1493;&#1510;&#1497;&#1493; &#1506;&#1500; &#1495;&#1497;&#1505;&#1493;&#1500; &#1508;&#1495;'&#1512;&#1497;&#1494;&#1488;&#1491;&#1492;. &#1492;&#1497;&#1492; &#1511;&#1510;&#1514; &#1502;&#1493;&#1508;&#1514;&#1506; &#1493;&#1505;&#1508;&#1511;&#1503;..\n&#1497;&#1497;&#1513;&#1512; &#1499;&#1495; &#1497;&#1493;&#1505;&#1497; &#128591; &quot;,&quot;username&quot;:&quot;simonarann&quot;,&quot;name&quot;:&quot;&#1513;&#1502;&#1506;&#1493;&#1503; &#1488;&#1512;&#1503; &#1588;&#1605;&#1593;&#1608;&#1606; &#1570;&#1585;&#1575;&#1606;&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1427386319064506368/MN04HnxN_normal.jpg&quot;,&quot;date&quot;:&quot;2020-11-27T17:51:09.000Z&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/En2R4H_W4AIu6Cs.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/VLZ5iUNm2A&quot;}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:3,&quot;retweet_count&quot;:1,&quot;like_count&quot;:22,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>Melman&#8217;s article &#8220;<em><strong><a href="https://www.tabletmag.com/sections/israel-middle-east/articles/coded">Coded</a></strong></em><strong>,</strong>&#8221; published in Tablet Magazine in October 2010, argued that Israel &#8220;may or may not&#8221; have been behind Stuxnet, and that it didn&#8217;t particularly matter. Tanji&#8217;s American-perspective article reached the same conclusion by a different route. On its surface, &#8220;<em>Modern Warfare, Too</em>&#8221; reads as competent analysis from a highly qualified commentator. Tanji correctly identified Stuxnet as targeting Siemens <strong><a href="https://en.wikipedia.org/wiki/SCADA">SCADA</a></strong> software, noted the worm&#8217;s sophistication, and speculated about Israeli involvement. When the article is mapped against what was publicly known in October 2010 and what would be confirmed months or years later, it is strikingly prescient.</p><p>The <strong><a href="https://docs.broadcom.com/docs/security-response-w32-stuxnet-dossier-11-en">Symantec Stuxnet dossier</a></strong>, published in late September 2010, had concluded that &#8220;the ultimate target of Stuxnet remains unknown.&#8221; <strong><a href="https://www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyber_weapon">Ralph Langner</a></strong>, the German industrial control systems researcher who first speculated publicly that Natanz was the target, described his own assessment as &#8220;speculation.&#8221; The precise mechanism by which Stuxnet destroyed centrifuges by manipulating frequency converters manufactured by Fararo Paya and Vacon on Siemens S7-315 <strong><a href="https://en.wikipedia.org/wiki/Programmable_logic_controller">PLCs</a></strong> would not be confirmed until November 2010 at the earliest. </p><p>Joint U.S.-Israeli authorship under <em><strong><a href="https://en.wikipedia.org/wiki/Operation_Olympic_Games">Operation Olympic Games</a></strong></em> was <strong><a href="https://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html">not reported</a></strong> until a New York Times piece in January 2011, and not fully confirmed until David Sanger&#8217;s June 2012 <strong><a href="https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html">account</a></strong>. Kim Zetter's <em><strong><a href="https://amzn.to/3O4ciK1">Countdown to Zero Day</a></strong></em>, the definitive account of Stuxnet's discovery and the operation behind it, provided much of the framework I used to verify what was and was not publicly established at each point in this timeline. </p><p>Tanji, writing in early October 2010, got the strategic picture almost perfectly right while remaining conspicuously vague on technical details.</p><p>He characterized Stuxnet as designed &#8220;not to kill, but simply to disorient: cyber tear gas.&#8221; Langner&#8217;s 2013 analysis, &#8220;<em><strong><a href="https://www.cs.yale.edu/homes/jf/Langner.pdf">To Kill a Centrifuge</a></strong></em>,&#8221; would confirm this framing years later, finding that the attackers &#8220;took great care to avoid catastrophic damage&#8221; and instead sought to induce early rotor failures that would be indistinguishable from routine engineering problems. He described digital weapons as &#8220;disposable sniper rifles, not cluster bombs,&#8221; a metaphor that reflects offensive cyber doctrine of the kind that has since become standard material at war colleges, but had no place in public discourse in 2010.</p><p>He observed that Stuxnet was &#8220;sophisticated enough, it is targeted enough, to make the sufficiently suspicious in Iran wonder if there is in fact not someone on the inside who has passed information.&#8221; In 2024, the Dutch newspaper De Volkskrant <strong><a href="https://nltimes.nl/2024/01/08/dutch-man-sabotaged-iranian-nuclear-program-without-dutch-governments-knowledge-report">revealed</a></strong> that a recruited AIVD agent named Erik van Sabben had been the human penetration vector who physically introduced the malware into Iranian facilities. What Tanji had framed as speculation now reads more like a description of the actual effect. </p><p>He invoked Effects-Based Operations <strong><a href="https://en.wikipedia.org/wiki/Effects-based_operations">doctrine</a></strong> by name: &#8220;you don&#8217;t want to destroy the power plant, you just want to turn it off, because eventually you want the lights to come back.&#8221; At the time of that writing, no one outside a small circle of officials understood that this was the operational philosophy of <em>Olympic Games</em>. Each of these judgments was subsequently confirmed. None were established in the public record when Tanji wrote them down. All of them served the strategic communication interests of the operation&#8217;s sponsors. </p><p>In response to a request for comment from this publication, Tanji said that his article relied on no classified knowledge.</p><div class="callout-block" data-callout="true"><p>&#8220;Any analytic tradecraft used to draw conclusions or make judgments can be found in any number of books on the topic of intelligence analysis,&#8221; he wrote. &#8220;Likewise, nothing in the article relied on any classified information. If it had, my half of this conversation would be coming from an IP attributable to a federal prison.&#8221; </p></div><p>He said that he does not know Yossi Melman, and had not read Melman&#8217;s companion piece. He acknowledged maintaining &#8220;a decent sized network of friends and former colleagues with extensive experience in IW/CNO&#8221; (Information Warfare and Computer Network Operations) but said he has &#8220;no idea if any of them was involved with Stuxnet.&#8221;</p><p>While the article was remarkably prescient, the author says it was solely the product of publicly available analytic tradecraft.</p><div><hr></div><h2>The Author&#8217;s Credentials</h2><p>Tanji was not a casual observer of cyber operations. His career placed him at the center of the American military cyber apparatus during its formative period. He began as a U.S. Army SIGINT analyst, served in Desert Storm, and moved through a succession of increasingly sensitive positions: intelligence specialist at U.S. Army Intelligence and Security Command (INSCOM), then the Defense Intelligence Agency, where from 1998 to 2004 he served as Supervisory Intelligence Officer in the Information Warfare Office within the Transnational Warfare Group. <strong><a href="https://www.csoonline.com/profile/michael-tanji/">Profiles</a></strong> published by OODA Loop and CSO Online also place him at NSA and the National Reconnaissance Office.</p><p>At DIA, Tanji was selected as one of a &#8220;handful of intelligence officers selected by-name&#8221; to support the Joint Task Force for Computer Network Defense (JTF-CND), the direct precursor to U.S. Cyber Command. He represented DIA on National Security Council and National Intelligence Council cyber projects, deployed in a counterintelligence and HUMINT role during Operation Allied Force, and after September 11 created the Department of Defense&#8217;s first computer forensics and intelligence fusion team. He left government in 2005 and co-founded Kyrus Tech, which later partnered with Microsoft to disrupt the Zeus botnet. He is also listed as one of the co-founders of security firm <strong><a href="https://en.wikipedia.org/wiki/VMware_Carbon_Black">Carbon Black</a>.</strong></p><p>In 2009, Tanji edited <em><strong><a href="https://amzn.to/4dNegst">Threats in the Age of Obama</a></strong></em>, a compendium of national security essays published by Nimble Books. Among the twenty-one contributors were Matt Devost and Bob Gourley.</p><div><hr></div><h2>The Book and Its People</h2><p><strong><a href="https://www.atlanticcouncil.org/expert/bob-gourley/">Bob Gourley</a></strong> was a Naval Intelligence officer who became the first Director of Intelligence (J2) at <strong><a href="https://en.wikipedia.org/wiki/Joint_Task_Force_%E2%80%93_Global_Network_Operations">JTF-CND</a></strong>, the same organization Tanji had supported, and later served as Chief Technology Officer of the Defense Intelligence Agency, the same agency where Tanji had worked in the Information Warfare Office. After leaving government, Gourley co-founded OODA LLC with Matt Devost. His website <em>CTOvision.com</em> published approving coverage of Tanji&#8217;s work at Kyrus Tech.</p><p>Devost&#8217;s biography takes a different turn. He arrived at SAIC in 1995. By his own account, buried in keywords at the bottom of his LinkedIn resume, he directed the Coalition Vulnerability Assessment Team, supported the President&#8217;s Commission on Critical Infrastructure Protection and the Defense Science Board, served on the President&#8217;s National Security Telecommunications Advisory Committee, and provided support during the Solar Sunrise investigation &#8212; the 1998 Department of Defense cyber intrusion that directly led to the creation of JTF-CND. He was twenty-five years old.</p><p>In 1996, Devost co-founded the Terrorism Research Center and began operating from <em>devost@terrorism.com</em>. A 2004 USPTO trademark filing shows the organization attempting to register &#8220;TERRORISM.COM&#8221; from an office on North Fairfax Drive in Arlington, Virginia. The trademark was refused as &#8220;merely descriptive.&#8221; Today, <em>terrorism.com</em> redirects to the website of DEV Capital, Devost&#8217;s investment entity. At iDEFENSE, he built a cyber-intelligence operation serving Fortune 500 clients. At Security Design International, he ran penetration testing and vulnerability assessments against what he described as &#8220;every critical infrastructure segment.&#8221;</p><p>Then, in 2006, Erik Prince purchased Devost&#8217;s companies and merged them with the consulting group led by Cofer Black, the former Director of the CIA&#8217;s Counterterrorism Center, to create Total Intelligence Solutions. Devost <strong><a href="https://www.devost.net/ventures/">became its president</a></strong>. Rob Richer, former CIA Associate Deputy Director of Operations, served as CEO. The <strong><a href="https://www.washingtonpost.com/wp-dyn/content/article/2007/11/02/AR2007110202165.html">Washington Post reported</a></strong> that Prince had &#8220;built Total Intel&#8221; from Devost&#8217;s firms.</p><p>Total Intelligence Solutions functioned as something akin to a privatized CIA: staffed with former senior Agency officers, capitalized by the Blackwater fortune, and selling intelligence services to governments and corporations alike. Devost ran its day-to-day operations with more than sixty employees.</p><div><hr></div><h2>Both Sides of the Table</h2><p>In June 2010, Devost co-founded FusionX LLC with <strong><a href="https://www.scworld.com/contributor/tom-parker">Tom Parker</a></strong>, a British cybersecurity expert who had <strong><a href="https://blackhat.com/presentations/bh-usa-03/bh-us-03-parker.pdf">presented with him at Black Hat</a></strong> on adversary characterization back in 2003. FusionX offered red-teaming, penetration testing, and cyber defense, promising that its &#8220;best in class technical assessment teams will target your information assets using the highly tailored tactics, techniques and procedures (TTP&#8217;s) of your most likely attackers.&#8221; Its clients included Fortune 500 companies and government agencies.</p><p>From March 2010 through April 2013, Devost simultaneously held an appointment as a Special Government Employee advising the Under Secretary of Defense for Policy, the Deputy Assistant Secretary of Defense for Cyber Policy, and &#8220;other senior leadership&#8221; on cyber strategy. This period encompassed the discovery of Stuxnet, the operational peak of <em>Olympic Games</em>, the achievement of full operational capability by U.S. Cyber Command, and the formulation of the country&#8217;s first comprehensive cyber strategy.</p><p>The dual position would have given Devost visibility into both the government&#8217;s offensive and defensive cyber posture and the vulnerability landscape of the private sector at the same time.</p><p>In 2015, Accenture acquired FusionX. Devost became a Managing Director leading Accenture&#8217;s Global Cyber Defense practice, while Parker took on global growth and strategy for Accenture Security&#8217;s 6,200-person organization, which generated more than $1.8 billion in annual revenue. Their access scaled accordingly. After both left Accenture, Parker served as Deputy CISO at AIG and then founded Hubble Technology, which was acquired by NetSPI/KKR in 2024. </p><p>As of early 2026, both Parker and Harvey work in IBM&#8217;s cybersecurity division.</p><div><hr></div><p><em>The reporting that follows &#8212; on the Blavatnik-funded institution at the center of Devost&#8217;s public image, the WINTERMUTE patents, and the months I spent at Accenture&#8217;s FusionX before being terminated by mail &#8212; is available to paid subscribers.</em></p><p><em>Hacking, but Legal has no access to protect. Only readers. Paid subscribers are the reason this piece exists, and the reason the next one will.</em></p>
      <p>
          <a href="https://www.hackingbutlegal.com/p/they-hired-me-hazed-me-and-fired">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[EXCLUSIVE: Where the West's Cyber Chiefs Land, and Who Pays for the Landing]]></title><description><![CDATA[Jen Easterly ran CISA. Ciaran Martin founded NCSC. They now work at the same Oxford school, funded by a Soviet-born billionaire former Treasury officials say escapes sanctions by passport alone.]]></description><link>https://www.hackingbutlegal.com/p/exclusive-where-the-wests-cyber-chiefs</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/exclusive-where-the-wests-cyber-chiefs</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Wed, 08 Apr 2026 23:09:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!KsC0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In June 2025, <strong><a href="https://www.bsg.ox.ac.uk/people/jen-easterly">Jen Easterly</a></strong>, the former Director of the Cybersecurity and Infrastructure Security Agency, the federal body responsible for defending American civilian networks, accepted a position as Visiting Fellow of Practice at the Blavatnik School of Government at the University of Oxford. </p><p>She joined the <strong><a href="https://www.bsg.ox.ac.uk/research/oxford-programme-cyber-and-technology-policy">Oxford Programme for Cyber and Technology Policy</a></strong>, known as OxCTP, which is co-directed by <strong><a href="https://www.bsg.ox.ac.uk/people/ciaran-martin">Ciaran Martin</a></strong>, the founding CEO of the United Kingdom&#8217;s National Cyber Security Centre, an operational cyber arm of GCHQ. Martin had joined the Blavatnik School as Professor of Practice in <strong><a href="https://www.bsg.ox.ac.uk/news/leading-figure-cyber-security-join-blavatnik-school">September 2020</a></strong>, the day after stepping down from his government role.</p><p>The two most recent leaders of civilian cyber defense in the United States and the United Kingdom now work in the same program, at the same school, under the same name. That name belongs to a Soviet-born billionaire whose business history, according to former senior Treasury sanctions officials, places him alongside sanctioned Russian oligarchs in every respect except his U.S. passport: Len Blavatnik.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KsC0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KsC0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png 424w, https://substackcdn.com/image/fetch/$s_!KsC0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png 848w, https://substackcdn.com/image/fetch/$s_!KsC0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png 1272w, https://substackcdn.com/image/fetch/$s_!KsC0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KsC0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png" width="551" height="828.4469964664311" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1702,&quot;width&quot;:1132,&quot;resizeWidth&quot;:551,&quot;bytes&quot;:2020422,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/193396250?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KsC0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png 424w, https://substackcdn.com/image/fetch/$s_!KsC0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png 848w, https://substackcdn.com/image/fetch/$s_!KsC0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png 1272w, https://substackcdn.com/image/fetch/$s_!KsC0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6679ca-467a-4ea6-b191-444481a8c38f_1132x1702.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong>Jen Easterly/<a href="https://www.linkedin.com/posts/jen-easterly_awesome-day-at-the-blavatnik-school-of-activity-7397649962685267968-fTRj/">LinkedIn</a></strong></em></figcaption></figure></div><p>That characterization is contested. Blavatnik&#8217;s representatives reject the oligarch label, and as this piece will discuss, several major news outlets have published corrections after using it. But in November 2020, two former senior U.S. government officials with direct sanctions expertise published an Atlantic Council report stating plainly that Blavatnik&#8217;s &#8220;funding can hardly be considered legitimate&#8221; and that he escapes sanctions only because he is a U.S. citizen.</p><p>There are reasons this convergence has gone unreported that have nothing to do with its importance. Blavatnik&#8217;s reputation apparatus &#8212; PR responses within hours of publication, legal letters, and corrections extracted from major outlets &#8212;&nbsp;makes writing about his network expensive. The facts are public; the cost of a single imprecise phrase is not. Institutional capture becomes invisible not because no one sees it, but because describing it carefully exceeds what most deadlines allow.</p><p>What follows is an accounting of what it means that the people the sanctions machinery could not touch are now funding the institutional home of the most senior Western cyber officials.</p><h2>The Donor</h2><p>Len <strong><a href="https://en.wikipedia.org/wiki/Len_Blavatnik">Blavatnik</a></strong> was born in Odessa in 1957, when it was part of the Ukrainian Soviet Socialist Republic. His family moved to Yaroslavl, north of Moscow, where he attended the Moscow State University of Railway Engineering before emigrating to the United States in 1978. He earned a master&#8217;s in computer science from Columbia University and an MBA from Harvard Business School. In 1986, he founded <strong><a href="https://www.accessindustries.com/">Access Industries</a></strong>, the holding company through which he conducts most of his business operations, and which now controls Warner Music Group.</p><p>After the collapse of the Soviet Union, Blavatnik used Access Industries to acquire former state assets during Russia&#8217;s privatization era, accumulating shares in aluminum smelters and energy companies that became the foundation of his fortune. As of April 2026, <strong><a href="https://www.forbes.com/profile/len-blavatnik/">Forbes</a></strong> estimates his net worth at $31.4 billion, making him the sixty-ninth richest person in the world. He holds dual American and British citizenship and was knighted by Queen Elizabeth II in 2017.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U3MY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U3MY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png 424w, https://substackcdn.com/image/fetch/$s_!U3MY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png 848w, https://substackcdn.com/image/fetch/$s_!U3MY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png 1272w, https://substackcdn.com/image/fetch/$s_!U3MY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U3MY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png" width="1402" height="756" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:756,&quot;width&quot;:1402,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:656146,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/193396250?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U3MY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png 424w, https://substackcdn.com/image/fetch/$s_!U3MY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png 848w, https://substackcdn.com/image/fetch/$s_!U3MY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png 1272w, https://substackcdn.com/image/fetch/$s_!U3MY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16d7bb46-3e67-4e62-9c24-e7ae164909fa_1402x756.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong>Forbes, <a href="https://www.forbes.com/profile/len-blavatnik/">April 8, 2026</a></strong></em></figcaption></figure></div><p>His early business partnerships are what counterintelligence professionals would focus on. This is not a matter of individual bad actors. As former Bush administration official Philip Zelikow and three co-authors argued in <strong><a href="https://www.foreignaffairs.com/united-states/rise-strategic-corruption-weaponize-graft-trump">Foreign Affairs</a></strong> in mid-2020, the Kremlin has transformed corruption itself &#8220;into an instrument of national strategy,&#8221; a doctrine under which ostensibly private business relationships, philanthropic giving, and elite social access are tools of statecraft rather than peripheral side effects of it.</p><p>Blavatnik reportedly became close friends with <strong><a href="https://en.wikipedia.org/wiki/Viktor_Vekselberg">Viktor Vekselberg</a> </strong>at the Moscow State University of Railway Engineering. Together, they co-founded the Renova investment vehicle and accumulated stakes in Russian aluminum smelters. In 1997, Blavatnik&#8217;s Access Industries joined with Vekselberg&#8217;s Renova Group and Mikhail Fridman&#8217;s Alfa Group to form the AAR consortium, which acquired a 40% stake in Tyumen Oil Company (TNK) for $800 million. AAR later partnered with BP to form <strong><a href="https://en.wikipedia.org/wiki/TNK-BP">TNK-BP</a></strong>, one of the largest oil companies in Russia. </p><p>The venture was enormously profitable: when the state-owned Rosneft purchased AAR&#8217;s stake in 2013, the consortium received $28 billion in cash, having already collected $19 billion in dividends. Blavatnik was also a board member of <strong><a href="https://en.wikipedia.org/wiki/Rusal">Rusal</a></strong>, one of the world&#8217;s largest aluminum producers, from 2007 to 2016. The company was founded by <strong><a href="https://www.occrp.org/en/news/us-authorities-indict-putins-pal-deripaska">Oleg Deripaska</a></strong> and controlled through his EN+ Group; Blavatnik held an indirect minority stake of approximately 8% through SUAL Partners (jointly with Vekselberg), which held ~22%.</p><p>Vekselberg was <strong><a href="https://home.treasury.gov/news/press-releases/jy0650">sanctioned</a></strong> by the U.S. Treasury in April 2018 under E.O. 13662&nbsp;&#8220;for operating in the energy sector of the Russian Federation economy.&#8221; Deripaska was <strong><a href="https://home.treasury.gov/news/press-releases/jy2337">sanctioned</a></strong> &#8220;for having acted or purported to act for or on behalf of, directly or indirectly, a senior official of the Government of the Russian Federation&#8221; under E.O. 13661 and 13662. </p><p>Blavatnik himself has not been sanctioned by the United States or the United Kingdom, and his representatives have been aggressive in defending that distinction. Spokespersons for Access Industries have said repeatedly that he &#8220;hasn&#8217;t had any contact with president Vladimir Putin since 2000,&#8221; &#8220;plays no role in Russian politics,&#8221; and &#8220;is not Russian,&#8221; emphasizing that he has been an American citizen since the 1980s, was born in Soviet Ukraine, and holds dual U.S.&#8211;U.K. citizenship. </p><p>Despite this, in December 2023, Ukrainian President Volodymyr Zelensky signed a decree imposing sanctions on 51 individuals, Blavatnik among them. He remains off the U.S. OFAC Specially Designated Nationals list and the U.K. OFSI sanctions list, but the country of his birth has formally sanctioned him. Blavatnik&#8217;s fortune was built alongside and intertwined with individuals who have since been sanctioned, and his business history in post-Soviet Russia appears inseparable from the political economy of the oligarch era.</p><p>Two former senior Treasury and National Security Council officials made the same assessment explicitly in a 2020 Atlantic Council <strong><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/defending-the-united-states-against-russian-dark-money/">report</a></strong> on Russian dark money. Anders &#197;slund, a former economic adviser to the Russian government from 1991 to 1994, and Julia Friedlander, who served as Senior Policy Advisor for Europe in Treasury&#8217;s Office of Terrorism and Financial Intelligence during the period when Vekselberg and Deripaska were sanctioned, wrote that Blavatnik &#8220;became a naturalized US citizen in 1984&#8221; but &#8220;made his big money much later on in the Russian heavy industry, notably in TNK-BP, in partnership with Viktor Vekselberg, who was sanctioned by the US government as a Kremlin oligarch in April 2018.&#8221; </p><p>Their conclusion: &#8220;Blavatnik is a US citizen and cannot be sanctioned by the United States, but his funding can hardly be considered legitimate.&#8221; That sentence, written by someone who sat inside Treasury&#8217;s sanctions apparatus during the relevant period, is the clearest public statement from a former U.S. government official that the only thing separating Blavatnik from his sanctioned partners is his passport.</p><p>In 2019, Quartz <strong><a href="https://qz.com/1521847/major-gop-donor-len-blavatnik-had-business-ties-to-a-russian-official">published</a></strong> Panama Papers&#8211;based reporting describing an indirect business link between Blavatnik and a Russian Interior Ministry official. The connection ran through Amediateka, a Russian streaming company majority-owned by Access Industries, which had outsourced services to Nemo TV, a company in which Alexander Makhonov, then Russia&#8217;s Deputy Minister of Internal Affairs, held a stake via offshore entities. </p><p>Quartz was careful to note that &#8220;it&#8217;s unclear whether Blavatnik had any interaction with Makhonov&#8221; and that &#8220;there is no allegation of any illegality.&#8221; The relationship was a vendor arrangement between a subsidiary and a company part-owned by a Russian official, not a direct partnership &#8212; perhaps a meaningful distinction on paper, though one that still places a Russian Interior Ministry figure inside Blavatnik&#8217;s corporate supply chain during a period when his holdings remained deeply embedded in Russia. </p><p>Access Industries has described his donations as driven by a &#8220;pro-business, pro-Israel agenda&#8221; &#8212; a framing that is only partially borne out by the FEC record. Blavatnik&#8217;s political giving spans both American parties and multiple countries, but is bipartisan in name only. Between 2009 and 2014, his federal donations were modest and roughly balanced, peaking at $273,600 in the 2013&#8211;2014 cycle, according to FEC data compiled by the <strong><a href="https://www.dallasnews.com/opinion/commentary/2018/05/08/how-putin-s-oligarchs-funneled-millions-into-gop-campaigns/">Dallas Morning News</a></strong><a href="https://www.dallasnews.com/opinion/commentary/2018/05/08/how-putin-s-oligarchs-funneled-millions-into-gop-campaigns/"> </a>and <strong><a href="https://qz.com/1521847/major-gop-donor-len-blavatnik-had-business-ties-to-a-russian-official">Quartz</a></strong>. </p><p>Starting in 2015, his spending transformed: he poured at least $6.35 million into Republican committees and PACs during the 2015&#8211;2016 cycle with the overwhelming majority directed at the Senate GOP leadership and the PACs of presidential and Senate candidates. Mitch McConnell&#8217;s Senate Leadership Fund received roughly $2.5 million in that cycle and approximately $3.5 million total between 2015 and 2017, by far the largest single destination. </p><p>The McConnell donations sit alongside a sequence of events the Atlantic Council <strong><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/defending-the-united-states-against-russian-dark-money/">report</a></strong> describes as &#8220;public and legal&#8221; but impossible to ignore. </p><p>Blavatnik was a minority owner of Rusal when the Treasury Department sanctioned Rusal along with its controlling owners in April 2018. After what &#197;slund and Friedlander describe as &#8220;intense lobbying by Rusal&#8221; in a campaign led by Lord Gregory Barker, the new British CEO of Rusal&#8217;s parent company EN+, and including former Senator David Vitter of Louisiana, then at the lobbying firm Mercury Public Affairs, the Treasury lifted the sanctions against Rusal in January 2019. &#8220;Almost immediately afterward,&#8221; &#197;slund and Friedlander write, &#8220;Rusal committed to investing $200 million in a company in Kentucky, McConnell&#8217;s home state.&#8221;</p><p>McConnell led the Senate effort to block Chuck Schumer&#8217;s resolution of disapproval, which would have kept the Rusal sanctions in place. The resolution narrowly failed, 57-42, falling three votes short of the 60 needed to overcome a filibuster. Eleven Republicans crossed McConnell to vote with Democrats &#8212; including, notably, Marco Rubio, who had received $1.5 million in Blavatnik-connected contributions through his Conservative Solutions PAC and Florida First Project. Blavatnik&#8217;s donations did not purchase Rubio&#8217;s vote on this specific question. They appear, however, to have had a different effect on the Republican leadership: according to TIME magazine&#8217;s August 2019 investigation, two of the three votes needed to save the sanctions came from Kentucky&#8217;s own delegation: McConnell himself and junior Senator Rand Paul.</p><p>There is no public record of Blavatnik personally lobbying McConnell on the Rusal question; the documented relationship between them is financial. What is documented, through TIME&#8217;s reporting, is that Braidy Industries CEO Craig Bouchard met with a Rusal sales executive in Zurich in January 2019, while Rusal was still under U.S. sanctions, and was told: &#8220;If we get the sanctions off, let&#8217;s meet again.&#8221; The next day, McConnell blocked the Schumer resolution on the Senate floor. Ten days later, Treasury formally lifted the sanctions. Eleven weeks after that, Braidy and Rusal announced a $200 million partnership in Ashland, Kentucky. Senate Finance ranking member Ron Wyden opened an investigation in October 2019 asking whether the Braidy-Rusal discussions had taken place while sanctions were still in force. Bouchard never fully answered on the record.</p><p>McConnell told reporters in May 2019 that his position on Rusal was &#8220;completely unrelated to anything that might happen in my home state.&#8221; Michael McFaul, the former U.S. Ambassador to Russia under the Obama administration, told the Washington Post: &#8220;It is shocking how blatantly transactional this arrangement looks.&#8221; Heather Conley, a former Deputy Assistant Secretary of State under George W. Bush, put it more structurally in TIME: </p><div class="callout-block" data-callout="true"><p>&#8220;You cannot go against them in a policy decision, even though it&#8217;s in our national interest, when they have infiltrated you economically. They use our laws, our rules, our banks, our lawyers, our lobbyists &#8212; it&#8217;s a strategy from within.&#8221;</p></div><p>The Kentucky mill was never built. Rusal ultimately invested approximately $65 million of its $200 million pledge before suspending further investment in March 2021. Braidy Industries was renamed Unity Aluminum, eventually merged with Steel Dynamics, and the mill project moved elsewhere. Kentucky recouped its $15 million taxpayer investment in September 2022, and the site was donated back to the regional industrial authority. The <em>political</em> function of the Rusal-Kentucky deal &#8212;&nbsp;the lifting of sanctions through the promise of American jobs &#8212; appears to have outlived its economic function by several years.</p><p>Beyond McConnell, Blavatnik&#8217;s Republican giving continued down the ticket: $1.1 million to Scott Walker&#8217;s PAC, $800,000 to Lindsey Graham&#8217;s PAC, $250,000 to John Kasich, and $200,000 to John McCain. Blavatnik then added $1 million to Donald Trump&#8217;s 2017 inaugural committee. His donations to Democrats over the same period to Kamala Harris, Chuck Schumer, Ron Wyden, Bob Menendez, and Hillary Clinton were described by Quartz as &#8220;relatively small sums&#8221; totaling in the low hundreds of thousands across multiple recipients. In the 2020 cycle, he gave $5,200 to Pete Buttigieg and $5,600 to Joe Biden. </p><p>Framing this as &#8220;bipartisan&#8221; would obscure a donation ratio of at least ten to one in favor of Republicans during the pivotal 2015&#8211;2017 period, concentrated in the hands of GOP leadership. The identities of the recipients, including the top foreign policy official in the United States government and the chairman of the Senate committee responsible for the federal budget blueprint,&nbsp;matter more now than they did when the donations were made.</p><p>Marco Rubio was confirmed as the 72nd Secretary of State on January 20, 2025 by a 99&#8211;0 Senate vote, and was sworn in the following day; since May 1, 2025, he has also served concurrently as acting National Security Advisor, the first person to hold both positions simultaneously since Henry Kissinger. Lindsey Graham was elected Chairman of the Senate Budget Committee for the 119th Congress on December 20, 2024, and has since used that chair to shepherd the FY 2025 budget resolution and the &#8220;One Big Beautiful Bill Act&#8221; through the Senate. </p><p>In 2024, the <strong><a href="https://www.washingtonpost.com/nation/2024/05/16/business-leaders-chat-group-eric-adams-columbia-protesters/">Washington Post</a></strong> reported that Blavatnik belonged to a WhatsApp group of powerful U.S. business leaders, whose <strong><a href="https://israelpalestinenews.org/jewish-billionaires-secretly-worked-to-shape-u-s-public-opinion-on-israels-war-against-gaza/">stated goals</a></strong> included shifting public opinion in favor of Israel and coordinating with Israeli government officials after October 7th. Members discussed receiving private briefings from Israeli officials and pressuring Columbia University&#8217;s administration to permit police action against student protesters. </p><p>The Washington Post&#8217;s reporting drew pushback. NYC Deputy Mayor for Communications Fabien Levy, who is Jewish, <strong><a href="https://www.jpost.com/diaspora/antisemitism/article-801609">called</a></strong> the framing &#8220;offensive&#8221; and &#8220;antisemitic&#8221; in a <strong><a href="https://x.com/Fabien_Levy/status/1791263665359843796">post</a></strong> on X:</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/Fabien_Levy/status/1791263665359843796&quot;,&quot;full_text&quot;:&quot;I was honestly shocked when this inquiry came in.\n\nThe insinuation that Jewish donors secretly plotted to influence government operations is an all too familiar antisemitic trope that <span class=\&quot;tweet-fake-link\&quot;>@washingtonpost</span> should have been ashamed to ask about, let alone actually publish. 1/7&quot;,&quot;username&quot;:&quot;Fabien_Levy&quot;,&quot;name&quot;:&quot;Fabien Levy&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1479262564479610888/I0e-xieM_normal.jpg&quot;,&quot;date&quot;:&quot;2024-05-17T00:25:12.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{&quot;full_text&quot;:&quot;Exclusive: A group of billionaires and business titans working to shape U.S. public opinion of the war in Gaza privately pressed New York City&#8217;s Mayor Eric Adams (D) last month to send police to disperse pro-Palestinian protests at Columbia University. https://t.co/PWgvkAwVG0&quot;,&quot;username&quot;:&quot;washingtonpost&quot;,&quot;name&quot;:&quot;The Washington Post&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1060271522319925257/fJKwJ0r2_normal.jpg&quot;},&quot;reply_count&quot;:26,&quot;retweet_count&quot;:16,&quot;like_count&quot;:54,&quot;impression_count&quot;:33135,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/Fabien_Levy/status/1791263667243163862&quot;,&quot;full_text&quot;:&quot;With lines like this:\n\n\&quot;Overall, the messages offer a window into how some prominent individuals have wielded their money &amp;amp; power in an effort to shape American views of the Gaza war, as well as the actions of academic, business &amp;amp; political leaders &#8212; including NY's mayor.\&quot; 2/7&quot;,&quot;username&quot;:&quot;Fabien_Levy&quot;,&quot;name&quot;:&quot;Fabien Levy&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1479262564479610888/I0e-xieM_normal.jpg&quot;,&quot;date&quot;:&quot;2024-05-17T00:25:12.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:5,&quot;retweet_count&quot;:1,&quot;like_count&quot;:11,&quot;impression_count&quot;:2822,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/Fabien_Levy/status/1791263668493070506&quot;,&quot;full_text&quot;:&quot;This story is even more offensive than even initially described to us.\n\nTo be clear, both times the NYPD entered <span class=\&quot;tweet-fake-link\&quot;>@Columbia</span>'s campus &#8212; on April 18th &amp;amp; April 30th &#8212; were in response to specific written requests from Columbia University to do so. 3/7&quot;,&quot;username&quot;:&quot;Fabien_Levy&quot;,&quot;name&quot;:&quot;Fabien Levy&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1479262564479610888/I0e-xieM_normal.jpg&quot;,&quot;date&quot;:&quot;2024-05-17T00:25:13.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:3,&quot;retweet_count&quot;:1,&quot;like_count&quot;:17,&quot;impression_count&quot;:3173,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/Fabien_Levy/status/1791263669789086139?s=20&quot;,&quot;full_text&quot;:&quot;The suggestion that other considerations were involved in the decision-making process is completely false.\n\nAs <span class=\&quot;tweet-fake-link\&quot;>@NYCMayor</span> has often said, peaceful protest has a place in our society &amp;amp; will always be protected. 4/7&quot;,&quot;username&quot;:&quot;Fabien_Levy&quot;,&quot;name&quot;:&quot;Fabien Levy&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1479262564479610888/I0e-xieM_normal.jpg&quot;,&quot;date&quot;:&quot;2024-05-17T00:25:13.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:2,&quot;retweet_count&quot;:1,&quot;like_count&quot;:11,&quot;impression_count&quot;:2269,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>None of this is secret; it is the documented financial and political biography of the man whose name is on the school where America&#8217;s and Britain&#8217;s top cyber officials now work. With that said, billionaires have deep pockets with which to handle legal and media matters. Blavatnik&#8217;s representatives have publicly rejected the &#8220;oligarch&#8221; label as &#8220;both highly inaccurate and offensive,&#8221; and major outlets including the Guardian and the Times of London have published formal corrections after describing him as a &#8220;Putin pal&#8221; or &#8220;Putin associate.&#8221; </p><p>His lawyer, Martin Singer, told <strong><a href="https://qz.com/1521847/major-gop-donor-len-blavatnik-had-business-ties-to-a-russian-official">Quartz</a></strong> in a December 2018 letter that Blavatnik had &#8220;zero&#8221; involvement in Russian politics.</p><div class="callout-block" data-callout="true"><p>Blavatnik takes great pains to distance himself from Russian politics. Within hours of describing Blavatnik as an &#8220;oligarch&#8221; when<a href="https://qz.com/963801/trumps-inauguration-committee-took-1-mln-from-alexander-shustorovich-a-russian-american-whose-money-the-republicans-rejected"> </a><strong><a href="https://qz.com/963801/trumps-inauguration-committee-took-1-mln-from-alexander-shustorovich-a-russian-american-whose-money-the-republicans-rejected">breaking the news</a></strong> of his donation to Trump&#8217;s inaugural committee in 2017, Quartz received an email from his PR representative. An outside spokesperson for Blavatnik&#8217;s Access Industries called the term oligarch &#8220;both highly inaccurate and offensive,&#8221; arguing that it implied having a &#8220;great deal of political influence&#8221; in Russia. The spokesperson said that Blavatnik hadn&#8217;t had any contact with president Vladimir Putin since 2000 and that he &#8220;plays no role in Russian politics.&#8221;</p></div><p><strong><a href="https://www.bloomberg.com/news/articles/2023-05-18/billionaire-blavatnik-said-to-unload-last-major-russia-asset-with-rusal-sale">Bloomberg</a> </strong>wrote<strong> </strong>in May 2023 that &#8220;naturalized US citizen&#8221; Blavatnik had divested &#8220;his last major asset in the country where he seeded his fortune,&#8221; exiting a chapter that began with TNK-BP&#8217;s sale to Rosneft in 2013 and his departure from the Rusal board in 2016.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>The outlets that could have broken this story didn't, because the access they depend on dies the moment they print it. Hacking, but Legal has no access to protect &#8212; only readers. Paid subscribers are the reason this piece exists, and the reason the next one will. Become one.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2>The Institutional Network</h2><p>The Blavatnik philanthropic footprint across Western academic institutions is extraordinary in both scale and strategic positioning.</p><p>The <strong><a href="https://www.bsg.ox.ac.uk/">Blavatnik School of Government</a></strong> at the University of Oxford was founded in 2010 with a <strong><a href="https://blavatnikfoundation.org/beneficiary/blavatnik-school-of-government/">&#163;75 million donation</a></strong> from the Blavatnik Family Foundation, one of the largest gifts in Oxford&#8217;s nine-hundred-year history. The original donation came from &#8220;Len Blavatnik and a trust associated with him&#8221; per Oxford&#8217;s <strong><a href="https://governance.admin.ox.ac.uk/legislation/blavatnik-school-of-government">Council Regulations</a></strong>; the &#8220;Blavatnik Family Foundation&#8221; was formally incorporated as a 501(c)(3) later, though the Foundation&#8217;s website now claims the gift.</p><p>The university contributed an additional &#163;26 million. The school&#8217;s purpose-built headquarters, designed by the famous Swiss architectural firm Herzog and de Meuron, was inaugurated by Prince William in 2016. It trains future government leaders through its Master of Public Policy program, hosts senior practitioners as visiting fellows, and conducts research on governance and public policy. It is, by design, a pipeline for the people who will run governments.</p><p>Oxford&#8217;s own <strong><a href="https://governance.admin.ox.ac.uk/legislation/blavatnik-school-of-government">governance regulations</a></strong> for the school are clear: Regulation 3 states &#8220;the academic direction and day-to-day management of the School shall be entirely and exclusively the responsibility of the University,&#8221; and Regulation 8 affirms Oxford&#8217;s &#8220;duty to preserve and protect the academic freedom of its academic staff.&#8221; But the same regulations contain a more unusual provision: the appointment of the Dean &#8220;shall be made by Council, with the approval in writing of the Blavatnik School of Government Foundation, such approval not to be unreasonably withheld.&#8221; The donor&#8217;s foundation holds a contractual say over who leads the institution. This arrangement is unusual in academic governance, where donor influence over senior appointments is typically resisted.</p><p>The <strong><a href="https://en-cyber.tau.ac.il/">Blavatnik Interdisciplinary Cyber Research Center</a></strong> (ICRC) at Tel Aviv University was established as a joint initiative with the Israel National Cyber Directorate under the Prime Minister&#8217;s Office. $65 million <strong><a href="https://blavatnikfoundation.org/case-study/tel-aviv-university/">funded</a></strong> the entire &#8220;Blavatnik Initiative&#8221; at TAU &#8212; encompassing the ICRC in addition to a drug discovery center, computer science fund, and other programs. ICRC is led by Major General (Ret.) Isaac Ben-Israel, former Director of Defense R&amp;D at Israel&#8217;s Ministry of Defense. The center hosts <strong><a href="https://cyberweektau.com/about/">Cyber Week</a></strong>, one of the world&#8217;s largest cybersecurity conferences drawing over 11,000 attendees from 99 countries, and runs DefenseTech Week in collaboration with the Israeli Ministry of Defense.</p><p>Beyond these two cyber-specific institutions, the Blavatnik Foundation has donated at least <strong><a href="https://www.thecrimson.com/article/2023/12/22/blavatnik-halts-donations-antisemitism/">$270 million to Harvard</a></strong> (including $200 million to Harvard Medical School, the largest gift in HMS history), roughly <strong><a href="https://blavatnikfoundation.org/beneficiary/universities/">$75 million to Yale</a></strong>, and tens of millions more to Columbia, Stanford, Brown, the University of Pennsylvania, the University of Cambridge, the Royal Academy of Engineering, and the New York Academy of Sciences. The Blavatnik Family Foundation&#8217;s <strong><a href="https://www.philanthropy.com/article/billionaire-len-blavatnik-pours-money-into-education-medical-research-and-history/">own website</a></strong><a href="https://www.philanthropy.com/article/billionaire-len-blavatnik-pours-money-into-education-medical-research-and-history/"> </a>now reports contributions exceeding $1.3 billion to over 250 institutions.</p><p>The pattern is clear: Blavatnik&#8217;s money does not simply support academic research. It names buildings, names schools, names programs, and in the case of the Oxford school, grants contractual influence over leadership appointments. The institutions receiving this funding are the ones that train government officials, conduct cyber policy research, and host leaders who recently held some of the most sensitive civilian cyber defense positions in the Western alliance.</p><div><hr></div><h2>The Cyber Leadership Pipeline</h2><p>The appointments at the Blavatnik School follow a pattern: government cyber leaders depart their positions and land at Oxford, where they receive academic prestige, a platform for continued policy influence, and proximity to the Blavatnik network, while simultaneously taking on private-sector roles.</p><p><strong>Ciaran Martin</strong> stepped down as CEO of NCSC on August 31, 2020, and joined the Blavatnik School as Professor of Practice on September 1. He is the founding director of OxCTP, the cyber policy program Easterly later joined, which he now co-directs with Dr Brianna Rosen. Simultaneously, Martin serves as Managing Director at <strong><a href="https://www.paladincapgroup.com/cyber-vc-paladin-appoints-former-ncsc-ceo-ciaran-martin-as-md/">Paladin Capital Group</a></strong>, a venture capital firm investing in early-stage cybersecurity companies, and sits on the Global Advisory Board of <strong><a href="https://cybercx.com.au/news/former-head-of-uk-national-cyber-security-ciaran-martin/">CyberCX</a></strong>, Australia and New Zealand&#8217;s largest cybersecurity services provider. The Blavatnik academic appointment provides the credibility platform; the private-sector positions provide the commercial channel. The knowledge and relationships cultivated during four years running NCSC (and longer still in GCHQ&#8217;s cyber leadership) now flow through both.</p><p><strong>Jen Easterly</strong> left CISA on January 20, 2025, when the Trump administration took office. Her <strong><a href="https://en.wikipedia.org/wiki/Jen_Easterly">career</a></strong> before CISA included service in NSA&#8217;s Tailored Access Operations, the agency&#8217;s elite offensive hacking unit; helping establish U.S. Cyber Command in 2009-2010; serving as Deputy for Counterterrorism at NSA; and over two years as Special Assistant to President Obama and Senior Director for Counterterrorism on the National Security Council. Between government stints, she spent more than four years at Morgan Stanley as global head of their cybersecurity fusion center. She is a West Point graduate and Rhodes Scholar who earned her Oxford master&#8217;s degree at Pembroke College.</p><p>In July 2025, Easterly was <strong><a href="https://www.hstoday.us/industry/people-on-the-move/jen-easterly-former-cisa-director-returns-to-west-point-as-distinguished-chair-in-social-sciences-department/">appointed</a></strong> to the Robert F. McDermott Distinguished Chair at West Point&#8217;s Department of Social Sciences. <strong><a href="https://thehill.com/homenews/administration/5428595-jen-easterly-west-point-laura-loomer/">Less than 24 hours</a></strong> after far-right activist Laura Loomer criticized the appointment, Secretary of the Army Daniel Driscoll rescinded the offer, posted a public <strong><a href="https://x.com/SecArmy/status/1950580548029595746">announcement</a></strong> on X, and ordered a review of hiring practices.</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/SecArmy/status/1950580548029595746&quot;,&quot;full_text&quot;:&quot;I have immediately directed West Point to:\n\n1. Rescind Jen Easterly&#8217;s offer to serve as the McDermott Chair\n2. Pause outside groups from selecting Academy employees or instructors\n\nI have also asked the Chair of the West Point Board of Visitors to conduct a full review of the &quot;,&quot;username&quot;:&quot;SecArmy&quot;,&quot;name&quot;:&quot;Secretary of the Army&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1900269837726720000/bYUZOsHj_normal.jpg&quot;,&quot;date&quot;:&quot;2025-07-30T15:33:37.000Z&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/GxHUs-vWwAAYmPc.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/AJixH5LtjI&quot;}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:1131,&quot;retweet_count&quot;:5460,&quot;like_count&quot;:28877,&quot;impression_count&quot;:2094176,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>Easterly responded to the <strong><a href="https://www.theregister.com/2025/07/31/jen_easterly_west_point_termination/">rescission</a></strong>, describing herself as a &#8220;casualty of casually manufactured outrage&#8221; and a victim of cynicism that &#8220;corrodes our institutions&#8221;. </p><p>The <strong><a href="https://www.linkedin.com/pulse/harder-right-jen-easterly-hi1be/">full statement</a></strong> is available on LinkedIn, but I quote from it here:</p><div class="callout-block" data-callout="true"><p>&#8220;As a lifelong independent, I&#8217;ve served our nation in peacetime and combat under Republican and Democratic administrations. I&#8217;ve led missions at home and abroad to protect all Americans from vicious terrorists, rogue nations, and cybercriminals. I&#8217;ve worked my entire career not as a partisan, but as a patriot&#8212;not in pursuit of power, but in service to the country I love and in loyalty to the Constitution I swore to protect and defend, against all enemies.</p><p>But this isn&#8217;t about me. This is about something larger.</p><p>It&#8217;s about the sacred trust we place in those who wear the uniform&#8212;and the damage threatened when that trust is eroded by partisanship. The U.S. military&#8212;including its academies&#8212;must remain an institution above politics, grounded in service to the Constitution. When outrage is weaponized and truth discarded, it tears at the fabric of unity and undermines the very ethos that draws brave young men and women to serve and sacrifice: Duty, Honor, Country. We must guard against the corrosive force of division&#8212;and stand firm in defense of these values that should bind us together.</p><p>It&#8217;s also about what we teach the next generation&#8212;about moral courage, judgment, and most importantly, character. It is not in comfort but in challenge that the warrior spirit is called forth&#8212;and the soul&#8217;s compass tested.</p><p>The Warrior Ethos was forged into me long ago, and it does not waver now. And though I will not walk the grounds of West Point this fall, I will continue advancing its mission&#8212;by leading with honor and integrity.</p><p>Every member of the Long Gray Line knows the Cadet Prayer. It asks that we &#8220;choose the harder right instead of the easier wrong.&#8221; That line&#8212;so simple, yet so powerful&#8212;has been my North Star for more than three decades. In boardrooms and war rooms. In quiet moments of doubt and in public acts of leadership.</p><p>The harder right is never easy. That&#8217;s the whole point.</p><p>To lead in this moment is to believe that with unshakeable certainty, to resist the cynicism that corrodes our institutions, to meet falsehoods with fidelity to truth and adversity with resilience.&#8221;</p></div><p>The same official who rescinded Easterly&#8217;s West Point appointment has since become one of the most consequential figures in U.S. national security. </p><p>In November 2025, President Trump tapped Driscoll (a Yale Law classmate of Vice President JD Vance with no prior diplomatic experience) to lead American negotiations to end the Russian war in Ukraine. Driscoll flew to Kyiv, then Geneva for talks alongside Rubio, Special Envoy Steve Witkoff, and Jared Kushner, then to Abu Dhabi for secret talks with a Russian delegation. The Army secretary is now the United States&#8217; primary point of contact with the Russian government on the most consequential foreign policy question of Trump&#8217;s second term, working off a 28-point peace plan originally drafted behind closed doors by Witkoff and Kremlin envoy Kirill Dmitriev.</p><p>His own position, however, is reportedly fragile. The Washington Post <strong><a href="https://www.washingtonpost.com/national-security/2026/04/07/hegseth-dan-driscoll-army/">reported</a></strong> on April 7, 2026 that Driscoll has been engaged in a months-long conflict with Defense Secretary Pete Hegseth over personnel decisions, including Hegseth&#8217;s attempts to block the promotions of four Army officers (two women, two <strong><a href="https://www.hackingbutlegal.com/p/pete-hegseth-revives-segregation">Black</a></strong>) to one-star generals, and Hegseth&#8217;s forced retirement of Army Chief of Staff General Randy George in early April ahead of schedule. Driscoll told the Post he has &#8220;no plans to depart or resign as the Secretary of the Army&#8221; and remains &#8220;laser focused&#8221; on Army readiness, but sources told the paper that tensions ran high enough last fall that Driscoll asked Vance to intervene on his behalf. </p><p>The same political dynamic that ended Easterly&#8217;s West Point appointment&nbsp;&#8212; outrage cultivated on partisan media, personnel decisions driven by loyalty rather than credentials &#8212; is now operating at the top of the Pentagon itself against the man who executed the Easterly rescission. The difference is that Driscoll has Vance; Easterly did not.</p><p>Easterly&#8217;s Blavatnik School fellowship was<strong> <a href="https://www.bsg.ox.ac.uk/news/global-cyber-security-leader-jen-easterly-joins-visiting-fellow-0">announced</a> </strong>the following month. This political exclusion from a traditional government-military academic role left the Blavatnik School as her primary institutional home, illustrating how private philanthropic institutions can become the only viable platform for elite experts who fall out of political favor in their home countries.</p><p>The convergence is now complete. The person who ran America&#8217;s civilian cyber defense and the person who ran Britain&#8217;s national cyber security center are working in the same program, at the same school, funded by the same individual, contributing to the same research and teaching on cyber policy.</p><div><hr></div><h2>The Structural Concern</h2><p>The question this arrangement raises is not about the individual integrity of Easterly or Martin. Both are widely respected professionals with distinguished records of public service. There is no evidence that either has been compromised or that their work at the Blavatnik School is anything other than legitimate academic engagement.</p><p>The concern is structural, and it operates at four levels.</p><p>First, there is the question of institutional dependence. When a single donor&#8217;s foundation holds contractual approval over the Dean of a school of government, and that school becomes the preferred destination for the most senior Western cyber officials, the donor&#8217;s interests become ambient. They need not be expressed through directives or conditions. They are embedded in the architecture. The scholars and fellows at the school know who funds it. The institution&#8217;s continued prestige depends on continued funding. The donor&#8217;s political and financial interests, documented in public filings, news reporting, and his own statements, form the background against which all programming decisions are made.</p><p>Second, there is the question of knowledge concentration. Easterly and Martin collectively possess the most comprehensive understanding of U.S. and UK cyber defense capabilities, vulnerabilities, and strategic doctrines held by any two people outside of current government service. Easterly worked in Tailored Access Operations, helped build Cyber Command, ran counterterrorism at NSA, and directed CISA. Martin built and ran NCSC for four years. The classified knowledge they carry does not expire when they leave government. Housing both of them under the same institutional roof, funded by a single individual with documented connections to sanctioned Russian entities, creates a concentration of strategic knowledge in a space that is neither government nor private sector, and is subject to neither classification controls nor corporate compliance regimes.</p><p>Third, the Atlantic Council <strong><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/defending-the-united-states-against-russian-dark-money/">report</a></strong> explains why Blavatnik&#8217;s alleged personal innocence may be beside the point. &#197;slund and Friedlander describe a mechanism that applies to wealthy Russian-born businessmen even when they hold Western passports and live outside Russia: the richer they get, the more leverage the Kremlin has over them. Their assets sit in two places: Russia, which Putin controls directly, and the West, where Western sanctions can freeze them. The Kremlin can squeeze either end.</p><p>The <strong><a href="https://en.wikipedia.org/wiki/Mueller_report">Mueller Report</a></strong> documented exactly this dynamic playing out with one of Blavatnik&#8217;s original business partners. Petr Aven, head of Alfa-Bank and a partner in the 1997 AAR consortium that Blavatnik co-founded, told Mueller&#8217;s team that he met with Putin roughly every three months. Aven said he treated anything Putin raised in those meetings as an order, and that refusing would have consequences. The specific threat Putin made to Aven in late 2016, according to Mueller, was that the United States might sanction Alfa-Bank, and that Aven needed to do something about it. In other words: Putin was using the threat of American sanctions to pressure a Russian oligarch into doing the Kremlin&#8217;s bidding.</p><p>None of this means Blavatnik operates under the same pressure Aven does, but people with whom Blavatnik built his fortune are on the record in sworn federal investigations as people who take orders from Putin because they simply cannot afford not to. Blavatnik maintained financial relationships with some of them until as recently as 2022. &#197;slund and Friedlander describe this kind of Kremlin pressure on wealthy Russians as &#8220;standard procedure.&#8221; The question is not whether Blavatnik himself takes orders from Moscow. It is whether the people around him do, and what that proximity means for the institution funding Easterly and Martin&#8217;s shared academic home.</p><p>Fourth, there is the question of the three-country bridge. The Blavatnik institutional network now spans the United States, the United Kingdom, and Israel. Easterly&#8217;s career and Blavatnik&#8217;s donations to Harvard, Yale, and Columbia anchor the American node. The Oxford school and Martin&#8217;s appointment anchor the British node. The ICRC at Tel Aviv University, jointly operated with the Israeli Prime Minister&#8217;s Office, anchors the Israeli node. These three countries are among the most important intelligence-sharing partners in the Western alliance. </p><p>The structural implications of these questions extend far beyond any individual appointment.</p><div><hr></div><h2>The Precedent</h2><p>In August 2017, <strong><a href="https://en.wikipedia.org/wiki/Bo_Rothstein">Bo Rothstein</a></strong> resigned his position as Professor of Government and Public Policy at the Blavatnik School in <strong><a href="https://www.promarket.org/2017/09/01/bo-rothstein-explains-resigned-oxford-donors-link-donald-trump/">protest</a></strong> over Blavatnik&#8217;s $1 million contribution to Donald Trump&#8217;s inaugural committee. &#8220;I cannot give legitimacy and credibility to a person who is supporting Donald Trump,&#8221; he <strong><a href="https://cherwell.org/2017/11/01/blavatnik-professor-accuses-oxford-of-excommunication-after-trump-protest/">wrote</a></strong> in his resignation letter to Oxford&#8217;s Vice Chancellor Louise Richardson. </p><p>ProMarket, a publication of the George J. Stigler Center at the University of Chicago&#8217;s Booth School of Business <strong><a href="https://www.promarket.org/2017/09/01/bo-rothstein-explains-resigned-oxford-donors-link-donald-trump/">interviewed</a></strong> him at the time, noting that &#8220;Rothstein is one of the most influential political scientists in the world today, having spent decades studying corruption and quality of government.&#8221;</p><p>Cherwell, Oxford&#8217;s student newspaper, <strong><a href="https://cherwell.org/2017/11/01/blavatnik-professor-accuses-oxford-of-excommunication-after-trump-protest/">obtained</a></strong> Rothstein&#8217;s letter on October 31, 2017, and published a story quoting it the following day:</p><div class="callout-block" data-callout="true"><p>&#8220;My duties as a teacher and supervisor have been cancelled. I have also been asked to vacate the responsibility I have had for the School&#8217;s weekly research seminar. And I have been asked not to appear in person at the School, and to vacate my office.</p><p>This policy of excommunication stands in conflict with the principles of academic freedom and freedom of expression.&#8221;</p></div><p>Rothstein <strong><a href="https://cherwell.org/2017/11/01/blavatnik-professor-accuses-oxford-of-excommunication-after-trump-protest/">told Cherwell</a></strong> that he had been &#8220;excommunicated&#8221; from the school and barred from his office and students after the resignation. The Blavatnik school disputed his characterization, calling his allegations &#8220;false.&#8221; <strong><a href="https://www.npr.org/sections/therecord/2017/09/07/549150268/political-donation-by-warner-music-owner-leads-to-university-professors-resignat">NPR</a></strong> and <strong><a href="https://www.theguardian.com/education/2017/aug/29/oxford-professor-in-trump-donation-row-defends-resignation">The Guardian</a></strong> covered the resignation <strong><a href="https://www.theguardian.com/business/2017/sep/03/len-blavatnik-oligarch-controversy-philanthropy-resignation-oxford-professor">extensively</a></strong>. </p><p>Rothstein returned to Sweden.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yF0O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yF0O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yF0O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yF0O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yF0O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yF0O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg" width="711" height="709.5350274725274" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1453,&quot;width&quot;:1456,&quot;resizeWidth&quot;:711,&quot;bytes&quot;:3036744,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/193396250?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yF0O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yF0O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yF0O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yF0O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F650784e9-5754-484c-aa6b-7c12c18852b3_5236x5225.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong>The Guardian, <a href="https://www.theguardian.com/business/2017/sep/03/len-blavatnik-oligarch-controversy-philanthropy-resignation-oxford-professor">September 3, 2017</a> and <a href="https://www.theguardian.com/education/2017/aug/29/oxford-professor-in-trump-donation-row-defends-resignation">August 29, 2017</a></strong></em></figcaption></figure></div><p>Two years earlier, in November 2015, a group of academics, Oxford alumni, and Russian dissidents including physicist and human rights activist <strong><a href="https://en.wikipedia.org/wiki/Pavel_Litvinov">Pavel Litvinov</a></strong> had published an open letter in <strong><a href="https://www.theguardian.com/education/2015/nov/03/oxford-university-accused-over-oligarch-len-blavatnik-75m-donation">The Guardian</a></strong> urging Oxford to &#8220;stop selling its reputation and prestige to Putin&#8217;s associates,&#8221; as <strong><a href="https://www.oxfordstudent.com/2015/11/09/oxford-criticised-for-accepting-75m-blavatnik-donation/">reported</a></strong> by the Oxford Student and covered in detail by <strong><a href="https://cherwell.org/2022/04/04/oxford-partnerships-report/">Cherwell</a></strong>.</p><p>The letter was organized by <strong><a href="https://www.linkedin.com/in/ilya-zaslavskiy-bab8624/">Ilya Zaslavskiy</a></strong>, a specialist in due diligence, sanctions, and kleptocracy who holds an MPhil in International Relations from the University of Oxford. Zaslavskiy held positions in TNK-BP's international affairs and gas business units between 2006 and 2010 &#8212; the Blavatnik-Vekselberg-Fridman oil venture central to this piece &#8212; before being arrested by the FSB in March 2008 in what the Washington Post <strong><a href="https://www.washingtonpost.com/wp-dyn/content/article/2008/03/20/AR2008032003797.html">reported</a></strong> at the time was widely viewed as part of an effort to force TNK-BP's foreign partners out of the venture. The FSB initially accused Zaslavskiy and his brother of state treason; the charge was later downgraded to industrial espionage, and then to &#8220;failed attempt of industrial espionage,&#8221; before a 2009 trial that Zaslavskiy described as a show trial, which ended with a conviction and a sentence of two years of probation. More than 100 Western managers were forced out of TNK-BP during the same period, and TNK-BP's British CEO Robert Dudley was forced to leave the country.</p><p>Zaslavskiy has since served as head of research at the Free Russia Foundation, as a fellow at Chatham House, and as senior program manager at the Center for International Private Enterprise. He heads Underminers.info, a research project exposing Eurasian kleptocrats in the West, and has written research papers for the Atlantic Council, Hudson Institute, Martens Centre, and other leading think tanks. His April 2021 <strong><a href="https://www.underminers.info/publications/2021/4/28/kremligarchs">paper</a></strong> &#8220;Which Kremligarchs Should Be Sanctioned by the Biden Administration?&#8221; introduced the term Kremligarchs to describe a litany of individuals who &#8220;should be added to the US Treasury sanctions&#8217; lists due to their close involvement in the Kremlin&#8217;s infrastructure designed to harm the US and its allies.&#8221;</p><p>In May 2022, <strong><a href="https://www.cnn.com/2022/05/11/us/russian-oligarchs-philanthropy-ukraine-war-invs">CNN</a></strong> reported that a group of fifty-five American and European foreign policy experts and anti-corruption activists had written a letter in September 2019 to the board of the Council on Foreign Relations to protest CFR&#8217;s acceptance of a $12 million donation, stating that Blavatnik &#8220;uses his &#8216;philanthropy&#8217; at leading western academic and cultural institutions to advance his access to political circles,&#8221; calling such giving a vehicle for &#8220;the infiltration of the US and UK political and economic establishments at the highest levels.&#8221;</p><p>CNN <strong><a href="https://www.cnn.com/2022/05/11/us/russian-oligarchs-philanthropy-ukraine-war-invs">further contextualized</a></strong> the situation:</p><div class="callout-block" data-callout="true"><p>&#8220;Potanin [&#8230;] isn&#8217;t the first or only oligarch to use his wealth to attempt to sway the opinion of Western elite. In fact, it&#8217;s a page straight out of an old American playbook.</p><p>Nineteenth century robber barons famously splashed their names across orchestra halls and museums to shed their reputations as ethically dubious industrialists who amassed enormous wealth on the backs of America&#8217;s most vulnerable. It worked: When most Americans hear the name Andrew Carnegie, they probably think of Carnegie Hall or Carnegie Mellon and not one of the deadliest labor confrontations in American history, which occurred at one of his steel plants in 1892. </p><p>[&#8230;] </p><p>In much the same way, Putin&#8217;s inner circle &#8211; many of whom are oligarchs who have profited off corruption and made their wealth in illicit ways &#8211; use philanthropy in the West to launder their reputations and gain access to American and European high society, according to experts.</p><p>Dartmouth sociology professor Brooke Harrington said oligarchs of any nationality typically target three kinds of institutions with their donations &#8211; cultural, political, and educational.&#8221;</p></div><p>These concerns predate the cyber dimension entirely. The question of whether Blavatnik&#8217;s money buys influence at Oxford has been debated since 2010. What has changed is the nature of the people now accepting his hospitality. When the school hosted political scientists and public policy scholars, the stakes were academic.</p><p>Now that it hosts the former heads of CISA and NCSC &#8212; people who possess the most sensitive knowledge about Western cyber defense &#8212;&nbsp;the stakes have become both a matter of national security and perceptions of the same.</p><div><hr></div><h2>What Comes Next</h2><p>The Oxford Programme for Cyber and Technology Policy is expanding. Its inaugural Oxford Cyber Forum has already taken place in June 2024. Easterly has contributed to classes, seminars, and public events, including a <strong><a href="https://www.ox.ac.uk/event/global-tech-policy-unsettled-age">panel</a></strong> at OxCTP&#8217;s Global Tech Policy Seminar Series alongside former Executive Vice President of the European Commission Margrethe Vestager. The program aims to &#8220;help governments navigate the cyber frontier and encourage the responsible adoption of emerging technologies.&#8221;</p><p>This is, on its face, valuable work. Democratic societies need thoughtful cyber policy. Academic institutions play an important role in developing it. The question is not whether this work should be done, but whether it should be done under the name and with the money of a single private individual whose financial biography includes partnerships with sanctioned Russian oligarchs, offshore entanglements with Russian government officials, and documented participation in coordinated influence campaigns.</p><p>There are other places where these leaders could have landed. Easterly is a West Point graduate who could have returned there, and nearly did. Martin could have joined any number of British universities or think tanks. Both chose, or accepted, the institution that offered the most prestige, the most resources, and the most ambitious cyber policy program, which happens to be the one funded by Len Blavatnik.</p><p>The individual decisions are rational, but the systemic outcome warrants scrutiny. </p><p>When a single billionaire with documented Russian oligarch ties funds the academic home of both the American and British cyber chiefs, the school that trains future government leaders, and a cyber research center jointly operated with the Israeli Prime Minister&#8217;s Office, the resulting structure is not a conspiracy. It is something more durable: an institution. Institutions do not need to conspire. They shape behavior through incentives, access, and prestige, and they outlast any individual appointment.</p><p>The question for policymakers, for the intelligence community, and for the public is whether this particular institution, with this particular funding source, in this particular configuration, is something Western democracies should be comfortable with, or whether the concentration of cyber leadership under a single private benefactor represents a structural vulnerability that no one has been willing to name at the intersection where it matters most: the pipeline of departing cyber chiefs into a single donor-funded institution.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>Access journalism can't touch stories like this. Reader-funded journalism can. Become a paid subscriber and keep Hacking, but Legal independent.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em>Correction, April 9, 2026: An earlier version of this piece described Ilya Zaslavskiy as &#8220;a former Russian politician.&#8221; Zaslavskiy is in fact a specialist in due diligence, sanctions, and kleptocracy who held positions in TNK-BP's international affairs and gas business units between 2006 and 2010 and was prosecuted in 2008-9 in what the Washington Post reported at the time was widely viewed as part of an effort to force TNK-BP's foreign partners out of the venture. The reference has been updated. I regret the error.</em></p>]]></content:encoded></item><item><title><![CDATA[EXCLUSIVE: The Architecture of Erasure]]></title><description><![CDATA[How Trump's executive orders on DEI are dismantling American cybersecurity &#8212; one accountability structure at a time]]></description><link>https://www.hackingbutlegal.com/p/the-architecture-of-erasure</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/the-architecture-of-erasure</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Mon, 06 Apr 2026 22:22:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uEQ9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In July 2025, the acting director of the nation&#8217;s civilian cyberdefense agency walked into a secure facility for a counterintelligence polygraph and did not pass. </p><p>Five current officials and one former official later <strong><a href="https://www.politico.com/news/2025/12/21/cisa-acting-director-madhu-gottumukkala-polygraph-investigation-00701996">confirmed</a></strong> this to Politico. Then, he took it again. He did not pass the second time either. Within days of the first result, the employees who had arranged the examination and done nothing more than follow the security requirements of the originating intelligence agency received letters suspending their access to classified information. The acting director kept his badge, but the staffers who enforced the rules lost theirs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uEQ9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uEQ9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uEQ9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uEQ9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uEQ9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uEQ9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;South Dakota has made tremendous investments to improve our IT  infrastructure. Our new BIT Commissioner Dr. Madhu Gottumukkala is the  right person to carry that momentum forward. He will focus on putting&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="South Dakota has made tremendous investments to improve our IT  infrastructure. Our new BIT Commissioner Dr. Madhu Gottumukkala is the  right person to carry that momentum forward. He will focus on putting" title="South Dakota has made tremendous investments to improve our IT  infrastructure. Our new BIT Commissioner Dr. Madhu Gottumukkala is the  right person to carry that momentum forward. He will focus on putting" srcset="https://substackcdn.com/image/fetch/$s_!uEQ9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uEQ9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uEQ9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uEQ9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F228fd0e7-a0da-4a27-86b4-706c5dfa17d1_1200x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Image Source: <a href="https://x.com/KristiNoem/status/1831094521792504305">@KristiNoem</a>/X</em></figcaption></figure></div><p>That sequence of events, which received scattered coverage when it <strong><a href="https://www.politico.com/news/2025/12/21/cisa-acting-director-madhu-gottumukkala-polygraph-investigation-00701996">broke into public view</a></strong> last December, is the right place to start a story about an executive order that President Trump <strong><a href="https://www.whitehouse.gov/presidential-actions/2026/03/addressing-dei-discrimination-by-federal-contractors/">signed</a></strong> on March 26, 2026 &#8212; and about what has happened to the federal networks those staffers were paid to protect.</p><p>On April 1, 2026, the FBI notified Congress that Chinese hackers had breached one of its internal surveillance systems in what the bureau classified as a &#8220;major incident&#8221; under <strong><a href="https://en.wikipedia.org/wiki/Federal_Information_Security_Management_Act_of_2002">FISMA</a></strong>. The compromised system, known internally as DCS-3000, is a pen register and trap-and-trace collection network that stores metadata revealing who the FBI is watching: which phone numbers, which websites, which subjects of active counterintelligence investigations. The intrusion was traced to a third-party commercial internet service provider&#8217;s vendor infrastructure. It was, in other words, a supply-chain attack &#8212; the exact category of threat that Emergency Directive 21-01 was written to address, and that CISA retired in a bulk action on January 8, 2026, three weeks after the polygraph story broke. The CISA story, the DEI story, and the FBI breach story are the same story. </p><p>Understanding why requires going back to the beginning.</p><div><hr></div><h2><strong>Sixty Years of Scaffolding</strong></h2><p>Lyndon Johnson signed <strong><a href="https://www.eeoc.gov/history/executive-order-no-11246">Executive Order 11246</a></strong> on September 24, 1965, in the middle of a decade that had already produced the Civil Rights Act and the Voting Rights Act. His order required federal contractors to do more than refrain from discrimination: they had to take affirmative steps to remedy it. Any company with a federal contract above $50,000 and at least 50 employees was obligated to develop a written Affirmative Action Program &#8212; an annual document specifying hiring goals, promotion timelines, pay equity analyses, and self-audits. A Labor Department bureau called the <strong><a href="https://www.dol.gov/agencies/ofccp">Office of Federal Contract Compliance Programs</a></strong> existed to enforce this, and in 2024 it was still recovering millions from contractors for alleged violations.</p><p>President Johnson&#8217;s theory was structural, rather than sentimental. </p><p>A labor market shaped by decades of exclusion from schools, professional networks, and institutions would, if left to its own devices, reproduce that exclusion through criteria that looked neutral but weren&#8217;t. The correction factor had to be built in. For sixty years, through administrations of both parties, through the Reagan era&#8217;s attempts to weaken it, the Clinton era&#8217;s &#8220;mend it, don&#8217;t end it&#8221; compromise, and Bush and Obama tenures where it remained effectively untouched, <strong><a href="https://www.stinson.com/newsroom-publications-president-trump-rescinds-federal-contractor-affirmative-action-executive-order">EO 11246 held</a></strong>.</p><p>On January 21, 2025, it was revoked.</p><div><hr></div><h2><strong>The First Demolition</strong></h2><p>Trump&#8217;s second inaugural week produced two executive orders relevant here. </p><p>The first, <strong><a href="https://www.whitehouse.gov/presidential-actions/2025/01/ending-radical-and-wasteful-government-dei-programs-and-preferencing/">EO 14151</a></strong> (&#8220;<em>Ending Radical and Wasteful Government DEI Programs</em>&#8221;), was largely an internal matter: federal agencies were told to shutter their DEI offices, eliminate equity grants and contracts, and remove diversity requirements from employee performance reviews. Federal DEI staff were placed on administrative leave within days. The second order on the following day, <strong><a href="https://www.whitehouse.gov/presidential-actions/2025/01/ending-illegal-discrimination-and-restoring-merit-based-opportunity/">EO 14173</a></strong> (&#8220;<em>Ending Illegal Discrimination and Restoring Merit-Based Opportunity</em>&#8221;), did the structural work. </p><p>It abolished Johnson&#8217;s EO 11246 outright, dismantled OFCCP&#8217;s enforcement authority, and replaced sixty years of affirmative action mandate with a certification requirement: every new federal contract would have to include a contractor&#8217;s attestation that it was not running DEI programs in violation of anti-discrimination law. The certification clause carried a second provision that drew less attention at the time. </p><p>It stated that compliance was &#8220;material to the Government&#8217;s payment decisions&#8221; under the <strong><a href="https://www.justice.gov/civil/false-claims-act">False Claims Act</a></strong> &#8212; the Civil War-era statute that authorizes the government to recover treble damages from contractors who defraud it. The FCA also allows private citizens to file suit on the government&#8217;s behalf and keep a share of what&#8217;s recovered. Those suits, called <em>qui tam</em> actions, are the mechanism through which the administration intends to make an example of holdouts. The White House&#8217;s FY2026 budget proposal sought to <strong><a href="https://hrlaws.com/federal-employment-law-insider/trump-administration-proposes-eliminate-ofccp-move-other-laws">eliminate OFCCP</a></strong>, removing its EO 11246 enforcement authority, but Congress ultimately funded the agency at roughly $101 million in the Consolidated Appropriations Act of 2026, leaving it smaller, narrowed, and focused on a much thinner slice of contractor compliance.</p><p>Courts moved immediately. A Maryland district judge issued a nationwide preliminary injunction in February 2025, concluding that key provisions were likely unconstitutional, and the administration appealed. The Fourth Circuit stayed the injunction, then vacated a second one. On February 6, 2026, the court ruled in <em><strong><a href="https://www.lawandtheworkplace.com/2026/02/fourth-circuit-allows-dei-related-executive-orders-to-proceed/">NADOHE v. Trump</a></strong></em> that the orders could not be struck down wholesale. Challengers would have to contest specific enforcement actions as they arose. </p><p>The orders have been fully operative ever since.</p><div><hr></div><h2><strong>The Enforcement Machinery</strong></h2><p>In May 2025, Deputy Attorney General Todd Blanche announced what DOJ called the <strong><a href="https://hrworks-inc.com/industry-update/doj-launches-civil-rights-fraud-initiative-to-strengthen-enforcement-of-the-false-claims-act/">Civil Rights Fraud Initiative</a></strong>, pairing the Civil Fraud Section and the Civil Rights Division to pursue FCA actions against contractors whose DEI programs could be characterized as race-conscious. The legal theory was not complicated: a company that submits a payment request to the government certifies, implicitly, that it is complying with applicable law. If prohibited programs are maintained while collecting federal payments, every invoice is a false claim. By December 2025, DOJ had issued civil investigative demands (subpoenas for documents and testimony) to companies across finance, defense, technology, and healthcare.</p><p>The FCA set a record in FY2025 by <strong><a href="https://www.littler.com/news-analysis/asap/dojs-false-claims-act-report-fy-2025-shows-biggest-total-monetary-recoveries-yet">&#8220;recovering</a>&#8221;</strong> $6.8 billion. This was the largest annual total in the statute&#8217;s 160-year history, more than doubling the prior year&#8217;s $2.9 billion. DOJ&#8217;s press release announcing the figure specifically cited EO 14173 as an enforcement priority for FY2026. </p><p>One thousand two hundred ninety-seven (1,297!) <em>qui tam</em> suits were filed in FY2025 alone.</p><div><hr></div><h2><strong>The Newest Order</strong></h2><p>The executive order signed a little more than a week ago is the campaign&#8217;s third instrument, and it addresses something the administration has evidently concluded the prior framework failed to prevent. </p><blockquote><p>The <strong><a href="https://www.whitehouse.gov/fact-sheets/2026/03/fact-sheet-president-donald-j-trump-addresses-dei-discrimination-by-federal-contractors/">White House fact sheet</a></strong> states this candidly: &#8220;some entities, including government contractors, have attempted to conceal ongoing DEI activities even as the Administration has worked to end them.&#8221;</p></blockquote><p>Where <strong><a href="https://www.whitehouse.gov/presidential-actions/2025/01/ending-illegal-discrimination-and-restoring-merit-based-opportunity/">EO 14173</a></strong> asked contractors to certify their own compliance, the order requires that every covered contract contain a verbatim clause prohibiting &#8220;racially discriminatory DEI activities&#8221;, defined as disparate treatment in hiring, promotion, contracting, or program participation based on race or ethnicity as a condition of performance. FCA materiality language, previously embedded in guidance, is now written into the contract clause itself. Contractors must also report any subcontractor&#8217;s known or &#8220;reasonably knowable&#8221; violations up the chain of command. This is a reporting duty that runs opposite to the usual flow of federal oversight, from contractor employee to contracting agency, and bypasses the subcontractor&#8217;s own management.</p><p>The order covers only race and ethnicity, conspicuously omitting sex, sexual preference, religion, and national origin that appeared in EO 14173. </p><p>Gender-based DEI programs such as women&#8217;s leadership tracks and pay equity reviews are left to the broader regulatory environment. The Office of Management and Budget is directed to identify specific sectors at particular risk of violations based on past conduct and issue sector-specific guidance. Finance, defense, technology, and healthcare have already been named in prior DOJ statements. </p><p>Cybersecurity contractors, defense-adjacent and technology-forward, are obvious candidates for early targeting.</p><div><hr></div><h2><strong>What Has Already Changed</strong></h2><p>Since Trump&#8217;s re-election in November 2024, roughly <strong><a href="https://www.nytimes.com/interactive/2025/03/13/business/corporate-america-dei-policy-shifts.html">one in five U.S. companies</a></strong> has eliminated DEI programs. </p><p>Among those, <strong><a href="https://www.hrdive.com/news/1-in-5-companies-slashed-dei-since-trump-election/754146/">fifty-seven percent reported</a></strong> hiring fewer workers from underrepresented groups, and a third reported promoting fewer. Representation of people of color in leadership fell at thirty percent of the companies that cut programs; women&#8217;s leadership representation fell at twenty-four percent. The Conference Board found that fifty-three percent of S&amp;P 100 companies changed how they described DEI efforts in their 2025 regulatory filings. Mentions of the acronym &#8220;DEI&#8221; in Fortune 100 documents <strong><a href="https://www.gravityresearch.com/posts/changes-in-corporate-dei-language/">fell ninety-eight percent</a></strong> year over year; broader references to diversity dropped <strong><a href="https://www.forbes.com/sites/conormurray/2025/05/29/corporate-mentions-of-diversity-and-dei-dropped-72-in-2025-analysis-finds/">seventy-two percent</a></strong>. Much of what corporate America has done is not eliminate programs but rename them. This looks more like a retreat from transparency in an attempt to appear compliant with Trump&#8217;s rulings rather than a genuine retreat from actual practice.</p><p>More than <strong><a href="https://www.npr.org/2025/05/27/nx-s1-5307319/dei-jobs-trump">twenty-six hundred jobs</a></strong> carrying &#8220;diversity&#8221; or &#8220;DEI&#8221; in the title have been eliminated since early 2023. The Pentagon cut or restructured <strong><a href="https://www.forbes.com/sites/conormurray/2025/04/11/ibm-reportedly-walks-back-diversity-policies-citing-inherent-tensions-here-are-all-the-companies-rolling-back-dei-programs/">a hundred and eighty-eight</a></strong> related positions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3NKy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3NKy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png 424w, https://substackcdn.com/image/fetch/$s_!3NKy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png 848w, https://substackcdn.com/image/fetch/$s_!3NKy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png 1272w, https://substackcdn.com/image/fetch/$s_!3NKy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3NKy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png" width="1456" height="884" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:884,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:197902,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192276198?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3NKy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png 424w, https://substackcdn.com/image/fetch/$s_!3NKy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png 848w, https://substackcdn.com/image/fetch/$s_!3NKy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png 1272w, https://substackcdn.com/image/fetch/$s_!3NKy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8828a63-e8c4-4aa0-bd0b-5a6c2c111b14_1980x1202.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The financial consequences have been real, yet unevenly distributed. </p><p><strong><a href="https://www.investopedia.com/target-faces-boycott-without-dei-11804311">Target</a></strong> announced its DEI rollbacks in January 2025 and experienced more than two hundred days of declining performance: ten consecutive weeks of declining foot traffic, a missed first quarter, and an estimated <em>twenty billion dollars in market capitalization erased</em> by the time the full impact registered. Investors <strong><a href="https://diversity.com/post/target-dei-rollback-2025-impact-update">sued</a></strong>, alleging the company had misled shareholders about the financial risks of the decision itself, which was the first time a rollback decision generated securities litigation, inverting the conventional risk calculation entirely. <strong><a href="https://fortune.com/2025/02/22/target-backtracking-dei-efforts-backfired-foot-traffic-dropped/">Costco</a></strong>, which defended its commitments publicly during the same period of shareholder pressure, saw between 4.6% and 5.8% year-over-year foot traffic growth.</p><div><hr></div><h2><strong>The CISA Catastrophe</strong></h2><p>CISA entered fiscal year 2025 with approximately <strong><a href="https://www.meritalk.com/articles/white-house-eyes-29-cisa-workforce-cut/">3,732 employees</a></strong>. The FY2026 budget proposal sought to reduce CISA&#8217;s staffing to 2,324 positions. What actually happened through layoffs, buyouts, and people who left without prompting because the environment had become untenable, brought headcount even lower to around <strong><a href="https://www.cybersecuritydive.com/news/cisa-departures-trump-workforce-purge/749796/">2,200</a></strong> by mid-2025 &#8212; a loss of roughly a third.</p><p>About seventy staff were <strong><a href="https://therecord.media/trump-administration-planning-workforce-cuts-at-cisa">reassigned </a></strong>to other DHS components, including ICE, through management-directed transfers. The Cybersecurity Division, which monitors federal networks for intrusions, <strong><a href="https://www.cybersecuritydive.com/news/cisa-departures-trump-workforce-purge/749796/">fell from around 1,100 people</a></strong> to around 800-850. CISA&#8217;s nationwide team of Cybersecurity Advisers &#8212; the field staff who connect companies with federal resources &#8212; went from 164 to about 97. The Stakeholder Engagement Division faced a <strong><a href="https://www.infosecurity-magazine.com/news/trump-cut-nearly-1000-jobs-cisa/">sixty-two percent funding reduction</a></strong>; the National Risk Management Center, which provided cross-sector risk analysis, faced seventy-three percent.</p><p><strong><a href="https://therecord.media/trump-administration-planning-workforce-cuts-at-cisa">In April,</a></strong> CISA announced it is planning to hire more than three hundred people. A familiar mechanism runs through both the CISA story and the DEI orders: remove the structure that enforced rules, wait to see what falls away, then propose to rebuild from a narrower base, under worse conditions, without restoring the safeguards that kept the enterprise functioning in the first place.</p><div><hr></div><h2><strong>How Gottumukkala Got There</strong></h2><p><strong><a href="https://en.wikipedia.org/wiki/Madhu_Gottumukkala">Madhu Gottumukkala</a></strong> arrived as acting director in May 2025, installed by Secretary Kristi Noem. His career had moved from Motorola and Verizon consulting to Samsung engineering to a CTO post at <strong><a href="https://inc42.com/buzz/healthtech-startup-callhealth-raised-44-62m-in-funding-over-5-rounds/">CallHealth</a></strong> in Hyderabad, then to Sanford Health, then to South Dakota state government as CIO. None of those roles required navigating the culture or methods of the intelligence community. Dakota State University &#8212; where Gottumukkala completed his PhD and later joined the advisory board &#8212; holds all three NSA Center of Academic Excellence designations and hosts an on-campus SCIF. To whoever placed him, that combination may have read as a credential. The substantive career remained in civilian IT and healthcare.</p><p>Within weeks of his arrival, <strong><a href="https://www.politico.com/news/2026/02/28/cisa-cyber-leadership-madhu-gottumukkala-00804515">Politico reported</a></strong> that in his first major intelligence briefing, he asked what threats the U.S. faced from the Southern border and India &#8212; a country that has never been considered a significant cyber adversary, while Russia and China were actively targeting American networks. </p><blockquote><p>&#8220;Typically, India would be the last place we&#8217;d be talking about,&#8221; said one official who was in the room.</p></blockquote><p>He also, within weeks of arrival, began pressing for access to a Controlled Access Program &#8212; among the most restricted intelligence compartments in existence, established only when ordinary Special Access Programs are insufficient, governed by the Director of National Intelligence, with entry conditions set by the originating agency. A senior career official denied the first request: there was no operational need, and his predecessor had never sought the same access. That official was subsequently placed on administrative leave. A second request, signed personally by Gottumukkala, went forward. His signature acknowledged the counterintelligence polygraph requirement mandated by the originating agency. Career staff arranged the examination.</p><p>In late July 2025, he took the polygraph.</p><p>He did not pass.</p><p>He took it again.</p><p>He did not pass again.</p><p>According to the <strong><a href="https://walkinshaw.house.gov/news/documentsingle.aspx?DocumentID=395">March 13, 2026 congressional letter</a></strong> led by Rep. James Walkinshaw (VA-11) and signed by four colleagues &#8212; citing information provided to House Homeland Security Committee staff by one of the suspended employees &#8212; Gottumukkala failed two counter-intelligence scope polygraphs required for access to the program. The letter was addressed to the inspectors general of DHS and the Intelligence Community.</p><p>Two failures. The same program. At an agency whose statutory mission is protecting federal networks from adversaries.</p><div><hr></div><h2><strong>Congress Asked. He Denied It.</strong></h2><p>At a <strong><a href="https://cyberscoop.com/cisa-madhu-gottumukkala-house-homeland-hearing-workforce-staffing-levels/">House Homeland Security Committee hearing</a></strong> on January 21, 2026, ranking member Bennie Thompson (D-MS) asked Gottumukkala directly whether he had failed a counterintelligence polygraph. Gottumukkala told Congress he &#8220;did not accept the premise of that question.&#8221; </p><blockquote><p>The <strong><a href="https://walkinshaw.house.gov/uploadedfiles/2026.03.13_final_letter_to_ic_and_dhs_ig_re_cisa_polygraph_incident.pdf">Walkinshaw letter</a></strong>, filed six weeks later, states that he &#8220;falsely accused career CISA staff of providing incorrect information&#8221; and asks whether his actions to &#8220;obstruct or retaliate against DHS employees for disclosing his two counter-intelligence polygraph failures to the Director of National Intelligence constitute a Prohibited Personnel Practice under 50 U.S. Code &#167; 3234.&#8221; </p></blockquote><p>The lawmakers also ask whether CISA&#8217;s Chief Security Officer ever alerted ODNI, as federal statute requires following a polygraph failure, and whether ODNI engaged a review of Gottumukkala&#8217;s clearance. </p><p>The answers remain publicly unknown.</p><div><hr></div><h2><strong>The Staff Who Enforced the Rules Were Punished</strong></h2><p>On August 1, 2025, acting DHS Chief Security Officer Michael Boyajian sent letters to six CISA employees suspending their classified access. Their stated offense: providing false information to the acting director about the necessity of a polygraph. They had not created the requirement. They had followed the conditions the originating agency laid down. The practical offense was arranging a procedure that produced an embarrassing result for a political appointee.</p><p>By December, <strong><a href="https://www.politico.com/news/2025/12/21/cisa-acting-director-madhu-gottumukkala-polygraph-investigation-00701996">twelve officials</a></strong> &#8212; among them several Trump appointees &#8212; had described the episode to Politico on background despite the risk to their own careers. </p><blockquote><p>&#8220;Instead of taking ownership and saying, &#8216;Hey, I screwed up,&#8217; he gets other people blamed and potentially ruins their careers,&#8221; one current official said. &#8220;We&#8217;re a sinking ship. </p><p>We&#8217;re like the Titanic,&#8221; said another.</p></blockquote><p>As of February 2026, <strong><a href="https://www.meritalk.com/articles/democrats-request-ig-investigation-into-cisa-polygraph-handling/">those employees&#8217; clearances remained revoked</a></strong> and they remained on administrative leave &#8212; more than six months after the original letters.</p><p>DHS&#8217;s public response came from Assistant Secretary Tricia McLaughlin, who stated that Gottumukkala &#8220;did not fail a <em>sanctioned</em> polygraph test&#8221; (the emphasis is mine.) The statement does not assert he passed a test. It does not dispute that counterintelligence examinations took place. It does not deny that the SAP (<strong><a href="https://en.wikipedia.org/wiki/Special_access_program">Special Access Program</a></strong>) owner required one as a condition of access, or explain why his own signature on the access request would not have alerted him to that condition. Under DHS&#8217;s reading, the polygraph was unauthorized because political leadership had never formally approved the access request in the first place &#8212; which would mean Gottumukkala pursued restricted intelligence access after being denied, after the official who denied him had been conveniently removed. </p><p>Neither interpretation is flattering.</p><div><hr></div><h2><strong>The ChatGPT Incident</strong></h2><p>The polygraph failures were not the only security lapse. Between mid-July and early August 2025 &#8212; the same period as the first polygraph &#8212; Gottumukkala <strong><a href="https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361">uploaded at least four documents</a></strong> marked &#8220;for official use only&#8221; to the public version of OpenAI&#8217;s ChatGPT. The uploads triggered automated cybersecurity alerts designed to detect theft or unintentional disclosure of government materials from federal networks, generating several alerts in the first week of August alone. He had personally requested special authorization from CISA&#8217;s Chief Information Officer to use OpenAI&#8217;s ChatGPT shortly after joining the agency, despite the fact that the tool is <strong><a href="https://www.csoonline.com/article/4124320/cisa-chief-uploaded-sensitive-government-files-to-public-chatgpt.html">blocked for most DHS employees</a></strong> over concerns that sensitive information could be retained outside federal systems. Data entered into the public version of ChatGPT can be incorporated into OpenAI&#8217;s training data and <strong><a href="https://www.csoonline.com/article/4124320/cisa-chief-uploaded-sensitive-government-files-to-public-chatgpt.html">exposed to hundreds of millions of users</a></strong>. </p><p>After the alerts surfaced, Gottumukkala met with CISA&#8217;s CIO Robert Costello, its chief counsel, and DHS&#8217;s acting general counsel to assess potential harm. CISA spokesperson Marci McCarthy described the usage as &#8220;short-term and limited&#8221; and said he had operated under an authorized temporary exception. Costello, the CIO who sat across from him in those meetings, subsequently <strong><a href="https://www.politico.com/news/2026/01/18/acting-cisa-chief-sought-ouster-of-agencys-chief-information-officer-00735826">tried to be dismissed</a></strong> by Gottumukkala in January 2026 &#8212; an effort blocked by other senior political appointees, but one that accelerated his departure from CISA and federal service. </p><p>Chair of the Senate Judiciary Committee Senator Chuck Grassley (R-IA) <strong><a href="https://www.politico.com/news/2026/02/26/madhu-gottumukkala-dhs-cisa-00803221">sent CISA a letter</a></strong> pressing the agency about the ChatGPT incident. As of this writing in early April 2026, CISA has not responded.</p><p>In his first weeks on the job, the man running the agency responsible for federal cybersecurity hygiene had uploaded government documents to a commercial AI platform, failed a counterintelligence polygraph, then failed a second one.</p><div><hr></div><h2><strong>Why the Polygraph Failures Are Unsurprising in Context</strong></h2>
      <p>
          <a href="https://www.hackingbutlegal.com/p/the-architecture-of-erasure">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[EXCLUSIVE: Sam Altman’s Sibling Is Taking Him to Trial]]></title><description><![CDATA[The federal case against the OpenAI CEO has survived its first major legal test, and the filings tell a much darker story than the public has been led to believe.]]></description><link>https://www.hackingbutlegal.com/p/exclusive-sam-altmans-sibling</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/exclusive-sam-altmans-sibling</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Fri, 03 Apr 2026 21:00:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jIgn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e61acda-48c4-40bd-8109-46f55c2a5d18_1192x1876.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Content Warning: This article contains detailed discussions of alleged childhood sexual abuse, incest, and psychological trauma based on federal court filings.</em></p><div><hr></div><p>I&#8217;ve been following Annie Altman&#8217;s allegations against her brother since before most people had heard her name.</p><p>In November 2023, when Sam Altman&#8217;s abrupt firing from OpenAI sent the tech world into a frenzy of speculation, I published an <strong><a href="https://www.hackingbutlegal.com/p/speculation-what-happened-at-openai">analysis</a></strong> exploring what might have rattled the board. In a section of that piece titled &#8216;Scenario 3,&#8217; I discussed the abuse allegations Annie had recently shared on social media. She subsequently published a statement on <strong><a href="https://allhumansarehuman.medium.com/how-we-do-anything-is-how-we-do-everything-d2e5ca024a38">her Medium blog</a>,</strong> which she then republished in full as a guest post on this site under her own byline. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JP5V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JP5V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png 424w, https://substackcdn.com/image/fetch/$s_!JP5V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png 848w, https://substackcdn.com/image/fetch/$s_!JP5V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png 1272w, https://substackcdn.com/image/fetch/$s_!JP5V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JP5V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png" width="528" height="305.63758389261744" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:690,&quot;width&quot;:1192,&quot;resizeWidth&quot;:528,&quot;bytes&quot;:129476,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/193017980?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JP5V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png 424w, https://substackcdn.com/image/fetch/$s_!JP5V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png 848w, https://substackcdn.com/image/fetch/$s_!JP5V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png 1272w, https://substackcdn.com/image/fetch/$s_!JP5V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac766917-0207-47fa-900d-077b9d8b6f7d_1192x690.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong>Source: <a href="https://x.com/anniealtman108/status/1635704398939832321">Annie Altman/X</a></strong></em></figcaption></figure></div><p>At the time I wrote my analysis, I was careful to note the allegations were unproven. I still am.</p><p>But I am not a lawyer, and I&#8217;m not a childhood sexual abuse expert. What I am is someone who has had direct interactions with Annie Altman and, based on those interactions, formed a professional and personal assessment: her allegations were credible. Having reviewed every key document in the federal court record, including the amended complaint she filed on April 1, 2026, I believe her even more.</p><p>This is the story of what that record actually says, what a federal judge has already decided, and what happens next. It is also, necessarily, the story of what happened to Annie when she tried to tell it the first time.</p><div><hr></div><h2><strong>The Lawsuit</strong></h2><p>On January 6, 2025 &#8212; just two days before the statute of limitations expired &#8212; Ann &#8220;Annie&#8221; Altman filed a civil lawsuit against her brother Samuel &#8220;Sam&#8221; Altman in federal court in St. Louis. The case, <em>Ann Altman v. Samuel Altman</em>, Case No. 4:25-cv-00017-ZMB, is assigned to U.S. District Judge Zachary M. Bluestone in the Eastern District of Missouri.</p><p>The complaint is not ambiguous. Annie alleges that Sam sexually abused her continuously from approximately 1997 to 2006, beginning when she was three years old and he was twelve, at the family home in Clayton, Missouri. The abuse, she alleges, progressed from forced oral contact to digital penetration to rape and sodomy, occurring multiple times per week during the early years and continuing until she was approximately eleven or twelve. </p><p>The last acts, she <strong><a href="https://storage.courtlistener.com/recap/gov.uscourts.moed.217171/gov.uscourts.moed.217171.53.0.pdf">alleges</a></strong>, were committed by Sam as an adult against a minor.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EHeF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EHeF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png 424w, https://substackcdn.com/image/fetch/$s_!EHeF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png 848w, https://substackcdn.com/image/fetch/$s_!EHeF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png 1272w, https://substackcdn.com/image/fetch/$s_!EHeF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EHeF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png" width="1304" height="1688" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1688,&quot;width&quot;:1304,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:249590,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/193017980?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EHeF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png 424w, https://substackcdn.com/image/fetch/$s_!EHeF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png 848w, https://substackcdn.com/image/fetch/$s_!EHeF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png 1272w, https://substackcdn.com/image/fetch/$s_!EHeF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe949920e-55bf-405d-bbc9-d7a8cbe38bf0_1304x1688.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://www.hackingbutlegal.com/p/exclusive-sam-altmans-sibling">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[EXCLUSIVE: The Sanctions Delisting They Hoped We’d Miss]]></title><description><![CDATA[The ships were dark, the data was falsified, and Treasury called it routine. That alone would be a story. It is not the story.]]></description><link>https://www.hackingbutlegal.com/p/exclusive-the-sanctions-delisting</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/exclusive-the-sanctions-delisting</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Wed, 01 Apr 2026 02:41:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oFSD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This morning, the U.S. Treasury published a routine sanctions delisting notice. PHANTOM WAKE flagged the vessel. I did the rest.</p><p>I spent the last eight hours confirming and re-confirming what I found. I needed to be sure before writing that a foreign head of government is implicated in a consequential decision made today by Treasury &#8212; and that the public record establishing that connection has been sitting there, openly, for sixteen years.</p><p>The delisting went through without a word. The responses to journalists have been unremarkable boilerplate. What follows is what I found, how I found it, and why it matters.</p><p>On the last day of March, the Treasury Department&#8217;s Office of Foreign Assets Control (OFAC) published a routine-looking administrative action: a batch of name removals from the Specially Designated Nationals (SDN) list. Buried among counter-narcotics delistings were three Russian-flagged vessels &#8212; <em>FESCO Moneron</em>, <em>FESCO Magadan</em>, and <em>SV Nikolay</em>. </p><p>Three lines of text on a government webpage made these three ships no longer subject to U.S. sanctions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Y2SD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Y2SD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png 424w, https://substackcdn.com/image/fetch/$s_!Y2SD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png 848w, https://substackcdn.com/image/fetch/$s_!Y2SD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png 1272w, https://substackcdn.com/image/fetch/$s_!Y2SD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Y2SD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png" width="1144" height="1974" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1974,&quot;width&quot;:1144,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:467523,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192759544?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Y2SD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png 424w, https://substackcdn.com/image/fetch/$s_!Y2SD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png 848w, https://substackcdn.com/image/fetch/$s_!Y2SD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png 1272w, https://substackcdn.com/image/fetch/$s_!Y2SD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff20ed21d-24cd-4ee6-be22-b8d743e14e32_1144x1974.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong><a href="https://ofac.treasury.gov/recent-actions/20260331">US Treasury</a>, March 31, 2026</strong></em></figcaption></figure></div><p>I had been watching all three.</p><p>For the past couple of weeks, I have been building and improving PHANTOM WAKE (<strong><a href="http://phantom-wake.com/">phantom-wake.com</a></strong>), a maritime hybrid warfare intelligence platform I created primarily to track Russia&#8217;s shadow fleet. </p><p>It draws from various sources such as public sanctions data, real-time AIS vessel tracking feeds, Ukrainian military intelligence databases, and Global Fishing Watch&#8217;s historical behavioral records, running every vessel through a multi-factor behavioral scoring engine I developed. The tool was directly inspired by Andrei Soldatov and Irina Borogan&#8217;s November 2025 investigation in <em>Foreign Affairs</em>, &#8220;<strong><a href="https://www.foreignaffairs.com/united-states/moscows-offshore-menace">Moscow&#8217;s Offshore Menace</a></strong>,&#8221; which documents how Russia&#8217;s sanctioned fleet has evolved from a financial evasion mechanism into an active platform for hybrid warfare. When OFAC published <strong><a href="https://ofac.treasury.gov/recent-actions/20260331">today&#8217;s action</a></strong>, all three of the newly delisted ships were already live in my system, flagged with active anomalies.</p><p>What the data shows about these vessels does not square with a routine administrative cleanup.</p><div><hr></div><h2>&#8220;Ordinary Course of Business&#8221;</h2><p>Asked about the deletions, a U.S. Treasury spokesperson <strong><a href="https://kyivindependent.com/us-lifts-sanctions-on-3-russia-flagged-ships/">told</a></strong> the Kyiv Independent that the actions are &#8220;not indicative of a broader shift in the U.S. Russia policy,&#8221; adding that &#8220;the removals implemented today were done in the ordinary course of business as part of OFAC&#8217;s investigations and based on a thorough review.&#8221; The spokesperson noted that such reviews may be triggered by requests from sanctioned individuals, internal OFAC considerations, or &#8220;in response to other national security and foreign policy priorities consistent with the law.&#8221;</p><blockquote><p>&#8220;The ultimate goal of sanctions is not to punish but to change behavior and to promote accountability,&#8221; the spokesperson said.</p></blockquote><p>That explanation deserves to be tested against the full record of what Treasury has been doing in relation to Russian sanctions for the past 33 days because today&#8217;s vessel delistings did not arrive in a vacuum. A review of OFAC&#8217;s own published actions since late February reveals a systematic, rolling dismantlement of Russia-related sanctions pressure across multiple sectors simultaneously:</p><ul><li><p><strong>February 27</strong>: Three PMC Wagner Group-linked individuals removed from the SDN list under Russia-EO14024</p></li><li><p><strong>March 5</strong>: General License 133 issued, authorizing Russian oil deliveries specifically to India. This oil license was issued within days of the Hormuz closure beginning around February 28</p></li><li><p><strong>March 12</strong>: General License 134 issued, authorizing Russian oil sales globally, citing market disruption from the closure of the Strait of Hormuz</p></li><li><p><strong>March 18</strong>: Evgeniya Tyurikova, a senior Sberbank executive sanctioned for her role in Russia&#8217;s financial system was quietly removed from the SDN list, along with a Turkish sanctions evasion network and a UAE-based entity</p></li><li><p><strong>March 19</strong>: GL-134 amended and extended as GL-134A</p></li><li><p><strong>March 20</strong>: A UAE freight company and several individuals sanctioned for Russian sanctions evasion removed from the SDN list</p></li><li><p><strong>March 27</strong>: Vladimir Dmitriev, former head of Vnesheconombank (VEB) &#8212; Russia&#8217;s state development bank was removed under <strong><a href="https://ofac.treasury.gov/faqs/topic/6626">Russia-EO14024</a></strong>; Andriy Portnov, a Yanukovych-era Ukrainian official with longstanding Russian political ties, removed under Global Magnitsky along with his charitable foundation, ANDRIY PORTNOV FUND</p></li><li><p><strong>March 30</strong>: General License 131D amended to facilitate the negotiated sale of Lukoil International GmbH &#8212; the day before today&#8217;s vessel delistings</p></li><li><p><strong>March 31</strong>: <em>FESCO Moneron</em>, <em>FESCO Magadan</em>, and <em>SV Nikolay</em> removed from the SDN list</p></li></ul><p>Treasury&#8217;s &#8220;ordinary course of business&#8221; explanation might have held for each action read in isolation. Against the full 33-day sequence &#8212; <strong><a href="https://en.wikipedia.org/wiki/Wagner_Group">PMC Wagner</a></strong> personnel, a Sberbank executive, VEB&#8217;s former head, a Yanukovych political ally, oil license upon oil license, a Lukoil transaction pathway cleared, and now defense-bank vessels &#8212; it becomes considerably harder to sustain. </p><div><hr></div><h2>Russia&#8217;s Informal Military Flotilla</h2><p>To understand why these three vessels matter specifically, you have to understand who owns them.</p><p><em>FESCO Moneron</em> and <em>FESCO Magadan</em> are currently owned and operated by Investconsulting LLC, a Russian company whose corporate lineage runs directly through the FESCO Group. Transgarant LLC, which founded Investconsulting, is 91.2% owned by PJSC DSMP, the FESCO Group&#8217;s parent company. But their previous owner tells the more significant story: both vessels were held by PSB Leasing LLC, a subsidiary of Promsvyazbank (known in Russia by its initials PSB), before being transferred into the FESCO corporate structure after sanctions were imposed, a transfer that is itself a textbook sanctions evasion technique. </p><p>The U.S. sanctioned both vessels in February 2022 as part of a package targeting five PSB Leasing-owned ships. Today&#8217;s action removes two of the five. The three that remain on the SDN list are <em><strong><a href="https://www.opensanctions.org/entities/NK-2iBvbCy64A7DFfb8McHMmi/">Baltic Leader</a></strong>,</em> <em>Linda</em> (now <em><strong><a href="https://www.opensanctions.org/entities/NK-iN4M9omw8Avu3hYQ2PtUDF/">Inda</a></strong></em>), and <em>Pegas</em> (now <em><strong><a href="https://www.opensanctions.org/entities/tok-mou-det-a370d9b8ee7a75db5f4e6a2eab6f5f33c3997c38/">Gallileo</a></strong></em>). Notably, both <em>Linda</em> and <em>Pegas</em> have already been renamed using similar identity-cycling behavior flagged in <em>FESCO Magadan</em> &#8212; and <em>Linda</em> has also cycled through multiple flags including Liberia, Netherlands, and Russia.</p><p><strong><a href="https://www.opensanctions.org/entities/NK-Q2UkkGgQpeU7femaMrXgEX/">PSB</a></strong> is not a typical commercial bank. PSB itself was <strong><a href="https://meduza.io/en/news/2020/12/04/interpol-removes-former-promsvyazbank-co-owners-from-its-wanted-list">seized</a></strong> from its founders, brothers Dmitry and Alexei Ananyev, by Russia&#8217;s Central Bank in late 2017 &#8212; and then repurposed by the Kremlin as its defense-sector bank. The Ananyevs fled Russia, and the vessel assets remained. Since 2018, PSB has operated as Russia&#8217;s designated defense-industry financial institution, processing state defense contracts for the Ministry of Defense, providing mortgage and banking services exclusively for military personnel, and extending its operations into Russian-occupied territories of Ukraine. Sanctioning these vessels was, in effect, sanctioning assets of Russia&#8217;s military bank. </p><p>The <em>SV Nikolay</em> carries a different ownership chain but a grimmer operational history. Sanctioned in connection with Russia&#8217;s Alfa-Bank, the financial empire co-built by Mikhail Fridman and Peter Aven, both of whom were sanctioned by the EU and UK &#8212; and both of whom <strong><a href="https://www.reuters.com/world/europe/eu-court-takes-russian-billionaires-fridman-avan-off-sanctions-list-2024-04-10/">successfully challenged</a></strong> their EU designations in court in 2024, with an Advocate General opinion <strong><a href="https://www.europeaninterest.eu/eu-advocate-general-sanctions-on-russian-billionaires-fridman-and-aven-lack-legal-justification/">suggesting</a></strong> a further appeals ruling may go their way. <strong><a href="https://www.ap.org/news-highlights/best-of-the-week/2022/russia-stealing-selling-ukraine-grain/">According</a></strong> to Ukrainian authorities, the vessel has been involved in transporting stolen grain from Russian-occupied Ukrainian territories to Turkey.</p><p><strong><a href="https://www.reuters.com/world/europe/satellite-imagery-ship-data-indicates-path-russian-vessel-kyiv-says-shipped-2022-07-22">Reuters</a></strong> used satellite imagery and ship-tracking data to reconstruct a June 2022 voyage in which <em>SV Nikolay</em> appeared at Crimea&#8217;s main grain terminal before docking in Izmir, Turkey &#8212; while its own documents claimed the cargo had been loaded at a Russian port 160 miles away. The 10,000-metric-ton corn shipment was purchased by Turkish food company Yayla Agro, which <strong><a href="https://www.ap.org/news-highlights/best-of-the-week/2022/russia-stealing-selling-ukraine-grain/">said</a></strong> it had been given falsified documents. Ukrainian military intelligence lists the vessel as actively involved in stolen grain transport to Turkey to this day.</p><p>This is not a ship that was swept up in broad financial measures and later found to be commercially innocent. <em>SV Nikolay</em> has had a documented role in the physical looting of Ukrainian agricultural output.</p><p>The Trump administration&#8217;s official framing for its Russia sanctions relief program has centered on energy markets: U.S.-Iran tensions sent oil prices surging, the Strait of Hormuz effectively closed, and on March 12 Treasury issued a <strong><a href="https://ofac.treasury.gov/recent-actions/20260312_33">general license</a></strong> permitting the purchase of certain sanctioned Russian oil at sea. The March 5 India-specific <strong><a href="https://ofac.treasury.gov/recent-actions/20260305_33">oil license</a></strong> suggests that framing was already in motion before the Hormuz closure, complicating the implied causation. </p><p>And regardless, <em>FESCO Moneron</em>, <em>FESCO Magadan</em>, and <em>SV Nikolay</em> are container ships and a general cargo vessel. They do not carry oil. The energy market rationale does not apply here.</p><div><hr></div><h2>What &#8220;Going Dark&#8221; Means</h2><p>Every large commercial vessel is required by international law to operate an Automatic Identification System (AIS) transponder which broadcasts the ship&#8217;s identity, position, speed, heading, and declared destination. Port authorities, coast guards, insurers, and compliance teams all rely on this data. &#8220;Going dark&#8221; means switching the transponder off, or transmitting false data. When a vessel disappears from AIS tracking, it may be in a geographic dead zone beyond terrestrial receiver range, experiencing equipment failure, or deliberately suppressing its signal to conceal where it is and what it is doing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oFSD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oFSD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png 424w, https://substackcdn.com/image/fetch/$s_!oFSD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png 848w, https://substackcdn.com/image/fetch/$s_!oFSD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png 1272w, https://substackcdn.com/image/fetch/$s_!oFSD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oFSD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png" width="1456" height="1039" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/775aed14-f317-4933-983d-d0653f002924_2768x1976.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1039,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2082378,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192759544?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oFSD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png 424w, https://substackcdn.com/image/fetch/$s_!oFSD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png 848w, https://substackcdn.com/image/fetch/$s_!oFSD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png 1272w, https://substackcdn.com/image/fetch/$s_!oFSD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F775aed14-f317-4933-983d-d0653f002924_2768x1976.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong><a href="https://phantom-wake.vercel.app/#/map">PHANTOM WAKE</a>, March 31, 2026</strong></em></figcaption></figure></div><p>In the context of Russia&#8217;s shadow fleet, deliberate darkness is the rule, not the exception. Extended AIS gaps correlate reliably with ship-to-ship oil transfers at sea, undeclared Russian port calls, and, according to Soldatov and Borogan&#8217;s reporting, potentially the positioning of personnel and equipment for hybrid warfare operations. </p><p>The tanker <em>Boracay</em>, previously sanctioned by the UK and EU, was tracked near the Danish coast during drone incursions that forced the closure of Copenhagen Airport in September 2025 &#8212; one of three shadow fleet vessels Danish authorities placed under investigation as a possible drone launch point. French commandos <strong><a href="https://www.independent.co.uk/news/world/europe/french-troops-oil-tanker-putin-shadow-fleet-denmark-drone-b2837835.html">boarded</a></strong> the ship in international waters off Ushant Island on September 27, finding approximately $100 million in Russian oil bound for India, two Russian private security agents who, according to French investigators, were controlling the crew and &#8220;representing Russian interests and gathering intelligence&#8221;, and a false flag of Benin flying where a proper registration should have been. French President Emmanuel Macron <strong><a href="https://www.nbcnews.com/world/europe/france-arrests-crew-boracay-tanker-russia-shadow-fleet-denmark-drones-rcna235113">said</a></strong> the vessel was suspected of &#8220;serious offences&#8221; but declined to address the drone speculation directly. </p><p>Putin <strong><a href="https://apnews.com/article/france-oil-tanker-russia-shadow-fleet-f48178356af3b474e24ee511f309c9b2">called</a></strong> the French boarding &#8220;piracy.&#8221;</p><p>Just yesterday, the day before OFAC quietly removed these three Russian vessels in question from the SDN list, a criminal court in Brest, France <strong><a href="https://www.france24.com/en/europe/20260330-france-hands-captain-of-suspected-russian-shadow-fleet-tanker-one-year-jail-sentence">sentenced</a></strong> the <em>Boracay</em>'s captain, Chinese national Chen Zhangjie, to <strong><a href="https://www.politico.eu/article/china-captain-shadow-fleet-vessel-sentenced-france-amid-shadow-fleet-crackdown/">one year in prison</a></strong> and a &#8364;150,000 fine &#8212; in absentia, because he was already back at sea. </p><p>The ship itself has since been renamed <em>Feniks</em> (&#8220;<em>The Phoenix</em>&#8221;) and was last <strong><a href="https://www.themoscowtimes.com/2026/03/30/french-court-sentences-russia-linked-tanker-captain-to-1-year-in-jail-a92381">reported</a></strong> flying the Russian flag in the Strait of Malacca. Its ultimate beneficial owner has not been publicly identified.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2hsF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2hsF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png 424w, https://substackcdn.com/image/fetch/$s_!2hsF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png 848w, https://substackcdn.com/image/fetch/$s_!2hsF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png 1272w, https://substackcdn.com/image/fetch/$s_!2hsF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2hsF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png" width="1356" height="1980" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1980,&quot;width&quot;:1356,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:313893,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192759544?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2hsF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png 424w, https://substackcdn.com/image/fetch/$s_!2hsF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png 848w, https://substackcdn.com/image/fetch/$s_!2hsF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png 1272w, https://substackcdn.com/image/fetch/$s_!2hsF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4986cbe-2fd8-456c-8811-cec068023697_1356x1980.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong><a href="https://phantom-wake.vercel.app/#/vessel/9332810">PHANTOM WAKE</a>, March 31, 2026</strong></em></figcaption></figure></div><p>The shadow fleet&#8217;s dual life as economic instrument and military-intelligence platform reflects a Soviet-era operational playbook Russia has maintained for nearly a century.</p><div><hr></div><h2>What I Found Using PHANTOM WAKE</h2><p><strong><a href="https://www.phantom-wake.com">PHANTOM WAKE</a></strong> maintains a watchlist of 2,000+ vessels drawn from <strong><a href="https://www.opensanctions.org/">OpenSanctions</a></strong>, which aggregates designations from <strong><a href="https://sanctionslist.ofac.treas.gov/Home/">OFAC</a></strong>, the EU, UK, Australia, Canada, and Ukraine, and from GUR Ukraine&#8217;s independently compiled <strong><a href="https://war-sanctions.gur.gov.ua/en/transport/shadow-fleet">shadow fleet database</a></strong>. Every vessel with a known position is scored continuously against a multi-tier risk formula: static identity factors including flag state, ownership opacity, and the history of name changes; behavioral signals derived from AIS data; infrastructure proximity checks against more than 700 submarine cable routes; and fleet-clustering detection that flags when multiple tracked vessels converge in the same area.</p><p>The platform draws entirely on publicly available data sources. Every feed it taps are accessible to anyone. What the scoring engine does is fuse those signals into a continuous, ranked assessment of which vessels warrant added attention, and why. Beyond sanctions evasion, PHANTOM WAKE monitors a second threat class that has received far less public attention: shadow fleet vessels being used to destroy the undersea cables and power lines that keep Europe&#8217;s lights on and internet running.</p><p>The incidents are no longer hypothetical. </p><p>In November 2024, a Chinese-flagged bulk carrier called the <em><strong><a href="https://www.sdxcentral.com/news/chinese-bulk-carrier-suspected-of-being-behind-baltic-sea-cable-cuts/">Yi Peng 3</a></strong></em> crossed the Baltic Sea and left two severed cables in its wake. One of them, the <strong><a href="https://www.submarinenetworks.com/en/systems/intra-europe/sea-lion">C-Lion1</a></strong>, was the only direct telecommunications cable connecting Finland to Central Europe &#8212; <strong><a href="https://en.wikipedia.org/wiki/C-Lion1">144 terabits per second</a></strong> of internet traffic, gone. The other, the BCS East-West link, carries a significant share of Lithuania&#8217;s internet capacity. <strong>Both were cut within hours of each other.</strong> On Christmas morning 2024, the <em><strong><a href="https://www.opensanctions.org/entities/NK-TQMAp4fbTdAagt7bECC74U/">Eagle S</a></strong></em> dragged its anchor across the Estlink-2 cable on the floor of the Gulf of Finland. Estlink-2 is not a data cable &#8212; it is the power line that carries electricity from Finland into Estonia. Cross-border power transmission dropped by two-thirds, from 1,016 megawatts to 358. Estonia&#8217;s government convened an emergency session. Repairs were expected to take up to seven months. Finland seized the <em><strong><a href="https://www.euronews.com/my-europe/2025/01/03/police-in-finland-say-eagle-s-crew-detained-as-estlink-2-cable-damage-probe-continues">Eagle S</a></strong></em> at sea. </p><p>Estonia&#8217;s Prime Minister said publicly that shadow tankers &#8220;assist Russia in generating revenue that supports its hybrid attacks.&#8221; In January 2025, the <em><strong><a href="https://www.irishtimes.com/crime-law/2026/03/28/russia-bound-cargo-ship-seen-dropping-anchor-near-subsea-cables-off-irish-coast/">MV Arne</a></strong></em> was caught dragging its anchor through 90 meters of water &#8212; nearly three times the depth at which commercial vessels normally anchor &#8212; directly over the AEC-1 cable off Ireland&#8217;s County Mayo coast. German police who boarded the vessel later found it was missing its anchor entirely. </p><p>The AEC-1 is Ireland&#8217;s only dedicated transatlantic cable, carrying internet and cloud traffic between New York and Europe, including a dedicated connection used by the U.S. Department of Energy to move scientific data between American national laboratories and CERN&#8217;s particle accelerator in Switzerland. If the cable had been cut, there is no backup route. Ireland has no redundant transatlantic cable. None of these three incidents was detected before the damage occurred. Each required a patrol aircraft or seized vessel to piece together what had happened after the fact.</p><p>The method is almost always the same: anchor drag. A ship drops or drags its anchor across a cable route, the anchor snaps fibers or power lines that have lain undisturbed on the ocean floor for decades, and the vessel sails away. It looks like an accident. It usually isn&#8217;t. PHANTOM WAKE checks every vessel&#8217;s position against 708 submarine cable routes in real time, flagging ships that anchor in suspiciously deep water, loiter over cable corridors at near-zero speed, or go dark in an area where their projected path crosses critical infrastructure. The three vessels delisted today did not trigger cable proximity alerts during the monitoring window. But the behavior that makes a vessel dangerous to cables, such as extended radio silence, deep-water loitering, and/or weeks of static position data, is exactly the behavior all three have displayed. The tool was built to find vessels like these before the next cable goes dark, not after.</p><p>Here is what the system was showing for the three vessels as of this afternoon.</p><p><em><strong>SV Nikolay</strong></em> carries the highest risk score of the three: 52 out of 100, in the HIGH tier. Its AIS transponder has been effectively silent for 197 days. The last confirmed transmission was September 15, 2025. Its last reported position places it near 41.3 degrees north, 29.5 degrees east &#8212; the northern Bosphorus approaches, one of the most strategically significant chokepoints in the world for Russian commercial and naval traffic, and a well-documented hub for ship-to-ship grain and oil transfers. PHANTOM WAKE flagged it with the STS_ZONE_DARK signal: the vessel went dark while inside a known ship-to-ship transfer zone. </p><p>Something else stood out when I reviewed the PHANTOM WAKE data for all three vessels. Their <strong><a href="https://en.wikipedia.org/wiki/Draft_(hull)">draught</a></strong> readings (the measure of how deep a hull sits in the water, a direct proxy for cargo and fuel load) were completely static across 18 consecutive daily readings spanning nearly three weeks.</p><p>In commercial shipping, draught varies constantly. Fuel burns, ballast is adjusted, cargo is loaded and offloaded. A flat line across days or weeks suggests one of several possibilities: the vessel is moored and not operating commercially; the position data being broadcast is replayed or fabricated; or the vessel is being held in a deliberate staging posture. Any of these would be consistent with the broader evasion pattern these ships have displayed. </p><p>The <em>SV Nikolay</em>&#8217;s draught reading has not moved by so much as a tenth of a meter across 18 consecutive daily readings spanning March 14 through March 31. It has no declared destination. This is the same vessel used to move stolen Ukrainian grain to Turkey &#8212; more on that below.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n0IC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n0IC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png 424w, https://substackcdn.com/image/fetch/$s_!n0IC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png 848w, https://substackcdn.com/image/fetch/$s_!n0IC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png 1272w, https://substackcdn.com/image/fetch/$s_!n0IC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n0IC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png" width="1456" height="1893" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1893,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:319855,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192759544?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!n0IC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png 424w, https://substackcdn.com/image/fetch/$s_!n0IC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png 848w, https://substackcdn.com/image/fetch/$s_!n0IC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png 1272w, https://substackcdn.com/image/fetch/$s_!n0IC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F132b29a6-51e3-45e7-8bb8-bb8461446760_1494x1942.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong><a href="https://phantom-wake.vercel.app/#/vessel/9482926">PHANTOM WAKE</a>, March 31, 2026</strong></em></figcaption></figure></div><p><em><strong>FESCO Moneron (</strong></em><strong>Cyrillic:</strong><em><strong> &#1060;&#1045;&#1057;&#1050;&#1054; &#1052;&#1054;&#1053;&#1045;&#1056;&#1054;&#1053;)</strong></em> last transmitted a confirmed AIS signal on December 21, 2025 &#8212; ninety-nine days ago. Its reported position puts it in the Sea of Okhotsk, off Russia&#8217;s Pacific coast, moving at 13.1 knots. Global Fishing Watch recorded four loitering events for this vessel in the past twelve months: three consecutive days in late February 2026 near 50.9 degrees north, 150.5 degrees east, roughly 88 kilometers offshore and well clear of any declared port, drifting at between 0.34 and 1.13 knots. Its draught, 6.2 meters, has not changed across 18 consecutive readings since March 14. </p><p>These signals appear abnormal in every way.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tZoT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tZoT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png 424w, https://substackcdn.com/image/fetch/$s_!tZoT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png 848w, https://substackcdn.com/image/fetch/$s_!tZoT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png 1272w, https://substackcdn.com/image/fetch/$s_!tZoT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tZoT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png" width="1456" height="1933" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1933,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:329339,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192759544?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tZoT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png 424w, https://substackcdn.com/image/fetch/$s_!tZoT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png 848w, https://substackcdn.com/image/fetch/$s_!tZoT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png 1272w, https://substackcdn.com/image/fetch/$s_!tZoT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fd02905-9690-4329-8880-e977a4ae5689_1484x1970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong><a href="https://phantom-wake.vercel.app/#/vessel/9277412">PHANTOM WAKE</a>, March 31, 2026</strong></em></figcaption></figure></div><p><em><strong>FESCO Magadan</strong></em><strong> </strong><em><strong>(</strong></em><strong>Cyrillic:</strong><em><strong> &#1060;&#1045;&#1057;&#1050;&#1054; &#1052;&#1040;&#1043;&#1040;&#1044;&#1040;&#1053;)</strong></em> presents the most analytically complex picture. Its behavioral score at the time of capture is low. On the surface, it looks relatively clean. It is not.</p><div><hr></div><h2>The Ship That Called Itself a French Carrier</h2><p><em>FESCO Magadan</em> has cycled through five flag states (Germany, the UK, Malta, Portugal, and Russia) and carries four known aliases: <em>CMA CGM Tatiana</em>, <em>India</em>, <em>Velazquez</em>, and its Cyrillic name variant, <em>&#1060;&#1077;&#1089;&#1082;&#1086; &#1052;&#1072;&#1075;&#1072;&#1076;&#1072;&#1085;</em>. </p><p>PHANTOM WAKE gives it an Identity Cycling score of 80 out of 100, the highest of the three vessels.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!787y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!787y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png 424w, https://substackcdn.com/image/fetch/$s_!787y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png 848w, https://substackcdn.com/image/fetch/$s_!787y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png 1272w, https://substackcdn.com/image/fetch/$s_!787y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!787y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png" width="1456" height="1933" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e00549f3-be55-4efd-9932-60c54b050842_1484x1970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1933,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:326147,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192759544?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!787y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png 424w, https://substackcdn.com/image/fetch/$s_!787y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png 848w, https://substackcdn.com/image/fetch/$s_!787y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png 1272w, https://substackcdn.com/image/fetch/$s_!787y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe00549f3-be55-4efd-9932-60c54b050842_1484x1970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong><a href="https://phantom-wake.vercel.app/#/vessel/9287699">PHANTOM WAKE</a>, March 31, 2026</strong></em></figcaption></figure></div><p>The alias &#8220;<em>CMA CGM Tatiana</em>&#8221; is worth sitting with. CMA CGM is one of the world&#8217;s largest and most recognized container shipping companies, a French firm whose vessels move through virtually every major port on earth. Using that name looks nothing like coincidence or administrative carelessness. It is a deliberate technique to create name confusion with a legitimate, widely recognized Western carrier with the intention of reducing scrutiny at port, in insurance documentation, and in compliance database queries. </p><p>PHANTOM WAKE now specifically scores for this class of behavior, flagging vessels whose aliases match major Western carriers including CMA CGM, Maersk, MSC, and Hapag-Lloyd.</p><p><em>FESCO Magadan</em>&#8217;s low behavioral score reflects only what the system could observe during a narrow capture window, not what <strong><a href="https://globalfishingwatch.org/">Global Fishing Watch</a></strong>&#8217;s historical archive shows. On February 18, 2026, the vessel had a three-day, eight-hour AIS gap in the Sea of Okhotsk, at approximately 52 degrees north, 158.7 degrees east. On the same day, in the same general zone, <em>FESCO Moneron</em> was in the middle of its own three-day loitering cluster. </p><p>These ships are both listed at exactly 7,519 gross registered tonnage or <strong><a href="https://en.wikipedia.org/wiki/Gross_register_tonnage">GRT</a></strong>, indicating they are sister ships built to the same specification.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YVy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YVy0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png 424w, https://substackcdn.com/image/fetch/$s_!YVy0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png 848w, https://substackcdn.com/image/fetch/$s_!YVy0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png 1272w, https://substackcdn.com/image/fetch/$s_!YVy0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YVy0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png" width="1484" height="656" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:656,&quot;width&quot;:1484,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:133635,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192759544?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F070b83b4-abdd-4bc9-97e9-dbff0abde47c_1484x1976.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YVy0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png 424w, https://substackcdn.com/image/fetch/$s_!YVy0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png 848w, https://substackcdn.com/image/fetch/$s_!YVy0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png 1272w, https://substackcdn.com/image/fetch/$s_!YVy0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdcdf94a-f75e-4728-8ed9-559881795d3f_1484x656.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong><a href="https://phantom-wake.vercel.app/#/vessel/9287699">PHANTOM WAKE</a>, March 31, 2026</strong></em></figcaption></figure></div><p>Two vessels built together, sharing ownership connections to Russia&#8217;s sanctioned defense bank, co-sanctioned and now co-delisted together, operated in dark posture in the same remote Pacific waters on the same dates. The behavioral signature is consistent with a coordinated ship-to-ship transfer operation, but it is not definitive confirmation. That would require cross-referencing with closed satellite imagery sources, which my system cannot provide at present. </p><p>But this does not seem like a coincidence.</p><div><hr></div><h2>Speaking of Coincidences</h2><p>It is worth noting that the <em>FESCO Moneron</em> carries one additional entry in its public sanctions record that the ownership chain alone does not capture.</p><p>Back then, it was named <em>Francop</em> &#8212; the vessel at the center of the <strong><a href="https://en.wikipedia.org/wiki/Francop_Affair">Francop Affair</a></strong>, in which Israeli Navy commandos from <strong><a href="https://en.wikipedia.org/wiki/Shayetet_13">Shayetet 13</a></strong> boarded the ship in the eastern Mediterranean on November 4, 2009 during Operation Four Species and <strong><a href="https://edition.cnn.com/2009/WORLD/meast/11/04/israel.weapons.ship/index.html">seized</a></strong>, according to CNN, 40 containers of missiles, rockets, lights arms and mortars. We&#8217;re talking 320 <em>tons</em> of weapons, including 9,000 mortar shells, Katyusha rockets, hand grenades, and over half a million rounds of ammunition in what Israel described as the largest arms seizure in its history. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wwEJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wwEJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png 424w, https://substackcdn.com/image/fetch/$s_!wwEJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png 848w, https://substackcdn.com/image/fetch/$s_!wwEJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png 1272w, https://substackcdn.com/image/fetch/$s_!wwEJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wwEJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png" width="1398" height="908" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:908,&quot;width&quot;:1398,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:146841,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192759544?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!wwEJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png 424w, https://substackcdn.com/image/fetch/$s_!wwEJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png 848w, https://substackcdn.com/image/fetch/$s_!wwEJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png 1272w, https://substackcdn.com/image/fetch/$s_!wwEJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363cdd57-19f7-4f0d-82bb-b07b9f89577a_1398x908.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong><a href="https://phantom-wake.vercel.app/#/vessel/9277412">PHANTOM WAKE</a>, March 31, 2026</strong></em></figcaption></figure></div><p>The Katyusha rockets stand out. According to a September 2023 analysis by <strong><a href="https://www.economist.com/international/2023/09/19/meet-the-worlds-new-arms-dealers">The Economist</a></strong>, these particular rockets have a relatively recent history of North Korean arms sales to Russia:</p><blockquote><p>&#8220;North Korea has been delivering 152mm shells and Katyusha-type rockets to Russia for the best part of a year. Russia is shopping in Pyongyang and Tehran because both regimes are already so heavily targeted by international sanctions that they have nothing to lose and much to gain by doing business with Mr. Putin&#8217;s government.&#8221;</p></blockquote><p><strong>The cargo was Iranian-origin, bound for Hezbollah via Syria. </strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8GmI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8GmI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png 424w, https://substackcdn.com/image/fetch/$s_!8GmI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png 848w, https://substackcdn.com/image/fetch/$s_!8GmI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png 1272w, https://substackcdn.com/image/fetch/$s_!8GmI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8GmI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png" width="1284" height="1858" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1858,&quot;width&quot;:1284,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1280543,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192759544?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8GmI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png 424w, https://substackcdn.com/image/fetch/$s_!8GmI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png 848w, https://substackcdn.com/image/fetch/$s_!8GmI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png 1272w, https://substackcdn.com/image/fetch/$s_!8GmI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a77a118-0ca0-4f7f-8148-92e360cf0a0a_1284x1858.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em><strong><a href="https://www.gov.il/en/pages/proof_iranian_arms_smuggling_to_terrorists_nov-202009">Ministry of Foreign Affairs of Israel</a>, November 10, 2009</strong></em></figcaption></figure></div><p>Israeli President Shimon Peres issued a strong condemnation following the seizure, asserting that the operation exposed the &#8220;large gap between Syria and Iran's statements and their actual activities.&#8221;<strong> </strong>Israeli PM Netanyahu <strong><a href="https://www.gov.il/en/pages/pm_netanyahu_capture_weapons_ship_5-nov-2009">said</a></strong>, </p><blockquote><p>&#8220;This is a war crime. This is a war crime that the UN General Assembly, which is meeting today, should investigate, discuss and condemn. This is a war crime that should prompt the UN Security Council to convene in special session, especially since it was in gross violation of UN Security Council resolutions. </p><p>This is a war crime which we know the Iranian regime intends to repeat, further arming Hizbullah, which has already fired thousands of missiles at our communities.&#8221;</p></blockquote><p>Hezbollah denied any connection to the weapons and, as with Putin in the case of the <em>Boracay</em>, <strong><a href="https://www.voanews.com/a/a-13-2009-11-05-voa33/414410.html">condemned</a></strong> the maritime interception as an act of piracy. The ship was released. It was renamed. It became <em>FESCO Moneron</em>. </p><p><strong>And today, the United States removed it from the sanctions list.</strong></p><p>The U.S. government manages the sanctions list. The review that produced yesterday&#8217;s delisting was, in Treasury&#8217;s own words, &#8220;thorough.&#8221; The Francop Affair was not a footnote buried in a classified annex. This was a public diplomatic incident involving ambassadors from 44 countries, an IDF press conference, and a statement from Israel&#8217;s Prime Minister. </p><p><strong>Netanyahu was that Prime Minister. He is back in office.</strong> </p><p>Given the multifaceted, high-level intelligence sharing and security coordination that characterizes the U.S.&#8211;Israel alliance, especially during the current conflict, it is highly improbable that an action involving vessels tied to a major Israeli security incident would occur without some level of bilateral coordination.</p><p>The conclusion is not comfortable, but it is the only one the record supports: whoever approved this delisting knew exactly what the <em>Francop</em> was. <strong>They removed it anyway.</strong> The question is not at all whether that decision was informed. The questions are: what was it made in exchange for, what does it suggest about the future of this war, and what are its implications for the American people?</p><div><hr></div><h2>Ukraine Is Watching</h2><p>These delistings do not only register in Washington. While the Trump administration was quietly removing three Russian vessels from the SDN list, the rest of the Western alliance was moving in the opposite direction.</p><p>On March 25, Prime Minister Keir Starmer <strong><a href="https://www.reuters.com/world/uk/least-25-sanctioned-russian-ships-pass-through-uk-waters-after-boarding-threat-2026-03-31/">authorized</a></strong> British military and law enforcement to board, interdict, and detain sanctioned shadow fleet vessels transiting UK waters. The announcement was made at the Joint Expeditionary Force Summit in Helsinki, where allied nations agreed to coordinate shadow fleet interdiction across European and Mediterranean waters. </p><blockquote><p>&#8220;Putin is delighted with the conflict in the Middle East,&#8221; Starmer said, &#8220;as he believes rising oil prices will enrich him. That&#8217;s why we are intensifying our efforts against his shadow fleet.&#8221; </p></blockquote><p>The day after that authorization, a Cameroon-flagged tanker named <em><strong><a href="https://www.opensanctions.org/entities/NK-QFooPymfzUMMoefqnGm82x/">VAYU 1</a></strong></em> &#8212; sanctioned by the UK in May 2025 for transporting Russian oil, having departed Murmansk on March 10 &#8212; sailed to within six nautical miles of Dover, close to the narrowest part of the English Channel, and passed through undetained. BBC Verify <strong><a href="https://www.bbc.com/news/articles/cp3lw02ndr5o">tracked it</a></strong><a href="https://www.bbc.com/news/articles/cp3lw02ndr5o"> </a>spending at least five and a half hours inside UK territorial waters and twenty-nine hours in the UK&#8217;s Exclusive Economic Zone. The Ministry of Defence told the BBC that &#8220;any action is on a case-by-case basis.&#8221; </p><p>By today, at least 25 sanctioned Russian vessels have transited UK waters since the boarding authorization was announced (out of a total of 544 vessels Britain has sanctioned as shadow fleet participants) with no reported detentions, according to ship tracking data <strong><a href="https://www.reuters.com/world/uk/least-25-sanctioned-russian-ships-pass-through-uk-waters-after-boarding-threat-2026-03-31/">analyzed</a></strong> by Reuters. Pole Star Global <strong><a href="https://www.einpresswire.com/article/902102343/new-pole-star-global-data-reveals-301-russian-shadow-fleet-vessel-events-in-uk-waters-in-2026">counted</a></strong> 301 Russian shadow fleet vessel events in UK waters in the first three months of 2026 alone: 95 in January, 100 in February, 106 in March &#8212; increasing each month, with incidents recorded not just in the Channel but inside UK internal waters and at ports including Belfast, Immingham, and Grangemouth.</p><p>Yesterday, France sentenced a shadow fleet captain to prison. The UK authorized boarding last week and has not yet used it. The EU&#8217;s 20th sanctions package remains <strong><a href="https://www.pravda.com.ua/eng/news/2026/02/27/8023131">blocked</a></strong> by Hungary and Slovakia. On the same day OFAC freed three Russian vessels, the Russian oil tanker <em>Anatoly Kolodkin</em> <strong><a href="https://www.bbc.com/news/articles/clyx1lrv0w5o">docked in Cuba</a></strong> with Washington&#8217;s blessing. Ukraine is urging allies to tighten the noose while the United States actively loosens it.</p><p>In a <strong><a href="https://www.foreign.senate.gov/press/dem/release/ranking-member-shaheen-senatorswarrenschumerstatement-on-trump-administrations-further-weakening-of-russia-sanctions-as-trumps-iran-war-drives-up-costs">joint statement</a></strong> with Senators Warren and Schumer on March 13, Senator Jeanne Shaheen (D-NH) said the administration had helped &#8220;facilitate a windfall of $150 million each day for [Russia&#8217;s] war machine,&#8221; and raised the possibility that Treasury was &#8220;flouting&#8221; the congressional notification requirements of the <strong><a href="https://en.wikipedia.org/wiki/Countering_America%27s_Adversaries_Through_Sanctions_Act">Countering America&#8217;s Adversaries Through Sanctions Act</a></strong>. Thirteen days later, Shaheen and Republican Senator Thom Tillis co-introduced the BLOCK PUTIN Act &#8212; legislation <strong><a href="https://www.steptoe.com/en/news-publications/stepwise-risk-outlook/sanctions-update-march-30-2026.html">explicitly designed</a></strong> to prevent the kind of sanctions rollback now unfolding.</p><p>Treasury&#8217;s assurance that today&#8217;s actions are &#8220;not indicative of a broader shift&#8221; is difficult to square with a calendar that speaks for itself.</p><div><hr></div><h2>What PHANTOM WAKE Does and Does Not Do</h2><p>The platform works entirely on publicly available data sources. It cannot access classified intelligence. It uses reported AIS positions at face value, which introduces a meaningful limitation: AIS is trivially spoofable, and Russia&#8217;s shadow fleet operators know it. Vessels can broadcast false coordinates while operating elsewhere entirely. <strong><a href="https://www.polestarglobal.com/">Pole Star Global</a></strong> calls this &#8220;long-term anchor spoofing,&#8221; a state in which a ship appears stationary or on a plausible route while physically conducting illicit operations somewhere else. </p><p>More sophisticated variants involve dual transmitters broadcasting different IMO identification numbers simultaneously, pre-programmed routes that mimic legitimate voyages, and other forms of Vessel Identity Laundering or Identity Theft. For example, a high-risk ship in proximity of a clean vessel will briefly assume its identity, conduct its transfer, and swap back to avoid detection. The static draught and speed readings I flagged for all three delisted vessels are themselves consistent with long-term anchor spoofing.</p><p>This is the operational baseline for this class of vessel. Confirming or ruling out spoofing as well as other anomalies I described would require cross-referencing against Synthetic Aperture Radar satellite imagery cross-referenced against the AIS record (the standard methodology used by commercial maritime intelligence platforms), RF signal geolocation, and in some cases human intelligence, none of which PHANTOM WAKE can provide from public sources alone. </p><p>What the system can do is identify the behavioral footprint that spoofing reliably leaves behind: impossible speed transitions, coordinate jumps, repeated positional values across weeks of readings, and AIS gaps timed to known transfer zones. The anomalies flagged here are real. Where exactly these ships are right now is a question that requires satellite data to answer.</p><p>PHANTOM WAKE continues to track all three vessels under a DELISTED category. Removal from the OFAC SDN list does not remove a vessel from Ukrainian military intelligence&#8217;s shadow fleet database, from the EU&#8217;s watchlist, or from other lists &#8212; and it raises an immediate question about what else on the watchlist may be OFAC&#8217;s next target.</p><div><hr></div><h2>Another One To Watch</h2><p>There is a fourth vessel worth watching: <em>FESCO Sofia</em>, a container ship bearing the FESCO name but operated by Steam Line Middle East Shipping L.L.C., a UAE-based company &#8212; and currently not designated by any Western sanctions authority. </p><p>It appears in OpenSanctions not as a sanctioned vessel but as an &#8220;entity of interest,&#8221; flagged through the Tokyo Memorandum of Understanding&#8217;s port state control detention database. It has been detained by Asian port authorities five times in fourteen months &#8212; February, July, August, September 2024, and April 2025 &#8212; with each detention indicating serious safety or compliance deficiencies. It is classified by the <strong><a href="https://www.opensanctions.org/entities/NK-kVWPFceib6pDmdtntYn44H/">Russian Maritime Register of Shipping</a></strong>, itself a sanctioned entity. </p><p><em>FESCO Sofia&#8217;s</em> AIS transponder has been dark for 193 days. Global Fishing Watch recorded 14 loitering events in the past year, nearly all at the same cluster of coordinates in the East China Sea, 40 kilometers offshore, drifting at fractions of a knot. Its draught has not moved by a single millimeter across 18 consecutive daily readings. Both FESCO vessels delisted today share every one of those behavioral signatures &#8212; and <em>SV Nikolay</em>&#8217;s 197-day AIS silence makes the parallel hard to ignore, regardless of ownership chain. </p><p>Whether <em>FESCO Sofia</em> is a vessel the West should be watching more closely, or simply one that hasn&#8217;t attracted sufficient attention yet, is a question <strong><a href="https://www.phantom-wake.com">PHANTOM WAKE</a></strong> will keep asking.</p><div><hr></div><h2>The Cuffs Are Off</h2><p>As of this morning, the vessels are no longer sanctioned by the U.S. They can enjoy calling at Western ports and will avoid triggering secondary sanctions risk. Their insurers can cover them through markets that previously dropped them. The practical effects of today&#8217;s decision are immediate.</p><p>More significantly, all three previously carried a secondary sanctions designation under Section 11 of <strong><a href="https://ofac.treasury.gov/faqs/topic/6626">Executive Order 14024</a></strong>, meaning foreign companies worldwide, not just American ones, faced potential U.S. designation for conducting significant transactions with them. That extraterritorial deterrent is now gone. </p><p>&#8220;Ordinary course of business&#8221; is one explanation &#8212;&nbsp;one which the data strongly suggests shouldn&#8217;t be the only one considered. The sanctions regime is only as credible as the decisions made in its name. When a vessel with this history is removed without explanation and without scrutiny, the question is no longer whether the list reflects U.S. national security interests. </p><p><strong>The question is whose interests it reflects instead.</strong></p><div class="pullquote"><p><em>Jackie Singh is an information security professional and investigative journalist. </em></p><p><em>PHANTOM WAKE is accessible at <a href="https://phantom-wake.com/">phantom-wake.com</a>. Data sources include OpenSanctions, GUR Ukraine, Global Fishing Watch, and TeleGeography. </em></p><p><em>Follow <a href="https://x.com/hackingbutlegal">@hackingbutlegal</a> on X.</em></p></div><div class="install-substack-app-embed install-substack-app-embed-web" data-component-name="InstallSubstackAppToDOM"><img class="install-substack-app-embed-img" src="https://substackcdn.com/image/fetch/$s_!ZcdC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eaf71e4-63f5-4ded-bf46-56b7ec78f94a_390x390.png"><div class="install-substack-app-embed-text"><div class="install-substack-app-header">Get more from Jackie Singh in the Substack app</div><div class="install-substack-app-text">Available for iOS and Android</div></div><a href="https://substack.com/app/app-store-redirect?utm_campaign=app-marketing&amp;utm_content=author-post-insert&amp;utm_source=hackingbutlegal" target="_blank" class="install-substack-app-embed-link"><button class="install-substack-app-embed-btn button primary">Get the app</button></a></div>]]></content:encoded></item><item><title><![CDATA[Designed to Spread: The Iran War and the Limits of Official Narrative]]></title><description><![CDATA[What the Trump administration is selling as a &#8220;little excursion&#8221; in Iran reads, on the facts, like the opening phase of a much larger regional war that senior officials saw coming and chose anyway.]]></description><link>https://www.hackingbutlegal.com/p/designed-to-spread-the-iran-war-and</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/designed-to-spread-the-iran-war-and</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Tue, 31 Mar 2026 13:25:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yOom!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On February 28, 2026, the United States and Israel opened a coordinated air campaign on Iran that immediately blew past any plausible definition of &#8220;limited strikes.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yOom!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yOom!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png 424w, https://substackcdn.com/image/fetch/$s_!yOom!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png 848w, https://substackcdn.com/image/fetch/$s_!yOom!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png 1272w, https://substackcdn.com/image/fetch/$s_!yOom!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yOom!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png" width="1344" height="1074" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1074,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:550170,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192692140?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yOom!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png 424w, https://substackcdn.com/image/fetch/$s_!yOom!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png 848w, https://substackcdn.com/image/fetch/$s_!yOom!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png 1272w, https://substackcdn.com/image/fetch/$s_!yOom!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983e1c97-e579-4b61-9218-0af5b3c83484_1344x1074.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>&#8220;US-Israeli strikes on Iran on 28 February triggered a full-scale war that quickly escalated across the Middle East and set off a chain of global repercussions.&#8221;      Image Source: <a href="https://acleddata.com/iran-crisis-live">ACLED</a></em></figcaption></figure></div><p> Reporting from <strong><a href="https://acleddata.com/update/middle-east-special-issue-march-2026">ACLED&#8217;s March 2026 special issue</a></strong> shows the opening wave killed Supreme Leader Ali Khamenei and other senior figures, hit government compounds in Tehran, and targeted key elements of Iran&#8217;s air defenses, missile forces, and internal security apparatus.</p><p>Within days, ACLED was tracking hundreds of strikes across at least 26 of Iran&#8217;s 31 provinces, with Tehran the most heavily bombed, alongside central, western, and southern regions. Targets have included media facilities and detention centers, with resulting jailbreaks and large-scale displacement, as <strong><a href="https://www.merip.org/2026/03/war-across-boundaries-perspectives-on-iran-and-a-region-under-siege/">MERIP&#8217;s regional analysis</a></strong> documents.</p><p>In public appearances, Donald Trump has worked to shrink the war in the American imagination. Speaking to House Republicans at his Florida golf resort, he described it as a &#8220;little excursion&#8221; to &#8220;get rid of some evil,&#8221; promised it would be &#8220;short-term,&#8221; and claimed the United States had already &#8220;won in many ways,&#8221; per <strong><a href="https://www.militarytimes.com/news/pentagon-congress/2026/03/09/trump-calls-war-in-iran-a-little-excursion/">Military Times</a></strong>. In remarks captured by <strong><a href="https://www.aljazeera.com/video/newsfeed/2026/3/10/short-term-excursion-what-trump-said-about-the-war-on-iran">Al Jazeera English</a></strong>, he floated a timeline of a &#8220;couple weeks, few weeks,&#8221; even while threatening, as <strong><a href="https://www.nbcnews.com/politics/donald-trump/president-calls-iran-war-little-excursion-will-end-soon-rcna262494">NBC News</a></strong> reported, to inflict damage that would make it &#8220;nearly impossible for Iran to ever rebuild as a nation again.&#8221;</p><p>A campaign that aims to shatter a state&#8217;s ability to function is, by definition, neither narrow nor brief.</p><div><hr></div><h2><strong>Domestic fairy tale vs. operational reality</strong></h2><p>Trump&#8217;s language does more than express confidence; it manages risk perception. </p><p>Calling a war an &#8220;excursion&#8221; suggests a discrete trip, something you return from without lasting disruption. It signals to markets and voters that this conflict will not become another Iraq or Afghanistan.</p><p>Trump's language does more than express confidence; it manages two audiences at once, and it does so by design. For people who follow foreign policy closely, "excursion" reads as a malapropism for "incursion," the more precise military term. That slippage does not feel accidental. It invites educated observers to conclude that the president simply doesn't know the word he was looking for, which is a psychologically powerful move: if you believe the man ordering the war is too confused to name it correctly, you are more likely to roll your eyes than to organize. Contempt is a remarkably effective substitute for complacency. </p><p>For everyone else, the word does its other job. An excursion is a day trip. It&#8217;s what you do on a cruise ship when you dock somewhere new. It carries no weight, no dread, no implication of open-ended commitment. Both readings serve the same purpose: keep the public from treating this as the generational policy choice it actually is. One group is anesthetized by condescension, the other by reassurance. The word works precisely because it fails in two different directions at once.</p><p>The conduct of the war points in a different direction. <strong><a href="https://acleddata.com/media-citation/iranian-retaliation-widens-conflict-escalates-across-gulf-bloomberg">ACLED&#8217;s conflict tracking</a></strong> indicates:</p><ul><li><p>1,879 U.S. and Israeli strikes recorded in the first two weeks alone, with at least 73 intercepted.</p></li><li><p>Hundreds of those attacks falling across most of Iran&#8217;s provinces, including repeated hits in and around Tehran.</p></li><li><p>A campaign explicitly structured to degrade Iran&#8217;s ballistic missile forces, air defenses, and nuclear-related infrastructure, which Iranian planners treat as core regime survival assets.</p></li></ul><p>Tehran&#8217;s response has also shifted. A <strong><a href="https://www.csis.org/analysis/visualizing-irans-escalation-strategy">CSIS analysis</a></strong> concludes that Iran has abandoned its earlier pattern of calibrated retaliation in favor of rapid escalation, with strikes and proxy attacks across the Gulf and explicit threats to &#8220;irreversibly destroy&#8221; regional infrastructure and energy facilities. The <strong><a href="https://understandingwar.org/research/middle-east/iran-update-special-report-march-27-2026/">Institute for the Study of War</a></strong> describes Iranian operations in multiple theaters, including Lebanon, Iraq, Syria, and the Gulf, alongside cyber and maritime actions.</p><p><strong><a href="https://www.hrw.org/news/2026/03/26/middle-east-conflict-rhetoric-actions-flout-laws-of-war">Human Rights Watch&#8217;s March 26 assessment</a></strong> frames the conflict as a stress test for the laws of war, documenting serious violations by all parties and citing inflammatory statements by officials that include open threats to destroy civilian infrastructure and dismiss the binding force of international law. Defense Secretary Pete Hegseth publicly vowed that U.S. forces would give &#8220;no quarter&#8221; to enemies in Iran, a statement that itself constitutes a war crime under international humanitarian law.</p><div><hr></div><h2><strong>The public isn&#8217;t buying the &#8220;excursion&#8221;</strong></h2><p>American public opinion has turned against the war early. A <strong><a href="https://ssrs.com/news/americans-views-of-2026-iran-strike/">CNN-SSRS poll</a></strong> conducted just after the strikes began found that nearly 60 percent of respondents disapproved of the decision to take military action in Iran, while 56 percent believed a long-term military conflict between the two countries was at least somewhat likely. More than half expected Iran to become more of a threat to the United States as a result of the strikes.</p><p>Support for regime change and ground operations is weaker still. According to the same polling, 56 percent opposed an effort to overthrow the Iranian government, and only 12 percent supported deploying U.S. ground forces into Iran. A separate analysis from the <strong><a href="https://instituteforglobalaffairs.org/2026/03/the-blowback-from-an-unpopular-iran-war/">Institute for Global Affairs</a></strong> draws on these numbers to describe the war as &#8220;politically unsustainable&#8221; and warns it is already drifting toward the kind of open-ended, ill-defined commitment that marked earlier U.S. wars in the region.</p><div><hr></div><h2><strong>Intentional risk, not accidental quagmire</strong></h2><p>The administration&#8217;s own stated objectives point toward a strategy that assumes, and to function requires, a willingness to risk wider war. Public statements by Trump and allied analysts describe goals that include:</p><ul><li><p>Destroying large portions of Iran&#8217;s missile and naval capabilities.</p></li><li><p>Crippling or dismantling its regional proxy networks, often described as the &#8220;Axis of Resistance.&#8221;</p></li><li><p>Preventing Iran from ever obtaining a nuclear weapon, including by force.</p></li><li><p>Weakening or toppling the regime in Tehran, framed as necessary for a &#8220;decisive victory.&#8221;</p></li></ul><p>As the <strong><a href="https://www.atlanticcouncil.org/content-series/inflection-points/now-that-the-iran-war-is-here-the-us-must-complete-its-mission/">Atlantic Council</a></strong> puts it, completing that mission requires sustained coercive pressure well beyond a brief air campaign. ACLED goes further, concluding that &#8220;the only clear path to a decisive victory, especially for Israel, would be regime change, a far longer, costlier, and more destabilizing undertaking than a limited air campaign is likely to achieve.&#8221; A policy that sets regime change as the real victory condition cannot honestly be described as a short, controlled operation.</p><p>Escalation specialists have warned for years, as <strong><a href="https://www.csis.org/analysis/visualizing-irans-escalation-strategy">CSIS documents</a></strong>, that attempting to coerce Iran on core regime interests, especially its deterrent capabilities and regional networks, produces broad retaliation rather than capitulation. When policymakers choose maximal goals in full view of that history, they are accepting the likely shape of the conflict, not stumbling into it.</p><p>Early operational choices match that reading. The decision to open with leadership decapitation and attacks on national-level infrastructure signaled an intent to shock the Iranian system. Trump&#8217;s subsequent threat to destroy Iranian power plants if the Strait of Hormuz was not reopened within 48 hours, documented by <strong><a href="https://www.hrw.org/news/2026/03/26/middle-east-conflict-rhetoric-actions-flout-laws-of-war">Human Rights Watch</a></strong>, put civilian infrastructure explicitly on the table from the outset. They note that Trump <strong><a href="https://www.nytimes.com/2026/03/23/us/politics/trump-iran-gas-oil-strait.html">later</a></strong> &#8220;postponed but did not revoke his threat.&#8221;</p><div><hr></div><h2><strong>Eschatology, power, and the &#8220;excursion&#8221; story</strong></h2><p>Religious and ideological commitments inside the administration add another layer to this picture. <strong><a href="https://www.pbs.org/newshour/politics/pete-hegseths-christian-rhetoric-reignites-scrutiny-after-the-u-s-goes-to-war-with-iran">PBS NewsHour</a></strong> has documented how Hegseth built a public identity around Christian nationalism, defended the medieval Crusades, and used explicitly religious rhetoric to frame conflicts with Iran and other Muslim-majority states. His book <em>American Crusade</em> celebrates a narrative of civilizational struggle, and reporting has captured his use of crusader iconography, including &#8220;Deus vult&#8221; tattoos, as a sitting defense secretary. (I wrote a <strong><a href="https://www.hackingbutlegal.com/p/tattooed-for-war-how-pete-hegseths">story</a></strong> about Hegseth&#8217;s body ink in July 2025.) <strong><a href="https://www.cnn.com/2026/03/13/politics/hegseth-iran-israel-war-american-crusade-analysis">CNN&#8217;s analysis</a></strong> frames all of this not as personal quirk but as ideological commitment that now shapes policy.</p><p>The administration&#8217;s closest evangelical allies bring their own theological frameworks to bear. Work from the <strong><a href="https://www.misgavins.org/en/shalom-the-evangelical-dimension-the-trump-administrations-policy/">Misgav Institute</a></strong>, the <strong><a href="https://www.washingtoninstitute.org/policy-analysis/emerging-trump-doctrine-middle-east">Washington Institute</a></strong>, and the <strong><a href="https://arabcenterdc.org/resource/trump-and-the-evangelicals-define-support-for-israel/">Arab Center DC</a></strong> describes how certain strands of Christian Zionism and apocalyptic belief treat Israel&#8217;s territorial control and confrontation with Iran as steps in a prophetic timeline. <strong><a href="https://baptistnews.com/article/the-end-times-theology-driving-us-intervention-in-iran/">Baptist News</a></strong> traces this end-times theology directly into the policy debate around intervention in Iran. Those same networks shaped Trump&#8217;s first-term decisions on Israel-Palestine and are again present around his second-term team.</p><p>Alongside more familiar aims like reaffirming U.S. regional primacy and tightening the Israel-Gulf alignment, these beliefs help explain why a destabilizing war can be framed inside the administration as both strategically necessary and spiritually resonant, as <strong><a href="https://www.hoover.org/research/trumps-gulf-trip-confirming-and-upending-us-middle-east-policy">Hoover Institution analysis</a></strong> of the broader Trump doctrine makes clear. At home, describing the campaign as a &#8220;short-term excursion&#8221; reduces the friction between that vision and the domestic political need to minimize costs.</p><p>This mix of religious certainty and strategic ambition shows up in the way senior officials talk about legal constraints. In the HRW report and related coverage, statements by Trump and Hegseth treat the laws of war less as binding rules than as political annoyances. Critics who warn about escalation or civilian harm get cast as weak, defeatist, or disloyal rather than as people reading the risk landscape correctly.</p><div><hr></div><h2><strong>Information management and ready-made excuses</strong></h2><p>The &#8220;excursion&#8221; framing does more than sell optimism; it bakes in deniability. If the conflict drags on or spreads further, the White House can claim that no one could have anticipated the depth of Iranian resistance, or that domestic and foreign saboteurs undermined an otherwise sound plan.</p><p>Trump has already declared that the U.S. has &#8220;won in many ways&#8221; and suggested, per <strong><a href="https://www.nbcnews.com/politics/trump-administration/trump-administration-iran-statements-rcna263243">NBC News</a></strong>, that only a bit more pressure is needed to finish the job. As <strong><a href="https://zeteo.com/p/trump-iran-war-excursion-incursion">Zeteo</a></strong> and <strong><a href="https://abcnews.com/Politics/excursion-war-trump-analysis/story?id=131003550">ABC News</a></strong> have both analyzed, the &#8220;excursion&#8221; language is deployed precisely to keep public attention narrow, so that when mounting costs arrive, they can be framed as unfortunate surprises rather than predictable consequences.</p><p>The pattern is familiar. The Iraq invasion, to which I was deployed as a baby-faced soldier in 2003, was sold with promises of quick victory, low cost, and self-funding reconstruction. When that fantasy collapsed, officials blamed flawed intelligence and unforeseeable enemy resilience. Two decades later, the marketing has been updated with <strong><a href="https://www.jns.org/analysis/ai-lasers-and-satellites-technological-innovation-in-the-2026-iran-war/">AI-guided munitions and space-based targeting</a></strong>, but the core structure remains unchanged. Project expansive objectives onto a minimized public footprint, insist that escalation is something done <em>to</em> the United States rather than <em>chosen</em> by it, and deny that initial decisions made a grinding conflict the likely outcome from the start.</p><p>This time, as <strong><a href="https://www.merip.org/2026/03/war-across-boundaries-perspectives-on-iran-and-a-region-under-siege/">MERIP&#8217;s regional correspondents</a></strong> make clear, the stakes include not just one country&#8217;s fate but the stability of a region already under compounding pressure from Gaza, Lebanon, and long-running crises in Iraq and Syria.</p><div><hr></div><p>On the record we have now, the through-line is already quite visible. The war in Iran did not grow out of some misjudged &#8220;incursion&#8221; that somehow got out of hand; it emerged from a policy that treated a wider regional conflict as an acceptable, and perhaps necessary, risk, and then wrapped that choice in a story designed to make the eventual quagmire look like an accident rather than the predictable outcome of the original design.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>Hacking, but Legal is a reader-supported publication. If you appreciated this analysis, please consider becoming a free or paid subscriber.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Just a Haircut]]></title><description><![CDATA[Elon Musk's most market-moving signals are the ones regulators can't touch.]]></description><link>https://www.hackingbutlegal.com/p/just-a-haircut</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/just-a-haircut</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Sun, 29 Mar 2026 13:32:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QScK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On May 1, 2020, at 11:11 in the morning, Elon Musk tweeted five words that vaporized $13 billion in Tesla&#8217;s market value before lunch. &#8220;Tesla stock price is too high imo.&#8221; The stock cratered 10.3% in hours. Just days earlier, the company had posted a strong quarter.</p><p>On a Saturday in November 2021, he asked his 62.5 million Twitter followers whether he should sell 10% of his stake. They said yes. The following Monday, $60 billion vanished. Over the next five days, $200 billion more followed.</p><p>In December of that same year, he debuted a haircut that social media immediately likened to a style associated with 1930s European fascist movements. Tesla fell 11.3% in three days while the Nasdaq recovered.</p><p>In July 2024, on an earnings call, he told shareholders who doubted his vision to sell their stock. They obliged: Tesla dropped 12.3% in a single session, 3.4 times the decline of the broader tech sector.</p><p>Last March, he tweeted that he was &#8220;going back to this haircut,&#8221; attaching a photo of the 2021 look. Tesla fell 4.8% the next trading day while the broader market was up.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QScK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QScK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png 424w, https://substackcdn.com/image/fetch/$s_!QScK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png 848w, https://substackcdn.com/image/fetch/$s_!QScK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png 1272w, https://substackcdn.com/image/fetch/$s_!QScK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QScK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png" width="496" height="599.9866888519135" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1454,&quot;width&quot;:1202,&quot;resizeWidth&quot;:496,&quot;bytes&quot;:1522342,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/192483151?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QScK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png 424w, https://substackcdn.com/image/fetch/$s_!QScK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png 848w, https://substackcdn.com/image/fetch/$s_!QScK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png 1272w, https://substackcdn.com/image/fetch/$s_!QScK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c49e0b-f68d-4b40-8a3c-e567099eac02_1202x1454.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I used two separate AI models to assist me in analyzing each of these events against market benchmarks while isolating Tesla&#8217;s stock performance from broader index movements to suss out what portion of each decline was attributable to Musk&#8217;s behavior, not macroeconomic conditions. My methodology here is simple: compare Tesla&#8217;s returns against the Nasdaq-100 (QQQ) and S&amp;P 500 (SPY) over one-day and five-day windows following each signal. Any gap between Tesla&#8217;s performance and the benchmark highlights an idiosyncratic move where the market was punishing Tesla specifically, not tech stocks or equities in general.</p><p>The cumulative toll across five qualifying events: roughly 35 percentage points of excess loss against the Nasdaq. I make the case that this is not attributable to earnings misses, interest rate hikes, or competitive pressure from BYD, but to the public conduct of one key man.</p><p>On March 20, 2026, a nine-member federal jury in San Francisco found that Musk had made materially misleading statements to investors during his Twitter acquisition, in violation of Section 10(b) of the Securities Exchange Act and SEC Rule 10b-5. The jury awarded approximately $2.1 billion in stock damages, with potentially $500 million more in options losses still to be resolved. In closing arguments, plaintiffs&#8217; attorney Mark Molumphy told the jury that Musk&#8217;s tweets were not innocent mistakes but were &#8220;carefully calculated to drive down&#8221; Twitter&#8217;s stock price. The jury found him liable for misrepresentation on two of three challenged statements and rejected the broader claim that he had engaged in a deliberate scheme to defraud.</p><p>That verdict, partial as it is, reframes everything that came before it.</p><div><hr></div><h2>The Anatomy of a Clean Signal</h2><p>Not every Musk provocation qualifies. Tesla is a volatile stock, and much of its movement on any given day tracks broader tech sector dynamics or responds to legitimate business catalysts: delivery numbers, margin compression, Federal Reserve policy. The question is not whether Tesla&#8217;s stock goes down after Musk says something inflammatory but whether it goes down <em>more than the rest of the market</em> in a way that only Musk&#8217;s conduct can explain.</p><p>I set the bar conservatively. To qualify for this analysis, an event needed to produce an excess return of at least negative 5% against QQQ within one trading day. Events where Tesla declined roughly in lockstep with tech stocks were discarded, regardless of how dramatic the drop looked in isolation. The filter eliminated a number of candidates, including Musk&#8217;s April Fools &#8220;Tesla Goes Bankrupt&#8221; tweet in 2018 and his Hertz deal skepticism in November 2021. It also eliminated the current March 2026 selloff, which, severe as it has been, is substantially explained by macro weakness: the Nasdaq fell 5.2% over the same window, leaving Tesla with only 2.3% of excess decline, and the jury verdict on March 20 introduced a second concurrent catalyst that makes the signal impossible to isolate cleanly.</p><p>Five events survived the cut. Together, they tell a story about how the world&#8217;s richest man communicates with markets.</p><div><hr></div><h2>&#8220;Tesla stock price is too high imo&#8221;</h2><p><strong>May 1, 2020.</strong></p><p>The tweet arrived mid-session, part of a barrage that included &#8220;Selling almost all physical possessions&#8221; and lines from the national anthem. Tesla had been trading at roughly $760. Within minutes of the 11:11 AM post, it fell below $700. It closed down 10.3%.</p><p>The Nasdaq dropped 2.8% that day on COVID-related uncertainty. The S&amp;P fell 2.6%. Tesla&#8217;s excess loss against QQQ was 7.5 percentage points, meaning the broader market explained less than a third of the decline. </p><p>The rest belonged entirely to Musk.</p><p>What makes that episode instructive is the recovery. Within five trading days, the stock had recouped all the losses, and then some. The market absorbed the tweet as a one-off disruption, limited to a CEO mouthing off &#8212; nothing structural. But the 7.5% excess loss on the day itself is unambiguous. A CEO publicly called his own stock overvalued, and the market repriced accordingly, in minutes.</p><p>Musk later testified under oath, during the &#8220;funding secured&#8221; trial in January 2023, that his tweets do not move Tesla&#8217;s stock price. He pointed to this exact episode as evidence, noting that the shares recovered. Three years later, in a different courtroom and a different case, a jury in <em>Pampena v. Musk</em> found that two of his tweets about the Twitter acquisition constituted material misrepresentations under federal securities law. </p><p>His defense that these posts were harmless and ephemeral, without predictable market consequences, has now been tested before a jury and found wanting.</p><div><hr></div><h2>The Twitter Poll</h2><p><strong>November 6-7, 2021.</strong></p><p>The cleanest signal in the dataset, and one that deserves a close read.</p><p>On a Saturday afternoon, Musk posted a poll to Twitter: &#8220;Much is made lately of unrealized gains being a means of tax avoidance, so I propose selling 10% of my Tesla stock. Do you support this?&#8221; Over 3.5 million accounts voted. 57.9% said yes. Musk pledged to abide by the result.</p><p>On Monday, Tesla fell 4.8%. By Friday, it was down 15.4%.</p><p>The S&amp;P 500 was <em>up</em> 0.1% on that Monday. The Nasdaq was essentially flat, down one-tenth of a percent. The 14.5% excess five-day loss against QQQ is the largest in the dataset. Every point of it belongs to Musk, and Musk alone.</p><p>Beneath the performance art lay a drier reality. SEC filings show that Musk had established a 10b5-1 pre-arranged trading plan in September 2021, two months before the poll, to sell shares tied to stock options expiring in August 2022. He was going to sell these shares regardless of any poll. He told the Code Conference in September that &#8220;a huge block of options will sell in Q4.&#8221; </p><p>The poll created the appearance of a democratic, crowd-sourced decision for a course of action already set in motion.</p><p>One more thing. Kimbal Musk, Elon&#8217;s brother and a Tesla board member, sold 88,500 Tesla shares on November 5 across 14 separate tranches at prices averaging roughly $1,229 per share, for a total of approximately $108.8 million. The <a href="https://ir.tesla.com/_flysystem/s3/sec/000149473121000003/000149473121000003-gen.pdf">Form 4</a> was filed with the SEC that same evening at 9:22 PM Eastern. </p><p>The poll went up the next afternoon.</p><p>The filing contains no notation indicating the sales were made under a pre-arranged Rule 10b5-1 trading plan. Kimbal&#8217;s later Tesla stock filings, in April 2023 and November 2024, prominently state that transactions were effected pursuant to a 10b5-1 plan. The November 5, 2021 filing carries no such language, and the SEC noticed. The Wall Street Journal reported in February 2022 that the agency had opened a formal investigation into whether Kimbal&#8217;s sale constituted insider trading. Elon&#8217;s public response was that his brother &#8220;wasn&#8217;t aware&#8221; of the poll, but that Tesla&#8217;s lawyers did know about it. </p><p>That distinction made between familial awareness and corporate-counsel awareness is the kind of parsing that securities attorneys are likely to remember.</p><div><hr></div><h2>The Haircut</h2><p><strong>December 1-3, 2021.</strong></p><p>Accepting that a CEO&#8217;s hairstyle can function as a market-moving event requires a certain flexibility of mind. The data, at any rate, is uncooperative with skeptics.</p><p>Musk appeared at The Wall Street Journal&#8217;s CEO Council event in early December 2021 sporting a look that broke sharply from his usual style: closely shaved sides, a longer swept-over top. Social media responses ranged from Gary Oldman&#8217;s villain in <em>The Fifth Element</em> to less charitable historical comparisons. Musk responded to the attention with a laughing emoji and the claim that he had cut it himself.</p><p>By Friday, December 3, the haircut had gone viral. Tesla fell 11.3% from its November 30 close. Volume on that Friday spiked 58% above normal levels.</p><p>The immediate objection is that the Federal Reserve was turning hawkish at the same time. Jerome Powell had testified before the Senate on November 30 and retired the word &#8220;transitory&#8221; from his description of inflation. True enough. The Nasdaq fell 2.7% over the same November 30 to December 3 window. Then, over the five-day window through December 10, the Nasdaq recovered and finished up 1.1%. The S&amp;P finished up 3.3%. Tesla kept falling, posting a negative 12.2% excess return against QQQ over that span. The Fed&#8217;s actual policy announcement, the accelerated taper and three projected rate hikes for 2022, did not come until the FOMC meeting on December 15, two full weeks after the selloff began.</p><p>The market was punishing Tesla for something it was not doing to tech stocks broadly. And that haircut was no isolated gesture. It was the visible edge of a political alignment that was about to become explicit.</p><p>On Thursday, December 16, Musk casually replied to an email from The Babylon Bee, a right-wing satire site whose content has been documented by Ohio State researchers as among the most shared factually inaccurate material on social media, inviting their team to Austin &#8220;this weekend.&#8221; On Sunday, December 19, Babylon Bee CEO Seth Dillon, Editor-in-Chief Kyle Mann, and Creative Director Ethan Nicolle flew to Austin and sat down with Musk for a rambling, hundred-minute interview covering &#8220;wokeness,&#8221; Elizabeth Warren, and the Metaverse. The next day, Monday, December 20, Tesla hit its monthly low: $299.98 &#8212; a 17.8% drawdown from the haircut&#8217;s debut.</p><p>The <a href="https://www.youtube.com/watch?v=jvGnw1sHh9M">interview was published on YouTube</a> and as a podcast on December 21 and 22. In it, Musk told the hosts he had sold &#8220;roughly 10%&#8221; of his Tesla holdings and was &#8220;almost done.&#8221; The stock, which had closed at $312.84 on December 21, surged to $355.67 by December 23. The Bee Weekly recap, released December 24, confirmed the Sunday recording date, with Nicolle noting it had worked out around a Disneyland trip because &#8220;we interviewed him on Sunday.&#8221;</p><p>The selling did not actually stop. SEC filings show Musk sold approximately 934,000 shares on December 21, another 934,000 on December 22, and a final 934,090 on December 28, when the Form 4 explicitly stated: &#8220;THIS RULE 10b5-1 TRADING PLAN WAS COMPLETED ON DECEMBER 28, 2021.&#8221; Nearly 2.8 million shares were sold after the interview was recorded and after the stock hit its bottom. The 10b5-1 plan ran on its pre-arranged schedule regardless.</p><p>The stock recovered anyway, surging 13.7% in two days on the strength of the &#8220;almost done&#8221; statement alone. The market did not wait for the selling to actually finish; it heard the signal and repriced. What moved the stock was not the cessation of sales but the <em>communication</em> that cessation was imminent, a forward-looking announcement delivered through a media channel that would reach Tesla&#8217;s most devoted retail holders. The selling continued for another week. The market did not care as it had heard what it needed to hear.</p><p>Tesla closed the year at $352.26, roughly where it started the month. Tesla closed at $365.00 on December 1, 2021, the day the haircut debuted. On March 27, 2026, it closed at $361.83. Within three dollars. </p><p>After four years and three months, the stock has gone nowhere.</p><div><hr></div><h2>&#8220;They should sell their Tesla stock.&#8221;</h2><p><strong>July 23, 2024.</strong></p><p>During Tesla&#8217;s second-quarter earnings call, Musk did something that, to my knowledge, no other sitting CEO of a publicly traded company has ever done on a recorded investor call: he told shareholders to sell.</p><div class="pullquote"><p>&#8220;I recommend anyone who doesn&#8217;t believe that Tesla would solve vehicle autonomy should not hold Tesla stock,&#8221; Musk said. &#8220;They should sell their Tesla stock.&#8221;</p></div><p>The next day, Tesla dropped 12.3%. The Nasdaq fell 3.6%. The S&amp;P lost 2.3%. Tesla&#8217;s excess loss against QQQ: 8.7 percentage points. Volume spiked 50%.</p><p>The quarter itself was weak, with declining automotive margins that were widely expected. Weak quarters alone do not produce 8.7 points of excess decline. The broader tech selloff explains about 30% of the move, with the remaining 70% as the market pricing in the spectacle of a CEO issuing an explicit sell recommendation for his own company.</p><p>Musk operates under a 2018 SEC consent decree, amended in April 2019, that requires him to have an experienced securities lawyer pre-approve public communications on an enumerated list of topics before he posts them. That list includes Tesla&#8217;s financial condition, production numbers, projections about the business, and &#8220;events regarding the company&#8217;s securities.&#8221; An explicit recommendation to sell Tesla stock, tied to a forward-looking projection about autonomous driving capability, falls squarely within at least two of those categories. The decree remains in force: Musk moved to terminate it in 2021, was denied by Judge Liman in SDNY in 2022, lost the appeal at the Second Circuit in 2023, and petitioned the Supreme Court in <em>Musk v. SEC</em> (No. 23-626) without obtaining relief.</p><p>No enforcement action followed the earnings call statement, just as none had followed the &#8220;stock price is too high&#8221; tweet in May 2020, which Musk told the Wall Street Journal was not vetted in advance by Tesla counsel. The SEC declined to comment to WSJ on the May 2020 tweet. No contempt motion was filed, nor was any sanction issued. Compliance Week ran a piece at the time headlined &#8220;Elon Musk again tests SEC with &#8216;stock price is too high&#8217; tweet,&#8221; framing the episode as a test of the agency&#8217;s willingness to enforce. Reuters, summarizing the pattern in 2022, was more blunt: in its faceoff with Musk, the SEC had &#8220;blinked.&#8221; Columbia law professor John Coffee told CNN he did not expect repercussions, viewing the tweet as opinion rather than factual misstatement. The SDNY docket confirms there is no entry in 2020 referencing the May 1 tweet, no show-cause order, and no contempt proceeding. </p><p>A consent decree that is never enforced obviously functions less as a constraint and more as a decoration.</p><div><hr></div><h2>&#8220;Going back to this haircut&#8221;</h2><p><strong>March 16, 2025.</strong></p><p>Thirteen months after the earnings call, with Tesla shares having already lost 48% of their value from a January 2025 high of $428.22, Musk posted the photograph of himself and his son from the December 2021 period with the caption: <a href="https://x.com/elonmusk/status/1901204835711455288">&#8220;Going back to this haircut.&#8221;</a> The tweet went up at 5:32 AM Eastern on a Sunday morning. X reported it received 113.9 million views.</p><p>Monday, Tesla fell 4.8%. The Nasdaq rose 0.6%. The S&amp;P rose 0.8%. The excess loss against QQQ was 5.4 percentage points, clearing the threshold. Unlike every previous signal, though, the five-day excess was negligible. The stock was already so beaten down from the DOGE backlash and the collapse of European sales that the marginal damage was absorbed within days.</p><p>Two features of this signal set it apart from its predecessors.</p><p>First, Musk owns X. He controls its algorithms, its trending mechanics, its content distribution pipeline, and the view-count metrics that the platform reports to the public. No independent body audits how X calculates or displays view counts, and Musk has a documented history of altering platform mechanics to amplify his own content. When X reports that a market-moving tweet from its owner reached 113.9 million accounts, that figure should be understood as a claim made by the interested party, not a verified measurement. The count may well reflect engineered amplification with distribution tuned to ensure saturation of financial media and institutional investor feeds.</p><p>Then there is the timing. The 2020 &#8220;stock price is too high&#8221; tweet went out at 11:11 AM on a Friday, causing a real-time intraday crash that at least gave traders the chance to react in the moment. The haircut callback went out before dawn on a Sunday. By Monday&#8217;s open, every financial outlet had covered it. Institutional risk desks had run their models, options market makers had adjusted their quotes, and algorithmic trading systems had processed the signal through Sunday evening futures. Monday&#8217;s open was a fait accompli. </p><p>Retail investors, who cannot trade pre-market and rely on liquidity available during market-hours to exit positions, bore the full brunt of a gap-down that institutional participants had a full overnight window to position themselves around.</p><div><hr></div><h2>The Pattern</h2><p>Five signals over five years. Each is structured differently, but all share a set of features that, taken together, do not appear purely impulsive.</p><p><strong>Insider positioning precedes the signal.</strong> In the Twitter poll case, Kimbal Musk liquidated $108.8 million in Tesla shares across 14 tranches on November 5, filed the Form 4 at 9:22 PM that evening, and the poll went up the next afternoon. His filing carried no 10b5-1 safe-harbor language, unlike his later Tesla sales in 2023 and 2024 which did. The SEC opened a formal investigation into whether the trade constituted insider trading. During the December 2021 haircut period, multiple insiders were executing sales. By early 2025, Tesla board members and executives had offloaded over $100 million in shares across a matter of weeks, with board chair Robyn Denholm alone moving $558 million worth of stock since 2020. After insiders sell, the signal drops.</p><p><strong>Every qualifying signal produced a volume spike.</strong> The smallest was 12%, the largest 58%. These are not retail panic-sell volumes. Spikes of that magnitude indicate institutional participation: pension funds, index rebalancers, risk-parity models, hedge fund desks, all responding to the same trigger simultaneously. The signal is not aimed at day traders on Reddit; it is aimed at the algorithmic layer of the market that treats CEO behavior as a quantifiable risk input.</p><p><strong>The signals hit hardest near highs.</strong> The Twitter poll and the haircut debut, both issued when Tesla hovered near its all-time highs around $400 (split-adjusted), produced 14.5% and 12.2% excess five-day losses respectively. The March 2025 tweet that was issued when the stock sat at $250 barely left a mark beyond the first day. A signal aimed at triggering corrections from elevated levels, where the most value can be extracted by anyone positioned short or holding puts ahead of the event, would behave exactly this way.</p><p><strong>Each signal is deniable.</strong> &#8220;Stock price is too high&#8221; is just an opinion. The Twitter poll was about his taxes. The haircut is just a haircut. The earnings call was actually about strategic conviction. &#8220;Going back to this haircut&#8221; is a simple joke about grooming. The signals he drops come wrapped in a layer of plausible deniability thick enough to keep regulators at bay but thin enough for anyone paying attention to read the message. Deniability is not a flaw in the signal; it is the actual mechanism by which the signal operates. And consider: Musk&#8217;s 2018 consent decree with the SEC requires pre-approval of communications about Tesla&#8217;s financial condition, securities, or projections. A tweet about a haircut does not appear on that list. The two signals in this dataset that produced the largest excess losses against the Nasdaq, the haircut debut at 12.2% and the haircut callback at 5.4%, are the two that most cleanly evade the decree&#8217;s enumerated categories. Draw your own conclusions.</p><p><strong>The distribution channel is now captive.</strong> When Musk tweeted &#8220;stock price is too high&#8221; in May 2020, Twitter was an independent platform with its own algorithms and editorial decisions. He was broadcasting through someone else&#8217;s infrastructure. After the October 2022 acquisition, every subsequent signal has been distributed through a platform he owns outright. Algorithmic amplification, trending curation, view-count reporting, etcetera &#8212; Musk controls all of it. No independent check exists on whether his posts receive preferential distribution, and there is no third-party verification of reported engagement metrics.</p><p>The man who moves markets with his posts also owns the printing press.</p><div><hr></div><h2>What the Jury Said</h2><p>On March 20, 2026, nine days after Musk&#8217;s latest haircut-related post began circulating, a nine-member federal jury in San Francisco returned its verdict in <em><a href="https://www.npr.org/2026/03/20/g-s1-114660/elon-musk-misled-investors-twitter-purchase">Pampena v. Musk</a></em>, the class action shareholder lawsuit over his 2022 Twitter acquisition. After nearly four days of deliberation, they delivered a split decision.</p><p>The jury found Musk liable under Section 10(b) of the Securities Exchange Act and SEC Rule 10b-5(b) for two specific tweets: his May 13, 2022 statement that the Twitter deal was &#8220;temporarily on hold,&#8221; and a May 17 tweet claiming the deal could not proceed without bot data. Both were found to be materially misleading. A third challenged statement, made on a podcast, was deemed opinion and not actionable. The jury rejected the plaintiffs&#8217; broader theory under Rule 10b-5(a) that Musk had engaged in an intentional &#8220;scheme to defraud&#8221; investors.</p><p>Damages rose to approximately $2.1 billion in stock losses, with plaintiffs&#8217; attorneys estimating an additional $500 million in options losses for a potential total near $2.6 billion. Shareholders are set to receive between $3 and $8 per share per day for the class period. Musk&#8217;s attorneys at Quinn Emanuel announced an appeal immediately, called the verdict &#8220;a bump in the road,&#8221; and noted the jury had &#8220;found both for and against the plaintiffs and found no fraud scheme.&#8221;</p><p>The plaintiffs&#8217; attorney Joseph Cotchett told reporters afterward that the verdict &#8220;sends a strong message that just because you&#8217;re a rich and powerful person, you still have to obey the law, and no man is above the law.&#8221;</p><p>The significance reaches well beyond the acquisition of Twitter and well beyond the two counts on which Musk prevailed. For the first time, a federal jury had examined specific tweets by Elon Musk under the framework of securities fraud and concluded that two of those constituted material misrepresentations made with the requisite mental state. They did not find a coordinated scheme, but they did find that individual tweets, standing alone, were false enough and consequential enough to warrant billions in damages.</p><p>None of that proves the five Tesla sell signals documented above were intentional misrepresentations. </p><p>A verdict about Twitter shares does not establish liability for Tesla share movements. It does, however, resolve a predicate question that Musk has contested in courtrooms for nearly a decade: does he understand that his public statements move stock prices, and does he make them with awareness of their consequences? Nine jurors heard his defense and rejected it on two out of three counts. </p><p>The proposition that Elon Musk posts without understanding what his posts do to stock prices is, as of March 20, 2026, something a jury weighed and declined to believe.</p><div><hr></div><h2>The Cumulative Cost</h2><p>Across five qualifying events, measured conservatively against the Nasdaq-100, Musk&#8217;s public actions have produced approximately 35 percentage points of idiosyncratic loss in Tesla&#8217;s stock. These are not losses caused by the Federal Reserve, Chinese competition, declining EV demand, or any of the dozens of legitimate headwinds that every automotive company faces. They are losses caused specifically and measurably by the CEO&#8217;s tweets, statements, and personal aesthetic choices in periods where the broader market was flat or rising.</p><p>At Tesla&#8217;s current market capitalization of roughly $1.4 trillion, a single percentage point of movement represents approximately $14 billion in shareholder value. The math is approximate, because the market cap has fluctuated over the five-year period in question, but the order of magnitude speaks for itself.</p><p>This accounting captures only the five cleanest events. It leaves out the slow bleed of the DOGE period, when Tesla&#8217;s association with Musk&#8217;s political activities cost the stock roughly half its value from December 2024 to April 2025. It leaves out the dozens of smaller provocations that fell below my methodology&#8217;s 5% excess threshold, as well as the opportunity cost of investors who exited Tesla entirely because they could no longer stomach Musk&#8217;s governance style.</p><p>What it does capture, rigorously and defensibly, are five moments when the wealthiest individual used his public platform to communicate something to the market, the market responded with overwhelming and precisely timed selling pressure, and the rest of the market did not.</p><div><hr></div><h2>What Comes Next</h2><p>Tesla&#8217;s next earnings call is scheduled for April 28, 2026. </p><p>Musk has signaled that capital expenditures will exceed $20 billion this year, more than double the 2025 figure. Automotive revenue fell 10% last year. The company is discontinuing the Model S and Model X. The robotaxi fleet operates only about a dozen vehicles in Austin with human safety chaperones riding side-saddle. The Cybercab, which has no steering wheel, is supposed to begin production in April and expected to reach volume production by year&#8217;s end.</p><p>The <em>Pampena v. Musk</em> verdict will be appealed, and Quinn Emanuel will argue that a mixed decision vindicates their client. Despite this framing, the factual core of the jury&#8217;s finding stands until it is overturned: two tweets by Elon Musk constituted material misrepresentations under federal securities law, and they cost shareholders billions. For anyone holding TSLA, the question is no longer whether the CEO&#8217;s public behavior affects the stock &#8212; The data settles that. The question is whether the next signal has already been sent.</p><p>Tesla closed at $361.83 on March 27. That is just $3.17 away from where it stood on December 1, 2021, the day Elon Musk debuted a Hitler Youth-style haircut and the market started selling.</p><p>Some patterns repeat because the underlying conditions recur. Others, because someone wants them to.</p><div><hr></div><p><em>Jackie Singh is an information security professional and investigative journalist. </em></p><p><em>This analysis is based on publicly available market data, SEC filings, court records, and contemporaneous media reporting. It does not constitute investment advice. All price data has been split-adjusted.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/p/just-a-haircut?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/p/just-a-haircut?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[Your Eyes Are Lying to You. I Can Prove It.]]></title><description><![CDATA[Relying on intuition to spot a deepfake in 2026 is like bringing a knife to a drone fight.]]></description><link>https://www.hackingbutlegal.com/p/your-eyes-are-lying-to-you-i-can</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/your-eyes-are-lying-to-you-i-can</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Tue, 10 Mar 2026 13:15:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3rFq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Relying on intuition to spot a deepfake in 2026 is like bringing a knife to a drone fight. Fake or manipulative content has become a scourge. Between high-fidelity voice clones, synthetic manipulation, and influence actors with media access, &#8220;seeing is believing&#8221; has become a dangerous liability. </p><p>If you work in a newsroom, a law firm, or a research lab, your gut feeling no longer counts as a forensic tool. I&#8217;m so excited to share that my new app <strong><a href="https://www.kinexis.ai">Kinexis.AI</a></strong> goes live today to help bridge the gap between human perception and manipulated reality.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3rFq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3rFq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png 424w, https://substackcdn.com/image/fetch/$s_!3rFq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png 848w, https://substackcdn.com/image/fetch/$s_!3rFq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png 1272w, https://substackcdn.com/image/fetch/$s_!3rFq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3rFq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png" width="1456" height="1540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1540,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1244791,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/190484960?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3rFq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png 424w, https://substackcdn.com/image/fetch/$s_!3rFq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png 848w, https://substackcdn.com/image/fetch/$s_!3rFq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png 1272w, https://substackcdn.com/image/fetch/$s_!3rFq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8052b9d-2567-4fb3-ac0a-c772aa002295_1836x1942.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>&#8220;President Trump Demands Unconditional Surrender from Iran in Air Force One Gaggle&#8221; / <a href="https://www.kinexis.ai/analyses/UKyEBzxV">Kinexis.AI</a></strong></figcaption></figure></div><p>Instead of a simple &#8220;fake or not&#8221; detector, my company has built a multi-modal telemetry engine. Running a video through Kinexis generates a clinical, forensic report across multiple layers of analysis:</p><ul><li><p><strong>Synthetic Artifacts:</strong> Hunting for the microscopic glitches GenAI leaves in its wake.</p></li><li><p><strong>Narrative Framing:</strong> Identifying hidden persuasion techniques like authority positioning or &#8220;feigned earnestness.&#8221;</p></li><li><p><strong>Body Language:</strong> Mapping movements and expressions that often occur too fast for the human eye to register.</p></li></ul><p>Jeffrey Epstein&#8217;s deposition footage serves as a quick case study. </p><p>When we processed clips of those archival tapes, the engine didn&#8217;t just confirm they were authentic; it flagged specific moments of contempt and high cognitive load that might change your understanding of the testimony.</p><p><strong><a href="https://www.kinexis.ai">Kinexis</a></strong> turns a passive viewing experience into a data-driven investigation.</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;4c9d9865-8e8c-464a-bbbd-82cb6412ee55&quot;,&quot;duration&quot;:null}"></div><p>Building <strong><a href="https://www.kinexis.ai">Kinexis</a></strong> has been a deeply personal mission over the past weeks because I believe technology should act as a shield for truth rather than as a weapon against it. </p><p><strong>This platform is a first-of-its-kind attempt to complement every citizen and professional&#8217;s valuable human judgment with a high-fidelity AI sensor that offers a nuanced, forensic understanding of how media can be constructed to influence us.</strong> </p><p>By merging deepfake detection with behavioral intelligence, my hope is that we can use AI for good&#8212;empowering people to cut through the noise of synthetic manipulation and restore a shared, factual foundation for how we understand the world.</p><p>I built this for those who hate black-box verdicts, but haven&#8217;t had useful tools to dig deeper. You&#8217;ll get raw data, timestamped findings, and probabilistic confidence scores. </p><p>Stop guessing. Start measuring!</p><p>You can run your first analysis right now, or <strong><a href="https://www.kinexis.ai/browse">browse public reports</a></strong>. Guest checkout is enabled, and we support direct links from sites like YouTube, Facebook, X/Twitter, and TikTok so you don&#8217;t have to waste your time downloading videos.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.kinexis.ai/analyze&quot;,&quot;text&quot;:&quot;Analyze Your First Video&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.kinexis.ai/analyze"><span>Analyze Your First Video</span></a></p><p>Stay skeptical.</p>]]></content:encoded></item><item><title><![CDATA[DOGE Has the Draft List]]></title><description><![CDATA[How automatic Selective Service registration, government data-mining, and two active wars converge on a single database.]]></description><link>https://www.hackingbutlegal.com/p/doge-has-the-draft-list</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/doge-has-the-draft-list</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Mon, 09 Mar 2026 01:12:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lxkx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ktmV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ktmV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ktmV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ktmV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ktmV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ktmV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg" width="860" height="573" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:573,&quot;width&quot;:860,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ktmV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ktmV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ktmV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ktmV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadca158-0025-461a-8389-4dcdfae19e17_860x573.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Officials conduct the first Vietnam-era draft lottery on December 1, 1969, at Selective Service headquarters in Washington, D.C. Capsules containing birth dates were drawn from the glass container to assign draft order numbers to men aged 18&#8211;26. The &#8220;RANDOM SELECTION&#8221; board behind them displayed 366 possible numbers. Today, the capsules have been replaced by federal databases. <strong>(Photo: <a href="https://www.saturdayeveningpost.com/2019/12/the-1969-draft-lottery-didnt-solve-nixons-problems/">Warren K. Leffler</a> / Library of Congress)</strong></figcaption></figure></div><p>In February 2025, I <strong><a href="https://www.hackingbutlegal.com/p/the-gops-quiet-draft-plans-how-the">wrote</a></strong> about something that almost happened. A provision in the House-passed FY2025 NDAA would have transformed the Selective Service System from voluntary self-registration into automatic, database-driven enrollment of every draft-age male in the country. It was stripped from the <strong><a href="https://nnomy.org/en/home-73768/1054-proposal-for-automatic-draft-registration-removed-from-ndaa.html">final bill</a></strong> before President Biden signed it in December 2024. I argued at the time that its removal didn&#8217;t mean the idea was dead. The 57-1 vote in the House Armed Services Committee, the bipartisan enthusiasm, the obvious political utility of keeping a draft on a hair trigger&#8212;all of it pointed toward a second attempt.</p><p>That second attempt succeeded, and in a context far worse than I anticipated.</p><p>On December 18, 2025, President Trump <strong><a href="https://www.whitehouse.gov/briefings-statements/2025/12/statement-by-the-president-7598/">signed</a></strong> the FY2026 National Defense Authorization Act into law. Section 535 mandates that the Selective Service System automatically register all male U.S. residents aged 18 to 26 using existing federal databases. The provision takes effect in one year. It <strong><a href="https://www.govconwire.com/articles/trump-fy26-ndaa-acquisition-reforms">passed</a></strong> 312-112 in the House and 77-20 in the Senate. Nobody held a press conference about it.</p><p>Between my original article and this one, the United States bombed Iran&#8217;s <strong><a href="https://en.wikipedia.org/wiki/2025_United_States_strikes_on_Iranian_nuclear_sites">nuclear facilities</a></strong>, intervened militarily in <strong><a href="https://en.wikipedia.org/wiki/2026_United_States_intervention_in_Venezuela">Venezuela</a></strong>, deployed the National Guard to <strong><a href="https://www.nytimes.com/interactive/2025/10/27/us/us-national-guard-deployments.html">American cities</a></strong>, and authorized the largest defense budget in history. A new National Defense Strategy explicitly prepares for &#8220;prolonged, multi-domain conflicts.&#8221; </p><p><em>Quiet draft plans are now law, being implemented against a backdrop of active warfare.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VCQR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VCQR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VCQR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VCQR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VCQR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VCQR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg" width="1024" height="716" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:716,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VCQR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VCQR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VCQR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VCQR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8934cd6-5eb3-458f-904f-3e7d2947e453_1024x716.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">An original Selective Service &#8220;Order to Report for Induction&#8221; from Local Board No. 101 in Melvindale, Michigan, dated November 19, 1959, directing a young man to report to the Armed Forces Induction Station in Detroit at 7:00 a.m. on December 3. Millions of these letters were sent between 1948 and 1973. Under Section 535 of the FY2026 NDAA, the registration that precedes such orders will be automatic. <strong>(Photo: Reddit <a href="https://www.reddit.com/r/mildlyinteresting/comments/5n32qi/vietnam_war_draft_notice/">r/mildlyinteresting</a>)</strong></figcaption></figure></div><div><hr></div><h2><strong>What Section 535 Actually Does</strong></h2><p>Under the new law, the SSS must &#8220;identify, locate, and register&#8221; every male person residing in the United States between 18 and 26 by aggregating data from other federal agencies&#8212;Social Security, IRS, immigration records, whatever else the SSS Director &#8220;determines necessary.&#8221;</p><p>This replaces a self-registration system in place since 1980. Under that framework, young men were supposed to sign up voluntarily; most didn&#8217;t. Compliance has been abysmal for decades. Bernard <strong><a href="https://en.wikipedia.org/wiki/Bernard_Rostker">Rostker</a></strong>, who ran the SSS from 1979 to 1981, <strong><a href="https://nnomy.org/index.php/en/home-73768/953-house-hearing-on-selective-service.html">testified</a></strong> in 2019 that the existing database would be &#8220;less than useless&#8221; for an actual draft.</p><p>Congress had an obvious alternative: abolish a system that hasn&#8217;t worked in 45 years. Instead, it chose to expand the system&#8217;s reach and its access to Americans&#8217; personal data.</p><p>Edward <strong><a href="https://hasbrouck.org/">Hasbrouck</a></strong>, the most knowledgeable independent expert on draft registration in the country, put the change in <strong><a href="https://www.antiwar.com/blog/2025/12/09/house-and-senate-agree-to-make-draft-registration-automatic/">stark terms</a></strong> when the conference bill emerged in December 2025: this: </p><blockquote><p>&#8220;will move the USA closer to activation of a draft, or at least to being able to claim to be ready to activate a draft &#8216;on demand,&#8217; than at any time in the half century since draft registration was suspended and draft boards were deactivated in 1975.&#8221;</p></blockquote><p>A revealing detail is buried in the legislation itself. Despite the word &#8220;automatic,&#8221; the law still requires potential draftees to provide personal information on demand of the SSS. If the system could truly identify and locate everyone on its own, that provision wouldn&#8217;t be necessary. It exists because the premise of constructing a comprehensive, accurate list of every draft-eligible person by merging federal databases doesn&#8217;t hold up. Federal databases don&#8217;t agree with each other. They don&#8217;t track current addresses. They don&#8217;t reliably record sex as assigned at birth. None of them were designed for this purpose.</p><p>So what the law actually creates is not an automated registration system but a sweeping new authority for the SSS to demand data from every other federal agency and to demand personal information from individuals. </p><p><em>Automation is the sales pitch; the surveillance architecture it enables is the product.</em></p><div><hr></div><h2><strong>How It Got Through</strong></h2><p>The legislative path reveals how Congress handles provisions with major civil liberties implications when nobody is paying attention.</p><p>Automatic registration language originated within the SSS itself during the Biden administration, championed in Congress by Rep. Chrissy <strong><a href="https://houlahan.house.gov/news/documentsingle.aspx?DocumentID=4113">Houlahan</a></strong> (D-PA). Her bill sailed through the House Armed Services Committee in May 2024 on a voice vote without audible opposition, endorsed &#8220;<strong><a href="https://www.militarytimes.com/news/pentagon-congress/2024/05/23/lawmakers-move-to-automate-selective-service-registration-for-all-men/">wholeheartedly</a></strong>&#8220; by Chairman Mike Rogers (R-AL). Democrats got to look tough on national service. Republicans got expanded government data collection that could be weaponized for other purposes. Everyone won except the people who&#8217;d eventually be registered.</p><p>When the provision was stripped from the FY2025 NDAA in conference, I <strong><a href="https://www.hackingbutlegal.com/p/the-gops-quiet-draft-plans-how-the">flagged it</a></strong> as a temporary setback, and ten months later it resurfaced in the FY2026 bill.</p><p>In September 2025, Rep. Warren <strong><a href="https://davidson.house.gov/">Davidson</a></strong> (R-OH), a West Point graduate and Army veteran, tried to bring a floor amendment that would have <strong><a href="https://www.antiwar.com/blog/2025/09/05/house-considers-whether-to-end-or-try-to-automate-draft-registration/">replaced</a></strong> automatic registration with outright repeal of the Military Selective Service Act. The House Rules Committee <strong><a href="https://rules.house.gov/bill/119/hr-3838">blocked it</a></strong>, foreclosing any debate on whether the Selective Service should exist at all. Only the question of how aggressively it should operate was permitted.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lxkx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lxkx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lxkx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lxkx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lxkx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lxkx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg" width="1456" height="1798" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1798,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Illinois v. Trump (7th Circuit)&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Illinois v. Trump (7th Circuit)" title="Illinois v. Trump (7th Circuit)" srcset="https://substackcdn.com/image/fetch/$s_!lxkx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lxkx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lxkx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lxkx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d3e42ad-50e5-424f-b190-89f0f63148f6_1610x1988.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A young man burns his Selective Service draft card during an anti-war protest in the late 1960s. Congress had criminalized the act in 1965 under the <a href="https://www.mtsu.edu/first-amendment/article/1060/draft-card-burning">Draft Card Mutilation Act</a>, making destruction of the card punishable by up to five years in prison. It didn&#8217;t stop them. <strong>(Photo: <a href="https://firstamendment.mtsu.edu/article/draft-card-mutilation-act-of-1965/">First Amendment Encyclopedia / Middle Tennessee State University</a>)</strong></figcaption></figure></div><p>By December 2025, the House-Senate <strong><a href="https://armedservices.house.gov/news/documentsingle.aspx?DocumentID=6359">conference committee</a></strong> had folded the provision into the final FY2026 NDAA. Public discussion around its passage focused on the $901 billion topline, the 3.8% military pay raise, Golden Dome missile defense authorization, and $400 million for Ukraine. Automatic draft registration was a footnote.</p><p>The Friends Committee on National Legislation had flagged the provision before it passed, calling it &#8220;<strong><a href="https://www.fcnl.org/updates/2025-11/dangerous-draft-automation-why-its-time-end-selective-service">dangerous draft automation</a></strong>.&#8221; </p><p><em>Their warning went largely unheard.</em></p><div><hr></div><h2><strong>DOGE Walks Into the Selective Service</strong></h2><p>In April 2025, before the automatic registration provision was even enacted, the Department of Government Efficiency showed up at SSS headquarters.</p><p>The SSS <strong><a href="https://www.antiwar.com/blog/2025/04/17/doge-gets-access-to-selective-service-registration-database/">confirmed</a></strong> to <strong><a href="https://responsiblestatecraft.org/author/edwardhasbrouck/">Edward Hasbrouck</a></strong> that &#8220;a DOGE representative visited our Agency this week. We&#8217;ve established a great working relationship. They asked us about our data and requested access, which we gave in compliance with the President&#8217;s Executive Order on Establishing and Implementing the Department of Government Efficiency.&#8221;</p><p>The registration database contains records on all male U.S. citizens or residents born on or after January 1, 1960, who have registered or been registered by state driver&#8217;s license agencies. Enormous and inaccurate, as of that April visit it was open to an organization with no statutory authority and no obligation to explain what it intended to do with the data.</p><p>When Hasbrouck asked whether new computer matching programs had been carried out by DOGE, the SSS said no, but acknowledged it wasn&#8217;t clear whether the agency would &#8220;even know what DOGE has done with SSS data, once DOGE has gotten access to it and possibly exfiltrated it.&#8221;</p><p>Once data leaves an agency and enters DOGE&#8217;s orbit, no mechanism exists to track it, constrain it, or recall it. DOGE&#8217;s entire operational model is built on aggregating and cross-referencing federal databases. </p><p><em>That model now includes the draft registration list.</em></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>If you want to know what the government is building before it gets used on you, subscribe to Hacking, but Legal.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2><strong>From Database to Weapon</strong></h2><p><em>If DOGE&#8217;s access was the opening move, the SSS&#8217;s subsequent rulemaking was the follow-through.</em></p><p>After Section 535 was enacted, the SSS&#8217;s first official regulatory action was a proposal to expand &#8220;routine uses&#8221; of registration data. Under the new proposed rules, SSS records could be disclosed to federal, state, and local agencies and to private entities for purposes including immigration enforcement.</p><p>The Heritage Foundation had <strong><a href="https://www.antiwar.com/blog/2025/02/02/heritage-foundation-project-wants-to-weaponize-selective-service-registration-against-immigrants/">signaled</a></strong> earlier in 2025 that it wanted SSS registration data turned against immigrants, leveraging threats of prosecution for &#8220;knowing and willful&#8221; non-registration to pressure undocumented individuals to self-deport. The legal basis for such threats is thin because you can&#8217;t prosecute someone for &#8220;knowingly&#8221; failing to do something they didn&#8217;t know they were required to do. But the coercive potential is real, especially for populations already living under threat of deportation.</p><p>In January 2026, a coalition of civil liberties and peace organizations <strong><a href="https://nlgmltf.org/military-law/2026/mltf-and-allies-object-to-expanded-use-of-selective-service-registration-data/">pushed back</a></strong>. The Military Law Task Force, the Electronic Privacy Information Center (EPIC), Restore the Fourth, the Committee Opposed to Militarism and the Draft, Project YANO, the Episcopal Peace Fellowship, the Jewish C.O. Project, and the Center on Conscience &amp; War submitted joint comments opposing the proposed data-sharing expansion. Their filing warned that DOGE had already been given access to the SSS database &#8220;for undisclosed purposes and with no apparent legal basis&#8221; and that the proposed rules were a precursor to the far broader data-sharing regime that automatic registration would require.</p><p>The coalition also flagged the populations most vulnerable: transgender and non-binary youth, who risk being misgendered or misregistered by databases that don&#8217;t track sex assigned at birth, and immigrant youth, whose data would flow directly into infrastructure already being repurposed for enforcement operations.</p><p>As someone who has spent years studying how government data systems get repurposed, I&#8217;ve seen this cycle before. A database gets built for a narrow purpose. Access creeps outward, new &#8220;routine uses&#8221; get proposed, and by the time the public notices, the architecture is already operational. The SSS registration database is mid-cycle right now.</p><div><hr></div><h2><strong>A System That Can&#8217;t Draft Anyone</strong></h2><p>Here&#8217;s the paradox. The Selective Service System is simultaneously being granted unprecedented data collection powers and remains institutionally incapable of executing an actual draft.</p><p>Between March 2021 and March 2025, draft board membership declined from 9,596 to 5,802. When the SSS conducted outreach to its own board members, it discovered that &#8220;many&#8221; had died without the agency&#8217;s knowledge. The SSS had so little contact with the people responsible for processing draft claims that it didn&#8217;t know they were dead.</p><p>Many local boards now lack the three members required by law to constitute a quorum. Without a quorum, a board cannot legally hear deferment or exemption claims. If a draft were activated tomorrow, residents in those jurisdictions would have no functioning board to appeal to. The National Appeal Board, which hears appeals of deferment and exemption decisions, had a single member as of March 2025. Three are needed for a quorum, so no functioning national appeals process exists.</p><p>The SSS was considering asking Congress to let it consolidate boards across entire Congressional districts rather than counties, which would reduce the number of boards needed but overload survivors with cases they&#8217;d be unprepared to handle, staffed by rushed appointees with minimal training.</p><p><em>Congress just entrusted this agency with building a comprehensive national database of every draft-eligible person in the country.</em></p><div><hr></div><h2><strong>Meanwhile, the Wars</strong></h2><p>While Congress debated subcommittee markup language, the United States was fighting.</p><p>On June 22, 2025, the U.S. launched Operation Midnight Hammer, striking three Iranian nuclear facilities at Natanz, Fordow, and Isfahan with B-2 stealth bombers and over 100 aircraft. Trump <strong><a href="https://www.reuters.com/world/us/strikes-iran-mark-trumps-biggest-riskiest-foreign-policy-gamble-2025-06-22/">declared</a></strong> Iran&#8217;s enrichment capabilities &#8220;obliterated.&#8221;</p><p>In late February 2026, the U.S. and Israel launched a second, larger campaign against Iran, <strong><a href="https://www.centcom.mil/OPERATIONS-AND-EXERCISES/EPIC-FURY/">Operation Epic Fury</a></strong>, engaging over 1,700 targets including command centers, ballistic missile sites, naval vessels, and military infrastructure. Trump declared a &#8220;major combat operation.&#8221; As of this writing, Iran has <strong><a href="https://www.aljazeera.com/news/2026/2/28/us-israel-bomb-iran-a-timeline-of-talks-and-threats-leading-up-to-attacks">retaliated</a></strong> with missile strikes on U.S. bases across the Gulf, and fighting continues.</p><p>In the Caribbean, the largest U.S. naval concentration since the Cuban Missile Crisis took shape over summer 2025. Since September, the U.S. has carried out dozens of <strong><a href="https://en.wikipedia.org/wiki/United_States_strikes_on_alleged_drug_traffickers_during_Operation_Southern_Spear">strikes</a></strong> on suspected drug-smuggling vessels, killing scores of people. Defense Secretary Pete Hegseth announced many of these personally on social media, declaring that targets would be treated &#8220;EXACTLY how we treated Al-Qaeda.&#8221;</p><p>A congressional crisis erupted in November after it was <strong><a href="https://www.nytimes.com/2025/12/01/us/hegseth-drug-boat-strike-order-venezuela.html">reported</a></strong> that Hegseth had allegedly ordered a second strike to eliminate survivors of a September 2 attack, raising serious questions under the Geneva Conventions that congressional investigators are still pursuing. The FY2026 NDAA itself contains a <strong><a href="https://www.cbsnews.com/news/house-vote-ndaa-defense-policy-bill/">provision</a></strong> withholding 25% of Hegseth&#8217;s travel budget until the Pentagon provides Congress with unedited video of the Caribbean strikes.</p><p>By January 2026, Venezuela escalated from naval buildup to full intervention with Operation Absolute Resolve, in which U.S. forces bombed infrastructure across northern Venezuela and Delta Force operators <strong><a href="https://www.reuters.com/world/americas/loud-noises-heard-venezuela-capital-southern-area-without-electricity-2026-01-03/">captured</a></strong> President Maduro.</p><p>On the domestic front, National Guard troops deployed to <strong><a href="https://www.lemkininstitute.com/statements-new-page/statement-on-the-domestic-deployment-of-national-guard-into-u.s.-cities">Washington D.C.</a></strong> in August 2025, then to Los Angeles, Memphis, Charlotte, New Orleans, and Portland. In August 2025, Trump signed an <strong><a href="https://www.cnn.com/2025/08/25/politics/trump-executive-order-national-guard-units-crime">executive order</a></strong> directing the Pentagon to create standing National Guard units in every state for &#8220;rapid nationwide deployment.&#8221; In a meeting with over 800 generals, he described America as waging &#8220;a war from within.&#8221; (The Supreme Court <strong><a href="https://www.politico.com/news/2025/12/31/donald-trump-national-guard-deployment-00708714">ruled</a></strong> against the Chicago deployment in December, and Trump withdrew troops from three cities before signaling they could return.)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Je5d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Je5d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Je5d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Je5d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Je5d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Je5d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg" width="1024" height="1384" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1384,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Je5d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Je5d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Je5d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Je5d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9b8ecc2-9b79-477f-849b-25cb3c3c8959_1024x1384.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">&#8220;The Riot in Lexington Avenue.&#8221; Mobs set fire to buildings and battled police during the New York City Draft Riots of July 1863, the largest civil insurrection in American history apart from the Civil War itself. The riots erupted after Congress passed the Enrollment Act, which allowed wealthy men to buy their way out of conscription for $300. <strong>(Illustration: <a href="https://blackpast.org/african-american-history/new-york-city-draft-riots-1863/">Harper&#8217;s Weekly, August 1, 1863 / New York Public Library</a> / Dixon, E. (2017, November 10). </strong><em><strong>The New York City Draft Riots (1863)</strong></em><strong>. <a href="https://blackpast.org/african-american-history/new-york-city-draft-riots-1863/">BlackPast.org</a>)</strong></figcaption></figure></div><div><hr></div><h2><strong>The 2026 National Defense Strategy: Saying the Quiet Part</strong></h2><p>Released in January 2026, the new <strong><a href="https://media.defense.gov/2026/Jan/23/2003864773/-1/-1/0/2026-NATIONAL-DEFENSE-STRATEGY.PDF">National Defense Strategy</a></strong> is the most telling document in this sequence. Previous defense strategies talked about &#8220;preventing war&#8221; or &#8220;integrated deterrence.&#8221; This one organizes around preparation for &#8220;prolonged, dispersed, and multi-domain conflicts.&#8221;</p><p>Homeland and hemispheric defense became Priority #1, with &#8220;homeland&#8221; now encompassing the entire Western Hemisphere under what the Pentagon calls a &#8220;Trump Corollary to the Monroe Doctrine.&#8221; China remains the &#8220;pacing threat,&#8221; but operational focus has shifted to the Caribbean, the Arctic, and the Gulf of America. Officials describe the defense industrial base as being placed on &#8220;a wartime footing,&#8221; with calls for a &#8220;once-in-a-century revival of American industry.&#8221;</p><p>CSIS analyst Mark <strong><a href="https://www.csis.org/analysis/2026-national-defense-strategy-numbers-radical-changes-moderate-changes-and-some">Cancian</a></strong>, a retired Marine colonel, noted the strategy warns of &#8220;an increased risk of America itself being drawn into simultaneous major wars across theaters &#8212; a third World War.&#8221; The answer offered is a &#8220;one plus&#8221; conflict model: the U.S. fights one major war while allies handle the second. Those allies, described in the document as &#8220;freeloading dependents,&#8221; are expected to shoulder frontline roles, logistics, and risk.</p><p>One conspicuous absence: the NDS does not mention the all-volunteer force. Every previous QDR and NDS had a section on sustaining the AVF. Its disappearance from a document that otherwise touches every major defense topic is hard to read as an oversight.</p><p>You don&#8217;t build automatic draft registration, expand the surveillance apparatus around it, <strong><a href="https://www.reuters.com/world/us/trump-rename-department-defense-department-war-official-says-2025-09-05/">rename</a></strong> the Department of Defense to the &#8220;Department of War,&#8221; and stop talking about the all-volunteer force (all while fighting on two continents) unless conscription is being kept very close to the surface.</p><div><hr></div><h2><strong>What Comes Next</strong></h2><p>The SSS has until December 18, 2026, to stand up the automatic registration system. That means publishing regulations, completing Privacy Act and Computer Matching Act notices, obtaining OMB approval for new data collection instruments, and building the technical infrastructure to pull and reconcile data across multiple federal agencies. All of this by an agency that can&#8217;t keep track of whether its own draft board members are alive.</p><p>States could complicate the process. The automatic registration law grants the SSS authority to compel data from <em>federal</em> agencies, but imposes no such obligation on <strong><a href="https://responsiblestatecraft.org/draft-selective-service/">state governments</a></strong>. Eleven states currently have no Selective Service registration tie-in with driver&#8217;s licenses. Any state that doesn&#8217;t want its residents&#8217; data funneled into a DOGE-accessible draft database could end its data-sharing agreement with the SSS entirely.</p><p>The coalition that submitted comments in January is planning continued opposition and calling for repeal of the Military Selective Service Act before automatic registration takes effect. They have nine months.</p><p>Congress could still repeal the MSSA with a one-sentence bill. But 389 House members and 77 senators just voted to expand the system, so repeal is not a near-term prospect.</p><p>What is a near-term prospect: by December 2026, the federal government will possess a continuously updated database of every draft-eligible male in the country, constructed from cross-referenced federal records, accessible to agencies with no clear data protection obligations, and maintained by an institution that has already shown it cannot be trusted with the data it has.</p><p>That database will exist in a country actively bombing Iran, intervening in Venezuela, operating under a defense strategy premised on prolonged warfare, and no longer mentioning the all-volunteer force in its strategic planning.</p><p>I wrote a year ago that the GOP&#8217;s draft plans were quiet. They aren&#8217;t quiet anymore. They are law, and the nine months between now and implementation are the last window to stop them.</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/p/doge-has-the-draft-list?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption"><em>Someone you know is on this list. Send them this article.</em></p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/p/doge-has-the-draft-list?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/p/doge-has-the-draft-list?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[The Industry That Fights Governments for a Living Won't Fight This One]]></title><description><![CDATA[On clearances, salaries, and the structural silence of the American infosec community.]]></description><link>https://www.hackingbutlegal.com/p/the-industry-that-fights-governments</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/the-industry-that-fights-governments</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Sat, 07 Mar 2026 01:17:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0pip!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I have spent the better part of two decades in information security. I was one of those kids who came up through hacker culture, then managed to professionalize those skills into a career. </p><p>And lately, watching the cybersecurity community go quiet while the Trump administration dismantles the country&#8217;s defenses, I keep asking myself the same question I&#8217;m about to try to answer.</p><div class="pullquote"><p>Why aren&#8217;t we doing something? We fight nation-state hackers for a living. We have the skills. Many of us hold values that are directly threatened by what&#8217;s happening.</p><p>Where is everybody?</p></div><p>Answering that honestly requires pulling apart several threads at once: money, clearances, the peculiar political inheritance of hacker culture, the structural position of technical professionals under capitalism, and a community that has quietly confused professional discretion with moral neutrality.</p><h2><strong>The SentinelOne Test</strong></h2><p>If you want to understand why the cybersecurity industry is silent, start with what happened to <strong><a href="https://cyberscoop.com/trump-chris-krebs-executive-order-2020-election/">Chris Krebs</a></strong>. Krebs was the founding director of <strong><a href="https://www.cybersecuritydive.com/news/cisa-7-biggest-challenges-2026/809088/">CISA</a></strong>, the government&#8217;s civilian cybersecurity agency.</p><p>Our community has generally had a positive view of CISA&#8212;in no small part due to the years-long visible efforts of their senior leadership, including Krebs, to create lines of integration with information security communities of practice and create a sense of democratic participation in the defense of the nation. </p><p>Many sectors which are critical to national defense are under the control of private enterprises, so it is similarly important to build these relationships&#8212;as well as relationships with foreign organizations tasked with the defense of their own respective nations&#8212;and they had, partly through forging relationships with noted influencers and increasing their visibility at industry events.</p><p>Trump fired Chris Krebs unceremoniously via tweet in November 2020 for working to counter disinformation that the presidential election was not secure. At the 2021 Cyberwarcon conference, organizers presented him with a flight jacket reading &#8220;FIRED BY TWEET,&#8221; and everybody clapped. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0pip!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0pip!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png 424w, https://substackcdn.com/image/fetch/$s_!0pip!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png 848w, https://substackcdn.com/image/fetch/$s_!0pip!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png 1272w, https://substackcdn.com/image/fetch/$s_!0pip!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0pip!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png" width="1024" height="1552" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1552,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:652935,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/190134635?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0pip!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png 424w, https://substackcdn.com/image/fetch/$s_!0pip!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png 848w, https://substackcdn.com/image/fetch/$s_!0pip!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png 1272w, https://substackcdn.com/image/fetch/$s_!0pip!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ef0211-25d3-4267-beff-8f4a82d8f0e4_1024x1552.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Kim Zetter&#8217;s <a href="https://www.zetter-zeroday.com/trump-signs-memorandum-revoking-security-clearance-of-former-cisa-director-chris-krebs/">Zero Day Blog</a></figcaption></figure></div><p>In April 2025, the joke stopped being funny: Trump issued a Presidential Memorandum naming Krebs in its title.</p><blockquote><p><em>For lawyers and process nerds:</em> that one is technically a Presidential Memorandum rather than an Executive Order, but in practice it functions the same way: it directs the executive branch, carries binding instructions for agencies, and can be enforced unless it conflicts with statute or the Constitution. The differences are mostly procedural: Memoranda don&#8217;t have to be printed in the Federal Register, they don&#8217;t have to spell out the president&#8217;s specific legal authority the way orders do under <a href="https://www.ecfr.gov/current/title-1/chapter-I/subchapter-E/part-19/section-19.1">1 C.F.R. &#167; 19.1</a>, and the budget office doesn&#8217;t need to issue a formal &#8220;Budgetary Impact Statement&#8221; for them.</p></blockquote><p>The effect of the <strong><a href="https://www.whitehouse.gov/presidential-actions/2025/04/addressing-risks-from-chris-krebs-and-government-censorship/">Memorandum</a></strong> was the revocation of Krebs&#8217; security clearance, the start of a Justice Department investigation into his government service, and the suspension of the clearances of every employee at <strong><a href="https://www.csoonline.com/article/3958808/trump-revokes-security-clearances-for-chris-krebs-sentinelone-in-problematic-precedent.html">SentinelOne</a></strong>, where Krebs worked as chief intelligence and public policy officer. No evidence supported the White House memo&#8217;s accusation that he had been &#8220;suppressing conservative viewpoints,&#8221; and no explanation was offered for why SentinelOne&#8217;s entire workforce should be punished. Within a week, <strong><a href="https://www.cnbc.com/2025/04/16/former-cisa-chief-krebs-leaves-sentinelone-after-trump-exec-order.html">Krebs resigned</a></strong>, saying the fight was one he needed to take on outside the company.</p><p><strong><a href="https://www.reuters.com/world/us/cybersecurity-industry-falls-silent-trump-turns-ire-sentinelone-2025-04-10/">Reuters</a></strong> contacted 33 of the largest U.S. cybersecurity companies for comment. </p><p>Thirty-two either declined or did not respond. A single voice of opposition came from the <strong><a href="https://www.scworld.com/brief/trumps-action-against-sentinelone-draws-muted-cyber-industry-reaction">Cyber Threat Alliance</a></strong>, a nonprofit, whose president Michael Daniel said: &#8220;Targeting a company because the president does not like someone in the company is an example of the very weaponization of the federal government the memo claims to be combating.&#8221;</p><p><strong><a href="https://securityboulevard.com/2025/04/krebs-steps-down-from-sentinelone-vows-to-fight-trump-attack/">Katie Moussouris</a></strong>, founder of Luta Security, was blunt: &#8220;I don&#8217;t think it&#8217;s feasible for cybersecurity companies to have a broader response on this. The risk is just too high.&#8221;</p><p>An anonymous executive put it more plainly to Reuters: &#8220;If they are willing to crush Mr. Krebs, what do you think they&#8217;ll do to me?&#8221;</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>This publication runs entirely on reader subscriptions. Please consider becoming a paid subscriber to help my stories reach more people.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2><strong>The Dismantling</strong></h2><p>The act against Krebs was not an isolated act of retribution. He was a demonstration project&#8212;and the demonstration worked!&#8212;because it ran in parallel with a systematic campaign to hollow out America&#8217;s cybersecurity infrastructure.</p><p>CISA entered fiscal year 2025 with roughly 3,400 employees. By December 2025, that number had fallen to approximately <strong><a href="https://www.metaintri.com/blog/cisa-job-cuts-workforce-cybersecurity-federal-workers-2026">2,400</a></strong>. Trump&#8217;s FY2026 budget proposes cutting the agency&#8217;s funding by <strong><a href="https://www.nextgov.com/cybersecurity/2025/06/cisa-projected-lose-third-its-workforce-under-trumps-2026-budget/405726/">$495 million</a></strong>, a 17% reduction, eliminating over a thousand authorized positions. Election Security has been entirely zeroed out. Forty-five million dollars stripped from Cyber Defense Education and Training. Seventy million from the National Risk Management Center.</p><p>In April 2025, the <strong><a href="https://blog.barracuda.com/2025/04/16/cve-program-funding-crisis">CVE program</a></strong> nearly collapsed. CVE is the global system for identifying and tracking software vulnerabilities, and it underpins virtually every security operation on Earth. MITRE&#8217;s government contract was allowed to approach expiration before CISA threw together a last-minute extension. The system survived. But nobody who watched it happen could avoid the obvious implication: even the most fundamental shared infrastructure of cybersecurity is expendable when it falls within the budget-cutting blast radius.</p><p>General Timothy Haugh, who led both the NSA and U.S. Cyber Command, was <strong><a href="https://www.military.com/daily-news/2025/04/11/nsa-cybercom-firings-stir-worries-over-how-seriously-trump-administration-takes-cybersecurity.html">fired</a></strong> along with his deputy, Wendy Noble. No official rationale was offered. DHS Secretary Kristi Noem took the stage at the RSA Conference and called CISA a &#8220;<strong><a href="https://vendelux.com/news/rsac-2025-cybersecurity-political-controversy/">Ministry of Truth</a></strong>,&#8221; accusing it of deciding &#8220;what was truth and what was not.&#8221; She was referring to the agency&#8217;s role in debunking election misinformation that Trump still insists was censorship.</p><p>By January 2026, the escalation had reached a kind of absurdist peak. CISA, the FBI, and the NSA all <strong><a href="https://www.cybersecuritydive.com/news/cisa-nsa-fbi-rsac-conference-jen-easterly/810482/">pulled out of the RSAC Conference</a></strong> after the event&#8217;s organizer hired former CISA director Jen Easterly as CEO. Easterly is a 25-year Army veteran and political independent whose offense was criticizing the administration&#8217;s loyalty mandate at the previous year&#8217;s conference. West Point had already rescinded a job offer to her after a far-right activist objected. The federal government withdrew from the world&#8217;s largest cybersecurity gathering because it didn&#8217;t like the new boss&#8212;one who was, until quite recently, their own well-respected boss.</p><p>All of this while Chinese state-sponsored hackers <a href="https://www.hackingbutlegal.com/p/the-secret-system-behind-every-call">remain positioned</a> inside American critical infrastructure. As <strong><a href="https://cybernews.com/security/former-cisa-head-slams-trump-for-dangerously-degrading-us-cyber-defenses/">Easterly wrote</a></strong> on LinkedIn before Trump&#8217;s allies forced her further from public life: &#8220;As experienced leaders exit and key roles remain vacant, our nation&#8217;s cyber defenses are at risk of being dangerously degraded.&#8221;</p><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ab97a410-e425-4795-a849-5d07eca28a6e&quot;,&quot;caption&quot;:&quot;Previous Story: The Trump administration has ordered a halt to offensive cyber operations against Russia while simultaneously dismantling key components of the nation's cybersecurity infrastructure in a dramatic realignment of national security priorities. These moves come as Trump seeks to &#8220;reset&#8221; relations with Russian President Vladimir Putin...&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;America's Cyber Surrender&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:12097991,&quot;name&quot;:&quot;Jackie Singh&quot;,&quot;bio&quot;:&quot;Discover \&quot;Hacking, but Legal\&quot;&#8212;your gateway to incisive cybersecurity journalism and expert analysis by renowned industry leader Jackie Singh&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/84a588ee-989d-41be-9e74-992b496e9cae_3072x3072.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-03-03T20:08:06.685Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1534598974068-2d51eda7628f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8cnVzc2lhJTIwdXNhfGVufDB8fHx8MTc0MTAzMTcyMHww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.hackingbutlegal.com/p/americas-cyber-surrender&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:158312632,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:37,&quot;comment_count&quot;:4,&quot;publication_id&quot;:1882518,&quot;publication_name&quot;:&quot;Hacking, but Legal&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ZcdC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eaf71e4-63f5-4ded-bf46-56b7ec78f94a_390x390.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h2><strong>The Government as Threat Actor</strong></h2><p>This is the part that should unsettle everyone in my field.</p><p>We train to defend against Advanced Persistent Threats, use acronyms like APT28 and APT41 and Volt Typhoon, write detection rules, build threat models, share indicators of compromise. Our entire conceptual apparatus assumes the threat actor is foreign and that the U.S. government is, broadly speaking, on our side. </p><p>Then came <strong><a href="https://fortune.com/2025/02/27/elon-musks-doge-is-a-cybersecurity-threat-in-the-making-former-dhhs-chief-information-officer-says/">DOGE</a></strong>. Elon Musk&#8217;s operatives gained access to Treasury payment systems, OPM personnel databases, and IRS records with minimal security vetting. Alan Butler, executive director of the Electronic Privacy Information Center, <strong><a href="https://www.politico.com/news/2025/02/03/doge-treasury-usaid-donald-trump-011538">told Politico</a></strong> that their access to federal data was &#8220;an absolute nightmare.&#8221;</p><p><strong><a href="https://www.hks.harvard.edu/faculty-research/policy-topics/science-technology-data/doge-putting-countrys-data-and-computing">Bruce Schneier</a></strong> at Harvard said government systems are now less secure because of DOGE&#8217;s actions. <strong><a href="https://www.axios.com/2025/02/11/insider-threats-loom-as-elon-musks-team-gains-swift-government-access">Axios</a></strong> reported on the insider threat implications of granting rapid access to individuals with unclear backgrounds and undisclosed conflicts of interest. A former DHS Chief Privacy Officer described what happened as &#8220;a data breach of exponential proportions.&#8221;</p><p>In any other context, we would call this an insider threat. We would write an incident report, recommend access revocation, conduct forensic analysis. But the people who did it answer to the president, and the people who would normally investigate are being fired or silenced. Nobody has written a TTP report for DOGE. Nobody has published a MITRE ATT&amp;CK mapping for an executive branch that treats its own government&#8217;s data as a personal resource. </p><p><em>Our frameworks were not built for this.</em></p><h2><strong>Who We Are, and Why That Matters</strong></h2><p>You can&#8217;t understand how this community responds without understanding where it came from. Information security descends from <strong><a href="https://www.inverse.com/culture/24440-the-hacker-ethic">hacker culture</a></strong>, and hacker culture&#8217;s founding ethic was libertarian in the older, pre-partisan sense: distrust of authority, commitment to open information, and an unwavering belief that technology could route around institutional power. <strong><a href="https://policyreview.info/glossary/cypherpunk">Cypherpunks</a></strong> who built the encryption tools we still depend on saw cryptography as a liberating force against government surveillance.</p><p>The politics are not neatly left or right. They are anti-authoritarian, which maps onto anarchism for some, market libertarianism for others, progressive activism for still others. Walk around DEF CON and you will find people who think open source is a grand anarchist experiment sitting next to people who think the Second Amendment is a cybersecurity posture. Collective political action can be difficult when the only shared conviction is some vague skepticism of centralized power.</p><p>Demographics complicate this further. <strong><a href="https://www.isc2.org/Insights/2025/03/Women-Comprise-22-percent-of-the-Cybersecurity-Workforce">Women make up 22%</a></strong> of the cybersecurity workforce. LGBTQ people, including a visible contingent of trans women hackers and security researchers, have carved out real cultural space in this industry&#8212;from long&#8209;running events like <strong><a href="https://unicornriot.ninja/media/queercon-brings-together-lgbtq-infosec-community-at-defcon/">Queercon at DEF CON</a></strong>, which I have personally attended and found to be great fun, to highly public practitioners like <strong><a href="https://diginomica.com/ada-lovelace-day-hacker-alissa-knight-being-trans-woman-mans-world">Alissa Knight</a></strong> who&#8217;ve made it easier for others to imagine themselves here. Plenty of people in this industry have skin in the game when it comes to the policies this administration is pursuing.</p><p>Yet the workforce remains <strong><a href="https://dispatch.thorcollective.com/p/why-we-need-more-women-and-intersectional-diversity-in-cyber">overwhelmingly white and male</a></strong>. People with the greatest personal stakes in resisting are also the most vulnerable in the workplace, and the least able to speak out safely. Meanwhile, the white, male, credentialed, senior professionals who hold the most structural power face the least direct personal threat.</p><p>Conferences celebrate minority members with panels and mentorship programs, but none of that has translated into collective defense when those same members face real-world policy harm.</p><h2><strong>Does the Culture Support MAGA?</strong></h2><p>No. Not broadly. But the picture has nuance that a flat denial would miss.</p><p>At <strong><a href="https://www.politico.com/news/2025/05/03/cyber-rebellion-trump-rsa-conference-00325000">RSA 2025</a></strong>, Chris Krebs drew thunderous applause for saying &#8220;we should be outraged. Absolutely outraged.&#8221; Moussouris told reporters, &#8220;Everybody feels the same way I do. Nobody is authorized to say anything officially.&#8221; An open letter from the Electronic Frontier Foundation gathered <strong><a href="https://cyberscoop.com/eff-letter-chris-krebs-donald-trump-executive-order/">more than 40 prominent signatories</a></strong> condemning the Krebs executive order. A State Department employee at the conference, speaking on condition of anonymity, called Secretary Noem &#8220;just a puppet.&#8221;</p><p>Overwhelmingly, sentiment in this community runs against what the administration is doing. It finds expression in private Slack channels, anonymous quotes to reporters, standing ovations at conferences. What it does not produce is organized, public, sustained resistance.</p><p>I should be transparent about where I sit in all of this. I was never fully anonymous in the communities I came up through, and I haven&#8217;t stopped using my voice. If anything, I&#8217;ve become far more strident since 2020, when I watched the security community fail to mount any serious response to the disinformation campaigns and election targeting that defined that cycle. Some of that targeting was directed at me personally. Those events fully clarified something I might have already known: silence in this industry is a choice, and it benefits whoever is running the operation.</p><p>Which brings me to the one moment when a real part of the community did speak up. In late April 2025, the <strong><a href="https://www.eff.org/press/releases/eff-leads-prominent-security-experts-urging-trump-administration-leave-chris-krebs">EFF organized an open letter</a></strong> to the White House demanding that the Krebs investigation be dropped and SentinelOne&#8217;s clearances reinstated. I signed it. </p><p>The <strong><a href="https://www.theregister.com/2025/04/29/infosec_trump_krebs_letter/">initial version</a></strong> carried names like Ron Rivest, Matt Blaze, Bruce Schneier, Jeff Moss, Alex Stamos, and Gabriella Coleman&#8212;people whose careers are established and reputations large enough to absorb the hit. Within days, the signature count <strong><a href="https://www.cybersecuritydive.com/news/chris-krebs-trump-investigation-letter-experts-eff/746558/">blew past 400</a></strong>. The version I have in front of me now carries over <strong><a href="https://docs.google.com/document/d/1nGzNrYe9ax_uMXS7xtCpHSUY1h5XjmAyiR9buLJucsM/edit?tab=t.0">730 names</a></strong>.</p><p>Look at who signed, and a pattern emerges. About 80% included a professional title or affiliation, which in this context is itself an act of exposure. Roughly a quarter hold senior positions: C-suite executives, CISOs, directors, distinguished engineers, endowed professors at MIT, Princeton, Stanford, Georgetown, Columbia. <strong><a href="https://www.csoonline.com/article/3973542/cybersecurity-leaders-decry-political-persecution-of-chris-krebs-in-a-letter-to-the-president.html">CSO Online</a></strong> called it &#8220;a who&#8217;s who of the cybersecurity intelligentsia.&#8221; </p><p>But the bulk of signatories, close to half, are mid-career practitioners: security engineers, analysts, architects. People with titles like &#8220;Cybersecurity Professional&#8221; or &#8220;Security Analyst at Black Hills Information Security.&#8221; These are people who don&#8217;t have endowed chairs to fall back on.</p><p>One name stands out for a different reason: Jonathan Kamens, who listed his title as &#8220;Former (fired by DOGE) Information Security Lead and Advisor to the CTO, U.S. Department of Veterans Affairs.&#8221; He signed as an original signatory, not an open one. He had already lost his job, and chose to make that visible. </p><p>The letter mattered. But 730 names out of a global cybersecurity workforce of over 5 million is vanishingly small. And as <strong><a href="https://www.politico.com/newsletters/digital-future-daily/2025/10/10/5-questions-for-chris-krebs-00602069">Krebs himself told Politico</a></strong> six months later, the executive order remained in force, his clearance was still revoked, and SentinelOne was still dealing with the fallout. Solidarity was expressed and nothing changed.</p><p>A real but minority pro-MAGA tendency does exist within the community, concentrated in military and intelligence-adjacent subcultures and in parts of the crypto and prepper worlds that overlap with hacker culture. Some of this traces back to the <strong><a href="http://esr.ibiblio.org/?p=8120">libertarian strand</a></strong> of hacker politics that has always been comfortable with right-wing anti-government rhetoric. But saying the culture &#8220;inherently supports MAGA&#8221; gets it wrong. </p><p>What the culture inherently supports is self-preservation. At this time, self-preservation and silence feel indistinguishable.</p><h2><strong>The Professional Managerial Trap</strong></h2><p>A body of left-wing theory explains what is happening here. In 1977, Barbara and John Ehrenreich coined the term &#8220;professional-managerial class&#8221; (PMC) to describe salaried mental workers whose function is &#8220;<strong><a href="https://dissentmagazine.org/online_articles/on-the-origins-of-the-professional-managerial-class-an-interview-with-barbara-ehrenreich/">the reproduction of capitalist culture and capitalist class relations</a></strong>.&#8221; They don&#8217;t own capital. They manage it, protect it, optimize it, and discipline the people who produce it.</p><p>Infosec professionals fit that description <em>almost too well</em>. We design access controls, write acceptable-use policies, implement data-loss prevention, monitor employee behavior on corporate networks, and enforce compliance regimes. Our professional purpose, at its structural core, is to keep the systems through which capital flows running without disruption. The trains must run on time. When the Ehrenreichs described the PMC&#8217;s relationship to the working class as &#8220;<strong><a href="https://libcom.org/article/professional-managerial-class-barbara-and-john-ehrenreich">objectively antagonistic</a></strong>,&#8221; they could have been describing the person who configures your company&#8217;s endpoint detection and decides what you&#8217;re allowed to plug into your laptop.</p><p>A <strong><a href="https://jacobin.com/2025/09/professional-managerial-class-pmc-ehrenreich-chibber">recent analysis</a></strong> in Jacobin puts a fine point on it: the PMC are &#8220;servants of capital, but also have a disdain for capitalism.&#8221; I recognize that tension in myself and in most of my peers. Many of us believe, sincerely, that we are protecting people: hospitals from ransomware, election infrastructure from foreign interference, critical infrastructure from catastrophic failure&#8230; Structurally, most of us work for corporations or government agencies whose primary interest is protecting capital, intellectual property, and state power. The sincerity is real but the paycheck comes from somewhere else.</p><p>And the paycheck is definitely generous. The average U.S. cybersecurity salary: <strong><a href="https://www.cybersecuritydive.com/news/security-professionals-salaries/712939/">$147,000</a></strong>. Directors and middle managers average $175,000. CISOs regularly clear $200-400K, and top earners exceed $1 million annually. That kind of money buys houses, private school tuitions, stacked retirement accounts, and a way of life that becomes very difficult to risk for the sake of a LinkedIn post.</p><p>Security clearances make the trap even tighter. A large portion of the infosec workforce holds or aspires to government clearances which can sometimes unlock lucrative contracts and often the most interesting work. As the Krebs case demonstrated, those clearances are revocable by presidential fiat. When your clearance is your career, and the president has shown he will use clearance revocation as punishment, speaking out goes beyond professional risk.</p><h2><strong>The Retreat from the Narrative Battlefield</strong></h2><p>One of the most consequential decisions the infosec community has made in recent years is leaving <strong><a href="https://knowtechie.com/twitters-loss-is-blueskys-gain-mastodon-threads-also-growing/">X/Twitter</a></strong>.</p><p>I understand the impulse. Musk&#8217;s platform became hostile to the values many in this community hold. Harassment spiked. Trans users were targeted relentlessly. Moderation collapsed. Leaving felt like self-preservation&#8212;in many cases, it was.</p><p>But Mastodon and Bluesky are not what Twitter was. They are <strong><a href="https://absolutelymaybe.plos.org/2025/10/30/a-mastodon-migration-from-bluesky-would-be-different/">smaller, more fragmented, built for conversation among the like-minded</a></strong>, where security pros talk to other pros about security. Pleasant, sometimes useful, but rarely political engagement in any meaningful sense. Leaving X was a moral exit, not a strategic one. It ceded the largest public forum where technical expertise could have shaped political discourse to bad actors who have been more than happy to fill the vacuum with nonsense.</p><p>The <strong><a href="https://louisderrac.com/the-progressivist-web-had-better-migrate-to-mastodon-not-bluesky/">progressivist web</a></strong> chose comfort over influence. A community that prides itself on understanding adversarial thinking <strong><a href="https://www.hackingbutlegal.com/p/disinformation-for-infosec-wonks">failed to think</a></strong> adversarially about information warfare.</p><h2><strong>The Professional Culture of Discretion</strong></h2><p>One more factor deserves attention because it&#8217;s one that is highly specific to this field.</p><p>Information security professionals are generally discreet. Operational security is not just a practice, but an identity marker. We often don&#8217;t disclose vulnerabilities before they are patched, share intelligence outside trusted channels, or draw attention to ourselves. These habits serve real purposes in their proper context, but they have metastasized into a professional culture where any public political statement feels like a violation of norms. </p><p>&#8220;We protect systems, not take sides&#8221; has become the industry&#8217;s equivalent of &#8220;just following orders,&#8221; which provides cover for inaction that handily serves the interests of whoever currently controls the systems we protect or can successfully apply pressure to its owners.</p><p>When <strong><a href="https://www.politico.com/news/2025/05/03/cyber-rebellion-trump-rsa-conference-00325000">Politico</a></strong> described a &#8220;typically nonpartisan community beginning to vocalize its dissent&#8221; at RSA, it was describing something real. But &#8220;beginning to vocalize&#8221; in the spring of 2025, months into the dismantling of the American experiment, was already far too late. And vocalization in the form of anonymous quotes and conference applause will never be the same as action.</p><h2><strong>What Would Action Look Like?</strong></h2><p>I don&#8217;t have a clean answer, but I know how it doesn&#8217;t look: migrating to Mastodon to post for an audience that already agrees with you, signing an open letter and going back to work on your government contract, or applauding Chris Krebs at a conference and then telling Reuters &#8220;no comment&#8221; when asked about SentinelOne.</p><p>The cybersecurity community has an asymmetric capability that almost no other professional class possesses. We are people who understand, at a technical level, how the systems of power actually work, who know where the data lives, how it moves, and what is exposed.</p><p>The anti-capitalist analysis would say this power will never be wielded against the system because the people who hold it are too deeply embedded in the system&#8217;s rewards. The PMC critique holds that professionals whose livelihood and identity depend on capitalist institutions will, in the final analysis, choose those institutions over solidarity with the people those institutions harm. </p><p>So far, the evidence supports that reading.</p><p>But the Ehrenreichs themselves <strong><a href="https://dissentmagazine.org/online_articles/on-the-origins-of-the-professional-managerial-class-an-interview-with-barbara-ehrenreich/">acknowledged</a></strong> that as working conditions and pay of the PMC deteriorate, alignment with the broader working class becomes possible, even if never guaranteed and always fraught.</p><p>Clearances are being revoked. Budgets are being slashed. The CVE program nearly died. Agencies are being gutted. The government pulled out of the industry&#8217;s own conference over a hiring decision. Conditions that once made silence feel like prudence are rapidly becoming conditions where silence feels like complicity.</p><p>I cannot tell you whether this community will recognize that shift in time. But the window in which inaction can be mistaken for neutrality is closing fast.</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/p/the-industry-that-fights-governments?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption"><em>Share this story with your industry colleagues.</em></p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/p/the-industry-that-fights-governments?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/p/the-industry-that-fights-governments?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[The Ratchet: How Non-Linear Warfare Turns Trauma Into Infrastructure]]></title><description><![CDATA[Cycles of shock, adaptation, and exploitation rewrite our tolerance.]]></description><link>https://www.hackingbutlegal.com/p/the-ratchet-how-non-linear-warfare</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/the-ratchet-how-non-linear-warfare</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Sat, 28 Feb 2026 19:08:00 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="6650" height="4433" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4433,&quot;width&quot;:6650,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;text&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="text" title="text" srcset="https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1588665343610-04dfd562e2e7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHx0ZW5zaW9ufGVufDB8fHx8MTc3MjMwNTMwOXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@timmossholder">Tim Mossholder</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2><strong>A War That Never Quite Starts or Ends</strong></h2><p>On March 12, 2014, as unmarked Russian soldiers tightened their grip on <strong><a href="https://en.wikipedia.org/wiki/2014_Russian_annexation_of_Crimea">Crimea</a></strong>, Vladislav Surkov published a short story in the glossy Russian magazine <em>Russky Pioneer</em>. Writing under his pseudonym Natan Dubovitsky, the longtime Kremlin political operator imagined a future conflict he called &#8220;the first non-linear war,&#8221; where &#8220;four coalitions collided&#8221; and &#8220;it wasn&#8217;t two against two, or three against one. It was all against all.&#8221; Entire towns and generations changed sides mid-battle; alliances were fluid, motives opaque.</p><p>The <strong><a href="https://www.bewilderingstories.com/issue582/without_sky.html">story</a></strong> appeared on March 12, two weeks after Russian forces seized Crimean airports and surrounded Ukrainian bases, and as soldiers without insignia were replacing local television channels with Russian programming across the peninsula. No war was ever declared. Surkov&#8217;s narrator calls the fighting &#8220;part of a process,&#8221; but not necessarily its most important part. </p><p><em>Moscow thinks about conflict in much the same way.</em></p><p>Since then, journalists and filmmakers (myself included) have treated &#8220;non-linear war&#8221; as a skeleton key to contemporary Russian strategy. Peter <strong><a href="https://www.lrb.co.uk/blog/2014/march/non-linear-war">Pomerantsev</a></strong> read Surkov&#8217;s fiction alongside his real-world media work, describing a system in which &#8220;nothing is true and everything is possible.&#8221; Adam Curtis went further in his 2016 BBC film <em><strong><a href="https://www.bbc.co.uk/programmes/p04b183c">HyperNormalisation</a></strong></em>, arguing that Surkov&#8217;s approach focuses less on battlefield victory than on producing &#8220;a constant state of destabilized perception&#8221; in which people can be managed because they can no longer tell what is real. </p><p>Not every Russia specialist accepts the story as a literal doctrinal blueprint; Surkov was also playing with avant-garde literary and artistic traditions. As a description of how power can operate, though, the story is brutally clear.</p><p>Non-linear war breaks things and redraws borders; it does something else, too. It reshapes what entire societies come to regard as ordinary. <strong><a href="https://www.hackingbutlegal.com/p/the-real-target-is-us">Shock follows shock.</a></strong> Information floods every channel. People adapt because they have no choice, and their adaptation becomes raw material for the next round of operations. That cycle functions like a ratchet. Each turn makes the next one easier.</p><p><em>Once the ratchet clicks forward, it becomes difficult to push back.</em></p><h2><strong>Phase One: Blurred Thresholds</strong></h2><p>Well before Surkov put the phrase &#8220;non-linear war&#8221; into print, Russian officers were questioning the old boundary between war and peace. In a 2013 article in the journal <em>Military-Industrial Courier</em>, General Valery <strong><a href="https://www.politico.com/magazine/story/2017/09/05/gerasimov-doctrine-russia-foreign-policy-215538">Gerasimov</a></strong>, Russia&#8217;s chief of the general staff, wrote that &#8220;the very &#8216;rules of war&#8217; have changed&#8221; and that non-military means of achieving political and strategic goals had in many cases &#8220;exceeded the power of force of weapons&#8221; in their impact. He pointed to social media, information campaigns, covert support to opposition forces, and economic pressure as tools that could soften a target state long before tanks crossed any border. An English <strong><a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">translation</a></strong> of the article was later published in <em>Military Review</em>.</p><p>Western commentators soon labeled this apparent synthesis the &#8220;Gerasimov Doctrine.&#8221; Mark <strong><a href="https://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/">Galeotti</a></strong>, the analyst who coined that phrase in 2014, has since written in <em>Foreign Policy</em> for what he says he launched &#8220;incautiously and unintentionally,&#8221; arguing there is no single doctrine so much as a set of evolving practices and improvisations. The name stuck anyway because it partly captured a change that extended beyond Russia: the rise of conflict fought through a dense mix of military, informational, economic, and legal tools that rarely triggers formal declarations of war.</p><p><em>No clean line separates war from peace in this environment.</em> </p><p>Disinformation campaigns muddy public debate. Cyber operations shut down services. Economic pressure spikes prices or wipes out savings. Sporadic kinetic attacks kill and injure far from any defined front. Christopher Paul and Miriam Matthews, in a 2016 RAND Corporation <strong><a href="https://doi.org/10.7249/PE198">report</a></strong>, called the Russian approach a &#8220;firehose of falsehood.&#8221; The output is high-volume, multichannel, repetitive, and unconcerned with internal consistency. The goal isn&#8217;t to get anyone to believe a particular story. Flood the zone with enough contradictory versions and people stop trying to sort them out.</p><p>NATO&#8217;s Allied Command Transformation has formalized part of this shift under the label &#8220;<strong><a href="https://www.act.nato.int/activities/cognitive-warfare/">cognitive warfare</a></strong>.&#8221; In its working definition, cognitive warfare consists of activities coordinated with other &#8220;instruments of power&#8221; in order to influence, protect, or disrupt cognition at the level of individuals, groups, or entire populations. The focus lies less on particular opinions than on the processes people use to form them. A 2024 <strong><a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC11565700/">analysis</a></strong> of the NATO concept published in <em>Frontiers in Political Science</em> notes that cognitive attacks are conceptualized to &#8220;hinder decision-making processes, erode national or institutional unity, sow societal division, exploit identities and narratives, and undermine the resolve to engage in conflict.&#8221; </p><p><em>When those cognitive processes are overloaded, manipulated, or numbed, the rest of the playbook becomes easier to run.</em></p><h2><strong>Phase Two: Layered Shock and Cognitive Overload</strong></h2><p>Once that blurred threshold is in place, the next move is to subject the population to a mixture of physical and psychological shocks, often far from any traditional front. Those shocks travel through media, markets, and digital infrastructure as readily as artillery barrages.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="6496" height="4331" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4331,&quot;width&quot;:6496,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a bunch of pens that are laying on a table&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a bunch of pens that are laying on a table" title="a bunch of pens that are laying on a table" srcset="https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1699256460480-4ae47855cb4d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHx1a3JhaW5lJTIwZ3VufGVufDB8fHx8MTc3MjI5ODQyMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@jccards">Marek Studzinski</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Ukraine, now entering its fourth year under full-scale Russian attack, offers an unusually well-documented example. A <strong><a href="https://www.who.int/europe/news/item/24-02-2025-three-years-of-war-rising-demand-for-mental-health-support-trauma-care-and-rehabilitation">WHO</a></strong>-supported health needs assessment conducted in October 2024 estimated that 68 percent of Ukrainians report a decline in overall health compared to the pre-war period. Mental health concerns are the most prevalent issue, affecting 46 percent of the population, followed by mental health disorders at 41 percent and neurological conditions at 39 percent. Among combat-exposed soldiers in clinical settings, one recent <strong><a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC12779173/">study</a></strong> reported PTSD in 45.9 percent of patients and Complex PTSD in 21.5 percent.</p><p>The war&#8217;s physical toll runs alongside this psychological damage. <strong><a href="https://www.care.org/media-and-press/ukraine-war-4-year-mark-civilian-deaths-injuries-rise-as-funding-falls-to-record-low/">CARE</a></strong> International has documented how civilian casualties rose sharply again in 2025 after a brief plateau, with 2,514 people killed and 12,142 injured in that year alone, a 31 percent increase in deaths compared to 2024. Many of those harmed were struck far from any trench or fortified line, as cruise missiles and drones hit apartment blocks, electricity infrastructure, and medical facilities.</p><p>At the same time, Russian and pro-Russian information operations batter domestic and international publics with competing narratives about who is responsible for particular atrocities, whether Ukraine is a &#8220;Nazi&#8221; state, and whether Western support is prolonging the fighting. Research on the firehose model notes that audiences exposed to such campaigns are more likely to remember the messages and less likely to engage in fact-checking, even when warned about disinformation in advance. </p><p>A 2025 report by the British Institute for Security Innovation on AI-driven <strong><a href="https://bisi.org.uk/reports/ai-driven-information-warfare-disinformation-and-psychological-manipulation">information warfare</a></strong> describes the end state of this process as &#8220;epistemic learned helplessness&#8221;: a condition in which people stop trying to evaluate claims because the cognitive cost of constant vigilance has become intolerable. Missile strikes, blackouts, deepfake videos, currency shocks: each of those on its own is destabilizing. </p><p><em>Taken together, and repeated over time, they create a background of crisis.</em></p><h2><strong>Phase Three: Defensive Normalization</strong></h2><p>As an Iraq veteran, I am intimately aware with the messy fact that human beings cannot live indefinitely at full alert. When faced with chronic emergency, they will find ways to normalize it as a type of coping mechanism. </p><p><em>War speeds this up and makes it uglier.</em></p><p>Alexei Yurchak called this &#8220;hypernormalization.&#8221; In his 2005 book <em><strong><a href="https://amzn.to/4b2hiWZ">Everything Was Forever, Until It Was No More</a></strong></em>, he described how late-Soviet citizens knew the official story was a lie, but collectively maintained it because nothing else seemed workable. Daily life carried on inside a shared fiction that nobody believed and nobody could replace. Curtis took Yurchak&#8217;s framework and ran with it in his 2016 documentary. His argument was that Western publics had arrived at their own version of the same problem. People could see that politics and media were stage-managed. They kept participating anyway, because no alternative script was on offer.</p><p>Ukrainians near the front describe sleeping in their clothes so they can grab their children and run to shelters at any hour. Workers plan commutes around likely missile timings. People say they have gotten used to the sound of drones overhead and streets without lights. CARE found that over 70 percent of adults in frontline regions experience depression or severe anxiety, but many frame their condition as just &#8220;being tired&#8221; or &#8220;living normally in war.&#8221;</p><p>The research on media consumption and collective trauma tells a related story. A three-year longitudinal <strong><a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC6469939/">study</a></strong> published in <em>Science Advances</em> by Thompson, Jones, Holman, and Silver found that people who consumed heavy media coverage of the Boston Marathon bombings experienced more distress and consumed more media after the Pulse nightclub massacre, feeding a cycle that compounded with each new event. Susan Moeller documented the same pattern at a broader scale in her 1999 book <em><strong><a href="https://amzn.to/4r3jiEe">Compassion Fatigue</a></strong></em>: once a conflict becomes a permanent fixture of the news cycle, audiences stop absorbing its daily horrors, even as the killing continues. Over time, the outrage fades into background noise.</p><p>From a non-linear operator&#8217;s perspective, that shift from alarm to numbness isn&#8217;t a side effect or collateral damage, it&#8217;s usable ground.</p><p><em>A win, if you will.</em></p><h2><strong>Phase Four: Memory, Narrative, and the New Normal</strong></h2><p>Normalization isn&#8217;t a phenomenon limited to individual minds. It is structured by institutions, stories, and the law.</p><p>Dr. Edna <strong><a href="https://academic.oup.com/book/55582/chapter/434061967">Lomsky-Feder</a></strong> interviewed Israeli soldiers from different wars about how they remembered combat. What she found was that societies actively rework traumatic memories through official ceremonies, films, school curricula, and family stories, gradually redefining what counts as &#8220;normal&#8221; in wartime. She calls this the &#8220;normalization of war.&#8221; Heroic, critical, and resilience narratives compete with one another, but the net effect is domestication: intense war experiences get folded into personal biography as expected, even routine.</p><p>A similar logic runs through Russian political life. A <strong><a href="https://www.mann.lt/en/archive/collective-trauma-populism-and-war-the-case-studies-of-russia-and-georgia">study</a></strong> of collective trauma and populism in Russia and Georgia, presented by Jana Javakhishvili and published by the Vilnius Institute for Policy Analysis, argues that unprocessed historical trauma, from Stalinist terror to the collapse of the Soviet Union, has been repurposed by elites into a sense of permanent grievance and siege. The Putin system, in this account, built its legitimacy on a &#8220;substitutive trauma&#8221;: the loss of empire. That loss is continually rehearsed in media and politics, producing a public encouraged to experience present events as proof that enemies are everywhere and that only a strong leader can keep chaos at bay.</p><p>On the receiving end of non-linear campaigns, something different but related unfolds. Therapists and researchers who have written about the &#8220;<strong><a href="https://gettherapybirmingham.com/the-weaponization-of-collective-trauma-understanding-digital-age-psychological-manipulation/">weaponization</a></strong> of collective trauma&#8221; described patients who experienced political news as a form of re-traumatization. <strong>Constant exposure to outrages and scandals, amplified by algorithmic feeds, keeps the amygdala on high alert.</strong> Those affected report difficulty distinguishing real from perceived threats, a collapse of nuance into black-and-white thinking, and &#8220;trauma-bonding&#8221; within political tribes that makes cross-cutting conversation nearly impossible.</p><p>Pomerantsev&#8217;s account of Russia in <em><strong><a href="https://amzn.to/4smKtel">Nothing Is True and Everything Is Possible</a></strong></em> feels like an extreme version of this condition: a country where reality TV, state propaganda, and organized crime blur into one spectacle, and &#8220;surreal&#8221; events are the daily rule and not exceptions. Under non-linear pressure, target societies can drift toward a similar terrain without consciously copying that model because the mechanisms producing it&#8212; namely, constant crisis, unresolved trauma, and saturated media&#8212; are highly familiar.</p><h2><strong>Phase Five: Institutions Adapt, Then Entrench</strong></h2><p>Once crisis becomes routine, institutions change shape to cope with it. Those changes can easily harden into a new status quo.</p><p>On the humanitarian and medical side, Ukraine now has a rapidly expanding mental health and rehabilitation sector. The World Health Organization and national partners warn that demand for trauma care, psychosocial support, and physical rehabilitation is rising faster than services can be built out, and that those needs will persist for decades after the fighting stops. <strong><a href="https://phr.org/news/attacks-on-health-in-ukraine-continue-to-escalate-four-years-into-russias-full-scale-invasion/">Physicians for Human Rights</a></strong> and its partners have documented at least 2,591 attacks on Ukraine&#8217;s health care system since the start of the full-scale invasion, with 359 health workers killed and 379 injured. </p><p>In parallel, Ukraine&#8217;s Ministry of Veterans Affairs and civil society organizations are racing to design long-term programs for reintegration, employment, and family support for hundreds of thousands of current and former combatants.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="6000" height="4000" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4000,&quot;width&quot;:6000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a close-up of a money bill&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a close-up of a money bill" title="a close-up of a money bill" srcset="https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1655456946098-a50949bd9e59?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1NHx8dWtyYWluZXxlbnwwfHx8fDE3NzIzMDU1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@zilvinaska">&#381;ilvinas Ka</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p><em>Security institutions have their own transformation under way.</em> </p><p>States targeted by non-linear campaigns are now pouring resources into counter-disinformation units, cyber defense agencies, and strategic communications teams. NATO&#8217;s cognitive warfare concept papers read partly as a warning and partly as a bureaucratic blueprint: they call for education programs to build &#8220;cognitive resilience,&#8221; technical systems to detect and flag manipulative content, and coordination mechanisms that treat the information space as a theater of operations in its own right. A senior NATO official <strong><a href="https://www.euronews.com/2025/10/15/hybrid-warfare-has-begun-senior-nato-official-tells-euronews">confirmed</a></strong> in October 2025 that &#8220;hybrid warfare has begun&#8221; and that the alliance was investing heavily in preparing for it.</p><p>These adaptations are essential for survival in the short and medium term. They also risk baking the emergency into law and policy. Exceptional powers become permanent fixtures. Surveillance measures introduced to counter one wave of disinformation or terror attacks stay in place for the next. Budget lines and career paths depend on the persistence of threat. Once a state apparatus has reorganized itself around managing non-linear conflict, officials have strong incentives to see that conflict everywhere.</p><p>Russian doctrine of reflexive control sits upstream of this institutional picture. The basic idea, developed by Soviet mathematician Vladimir <strong><a href="https://www.doria.fi/bitstream/handle/10024/176978/Vasara_FDS22_Theory%20of%20Reflexive%20Control%20(web1)-1.pdf">Lefebvre</a></strong> in the 1960s and refined since, is to influence an adversary&#8217;s choices by shaping its perception of reality so that it &#8220;voluntarily&#8221; selects the option most favorable to Moscow. Rather than telling an enemy what to do, the operator feeds it information that leads its own decision-making processes to the desired conclusion. Finnish analyst Antti <strong><a href="https://rusmilsec.blog/2023/12/12/how-to-respond-to-the-challenge-of-reflexive-control/">Vasara</a></strong> describes multi-channel campaigns that aim at the public as well as the command-and-control systems of target states in a bid to force them to misread situations and misallocate resources.</p><p>A population and a bureaucracy already conditioned to see permanent crisis are easier to steer with these techniques. When everything looks like an attack, officials can be nudged toward <strong><a href="https://www.hackingbutlegal.com/p/the-real-target-is-us">overreaction</a></strong> or paralysis with relatively small pushes.</p><h2><strong>Phase Six: The Ratchet Turns</strong></h2><p>Once blurred thresholds, layered shocks, defensive normalization, social reconstruction, and institutional adaptation are in place, the environment itself becomes a weapon. Each new operation lands on a society that has already been pushed closer to the edge.</p><p>The Thompson et al. study in <em>Science Advances</em> found that people who consumed more media coverage of one collective trauma experienced more stress and fear about the next, creating a feedback loop of anxiety and information-seeking that compounded with each event. King&#8217;s College London&#8217;s multi-country <strong><a href="https://icsr.info/2025/05/12/the-impact-of-trauma-survey-breaking-cycles-of-trauma-and-violence/">Impact of Trauma Survey</a></strong>, part of the XCEPT research programme, is probing a related dynamic in Iraq, Lebanon, and South Sudan: in some settings, those who experience severe conflict trauma are more likely to engage in violence themselves, contributing to a &#8220;cycle of violence&#8221; that spans generations.</p><p>In non-linear conflict, each new missile barrage, cyber intrusion, or disinformation wave is calibrated against the current baseline. It doesn&#8217;t need to exceed the last one in magnitude. It simply has to differ enough to break through whatever people have managed to normalize. A strike on pediatric wards after months of nighttime attacks on power stations; a deepfake of a leader &#8220;surrendering&#8221; after months of more conventional propaganda; a banking panic after a year of physical bombardment. </p><p><em>Each re-teaches the lesson that nothing is stable.</em></p><p>Gerasimov&#8217;s 2013 article is often quoted for a line about how a &#8220;perfectly thriving state&#8221; can, in a matter of days or months, be turned into &#8220;an arena of fierce armed conflict&#8221; and &#8220;sink into a web of chaos, humanitarian catastrophe, and civil war.&#8221; Read narrowly, that sentence describes rapid regime change. Read in light of a decade of Russian practice, it reads more like a statement of long-term intent to keep adversary societies hovering on the edge of breakdown. </p><p><em>Never quite collapsing, and never quite recovering.</em></p><p>In Ukraine, that edge is visible in both statistics and daily life. Civilian casualties rose by roughly a third in 2025 despite improved air defenses. According to the <strong><a href="https://www.who.int/news/item/23-02-2026-attacks-on-ukraine-s-health-care-increased-by-20-in-2025">WHO</a></strong>, attacks on healthcare facilities increased by nearly 20 percent that year, further straining an already overloaded system. Among respondents in frontline areas, 59 percent reported their health as poor or very poor in a December 2025 assessment. Clinicians warn that untreated PTSD and depression will shape politics, crime, and social cohesion for years after any ceasefire.</p><p><em>This is what it looks like when trauma functions as infrastructure.</em></p><h2><strong>Strategic Implications</strong></h2><p>Policy responses tend to focus on the most visible elements of non-linear war: sanctions, arms deliveries, cyber defense, high-profile fact-checking of viral lies. Those are necessary, but they address only pieces of the cycle.</p><p><em>The deeper problem is, as I&#8217;ve alluded, both epistemic and psychological.</em> </p><p>Once a population has been pushed toward learned helplessness and people feel it no longer matters what is true, traditional tools of democratic politics lose much of their force. A press conference correcting a false claim lands differently on an audience that has essentially given up on verification. A human rights report documenting atrocities carries far less impact if readers have spent years cycling between outrage and numbness.</p><p>That RAND study on the firehose of falsehood concludes that after-the-fact debunking is rarely effective. It recommends preemptive inoculation through warning audiences about manipulative techniques before they encounter them, saturating the same channels with accurate information, and, where possible, working to curb the reach of the most aggressive propagandists&#8212; defensive maneuvers they work hard to convince populations are a threat to everyone&#8217;s free speech. NATO concept papers on cognitive warfare argue for building &#8220;cognitive resilience&#8221; through education, media literacy, and institutional reforms that improve transparency and trust.</p><p>Those moves are sound as far as they go, but still tend to treat trauma and normalization as side effects rather than engineered outcomes. A strategy that takes the ratchet seriously needs to work on several fronts at once:</p><ul><li><p>Shorten exposure by hardening infrastructure and improving defenses so populations spend less time under active attack.</p></li><li><p>Expand care by treating mental health and social repair as central elements of security policy (not afterthoughts!)</p></li><li><p>Constrain emergency powers with clear sunsets and oversight to prevent a <strong><a href="https://en.wikipedia.org/wiki/Patriot_Act">crisis mindset from hardening into permanent law.</a></strong></p></li><li><p>Support alternative narratives that acknowledge trauma without turning it into a tool of mobilization or denial.</p></li></ul><p>This isn&#8217;t about &#8220;winning the information war&#8221; in some narrow sense; it&#8217;s more a question of whether democracies can sustain the conditions (e.g. trust, shared reality, a sense of future) that make politics something other than an exercise in managing a frightened and exhausted public.</p><p>In Surkov&#8217;s story &#8220;Without Sky,&#8221; the narrator suffers a brain injury that leaves him unable to perceive depth. He can see only two dimensions, only &#8220;yes&#8221; and &#8220;no,&#8221; only black and white. The loss of dimensionality is his private tragedy which doubles as metaphor for something larger. Non-linear warfare aims at flattening a society&#8217;s perception in just this way, until people lose the ability to imagine that life could be structured on any terms other than permanent crisis.</p><p><em>Once that perception takes hold, the ratchet doesn&#8217;t unwind itself.</em></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>If this story helped you understand our world a little more, I would greatly appreciate your subscription as a token of thanks.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Lumen’s Quiet Veto on DMCA Abuse Investigations]]></title><description><![CDATA[Harvard's takedown archive won't explain why my project is "not aligned" with its mission.]]></description><link>https://www.hackingbutlegal.com/p/lumens-quiet-veto-on-dmca-abuse-investigations</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/lumens-quiet-veto-on-dmca-abuse-investigations</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Wed, 18 Feb 2026 19:42:07 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong>What happens when the internet&#8217;s premier archive of DMCA claims declines to help investigate censorship and fraud?</strong></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="478" height="635.9452395768512" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4276,&quot;width&quot;:3214,&quot;resizeWidth&quot;:478,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;brown brick wall with black and yellow caution sign&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="brown brick wall with black and yellow caution sign" title="brown brick wall with black and yellow caution sign" srcset="https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1619379104123-51f1de307c56?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxibG9ja2VkfGVufDB8fHx8MTc3MTI2MTk3MHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@lazycreekimages">Michael Dziedzic</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Just over a week ago on a February afternoon, I found myself browsing yet another set of odd-looking DMCA notices when I decided to ask Lumen Database for an API key to access their database.</p><p>An API key is essentially a researcher login for software; a credential that lets you automatically query large volumes of data instead of clicking through individual records by hand. In my email, I described a straightforward project: examine how one prolific sender of DMCA and related takedown notices might be using copyright law to target lawful reporting and public&#8209;interest speech.</p><p>The outputs, I wrote, would be &#8220;public, written journalism and analysis,&#8221; and I signed it with my name and publication. </p><p>Lumen replied the following morning that my &#8220;plans and outputs do not align with Lumen&#8217;s current goals and mission&#8221; and declined access, then ignored a follow&#8209;up request to explain that contradiction.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X34D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X34D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png 424w, https://substackcdn.com/image/fetch/$s_!X34D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png 848w, https://substackcdn.com/image/fetch/$s_!X34D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png 1272w, https://substackcdn.com/image/fetch/$s_!X34D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X34D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png" width="968" height="579" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:579,&quot;width&quot;:968,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:109900,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/188182810?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e814c40-6266-4a45-a6f6-7c21c9fd0efc_972x710.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!X34D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png 424w, https://substackcdn.com/image/fetch/$s_!X34D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png 848w, https://substackcdn.com/image/fetch/$s_!X34D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png 1272w, https://substackcdn.com/image/fetch/$s_!X34D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e225049-81c6-4e36-a98b-ea7014c68213_968x579.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Lumen&#8217;s official account follows me on Twitter, which makes it hard to argue this was an anonymous or context&#8209;free request from a stranger they knew nothing about. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bKF9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bKF9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png 424w, https://substackcdn.com/image/fetch/$s_!bKF9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png 848w, https://substackcdn.com/image/fetch/$s_!bKF9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png 1272w, https://substackcdn.com/image/fetch/$s_!bKF9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bKF9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png" width="511" height="509.1074074074074" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1076,&quot;width&quot;:1080,&quot;resizeWidth&quot;:511,&quot;bytes&quot;:442270,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/188182810?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bKF9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png 424w, https://substackcdn.com/image/fetch/$s_!bKF9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png 848w, https://substackcdn.com/image/fetch/$s_!bKF9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png 1272w, https://substackcdn.com/image/fetch/$s_!bKF9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc02339b6-daba-4c38-9a1e-45a39c30d272_1080x1076.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://x.com/lumendatabase">@lumendatabase</a> &#8220;Follows you&#8221;</figcaption></figure></div><p>Because Lumen says it exists to document the censorship machinery that operates through legal threats, walling off deeper access to that machinery isn&#8217;t a neutral administrative act. </p><p>It&#8217;s a choice with real consequences for accountability.</p><div><hr></div><h2>The transparency project that gets to say no</h2><p>Lumen is a project of Harvard&#8217;s <strong><a href="https://cyber.harvard.edu/research/lumen">Berkman Klein Center</a></strong>, which describes it as collecting and studying online content&#8209;removal requests &#8220;providing transparency and supporting analysis of the Web&#8217;s takedown &#8216;ecology.&#8217;&#8221;</p><p>UNESCO&#8217;s <strong><a href="https://www.unesco.org/en/world-media-trends/lumen-database">profile</a></strong> summarizes Lumen&#8217;s purpose as promoting transparency about &#8220;who sends and receives these notices, why, and what online content they refer to,&#8221; and facilitating research on &#8220;both legitimate and questionable&#8221; complaints. The database is populated by voluntary contributions from companies such as Google, Twitter, and YouTube.</p><p>On its <strong><a href="https://lumendatabase.org/pages/researchers">Researchers</a></strong> page and in its <strong><a href="https://lumendatabase.org/pages/api_terms">API terms</a></strong>, Lumen tells the world that it generally issues researcher credentials to people or non&#8209;profits planning &#8220;journalistic, academic, or legislative &amp; regulatory policy&#8209;focused public written research outputs,&#8221; explicitly naming news articles, journal pieces, and white papers as acceptable outputs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F8GS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F8GS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png 424w, https://substackcdn.com/image/fetch/$s_!F8GS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png 848w, https://substackcdn.com/image/fetch/$s_!F8GS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png 1272w, https://substackcdn.com/image/fetch/$s_!F8GS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F8GS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png" width="1456" height="1522" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c7940800-352d-441b-b0a9-11a865717738_1842x1926.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1522,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:482584,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/188182810?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!F8GS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png 424w, https://substackcdn.com/image/fetch/$s_!F8GS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png 848w, https://substackcdn.com/image/fetch/$s_!F8GS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png 1272w, https://substackcdn.com/image/fetch/$s_!F8GS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7940800-352d-441b-b0a9-11a865717738_1842x1926.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Independent researchers are explicitly eligible; the terms define a &#8220;Researcher&#8221; as anyone using the API for such a purpose, whether institutionally affiliated or not.</p><p>The same API terms contain a sweeping escape hatch: &#8220;Lumen reserves the right to deny or refuse to grant API access for any reason.&#8221; There is no described public appeal process in those terms, no obligation to provide a reason, and no published statistics on who is refused.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4iXJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4iXJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png 424w, https://substackcdn.com/image/fetch/$s_!4iXJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png 848w, https://substackcdn.com/image/fetch/$s_!4iXJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png 1272w, https://substackcdn.com/image/fetch/$s_!4iXJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4iXJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png" width="1456" height="1644" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1644,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:549361,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/188182810?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4iXJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png 424w, https://substackcdn.com/image/fetch/$s_!4iXJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png 848w, https://substackcdn.com/image/fetch/$s_!4iXJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png 1272w, https://substackcdn.com/image/fetch/$s_!4iXJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c94330a-dcd3-4849-b0c4-258f74bdfa98_1842x2080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Lumen did not respond to my follow&#8209;up email explaining I was writing a story about their organization and asking for comment on how my &#8220;described plans and outputs do not align with Lumen&#8217;s current goals and mission.&#8221;</p><div><hr></div><h2>A textbook fit (on paper)</h2><p>Put Lumen&#8217;s public description next to the project it declined and the alignment appears perfect. Lumen says it wants to document the &#8220;ecology&#8221; of online removal requests: who sends them, why, and to what effect. </p><p>I proposed to:</p><ul><li><p>Map the takedown activity of one frequent submitter over time and across platforms and targets</p></li><li><p>Evaluate how often that entity&#8217;s notices appear overbroad, retaliatory, or aimed at lawful reporting and commentary</p></li><li><p>Examine which topics, individuals, or organizations are most frequently targeted, and whether notices cluster around particular events or critical coverage</p></li></ul><p>The outputs would be public journalism and analysis, with clear methodological notes about how Lumen data were used and my expressed willingness to follow any preferred citation or data&#8209;handling practices. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oun4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oun4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png 424w, https://substackcdn.com/image/fetch/$s_!oun4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png 848w, https://substackcdn.com/image/fetch/$s_!oun4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png 1272w, https://substackcdn.com/image/fetch/$s_!oun4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oun4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png" width="1292" height="1207" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1207,&quot;width&quot;:1292,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:330616,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/188182810?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0432248b-f72a-4641-a874-62f03a7a74a8_1292x1346.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oun4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png 424w, https://substackcdn.com/image/fetch/$s_!oun4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png 848w, https://substackcdn.com/image/fetch/$s_!oun4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png 1272w, https://substackcdn.com/image/fetch/$s_!oun4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bdf8951-ddc7-4954-8c00-575cc8ba8785_1292x1207.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Those are precisely the kinds of &#8220;journalistic&#8221; outputs Lumen cites when defining acceptable research purposes in its API terms. I was able to find various external descriptions of Lumen reinforcing that same expectation. </p><p>Bellingcat&#8217;s <strong><a href="https://bellingcat.gitbook.io/toolkit/more/all-tools/lumen">online investigations toolkit</a></strong> describes Lumen as a Harvard&#8209;affiliated research database of &#8220;legal complaints and content&#8209;removal requests (e.g., DMCA, defamation, court orders)&#8221; and explains how researchers can use it as part of large&#8209;scale investigations. Based on Bellingcat&#8217;s understanding and Lumen&#8217;s own docs, their API access is meant for just the sort of systematic pattern analysis that my proposed work needed.</p><p>Lumen&#8217;s refusal, then, was not simply a matter of limited resources or some ill&#8209;fitting use case. On the public record, my project&#8217;s aims sit squarely inside the organization&#8217;s announced remit. </p><p>The gap lies in how Lumen currently defines its &#8220;goals and mission&#8221; in practice, and who exactly is allowed to test the limits of abusive notice&#8209;sending.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>This is a reader-supported publication! To receive new stories by email, subscribe here:</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2>When a transparency archive narrows the aperture</h2><p>This is not the first time observers have questioned whether Lumen&#8217;s operational choices match its transparency rhetoric.</p><p>In 2020, <strong><a href="https://torrentfreak.com/lumen-database-restricts-access-to-dmca-notices-plans-to-expand-190510/">TorrentFreak</a></strong> reported that Lumen had removed precise URLs from public copies of DMCA notices, replacing them with domain&#8209;level information and requiring users to enter an email address to receive a single&#8209;use link to view full details. The outlet, which called Lumen &#8220;an essential tool for researchers and reporters interested in the cease&#8209;and&#8209;desist landscape,&#8221; warned that &#8220;reduced access will probably be disappointing for some,&#8221; and noted that the new hoops &#8220;place obstacles in the way of legitimate research and accountability.&#8221;</p><p>Lumen project manager Adam Holland told TorrentFreak the changes were meant to keep Lumen a &#8220;vibrant and valuable feature&#8230;for research, journalism, and public awareness around takedown requests&#8221; while addressing concerns about people using the database as a directory of infringing links and reducing staff workload. In his account, the research community&#8217;s experience would remain &#8220;in no way&#8221; compromised.</p><p>Even some copyright&#8209;enforcement professionals were uneasy. A representative from an anti&#8209;piracy company told TorrentFreak that while his clients welcomed less visibility for infringing URLs, he shared &#8220;the concerns of those who may feel that this places obstacles in the way of legitimate research and accountability.&#8221;</p><p>A pattern appears:</p><ul><li><p>Lumen and its institutional home present the project as a neutral infrastructure for transparency and research on legal threats to speech.</p></li><li><p>To manage internal workload and external sensitivities, they narrow public access and route serious work through privileged channels such as researcher logins and API keys.</p></li><li><p>Those privileged channels are themselves controlled by opaque, discretionary access decisions with no external oversight.</p></li></ul><p>An unexplained denial of API access to a journalist scrutinizing one particularly prolific takedown sender is a sharper expression of the same dynamic.</p><p>Additional denials may have occurred of which the public is not yet aware.</p><div><hr></div><h2>The quiet power to shape which abuses are visible</h2><p>The stakes are concrete. Fraudulent and retaliatory takedown campaigns have become a quiet but effective tool for reputation management and suppression of critical reporting under the banner of the DMCA.</p><p>A 2024 analysis by Tax Policy Associates titled <strong><a href="https://taxpolicy.org.uk/2024/02/17/the-invisible-campaign-to-censor-the-internet/">&#8220;The epidemic of fraudulent DMCA takedowns&#8221;</a></strong> described an &#8220;invisible campaign to censor the internet&#8221; through bogus copyright notices, especially those sent to Google, aimed at burying investigative or critical articles in search results. Drawing on Lumen data, the author detailed networks of shell companies and fake media entities submitting near&#8209;identical DMCA complaints to remove unflattering coverage of tax disputes, political figures, and alleged misconduct.</p><p>Journalist Mike Masnick, writing at <strong><a href="https://www.techdirt.com/2024/02/22/fake-entities-are-still-abusing-the-dmca-takedown-process-to-hide-facts-they-dont-like/">Techdirt</a></strong>, has likewise documented &#8220;fake entities&#8230;still abusing the DMCA takedown process&#8221; to scrub factual reporting, using Lumen entries to trace clusters of notices tied to a reputation&#8209;laundering operation built around a string of invented &#8220;Media Corporation&#8221; brands. Another analysis at <strong><a href="https://walledculture.org/how-backdated-articles-abuse-the-dmcas-takedown-system-to-remove-legitimate-news-items/">Walled Culture</a></strong> showed how backdated copies of articles are used to generate fraudulent notices that convince platforms to remove the original investigative pieces.</p><p>These investigations make one thing clear: Lumen&#8217;s archive is not just a passive record. It is often the only way to spot repetition and coordination across platforms that individual transparency reports, or scattered notices, will never reveal.</p><p>Other observers treat Lumen as central infrastructure. The Canadian think tank CIGI, in its report <strong><a href="https://www.cigionline.org/documents/2280/no.276_3PTEcTT.pdf">&#8220;Weaponizing Privacy and Copyright Law for Censorship&#8221;</a></strong>, points to the role of databases like Lumen in tracking censorship&#8209;adjacent use of copyright and privacy law.</p><p>Google itself, in its <strong><a href="https://support.google.com/legal/answer/12158374">About Lumen</a></strong> documentation, explains that it contributes certain legal removal requests to the project, and describes Lumen as a Harvard&#8209;based initiative that &#8220;collects and analyzes legal complaints and requests for removal of online materials.&#8221; Google explicitly links that sharing to goals of transparency and public oversight of content removal.</p><p>That privileged position comes with quiet, unreviewable power. By controlling scalable access to the underlying data, Lumen can determine which journalists and researchers can efficiently test powerful actors&#8217; use of copyright, defamation, or court orders to scrub the public record.</p><p>Lumen&#8217;s own notice&#8209;information page explains that some information is restricted to researchers and that fields, including URLs, may appear as redacted for the general public. After the 2020 changes, full notice details are often available only through email&#8209;gated single&#8209;use links. The web interface allows viewing one complete notice at a time and running basic keyword searches, but trying to map a prolific sender&#8217;s behavior that way is effectively research via pipette.</p><p>From the public record, the structure looks like this:</p><pre><code>[ Notice Senders ]
      &#9474;
      &#9474;  (DMCA, defamation, court orders, other takedown requests)
      &#9660;
[ Platforms / Intermediaries ]
      &#9474;
      &#9474;  (Some or all notices forwarded for "transparency" [CYA])
      &#9660;
[ Lumen Database ]
      &#9474;
      &#9474;  Public web interface
      &#9474;     (Single-notice, email-gated access for full details)
      &#9474;
      &#9492;&#9472;&#9472;&#9472;&#9658; [ API Access ]
              &#9474;
              &#9474;  (Sranted or denied at Lumen's discretion)
              &#9660;
     [ Researchers / Journalists ]</code></pre><p>When those gatekeepers quietly decline, without explanation, the chill is subtle but real. The path of least resistance is to focus on aggregated trends or generic &#8220;DMCA abuse,&#8221; not on how a particular company, law firm, or political actor is exploiting the system.</p><p>Lumen&#8217;s silence on my request for clarification leaves open uncomfortable questions that belong in the public record.</p><div><hr></div><h2>Why this should matter to policymakers and platforms</h2><p>For policymakers and platforms that tout transparency as a partial answer to overbroad content removal, Lumen&#8217;s access posture raises several uncomfortable implications.</p><p>First, if governments and companies point to Lumen as proof of accountability while Lumen quietly controls who can conduct serious analysis, transparency becomes a talking point rather than a practice. UNESCO&#8217;s treatment of Lumen in its <strong><a href="https://www.unesco.org/en/world-media-trends/lumen-database">World Trends in Freedom of Expression</a></strong> materials underscores its perceived role as a public good in the media freedom ecosystem. That status is undermined if its most powerful analytical tools are selectively withheld from independent scrutiny.</p><p>Second, platforms like Google that highlight their participation in Lumen in transparency materials should be pressed on whether they are comfortable with an arrangement in which the primary public archive of their legal notices is not meaningfully accountable to the wider research and journalism community. If Lumen&#8217;s access decisions systematically or even sporadically shield high&#8209;volume senders from investigation, platforms are implicated in that outcome.</p><p>Third, legislators considering reforms to notice&#8209;and&#8209;takedown regimes should recognize that &#8220;transparency&#8221; is not binary. A database can exist, be technically public, and be cited in policy debates while still being organized in ways that frustrate the very investigations it is meant to enable. Access design is policy.</p><p>Finally, there is a deeper structural question: should a single, privately governed institution occupy such a central position in documenting legal threats to online speech? Work on open data and research access has highlighted how opaque refusals can undercut the public interest even when framed as responsible stewardship. Lumen&#8217;s trajectory and practices deserve the same level of critical scrutiny that it has so usefully allowed researchers to apply to everyone else.</p><p>What is already clear is this: a project widely treated as the public&#8217;s telescope into the world of legal takedown threats is also the gatekeeper to that telescope&#8217;s highest&#8209;powered lens. When that gatekeeper quietly tells a researcher her plans no longer fit its mission, and declines to explain why, the story isn&#8217;t about a single denied API key, or that researcher&#8217;s annoyance at the denial. </p><p><strong>It&#8217;s about who gets to study censorship, and on whose terms.</strong></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=188182810&quot;,&quot;text&quot;:&quot;Get 25% off for 1 year&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=188182810"><span>Get 25% off for 1 year</span></a></p>]]></content:encoded></item><item><title><![CDATA[The $3.5 million pardon (and why I took this story to London)]]></title><description><![CDATA[You might have noticed fewer posts on Hacking, but Legal lately.]]></description><link>https://www.hackingbutlegal.com/p/the-35-million-pardon-and-why-i-took</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/the-35-million-pardon-and-why-i-took</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Wed, 11 Feb 2026 17:30:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gflj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You might have noticed fewer posts on <em>Hacking, but Legal</em> lately. </p><p>That&#8217;s because for the last few weeks, I&#8217;ve been tracking a story that was too sensitive, and frankly too dangerous, to publish without the backing of a major institutional partner.</p><p>I needed an outlet that wouldn&#8217;t blink when the names &#8220;Trump,&#8221; &#8220;Putin,&#8221; and &#8220;FBI&#8221; appeared in the same paragraph. I needed a publisher that regards being <strong><a href="https://bylinetimes.com/2025/08/21/russia-byline-times-sanctions-stop-list-ukraine-journalists-and-contributors-putin-war-crimes/">sanctioned by the Russian Federation</a></strong><a href="https://bylinetimes.com/2025/08/21/russia-byline-times-sanctions-stop-list-ukraine-journalists-and-contributors-putin-war-crimes/"> </a>as a badge of honor, not a legal liability.</p><p>That is why my new investigation, <strong>&#8220;<a href="https://bylinetimes.com/2026/02/11/trump-pardon-buries-fbis-secret-work-for-putins-oligarchs/">Trump Pardon Buries FBI&#8217;s Secret Work for Putin&#8217;s Oligarchs</a>,&#8221;</strong> is the lead exclusive story today in <strong>Byline Times</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gflj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gflj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png 424w, https://substackcdn.com/image/fetch/$s_!gflj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png 848w, https://substackcdn.com/image/fetch/$s_!gflj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png 1272w, https://substackcdn.com/image/fetch/$s_!gflj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gflj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png" width="724" height="292.88186813186815" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:589,&quot;width&quot;:1456,&quot;resizeWidth&quot;:724,&quot;bytes&quot;:422501,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/187649657?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gflj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png 424w, https://substackcdn.com/image/fetch/$s_!gflj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png 848w, https://substackcdn.com/image/fetch/$s_!gflj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png 1272w, https://substackcdn.com/image/fetch/$s_!gflj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc80c7-e18b-4a07-99f5-540c569b84dc_2380x962.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>The Investigation</strong> </h3><p>We discovered that President Trump&#8217;s recent pardon of former FBI agent Mark Rossini wasn&#8217;t just a favor&#8212;it was a burial.</p><ul><li><p><strong>The Money:</strong> I tracked $3.5 million in donations to a Trump-aligned Super PACsfrom the family of Rossini&#8217;s co-defendant.</p></li><li><p><strong>The Cover-up:</strong> We explain how the defense may have used &#8220;graymail&#8221;&#8212;threatening to expose national security secrets in open court&#8212;to force the DOJ to crumble.</p></li><li><p><strong>The Result:</strong> The pardon didn&#8217;t just free a man; it permanently sealed the records of what US intelligence officials were secretly doing for sanctioned Russian networks.</p></li></ul><p>Writing for <em>Byline Times</em> allowed me to document this complex &#8220;graymail&#8221; legal maneuver with the rigor it demands. Their editors and legal team are fearless, and they are one of the few outlets left willing to print the uncomfortable truth about the intersection of oligarch money and American justice.</p><p><strong>Please read the full investigation here:</strong> <a href="https://bylinetimes.com/2026/02/11/trump-pardon-buries-fbis-secret-work-for-putins-oligarchs/">https://bylinetimes.com/2026/02/11/trump-pardon-buries-fbis-secret-work-for-putins-oligarchs</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kYo4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kYo4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png 424w, https://substackcdn.com/image/fetch/$s_!kYo4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png 848w, https://substackcdn.com/image/fetch/$s_!kYo4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png 1272w, https://substackcdn.com/image/fetch/$s_!kYo4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kYo4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png" width="704" height="597.654403567447" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1523,&quot;width&quot;:1794,&quot;resizeWidth&quot;:704,&quot;bytes&quot;:3256020,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/187649657?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2af5f708-5fcb-4328-b0e8-057f2c8f8340_1794x2036.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kYo4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png 424w, https://substackcdn.com/image/fetch/$s_!kYo4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png 848w, https://substackcdn.com/image/fetch/$s_!kYo4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png 1272w, https://substackcdn.com/image/fetch/$s_!kYo4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb34220a9-5ca9-44a4-83a7-0ec57f95cb32_1794x1523.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Thank you for supporting <em>Hacking, but Legal</em>. It was your support that funded this investigation, and <em>Byline Times</em> that fearlessly gave it a home. If you want to support more reporting on what the papers don't say, please consider subscribing.</p><p>Best,<br>Jackie Singh</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=187649657&quot;,&quot;text&quot;:&quot;Get 25% off for 1 year&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=187649657"><span>Get 25% off for 1 year</span></a></p>]]></content:encoded></item><item><title><![CDATA[The Strange Case of ICE at the Winter Olympics]]></title><description><![CDATA[Trump is sending ICE agents to Italy. The backlash has been fierce.]]></description><link>https://www.hackingbutlegal.com/p/the-strange-case-of-ice-at-the-winter</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/the-strange-case-of-ice-at-the-winter</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Tue, 27 Jan 2026 21:09:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bsWc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For fifty years, the US State Department&#8217;s Diplomatic Security Service (DSS) has run American security at overseas Olympic Games. The agency created a dedicated Olympic coordinator in 1992, established a <a href="https://2017-2021.state.gov/history-of-major-events-coordination/">Major Events Coordination Unit</a> in 2004, and deployed agents to Paris last summer, where they embedded with Team USA, staffed the Olympic village, and coordinated with French authorities through a joint operations center. </p><p>DSS has done this work at every Games since Montreal. It is, by any reasonable measure, an important part of what the agency does&#8212;making a newly-announced arrangement at Milan-Cortina 2026 highly peculiar.</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/DHSgov/status/2016174667774480707&quot;,&quot;full_text&quot;:&quot;Obviously, ICE does not conduct immigration enforcement operations in foreign countries.\n\nAt the Olympics, ICE&#8217;s Homeland Security Investigations is supporting the U.S. Department of State&#8217;s Diplomatic Security Service and host nation to vet and mitigate risks from transnational&quot;,&quot;username&quot;:&quot;DHSgov&quot;,&quot;name&quot;:&quot;Homeland Security&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1882507181481656320/gzdbVHMv_normal.jpg&quot;,&quot;date&quot;:&quot;2026-01-27T15:41:14.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{&quot;full_text&quot;:&quot;ICE Agents Set to Have Security Role During Winter Olympics in Italy, Prompting Uproar https://t.co/Wdt2Ro5FUT&quot;,&quot;username&quot;:&quot;Variety&quot;,&quot;name&quot;:&quot;Variety&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1610752949550186496/X5zYP9oV_normal.jpg&quot;},&quot;reply_count&quot;:166,&quot;retweet_count&quot;:389,&quot;like_count&quot;:2815,&quot;impression_count&quot;:125849,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:false}" data-component-name="Twitter2ToDOM"></div><p>The Guardian&#8217;s sources at the US Embassy in Rome have <a href="https://www.theguardian.com/us-news/2026/jan/27/italy-ice-security-role-winter-olympics">confirmed</a> the following statement from ICE:</p><blockquote><p>&#8220;At the Olympics, ICE&#8217;s Homeland Security Investigations (HSI) is supporting the US Department of State&#8217;s Diplomatic Security Service and host nation to vet and mitigate risks from transnational criminal organisations.&#8221;</p><p>&#8220;All security operations remain under Italian authority.&#8221;</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bsWc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bsWc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png 424w, https://substackcdn.com/image/fetch/$s_!bsWc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png 848w, https://substackcdn.com/image/fetch/$s_!bsWc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png 1272w, https://substackcdn.com/image/fetch/$s_!bsWc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bsWc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png" width="555" height="809.0256797583081" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1930,&quot;width&quot;:1324,&quot;resizeWidth&quot;:555,&quot;bytes&quot;:1531197,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185997196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bsWc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png 424w, https://substackcdn.com/image/fetch/$s_!bsWc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png 848w, https://substackcdn.com/image/fetch/$s_!bsWc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png 1272w, https://substackcdn.com/image/fetch/$s_!bsWc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79cb135d-8f26-4b4a-bfe3-ce6e00b5fc47_1324x1930.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.theguardian.com/us-news/2026/jan/27/italy-ice-security-role-winter-olympics">The Guardian</a>, January 27, 2026</figcaption></figure></div><p>The official ICE statement describes Homeland Security Investigations as &#8220;assisting&#8221; DSS &#8220;to assess and mitigate threats posed by transnational criminal organizations.&#8221; Embassy sources confirmed that <a href="https://www.nbcnews.com/world/italy/ice-role-winter-olympics-prompts-fury-italy-rcna256087">HSI would back up</a> State Department security. The Department of Homeland Security said its agents would help with &#8220;vetting and mitigating risks.&#8221; This is not how federal agencies typically describe anti-trafficking operations, which is what HSI actually does at major sporting events. At the 2017 Super Bowl, HSI&#8217;s <a href="https://aimfree.org/super-bowl/">Operation Guardian Angel</a> arrested 94 perpetrators. The agency runs similar programs at every Super Bowl, working hotels and monitoring patterns. </p><p><em>It does not provide protective security.</em></p><p>The distinction matters. HSI is the investigative arm of Immigration and Customs Enforcement, with over 6,700 agents focused on cross-border crime: narcotics, weapons, money laundering, trafficking. The agency has provided <a href="https://www.congress.gov/118/meeting/house/117654/witnesses/HHRG-118-JU08-Wstate-BergerK-20240918.pdf">hundreds of thousands of hours</a> of support to the Secret Service at National Special Security Events like inaugurations and Super Bowls. But those are domestic events under DHS coordination. Overseas, the State Department holds authority. DSS operates under Foreign Service protocols. No statutory or operational framework exists for HSI to augment DSS abroad.</p><p>Embassy officials told <a href="https://www.reuters.com/sports/us-ice-agents-support-security-winter-olympics-italy-source-confirms-2026-01-27/">Reuters</a> that several federal agencies have supported Olympic security before, including HSI. <em>This is technically true and substantially misleading.</em> At Paris, HSI ran the <a href="https://unboundnow.org/opendoors-announcement/">Open Doors Initiative</a>, a trafficking prevention program partnering with French hotels and nonprofits. That is specialized law enforcement work, not threat assessment for DSS. </p><p>French reporting from <a href="https://www.rfi.fr/en/international/20260127-us-s-immigration-force-ice-to-help-with-security-at-winter-olympics-in-italy">RFI</a> noted uncertainty about whether HSI had ever participated in Olympic security at all. </p><p>I was unable to locate any public record documents showing HSI providing operational support to DSS at any previous Games. NBC News went further, <a href="https://www.nbcnews.com/world/italy/ice-role-winter-olympics-prompts-fury-italy-rcna256087">claiming</a>, &#8220;It is not unusual for the division, which takes the lead in international human trafficking situations, to work on marquee events abroad,&#8221; and placing that claim in the subheader.</p><p>The network offered no evidence for this and appears to be the sole source for this claim among the dozens of international news organizations covering this story. RFI was more careful, <a href="https://www.rfi.fr/en/olympic-games/20260127-anger-as-branch-of-ice-to-help-with-security-at-winter-olympics">reporting</a> it is &#8220;not known whether the HSI has in the past been involved in the Olympics, or whether this is a first.&#8221; </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cZ4L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cZ4L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png 424w, https://substackcdn.com/image/fetch/$s_!cZ4L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png 848w, https://substackcdn.com/image/fetch/$s_!cZ4L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png 1272w, https://substackcdn.com/image/fetch/$s_!cZ4L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cZ4L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png" width="539" height="385.5295735900963" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1040,&quot;width&quot;:1454,&quot;resizeWidth&quot;:539,&quot;bytes&quot;:194238,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185997196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cZ4L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png 424w, https://substackcdn.com/image/fetch/$s_!cZ4L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png 848w, https://substackcdn.com/image/fetch/$s_!cZ4L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png 1272w, https://substackcdn.com/image/fetch/$s_!cZ4L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f3e1c37-f597-46fb-81b1-75b50f1afd0e_1454x1040.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.nbcnews.com/world/italy/ice-role-winter-olympics-prompts-fury-italy-rcna256087">NBC News</a>, January 27, 2026 </figcaption></figure></div><p>Perhaps NBC has uncritically repeated an anonymous embassy source&#8217;s claim, or possibly conflated HSI's anti-trafficking work at Paris 2024 with the operational security role described for Milan-Cortina. The Open Doors Initiative partnered with hotels and NGOs to identify trafficking victims, which has nothing to do with threat assessment for DSS. One mission is routine. <em>The other, if it has ever happened, left no trace in the public record.</em> NBC&#8217;s framing risks normalizing a historically unprecedented arrangement by claiming it is routine.</p><p>So what explains Milan-Cortina?</p><p>The Department of Homeland Security&#8217;s own planning documents offer no answer. The agency&#8217;s <a href="https://www.dhs.gov/sites/default/files/2026-01/26_0123_mgmt-dhs-agency-financial-report-fy2025-vol1.pdf">FY2025 Financial Report</a>, published this month, mentions the Olympics exactly once: TSA preparing for the 2028 Los Angeles Summer Games alongside the 2026 FIFA World Cup and America&#8217;s 250th anniversary. Surge staffing. Coordinated planning. Screening upgrades. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ji2C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ji2C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png 424w, https://substackcdn.com/image/fetch/$s_!Ji2C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png 848w, https://substackcdn.com/image/fetch/$s_!Ji2C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png 1272w, https://substackcdn.com/image/fetch/$s_!Ji2C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ji2C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png" width="1940" height="734" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:734,&quot;width&quot;:1940,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:548449,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185997196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ee0a5fc-5ecb-4999-95ba-9b7eadcccb48_1940x734.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ji2C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png 424w, https://substackcdn.com/image/fetch/$s_!Ji2C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png 848w, https://substackcdn.com/image/fetch/$s_!Ji2C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png 1272w, https://substackcdn.com/image/fetch/$s_!Ji2C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f0f985-4dc8-4ca2-86eb-edc81eb646f9_1940x734.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: DHS FY 2025 Agency Financial Report, <a href="https://www.dhs.gov/sites/default/files/2026-01/26_0123_mgmt-dhs-agency-financial-report-fy2025-vol1.pdf">Vol 1.</a></figcaption></figure></div><p>The report says nothing about HSI providing security support at Milan-Cortina, nothing about augmenting DSS operations abroad, nothing about threat assessment at international sporting events. If this deployment reflects institutional planning rather than political improvisation, DHS&#8217;s budget justifications do not show it.</p><p>The <a href="https://www.state.gov/diplomatic-security-service-leads-u-s-security-at-milan-cortina-2026-winter-olympic-and-paralympic-games">State Department announcement</a> offers a clue: the arrangement demonstrates &#8220;the Trump administration&#8217;s bold leadership and steadfast commitment to law enforcement and security.&#8221; Vice President Vance is leading the U.S. delegation. <em>The framing is political, not operational.</em></p><p>DSS does face staffing pressure. A <a href="https://cttp.sanford.duke.edu/wp-content/uploads/sites/16/2023/09/Draft-CTPP-presentation-253.pdf">2022 study</a> found the agency operating at 73 percent of authorized strength. But DSS managed Paris without HSI integration, despite an unprecedented open-air ceremony on the Seine that French security officials called the most complex Olympic event ever attempted. If DSS cannot staff Milan-Cortina, a smaller Games in a less challenging security environment, something has gone badly wrong at Foggy Bottom. If DSS can staff it, the HSI deployment is theater.</p><p><em>The Italian reaction suggests the latter interpretation.</em> </p><p>Former Prime Minister Giuseppe Conte called on the Italian government to &#8220;set our own limits&#8221; regarding the United States and demanded an end to &#8220;capitulation&#8221; to Trump. </p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/GiuseppeConteIT/status/2015541617587851572&quot;,&quot;full_text&quot;:&quot;Dopo le violenze e le uccisioni in strada di questi giorni, ora gli agenti dell'Ice negli Stati Uniti hanno anche minacciato giornalisti italiani del servizio pubblico che facevano il loro lavoro. Esprimiamo loro tutta la nostra vicinanza. Non possiamo accettarlo. La Presidente&quot;,&quot;username&quot;:&quot;GiuseppeConteIT&quot;,&quot;name&quot;:&quot;Giuseppe Conte&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1504008089187590145/djo-mziu_normal.jpg&quot;,&quot;date&quot;:&quot;2026-01-25T21:45:43.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:393,&quot;retweet_count&quot;:335,&quot;like_count&quot;:1751,&quot;impression_count&quot;:36902,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>Interior Minister Piantedosi initially denied ICE involvement before <a href="https://www.rfi.fr/en/olympic-games/20260127-anger-as-branch-of-ice-to-help-with-security-at-winter-olympics">clarifying</a> that Italian authorities would maintain control and American agents would not operate on the streets. Foreign Minister Tajani <a href="https://sundayguardianlive.com/sports/italys-tajani-defends-role-of-u-s-ice-agents-at-winter-olympics-166798/">told reporters</a> HSI would work &#8220;in the operations rooms,&#8221; not in public.</p><p>The prominent LGBT activist and member of the European parliament for the centre-left Democratic party Alessandro Zan <a href="https://x.com/ZanAlessandro/status/2016080089436323859">said</a>:</p><blockquote><p>&#8220;Trump&#8217;s private police agents will arrive in Italy for the Milan-Cortina Olympics. Their task? &#8220;To verify and mitigate risks arising from transnational criminal organizations.&#8221; If that&#8217;s the goal, it&#8217;s paradoxical to entrust it to those who are the first to commit crimes, operating with violence and killing innocents in cold blood.<br><br>In Italy, we don&#8217;t want those who trample human rights and act outside any democratic control. It&#8217;s unacceptable to think that an agency of this kind could have a role, whatever it may be, in our country.<br><br>Giorgia Meloni should stop taking orders from Trump and, for once, act as a patriot of Italy and not of the United States.&#8221;</p></blockquote><p>Milan&#8217;s mayor called ICE &#8220;a militia that kills&#8221; and declared HSI agents <a href="https://www.upi.com/Top_News/World-News/2026/01/27/italy-us-olympics-ICE/1431769529889/">unwelcome</a>. He cited recent DHS enforcement operations in Minneapolis that left two U.S. citizens dead (one shot by Border Patrol, one by ICE), telling <a href="https://today.rtl.lu/news/world/anger-as-branch-of-ice-to-help-with-security-at-winter-olympics-667885712">RTL 102.5 radio</a> that, </p><blockquote><p>&#8220;This is a militia that kills,&#8221; he said. &#8220;It&#8217;s clear that they are not welcome in Milan, there&#8217;s no doubt about it. Can&#8217;t we just say no to Trump for once? We can take care of their security ourselves. We don&#8217;t need ICE.&#8221;</p><p>&#8220;ICE agents should not come to Italy because they are not aligned with our democratic way of providing security.&#8221;</p></blockquote><p>After the Minneapolis shootings, ICE officials <a href="https://www.bbc.com/news/articles/c5y29xzjdzvo">threatened</a> to break the car window of Italian Rai TV journalists who were filming the aftermath.</p><div id="youtube2-bXLx_Y6Xyo0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;bXLx_Y6Xyo0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/bXLx_Y6Xyo0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>The video aired on <a href="https://www.ilfattoquotidiano.it/2026/01/25/lice-minaccia-due-giornalisti-rai-a-minneapolis-il-video-spaccheremo-il-finestrino-e">Rai 3</a> and dominated Italian news for the past two days. Journalist Laura Cappon had shown both her press credentials and passport while identifying herself as Italian media. Foreign Minister Tajani, from Meloni&#8217;s own coalition, said the images &#8220;<a href="https://www.corriere.it/politica/26_gennaio_26/tajani-su-minneapolis-le-immagini-parlano-di-abusi-dell-ice-la-ue-resta-cauta-que">speak of abuse.</a>&#8221; Even Tommaso Foti, a minister from Meloni&#8217;s Fratelli d&#8217;Italia party, called ICE&#8217;s approach &#8220;very harsh and censurable, not at all in line with what is adopted by our law enforcement agencies.&#8221; The opposition was less diplomatic: Angelo Bonelli of the Green-Left alliance <a href="https://lespresso.it/c/mondo/2026/01/26/ice-minaccia-giornalisti-italiani-rai-minneapolis-stati-uniti/59460">called it</a> </p><blockquote><p>&#8220;mafia-like intimidation of the press in the heart of the United States.&#8221;</p></blockquote><p>The <a href="https://www.wantedinrome.com/news/ice-agents-threaten-italian-journalists-in-us-sparking-outcry-in-italy.html">backlash</a> reflects ICE&#8217;s toxic brand, which has little to do with HSI&#8217;s actual mission. HSI is the investigative division of ICE, separate from the Enforcement and Removal Operations (ERO) unit that conducts deportations. Italian media has quite reasonably conflated the two, and American officials have struggled to explain the distinction while simultaneously refusing to explain why HSI will be sent.</p><p>I have a few unanswered questions: What capabilities does HSI possess that DSS lacks after five decades of Olympic security? Under what legal framework will HSI agents operate in Italy? Will they carry weapons or hold diplomatic credentials? Who commands them? And why divert HSI personnel from investigating transnational criminal organizations to provide event security, while investigating TCOs is the stated justification for their presence?</p><p><em>The public record offers no answers.</em> What it offers instead is an arrangement without documented precedent, announced with political fanfare, defended with misleading claims about prior practice, and seemingly planned for implementation over the objections of the host city&#8217;s mayor. If DSS genuinely needs help, that is an institutional failure requiring congressional attention.</p><p>If it does not, the Milan-Cortina deployment is something else: an expansion of DHS&#8217;s international footprint dressed up as interagency cooperation, which establishes precedent for ad hoc federal deployments beyond statutory missions.</p><p>Either way, we Americans should probably ask why.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>This publication operates 100% on reader subscriptions. If this story was valuable to you, I need you as a paid subscriber.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[When Psychosis Meets the Algorithm]]></title><description><![CDATA[The arson of the Beth Israel Congregation synagogue in Mississippi reveals a dangerous gap in our understanding of the collision between psychotic illness and digital radicalization]]></description><link>https://www.hackingbutlegal.com/p/when-psychosis-meets-the-algorithm</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/when-psychosis-meets-the-algorithm</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Sun, 25 Jan 2026 09:23:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gkHe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Two weeks ago, a nineteen-year-old named <a href="https://www.cnn.com/2026/01/13/us/stephen-pittman-mississippi-synagogue-fire-wwk">Stephen Spencer Pittman</a> allegedly <a href="https://www.justice.gov/opa/pr/mississippi-man-arrested-arson-beth-israel-and-goldringwoldenberg-institute-southern-jewish">set fire</a> to Jackson, Mississippi&#8217;s Beth Israel Congregation, the city&#8217;s only synagogue. Hours earlier, he&#8217;d posted antisemitic content to social media. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yldZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yldZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png 424w, https://substackcdn.com/image/fetch/$s_!yldZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png 848w, https://substackcdn.com/image/fetch/$s_!yldZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png 1272w, https://substackcdn.com/image/fetch/$s_!yldZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yldZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png" width="1456" height="1720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1720,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2778717,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/184994571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yldZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png 424w, https://substackcdn.com/image/fetch/$s_!yldZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png 848w, https://substackcdn.com/image/fetch/$s_!yldZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png 1272w, https://substackcdn.com/image/fetch/$s_!yldZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80f50035-1fdc-4a26-a145-e84211634223_1544x1824.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.cnn.com/2026/01/13/us/jackson-mississippi-synagogue-fire-arson-suspect">CNN</a>, January 14, 2026</figcaption></figure></div><p>NPR <a href="https://www.npr.org/2026/01/11/nx-s1-5673976/arson-jackson-mississippi-synagogue-fire">reports</a>:</p><blockquote><p>Pittman&#8217;s father contacted the FBI hours after the fire and said his son had admitted to starting it, the complaint alleges. It states that Life360 map data from Pittman&#8217;s cell phone and text messages to his father further corroborated his confession.</p><p>According to the FBI, Pittman traveled from his home early Saturday and stopped at a gas station, before heading to Beth Israel. He then texted his father a picture of the back of the synagogue and a series of messages, which read, &#8220;There&#8217;s a furnace in the back,&#8221; &#8220;BTW my plate is off,&#8221; &#8220;Hoodie is on,&#8221; and, &#8220;they have the best cameras.&#8221;</p><p>Pittman's father pleaded for his son to return home. Pittman replied that he was "due for a homerun," according to the affidavit. The criminal complaint states that Pittman went on to text his father that he had done his "research." The FBI says Pittman's father noticed burns on his son's ankles, hands, and face and confronted him:</p></blockquote><p>The government&#8217;s complaint alleges that when he confessed to his father, with obvious burn injuries visible on his hands and body, he <a href="https://www.npr.org/2026/01/11/nx-s1-5673976/arson-jackson-mississippi-synagogue-fire">laughed</a> and said he &#8220;finally got them.&#8221;</p><p>Ten days later, standing in federal court with bandaged extremities, Pittman <a href="https://www.wapt.com/article/synagogue-arson-suspect-stephen-spencer-pittman-bond-motion/70051933">pleaded not guilty</a>. FBI Special Agent Ariel Williams&#8217;s testimony revealed something as disturbing as the attack itself: escalating psychiatric deterioration that everyone around him witnessed but no one knew how to stop.</p><p>His mother told investigators the family pets were afraid of him. She&#8217;d considered locking her bedroom door at night. After he returned on winter break, his behavior changed so dramatically that when his father tried to correct him for saying something offensive, Pittman &#8220;bowed up&#8221; in his father&#8217;s face. </p><p>Members of his gym even heard him say he wanted to burn a synagogue.</p><p>That laugh of his should haunt us. Not because it confirms Pittman as a monster, but because it suggests a young man whose break from reality coincided with immersion in online antisemitism, creating a perfect storm that existing frameworks for hate crimes and terrorism fail to capture.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lzf1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lzf1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png 424w, https://substackcdn.com/image/fetch/$s_!Lzf1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png 848w, https://substackcdn.com/image/fetch/$s_!Lzf1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png 1272w, https://substackcdn.com/image/fetch/$s_!Lzf1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lzf1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png" width="1456" height="1838" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1838,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2907933,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/184994571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lzf1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png 424w, https://substackcdn.com/image/fetch/$s_!Lzf1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png 848w, https://substackcdn.com/image/fetch/$s_!Lzf1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png 1272w, https://substackcdn.com/image/fetch/$s_!Lzf1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e6f865c-b344-4c47-88c4-0097f23a44c2_1534x1936.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image Credit: Beth Israel Congregation via <a href="https://www.cnn.com/2026/01/11/us/jackson-mississippi-synagogue-fire">CNN</a>, January 12, 2026</figcaption></figure></div><div class="pullquote"><p><em>Disclaimer: This analysis is based on publicly available information including news reports, legal filings, and social media posts. The author is not a mental health professional, attorney, or clinician, and cannot diagnose individuals nor provide legal counsel. Clinical assessments require direct examination by qualified psychiatrists or psychologists; legal determinations require licensed attorneys and judicial review.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?"><span>Subscribe now</span></a></p></div><h2>The Clinical Picture</h2><p><strong>Pittman&#8217;s trajectory tells an unusual story.</strong> I was able to locate quite a few mentions on social media praising his sports prowess amid photographs of a typical all-American youth. He was an honor roll student at <a href="https://www.cnn.com/2026/01/13/us/stephen-pittman-mississippi-synagogue-fire-wwk">St. Joseph Catholic School</a>, a National College Athletic All-Academic Team member, and spent a few semesters at <a href="https://mississippitoday.org/2026/01/12/mississippi-synagogue-fire-suspect-named/">Coahoma Community College</a> before the attack. High achievers don&#8217;t typically abandon their tracks without reason.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gkHe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gkHe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png 424w, https://substackcdn.com/image/fetch/$s_!gkHe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png 848w, https://substackcdn.com/image/fetch/$s_!gkHe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png 1272w, https://substackcdn.com/image/fetch/$s_!gkHe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gkHe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png" width="519" height="957.3562708102108" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1662,&quot;width&quot;:901,&quot;resizeWidth&quot;:519,&quot;bytes&quot;:1243523,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/184994571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gkHe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png 424w, https://substackcdn.com/image/fetch/$s_!gkHe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png 848w, https://substackcdn.com/image/fetch/$s_!gkHe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png 1272w, https://substackcdn.com/image/fetch/$s_!gkHe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4b0163f-49c3-434b-9c08-e10acfafc29e_901x1662.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Pittman in his Coahoma Community College baseball photo. Everyone who knew him said he "changed." No one knew how to stop it.</figcaption></figure></div><p><a href="https://mississippitoday.org/2026/01/13/online-world-of-man-accused-of-burning-mississippi-synagogue/">Mississippi Today</a> reported that, until recently, Pittman had &#8220;mainly used his numerous social media accounts to post about baseball, Christianity and his exercise routines.&#8221; My review of his X (Twitter) <a href="https://x.com/_sp4k">account</a> confirmed this. Notably, he showed little interest in engaging with anyone online&#8212;no back-and-forth with peers, no community building, just broadcast. <strong>His social media was a limited monologue.</strong></p><p>Friends said he &#8220;changed a lot&#8221; in recent years. He began bragging about money, promoting questionable health trends he called a &#8220;Christian diet.&#8221; There were videos of himself cracking raw eggs into his mouth on Snapchat. Videos of himself frantically pumping iron at the gym. Discussions of &#8220;testosterone optimization.&#8221; Linkages to online subcultures where &#8220;maxxing&#8221; masculinity, finances, and fitness bleed into nationalist religious fervor. His Instagram bio read &#8220;Entrepreneur&#8221; and &#8220;Lawyer of God.&#8221;</p><p>On December 5th, thirty-six days before the attack, Pittman purchased the domain for &#8220;One Purpose,&#8221; a website offering &#8220;Scripture-backed fitness, brotherhood accountability [and] life-expectancy maxxing&#8221; for ninety-nine dollars monthly. The site featured God&#8217;s ineffable name in Hebrew, references to Jewish fast days, and the seven biblical species of Israel.</p><p>Then he came home from Coahoma Community College in northwest Mississippi for winter break. His parents saw their son transform into someone they feared. Their household pets, being animals that are sensitive to behavioral cues often missed by humans, became afraid. The mother who&#8217;d raised him for nineteen years considered locking her bedroom door. He started day trading, and physically confronted his father. Others heard him utter racist threats in their presence.</p><p><strong>The cognitive disintegration was visible to everyone in real time, but was stopped by no one. </strong>At nineteen, Pittman sits at peak age for first-episode psychosis in males. Schizophrenia incidence shows a steep increase <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC6500669/">culminating at age 15 to 25 years in males</a>. Up to <a href="https://www.psychiatrictimes.com/view/prodromal-symptoms-of-schizophrenia-understanding-and-addressing-challenges">75 percent of patients with schizophrenia</a> experience a prodromal phase: subtle changes in perception, thinking, and functioning extending from weeks to years before full symptoms emerge. </p><p>The checklist reads like Pittman&#8217;s life: Academic dysfunction. Personality changes. Bizarre social behavior. Inappropriate affect. Grandiose thinking. Unusual preoccupations. Paranoid ideation. Behavioral disorganization. Changes so severe that family members become afraid.</p><p>When parents are considering locking bedroom doors, that isn&#8217;t radicalization. <strong>It&#8217;s psychiatric emergency.</strong></p><div class="pullquote"><p>&#8220;Synagogue of Satan&#8221;</p></div><p>Pittman&#8217;s phrase sits at the intersection of white nationalist propaganda and religious delusion. Religious delusions occur in <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC4031576/">between one-fifth and two-thirds</a> of patients with delusions, and <a href="https://www.sciencedirect.com/science/article/abs/pii/S0920996418307217">prevalence rates vary dramatically by country</a>&#8212;from 63% in Lithuania to 24% in England to 7% in Japan. In societies where religion plays an important role in everyday life, people with psychiatric disorders tend to show religious delusions more often than in non-religious societies. The content of delusions is determined by cultural context. In Christian-majority societies, common themes include apocalyptic imagery, supernatural persecution, and religious outgroups as existential threats.</p><p>Pittman&#8217;s inappropriate affect, laughing while confessing to a violent felony, is textbook psychotic disorder. So is the operational chaos: incriminating content posted hours before the attack, texting his father from the scene, his burned cell phone left behind, and severe self-injury to his face, hands, and ankles. This isn&#8217;t a picture of methodical ideological terrorism. <strong>It&#8217;s someone whose relationship with reality has catastrophically failed.</strong></p><p>Persecutory delusions correlate strongly with violence risk, particularly when combined with anger. Re-analysis of the <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC4133660/">MacArthur Violence Risk Assessment Study</a> found that threat delusions of being spied upon, persecutory delusions, and delusions of conspiracy were mediated by anger due to delusional content on the pathway to serious violence. The closeness in time, or temporal proximity, between the delusion and the act, is an important factor. When someone acts violently during or immediately after experiencing a delusion, there&#8217;s stronger evidence the delusion caused the violence, versus someone who holds delusional beliefs for months but acts for unrelated reasons.</p><p>Pittman&#8217;s timeline appears compressed: on Saturday, January 10 at 12:52 a.m, he posted an antisemitic video on Instagram.<br><br>&#8220;A Jew in my backyard, I can&#8217;t believe my Jew crow didn&#8217;t work,&#8221; an animated Disney princess-style character said to a short yellow figure with a long nose. &#8220;You&#8217;re getting baptized right now.&#8221;<br><br>Roughly two hours later, he drove a few miles to commit the arson, catching himself on fire in the process. He drove himself to the hospital for treatment, and was arrested later that evening after his father, who had seen his burns and heard his laughing confession, contacted law enforcement. Two days after that, he replied "Jesus Christ is Lord" when the judge read his rights. <strong>The delusion wasn&#8217;t incidental background noise. It was actively driving events.</strong></p><h2>The Radicalization Machine</h2><p>Pittman wasn&#8217;t reading Revelation in isolation. Before October 7th, 2023, antisemitic content lived in dark corners. After Hamas attacked, UK authorities <a href="https://www.jpr.org.uk/reports/antisemitism-aftermath-october-7-what-do-data-tell-us-and-what-more-do-we-still-need-know">documented dramatic increases</a> in antisemitic incidents. </p><p>The <a href="https://www.adl.org/resources/report/top-5-global-antisemitic-trends-october-7-one-year-impact-report">ADL documented 8,873 antisemitic incidents</a> in the United States in 2023, more than doubling the 3,698 reported in 2022. Similarly, the British <a href="https://cst.org.uk/news/blog/2024/02/15/antisemitic-incidents-report-2023">Community Security Trust</a> recorded 4,103 incidents in the UK, up from 1,662 in 2022. The British Community Security Trust recorded 2,019 antisemitic incidents in the first half of 2024 alone (the highest six-month total ever) before declining to 1,521 in the first half of 2025. </p><p>This remains historically elevated: the 2025 figure is still 84% higher than the 823 incidents recorded in the first half of 2022. After October 7th, content that once only lived in dark corners began to flood mainstream feeds&#8212;algorithmically amplified, packaged as edgy humor or political commentary, and normalized through sheer repetition. <strong>For someone like Pittman who was already showing signs of cognitive deterioration, this was the water he swam in.</strong></p><p>Hours before the attack, Pittman shared content from &#8220;jew_inbackyard_daily,&#8221; an Instagram account posting antisemitic material: caricatured figures with exaggerated features stealing bags of money, getting pushed into pools, &#8220;baptized.&#8221; The account name itself signals industrialized hate production.</p><p>Research shows a <a href="https://www.isdglobal.org/wp-content/uploads/2023/08/Young-guns_Understandings-a-new-generation-of-extremist-radicalization-in-the-United-States.pdf">413% rise since 2020</a> in the internet playing the primary role in the radicalization process for those under the age of 30 compared to the previous decade, according to the <a href="https://www.start.umd.edu/data-tools/profiles-individual-radicalization-united-states-pirus">PIRUS database</a>. Bad actors on platforms like 4chan, 8chan, Parler, Reddit, Gab, TikTok, Truth Social, X, and Instagram employ memes, dark humor, and pseudo-intellectual discourse to normalize racist and antisemitic beliefs, particularly targeting young men. </p><p>The Christchurch killer explicitly encouraged followers to &#8220;make memes&#8221; about his attack, understanding that internet culture perpetuates ideology more effectively than traditional propaganda&#8212;a strategy sometimes called &#8220;memetic warfare.&#8221;</p><p>What happens when someone immersed in this ecosystem begins experiencing prodromal psychotic symptoms? Emerging paranoia, difficulty distinguishing reality from digital content, religious preoccupations. <strong>These don&#8217;t develop in cultural vacuum. They incorporate available material.</strong></p><h2>The Diagnostic Trap</h2><p>Was Pittman experiencing genuine psychotic delusions, or what researchers call &#8220;extreme overvalued beliefs&#8221;: rigidly held convictions that motivate terrorism but aren&#8217;t delusional? The distinction matters legally and clinically, but the boundaries blur. Extreme overvalued beliefs are shared by subculture members, maintain internal logic, and develop through social learning rather than psychotic processes.</p><p>The difference isn't whether the belief is abhorrent, it's whether it's culturally transmitted or idiosyncratically generated. A neo-Nazi who believes in an international Jewish conspiracy holds an extreme overvalued belief: false and hateful, but shared by a subculture and spread through social learning. Someone who believes his specific neighbor is a Jewish agent implanting thoughts through the television holds a delusion. <strong>Conspiracy theories are taught. Delusions emerge from a breaking mind.</strong></p><p>But what about someone who builds a fitness website steeped in Hebrew religious content, then burns a synagogue and laughs about &#8220;finally getting them&#8221;?</p><p>Such an incongruous trajectory suggests neither pure ideology nor pure psychosis, but a pathological intersection of both: emergent psychosis shaped by online radicalization with psychotic symptoms providing the disinhibition necessary to act on violence suggested by extremist ideology. <strong>Psychosis breaks reality. Ideology fills the void. Algorithms reinforce it constantly.</strong></p><h2>Arson and the Mind</h2><p><a href="https://academic.oup.com/schizophreniabulletin/article/37/3/580/1890669">Swedish registry data</a> reveals dramatically elevated odds ratios for arson convictions among individuals with schizophrenia: 22.6 for males, 38.7 for females. These risk estimates are higher than those reported for other violent crimes and place arson in the same category as homicide as crimes most strongly associated with psychotic disorders.</p><p>The symbolic dimension matters. Fire destroys, purifies, attracts attention. In religious delusions, it represents divine judgment. For someone experiencing psychotic-level religious persecution beliefs, burning a &#8220;synagogue of Satan&#8221; may feel like spiritual warfare.</p><p>This is the same synagogue that was <a href="https://www.mississippifreepress.org/jackson-synagogue-burning-suspect-indicted-on-state-charges-with-hate-crimes-enhancement/">bombed by the Ku Klux Klan in 1967</a> during the civil rights era. The attack allegedly struck the same wing of the octagonal building that burned in that earlier attack.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NMtk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NMtk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png 424w, https://substackcdn.com/image/fetch/$s_!NMtk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png 848w, https://substackcdn.com/image/fetch/$s_!NMtk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png 1272w, https://substackcdn.com/image/fetch/$s_!NMtk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NMtk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png" width="1072" height="1700" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1700,&quot;width&quot;:1072,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1519803,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/184994571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NMtk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png 424w, https://substackcdn.com/image/fetch/$s_!NMtk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png 848w, https://substackcdn.com/image/fetch/$s_!NMtk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png 1272w, https://substackcdn.com/image/fetch/$s_!NMtk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8109781-90cf-41e8-ad40-4a48e1de55e2_1072x1700.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.nytimes.com/2026/01/20/us/mississippi-beth-israel-temple-judaism.html">The New York Times</a>, January 20, 2026</figcaption></figure></div><h2>What We&#8217;re Missing</h2><p>Could this have been prevented? At what point does &#8220;concerning behavior&#8221; become &#8220;imminent risk requiring intervention&#8221;? We have no system for this.</p><p>Research shows social media activity captures objective markers of psychotic relapse. <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC6779748/">One study</a> achieved 71% specificity predicting psychiatric hospitalizations from Facebook posts, identifying linguistic shifts in the month before relapse: increased swearing, anger, and death-related language; more first-person pronouns; fewer references to work, friends, and health.</p><p>Could similar patterns identify individuals in prodromal phases, before a first psychotic break? <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC6565626/">Research demonstrates</a> machine learning can predict conversion to psychosis with 93% accuracy by analyzing speech for two markers: low semantic density (vagueness) and increased talk about voices and sounds. </p><p>The challenge isn't technical, per se. It's ethical and legal. With that said, who might already be doing it?</p><h2>The State Actor Question</h2><p>A colleague with decades in information operations raised a hypothesis: what if hostile state actors are identifying vulnerable individuals and accelerating their radicalization?</p><p>Russian intelligence has demonstrated sophisticated social media manipulation. But the true infrastructure is <a href="https://greydynamics.com/gru-unit-54777-russias-psychological-operations-command/">GRU Military Unit 54777</a>, Russia&#8217;s formal psychological operations command.</p><p>Established in 1994 as successor to the Soviet Special Propaganda Directorate, <a href="https://newlinesmag.com/reportage/inside-russias-secret-propaganda-unit/">Unit 54777</a> operates in peace and wartime with documented involvement in the Crimea annexation, Syria, Ukraine, European elections, and COVID-19 disinformation. Unlike Soviet-era units activating only during military operations, 54777 conducts continuous psychological warfare. Its operations integrate cyberspace with traditional PSYOPS: &#8220;information confrontation,&#8221; a fusion of cyber-technical and cyber-psychological attacks with the goal of eroding the adversary&#8217;s will.</p><p>They operate through social media and front organizations (<a href="https://en.wikipedia.org/wiki/GRU_Unit_54777">InfoRos</a>, Institute of the Russian Diaspora), with subordinate PSYOPS units in every Russian military district. The &#8220;<a href="https://thinktank.4freerussia.org/wp-content/uploads/2020/12/AquariumLeaks-EN-Web-1.pdf">Aquarium Leaks</a>&#8221; (declassified GRU documents) reveal a consistent strategy: identify contentious social issues, flood platforms with divisive content through bot networks and troll armies, and amplify societal tensions. Not to win debates, but to paralyze societies through internal conflict.</p><p>Industrial-scale psychological operations require precision targeting. Enter surveillance capitalism. Research establishes comprehensive personality profiles can be inferred from <a href="https://www.gsb.stanford.edu/insights/science-behind-cambridge-analytica-does-psychological-profiling-work">as few as 300 Facebook &#8220;likes&#8221;</a> with spouse-level accuracy. <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC7879781/">Cambridge Analytica</a> exposed this at scale: combining psychological tests from 270,000 users with machine-learning models, the firm built personality profiles for over one hundred million U.S. voters, then used algorithmic microtargeting to tailor messages to individual psychological vulnerabilities.</p><p>Digital footprints predict political orientation, sexual orientation, ethnicity, intelligence, and crucially, psychological states: depression, anxiety, emotional vulnerability. Facebook offered advertisers ability to target users &#8220;in moments of psychological vulnerability,&#8221; identifying when young people feel insecure and stressed.</p><p>This is psy-ops at scale. Personality-tailored messaging <a href="https://www.gsb.stanford.edu/insights/science-behind-cambridge-analytica-does-psychological-profiling-work">increases persuasiveness by approximately 40%</a> compared to untargeted content. Studies show even warnings about microtargeting fail to reduce message persuasiveness for personality-matched content. The manipulated cannot perceive the manipulation.</p><p>Social media platforms collect massive behavioral data: linguistic patterns, posting frequency, content shifts, engagement metrics, temporal behaviors. The capability architecture exists to identify individuals showing early signs of psychiatric vulnerability, apply personality profiling to understand specific psychological architecture, and deliver personality-optimized radicalization content through algorithmic amplification.</p><p>This remains theoretical vulnerability, not documented practice. While Intelligence Community assessments on foreign malign influence focus on election interference, disinformation campaigns, and diaspora targeting, they haven&#8217;t discussed the exploitation of psychiatric vulnerabilities (nor cognitive warfare, more broadly.)</p><p>However, the operational capability unquestionably exists, and some of the recent clusters of &#8220;random&#8221; or &#8220;unexplained&#8221; attacks by mentally ill individuals in the United States and elsewhere could fit this hypothesis within the framework of non-linear warfare.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;149e2bbb-771b-4826-b0ca-4c4be03eb908&quot;,&quot;caption&quot;:&quot;Terrorism and Russian-style hybrid warfare work in similar ways: both strategies seek to weaponize attention and response at scale.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Real Target Is Us&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:12097991,&quot;name&quot;:&quot;Jackie Singh&quot;,&quot;bio&quot;:&quot;Discover \&quot;Hacking, but Legal\&quot;&#8212;your gateway to incisive cybersecurity journalism and expert analysis by renowned industry leader Jackie Singh&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/84a588ee-989d-41be-9e74-992b496e9cae_3072x3072.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-12-11T13:20:30.308Z&quot;,&quot;cover_image&quot;:&quot;https://images.unsplash.com/photo-1561630116-55df9770906f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1Nnx8YXR0ZW50aW9ufGVufDB8fHx8MTc2NTM5NDAyNHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.hackingbutlegal.com/p/the-real-target-is-us&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:181297268,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:25,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1882518,&quot;publication_name&quot;:&quot;Hacking, but Legal&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!p0d7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56786f37-5288-441c-aaa7-64178209bce1_947x947.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Technical components (psychological profiling, microtargeting, radicalization content delivery, vulnerability identification) have all been demonstrated in commercial and intelligence contexts. The intersection of online radicalization and mental illness sits between terrorism research and psychiatry and remains understudied, creating blind spots where such operations are able to develop undetected and flourish.</p><p>Whether through deliberate state actor targeting or emergent properties of algorithmic amplification, vulnerable individuals experiencing early psychotic symptoms are being exposed to extreme content precisely when least equipped to evaluate it critically.</p><h2>The Forensic Dilemma</h2><p>Pittman faces federal arson charges and state charges with hate crime enhancements. At his January 20th bond hearing, Magistrate Judge <a href="https://www.wapt.com/article/synagogue-arson-suspect-stephen-spencer-pittman-bond-motion/70051933">LaKeysha Greer Isaac denied bond</a>: &#8220;No conditions would ensure community safety.&#8221; Trial is set for late February. He faces five to twenty years federal, five to thirty state&#8212;up to sixty with hate crime enhancements.</p><p>Given suspected psychotic symptoms, substantial basis exists for competency evaluation. When the judge read rights during his initial appearance via video from his hospital bed, Pittman responded: &#8220;Jesus Christ is Lord&#8221;&#8212;possibly indicating tangential thinking or inability to focus on legal proceedings. He appeared with bandaged hands and ankles, carrying a Bible, and said little to his attorney through two hours of proceedings.</p><p>The insanity defense proves more complex. Federal law requires proving the defendant &#8220;was unable to appreciate the nature and quality or wrongfulness of his acts.&#8221; Premeditation and scant signs of operational security such as removing license plates and wearing a hoodie suggest preserved appreciation of consequences. But the text messages, self-immolation, laughing confession, and social media posts before and after the arson indicate profoundly impaired judgment.</p><p>Public defender Mike Scott argued Pittman suffered third-degree burns, incarceration could risk his health, posed no community danger. Prosecutor <a href="https://www.wapt.com/article/synagogue-arson-suspect-stephen-spencer-pittman-bond-motion/70051933">Matthew Wade Allen</a> countered Pittman posed &#8220;serious risk he will obstruct justice or threaten, injure or intimidate witness or juror.&#8221; </p><p><strong>Judge Isaac agreed.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!96H8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!96H8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png 424w, https://substackcdn.com/image/fetch/$s_!96H8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png 848w, https://substackcdn.com/image/fetch/$s_!96H8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png 1272w, https://substackcdn.com/image/fetch/$s_!96H8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!96H8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4422166,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/184994571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!96H8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png 424w, https://substackcdn.com/image/fetch/$s_!96H8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png 848w, https://substackcdn.com/image/fetch/$s_!96H8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png 1272w, https://substackcdn.com/image/fetch/$s_!96H8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d6c9c8c-7790-4a89-840a-d2d6f636ae92_2016x1512.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image Credits: Beth Israel Congregation via <a href="https://www.cnn.com/2026/01/11/us/jackson-mississippi-synagogue-fire">CNN</a>, January 12, 2026</figcaption></figure></div><h2>Treatment and Prevention</h2><p>Early treatment for first-episode psychosis dramatically improves outcomes. But for someone like Pittman, treatment must also address the ideological content of his beliefs&#8212;and traditional psychosis programs have no framework for this.</p><p>Standard treatment for delusions involves medication and therapy to help patients reality-test their beliefs. Deradicalization programs help people exit extremist ideologies. But what happens when the two overlap? How do clinicians distinguish a psychotic delusion requiring psychiatric treatment from a sincerely held extremist belief requiring deradicalization? Where does illness end and ideology begin? This intersection remains uncharted clinical territory. </p><p><strong>The integrated approach Pittman needs essentially doesn&#8217;t exist.</strong></p><p>Unfortunately, his case isn&#8217;t isolated. As a recent example, Australia&#8217;s security service ASIO reported in its <a href="https://www.asio.gov.au/director-generals-annual-threat-assessment-2025">2025 Annual Threat Assessment</a> finding a twelve-year-old self-professed neo-Nazi discussing on social media how to livestream a school shooting before moving to religious targets. ASIO&#8217;s intelligence enabled U.S. authorities to intervene. </p><p>The director-general noted a disturbing pattern: many radicalized minors &#8220;did not have a clear or coherent ideology beyond an attraction to violence itself.&#8221;</p><p><strong>What needs to happen?</strong></p><ul><li><p><strong>Intervention pathways for families witnessing psychiatric deterioration.</strong> <a href="https://www.nami.org/advocacy/crisis-intervention/">NAMI&#8217;s crisis intervention resources</a> provide guidance, but we need systematic protocols that empower families to act before crisis becomes catastrophe.</p></li><li><p><strong>More interdisciplinary research at the intersection of mental health and radicalization.</strong> Current studies remain siloed. The <a href="https://home-affairs.ec.europa.eu/system/files/2019-11/ran_h-sc_handbook-for-practitioners_extremism-radicalisation-mental-health_112019_en.pdf">EU Radicalisation Awareness Network&#8217;s practitioner handbook</a> presents a start, but <a href="https://nij.ojp.gov/topics/articles/roles-trauma-and-mental-health-preventing-domestic-radicalization-and-violent">NIJ-funded research</a> confirms the need for integrated approaches.</p></li><li><p><strong>Early intervention services for psychosis must develop capacity to assess ideological radicalization.</strong> <a href="https://www.nimh.nih.gov/research/research-funded-by-nimh/research-initiatives/early-psychosis-intervention-network-epinet">NIMH&#8217;s EPINET initiative</a> delivers a framework, but clinicians need training to recognize when delusional content intersects with extremist recruitment.</p></li><li><p><strong>Platforms must acknowledge their role in algorithmic amplification of extreme content.</strong> The <a href="https://counterhate.com/research/star-framework/">Center for Countering Digital Hate&#8217;s STAR Framework</a> outlines principles for Safety by Design, Transparency, Accountability, and Responsibility. The <a href="https://www.adl.org/resources/report/bad-worse-amplification-and-auto-generation-hate">ADL&#8217;s research on algorithmic amplification</a> documents the problem; <a href="https://eshoo.house.gov/media/press-releases/reps-eshoo-and-malinowski-reintroduce-bill-hold-tech-platforms-accountable">proposed legislation</a> offers a regulatory path forward.</p></li><li><p><strong>Frameworks for identifying vulnerable individuals without creating new surveillance states.</strong> <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC11450345/">Emerging research</a> on AI that can infer mental states from behavioral patterns (Affective Computing) highlights core tensions between ethical care and patient privacy and autonomy.</p></li><li><p><strong>Funded treatment capacity instead of prisons as de facto psychiatric hospitals.</strong> The <a href="https://www.tac.org/reports_publications/treat-or-repeat-a-state-survey-of-serious-mental-illness-major-crimes-and-community-treatment/">Treatment Advocacy Center</a> documents how 383,000 individuals with severe mental illness are incarcerated versus 38,000 in state psychiatric hospitals. <a href="https://www.nami.org/advocacy/policy-priorities/improving-health/mental-health-treatment-while-incarcerated/">NAMI&#8217;s policy position</a> and the <a href="https://www.prisonpolicy.org/research/mental_health/">Prison Policy Initiative&#8217;s research</a> outline evidence-based alternatives to this.</p></li></ul><h2>The Uncomfortable Conclusion</h2><p>Antisemitism isn&#8217;t a symptom of mental illness. The vast majority of antisemitic violence is perpetrated by individuals without mental illness, motivated by ideology, hatred, political extremism. Attributing hate to mental illness risks excusing ideologically-motivated violence while reinforcing unfair stigma.</p><p>But some percentage of cases (we don&#8217;t know how many, because I&#8217;m not sure anyone is looking systematically yet) represent this dangerous intersection: vulnerable individuals experiencing psychotic symptoms, immersed in online radicalization, and lacking insight to seek help or support systems to intervene.</p><p>These cases don&#8217;t fit existing categories: Not pure mental illness. Not pure terrorism. They are hybrid threats at the intersection of psychiatry, counterterrorism, technology policy, and public health. Everyone around Pittman saw what was happening, but no one could stop it.</p><p>His laugh wasn&#8217;t evil triumphant. Those behavioral changes weren&#8217;t simple signs of ideological radicalization. That incongruous website wasn&#8217;t some act of strategic deception. His mother&#8217;s fear wasn&#8217;t an overreaction. These acts were the signatures of a mind fragmenting in real time, with unregulated algorithms and hateful ideology filling the cracks.</p><p>The question isn't simply whether hostile state actors are deliberately exploiting psychiatric vulnerability for radicalization; capability and motive exist. </p><p>The more crucial question is whether we're willing to acknowledge that the digital environment Big Tech has created has effectively automated the same process: algorithmic amplification of extreme content, precision targeting of vulnerable individuals, and radicalization at scale. <strong>Either way, we&#8217;re unprepared.</strong></p><p>Pittman&#8217;s trial begins February 23rd. Perhaps it will answer legal questions about guilt and responsibility. But it won&#8217;t answer what matters most: How many others are fragmenting right now? How many families are watching the same deterioration with no idea where to turn? <strong>How many more Pittmans are fragmenting right now, and what are we doing about it?</strong></p><div class="pullquote"><p><em>If you or someone you know is struggling with mental health issues, the National Alliance on Mental Illness (NAMI) helpline is available at 1-800-950-NAMI (6264). </em></p><p><em>If you have concerns about someone&#8217;s radicalization, the FBI accepts tips at <a href="https://tips.fbi.gov">tips.fbi.gov</a>.</em></p></div><p><em>This publication runs on reader subscriptions. If this analysis demonstrated value, please consider becoming a paid subscriber to help my research reach more people.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=184994571&quot;,&quot;text&quot;:&quot;Get 25% off for 1 year&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=184994571"><span>Get 25% off for 1 year</span></a></p>]]></content:encoded></item><item><title><![CDATA[Anatomy of a Modern Phishing Attack]]></title><description><![CDATA[How a single suspicious email from Reagan.com reveals a cybercrime operation spanning three continents, thousands of vulnerable routers, and flaws in Google&#8217;s most advanced email protection]]></description><link>https://www.hackingbutlegal.com/p/anatomy-of-a-modern-phishing-attack</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/anatomy-of-a-modern-phishing-attack</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Wed, 21 Jan 2026 11:17:00 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="6000" height="4000" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4000,&quot;width&quot;:6000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a fishing hook hanging from the side of a boat&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a fishing hook hanging from the side of a boat" title="a fishing hook hanging from the side of a boat" srcset="https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1714880003292-17685b9999b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxwaGlzaGluZ3xlbnwwfHx8fDE3Njg5NDAxNjd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@kasiade">Kaptured by Kasia</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Yesterday, I received what appeared to be an internal HR announcement about updated company policies for 2026. </p><p>At first glance, the email appeared somewhat legitimate. It passed every authentication check Google runs, appeared in an existing business conversation thread, and used professional formatting that mimicked Microsoft Teams notifications.</p><p>I wasn&#8217;t tricked into clicking a bad link. Instead, I spent the next couple of hours reverse engineering the attack infrastructure. What I found was a professionally operated phishing campaign:</p><ul><li><p>A throwaway email account on a conservative-branded email service ($33/year, no verification required)</p></li><li><p>A compromised router in Cape Town, South Africa routing the attack traffic</p></li><li><p>The same infrastructure targeting at least three other organizations across multiple countries</p></li><li><p>A Phishing-as-a-Service platform called <strong><a href="https://www.cybereason.com/blog/tycoon-phishing-kit-analysis">Tycoon 2FA</a></strong> with tens of thousands of documented incidents</p></li><li><p>Multi-national infrastructure spanning Russia, South Africa, the United States, and Croatia</p></li></ul><p>Here are a few things we can learn from taking apart a single phishing email.</p><div><hr></div><h2>How I Spotted It</h2><p>The email appeared to be from <strong>Human |Resourcesgeneral &lt;humanresources@reagan.com&gt;</strong>. </p><p>The subject line read: <strong>&#8220;New policy documents have been posted. Please review the updated Employee Agreement and Workbook for 2026.REF#09098&#8221;.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8QAQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8QAQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png 424w, https://substackcdn.com/image/fetch/$s_!8QAQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png 848w, https://substackcdn.com/image/fetch/$s_!8QAQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!8QAQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8QAQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png" width="584" height="685.0439882697947" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:1364,&quot;resizeWidth&quot;:584,&quot;bytes&quot;:246942,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8QAQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png 424w, https://substackcdn.com/image/fetch/$s_!8QAQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png 848w, https://substackcdn.com/image/fetch/$s_!8QAQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!8QAQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f1fd53-25fc-41c1-9b77-826566061ac0_1364x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Because I did not click the Gmail button to &#8220;Show images&#8221; above the email body, the content is not visually formatted in the manner the attacker intended. </p><blockquote><p><strong>&#128161; </strong>Generally speaking, you should avoid clicking &#8220;Show images&#8221; in spam or phishing emails, because image loading in emails is a common phishing technique that can leak your email address to attacker-controlled servers. </p><p>This helps provide a glimpse of your Internet activity and confirms to the cybercriminal that your email is active and monitored by a real person. This is a process called &#8220;email validation&#8221; that increases the likelihood your address will be targeted in future campaigns.</p><p>Depending on your email client, you may also inadvertently reveal your IP address in the process, giving attackers additional data for targeting and geolocation. However, that particular technique doesn&#8217;t work in Gmail or Google Workspace because Google&#8217;s infrastructure loads all images through their own proxy servers, stripping away your real IP address and preventing attackers from confirming email validity or collecting device information via <strong><a href="https://en.wikipedia.org/wiki/Web_beacon">tracking pixels</a></strong>).</p></blockquote><h4>Importance Marker Applied</h4><p>Google automatically marked the email as &#8220;<strong><a href="https://support.google.com/mail/answer/186543?hl=en">Important</a></strong>&#8221; without my intervention based on its interpretation of the contents. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6XZZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6XZZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png 424w, https://substackcdn.com/image/fetch/$s_!6XZZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png 848w, https://substackcdn.com/image/fetch/$s_!6XZZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png 1272w, https://substackcdn.com/image/fetch/$s_!6XZZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6XZZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png" width="581" height="370.81705639614853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:928,&quot;width&quot;:1454,&quot;resizeWidth&quot;:581,&quot;bytes&quot;:182323,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6XZZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png 424w, https://substackcdn.com/image/fetch/$s_!6XZZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png 848w, https://substackcdn.com/image/fetch/$s_!6XZZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png 1272w, https://substackcdn.com/image/fetch/$s_!6XZZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe598dbe6-2ee4-47fa-904d-a4905c789b6d_1454x928.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://support.google.com/mail/answer/186543?hl=en">https://support.google.com/mail/answer/186543?hl=en</a></figcaption></figure></div><p>I unmarked the email to help ensure Gmail will learn not to do that again in the future, but there is also <strong><a href="https://support.google.com/mail/answer/186543?hl=en#zippy=%2Chide-importance-markers-in-gmail%2Cdont-use-past-actions-to-predict-which-emails-are-important">a way to change</a></strong> your importance marker settings to prevent Gmail from using your &#8220;past actions to predict which messages are important&#8221;.</p><h4>What Looked Wrong?</h4><p>I have manually analyzed many phishing emails over the course of my career. Because of this, three things immediately felt wrong:</p><ul><li><p><strong>First, the timing was convenient.</strong> The date was January 20, 2026. Annual policy updates are expected this time of year. The social engineering was textbook: invoke authority (HR department), create urgency (new policies require review), add legitimacy (&#8220;reference number REF#09098&#8221;).</p></li><li><p><strong>Second, the sender was suspicious.</strong> The email appeared to come from one account, but when I examined it more closely, the actual sending account was a different address entirely, belonging to a person I don't know and who doesn't work with me.</p></li><li><p><strong>Third, the call-to-action was wrong.</strong> The email showed a file icon (&#128196; Employee Policy 2026.docx) but included no actual attachment. Instead, there was a button: <strong>&#8220;Open to Read Policy.&#8221; </strong>That button contained a URL to <strong>mail.notifyvisitors.com</strong> (an email marketing platform) with a 576-character Base64-encoded parameter obscuring the final destination.</p></li></ul><div><hr></div><h2>First Bypass Technique: Email Authentication</h2><p>My Google account has <strong><a href="https://landing.google.com/intl/en_in/advancedprotection/">Advanced Protection Program</a></strong> enabled. </p><p>This is Google&#8217;s strongest security tier designed for high-risk users like journalists, campaign staffers, and business executives. It&#8217;s supposed to catch sophisticated phishing, and anecdotally does a fantastic job 95%+ of the time.</p><p><strong>This particular email sailed right through.</strong></p><p>I pulled the full email headers (technical information inside) to understand why. Here&#8217;s what Google&#8217;s authentication system saw:</p><pre><code><code>SPF: PASS (173.203.187.109 designated as permitted sender for reagan.com)</code>
<code>DKIM: PASS (cryptographic signature valid for @reagan.com)</code>
<code>DMARC: PASS (sender alignment verified)</code></code></pre><p>Every single check passed. Gmail didn&#8217;t seem to think this was a spoofed (faked) email. Was it?</p><h3>What is Reagan.com?</h3><p><strong>Reagan.com</strong> markets itself as a &#8220;private email&#8221; service emphasizing conservative American values and privacy. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0MeW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0MeW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png 424w, https://substackcdn.com/image/fetch/$s_!0MeW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png 848w, https://substackcdn.com/image/fetch/$s_!0MeW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png 1272w, https://substackcdn.com/image/fetch/$s_!0MeW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0MeW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png" width="585" height="795.9375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1981,&quot;width&quot;:1456,&quot;resizeWidth&quot;:585,&quot;bytes&quot;:724103,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0MeW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png 424w, https://substackcdn.com/image/fetch/$s_!0MeW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png 848w, https://substackcdn.com/image/fetch/$s_!0MeW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png 1272w, https://substackcdn.com/image/fetch/$s_!0MeW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23f20c6d-844c-488f-9a4d-15cc7a77361e_1460x1986.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Reagan.com, January 21, 2026</figcaption></figure></div><p>For $40 to $99 per year, anyone can register an email address like <strong>financedepartment@reagan.com</strong> with no identity verification required.</p><h4>The &#8220;Ronald Reagan&#8221; Attack</h4><p>When the email arrived in my Gmail inbox, it displayed as coming from <strong>humanresources@reagan.com</strong>. The subject line, timing, and sender all appeared vaguely legitimate. </p><p>Only when I examined the email headers did the attack become clear.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_NmC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_NmC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png 424w, https://substackcdn.com/image/fetch/$s_!_NmC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png 848w, https://substackcdn.com/image/fetch/$s_!_NmC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png 1272w, https://substackcdn.com/image/fetch/$s_!_NmC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_NmC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png" width="1118" height="638" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:638,&quot;width&quot;:1118,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:140211,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_NmC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png 424w, https://substackcdn.com/image/fetch/$s_!_NmC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png 848w, https://substackcdn.com/image/fetch/$s_!_NmC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png 1272w, https://substackcdn.com/image/fetch/$s_!_NmC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbcc3a3fd-3b34-4850-b996-97c8cb001eb0_1118x638.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The attacker logged into a legitimate <strong>berrelli@reagan.com</strong> account and manually forged the <code>From:</code> header field to impersonate <strong>humanresources@reagan.com</strong>.</p><p>The email&#8217;s <code>To:</code> field listed <strong>Human@resourcesmailonlinesespr.com</strong>. This is a domain name that, upon investigation, does not exist in any registrar, DNS system, or search engine. This is not an oversight or typo; it&#8217;s a deliberate design choice by the attacker.<br><br>The <code>To:</code> field address serves a purely social engineering function here.</p><p>When victims receive this email, seeing it addressed to a plausible-sounding HR domain reinforces the illusion of legitimacy. But the address was never meant to receive email. Instead, stolen credentials are collected through a different mechanism: the Adversary-in-the-Middle proxy infrastructure hidden behind the NotifyVisitors redirect chain.</p><pre><code>Received: by webmail.reagan.com
(Authenticated sender: <strong><a href="mailto:berrelli@reagan.com">berrelli@reagan.com</a></strong>, from: <strong><a href="mailto:humanresources@reagan.com">humanresources@reagan.com</a></strong>)

X-Auth-ID: <strong><a href="mailto:berrelli@reagan.com">berrelli@reagan.com</a></strong>
From: &#8220;Human Resources general&#8221; <strong><a href="mailto:humanresources@reagan.com">humanresources@reagan.com</a></strong></code></pre><p>The authenticated sender is the person who actually owns and logged into the account. The <code>From: </code>is what users see. These should match, but Reagan.com allows their senders to set the <code>From: </code>field to any address they choose.</p><p>Google&#8217;s SPF check validated that <strong>berrelli@reagan.com</strong> is authorized to send email from reagan.com, which is true. The DKIM signature cryptographically proves the email came from Reagan.com&#8217;s servers; also true. DMARC confirmed sender alignment; also correct, because the domain legitimately sent it. Every authentication protocol did exactly what it was designed to do. But none of them verify that the <code>From:</code> field matches the authenticated sender. </p><p>In Check Point&#8217;s original write-up, Gmail relied on an <code>X-Sender-Id</code> field. In this case, Reagan.com instead exposes <code>X-Auth-ID</code> to record the authenticated account, but the effect is identical: the authenticated sender differs from the forged <code>From:</code> address.</p><p><strong>This is a gap in email protocol design that has existed for decades.</strong></p><p>The attack pattern was documented by researcher Yoav Nathaniel at Check Point Research in 2018, who named it the &#8220;<strong><a href="https://web.archive.org/web/20250502071351/https://emailsecurity.checkpoint.com/blog/ronald-reagan-gmail-phishing-attack">Ronald Reagan Attack</a></strong>&#8221; specifically because Reagan.com&#8217;s permissive webmail settings made it ideal infrastructure for this type of impersonation. Attackers would register inexpensive accounts, forge email headers to appear as HR departments or executives, and send thousands of phishing emails that passed every standard authentication check.</p><p>Most email providers implement controls to prevent this, either by limiting which addresses users can send from or by appending disclaimers when the <code>From:</code> doesn&#8217;t match the authenticated account. Reagan.com has apparently chosen not to implement such controls, making their infrastructure attractive to attackers and problematic for users who receive emails that appear to come from addresses they don&#8217;t recognize but still pass all technical validation checks.</p><p>My instinct was to check if <strong>berrelli@reagan.com</strong> was a compromised account from a public breach. I searched <strong><a href="https://haveibeenpwned.com">HaveIBeenPwned</a></strong>, the definitive database of breached credentials founded by <strong><a href="https://www.troyhunt.com">Troy Hunt</a></strong>, and found nothing there or on Google either, which is somewhat unusual for a typical email account used over a period of time.</p><p>This suggested one of three possibilities: the account was created recently (within days) specifically for this campaign, it was compromised via targeted phishing rather than a public data breach, or it&#8217;s a throwaway account used for a limited campaign and then abandoned. </p><p><strong>Bottom Line:</strong> The attacker controlled a real email account with valid authentication, so the email got through. </p><div><hr></div><h2>Second Bypass Technique: Thread Hijacking</h2><p>The email didn&#8217;t arrive standalone. It appeared as a reply in what appeared to be an existing conversation about Kinetic GPO membership, Saskatchewan Health Authority procurement policies, and Los Angeles Department of Building and Safety regulations.</p><p>This technique is called &#8220;thread hijacking,&#8221; and it&#8217;s becoming the gold standard for bypassing email security.</p><p>In our case, an attacker has possibly compromised a third-party email account that had access to a business conversation thread, and has added that content to make their message appear as a eal reply to an existing thread. </p><p>By injecting their phishing payload at the <em>top</em> of a long, legitimate business discussion, the attacker attempts to exploit three psychological vulnerabilities:</p><ol><li><p><strong>Trust in context</strong>: There were other legitimate-looking participants in the thread (real organizations)</p></li><li><p><strong>Cognitive overload</strong>: Scrolling through various legitimate messages could make the single malicious one at the top seem plausible</p></li><li><p><strong>Authority reinforcement</strong>: The thread discussed HR policies and organizational procedures, making the fake HR announcement seem contextually appropriate</p></li></ol><p>The British security firm <strong><a href="https://www.darktrace.com/blog/thread-hijacking-how-attackers-exploit-trusted-conversations-to-infiltrate-networks">Darktrace</a></strong> published research on thread hijacking on January 14, just six days before I received the email. They documented how attackers create mailbox rules that forward responses to hidden archive folders, allowing them to monitor conversations without the compromised account owner noticing.</p><p>The technique has proven effective because it defeats one of the primary ways people identify phishing: checking to see if the email &#8220;fits&#8221; the conversation.</p><div><hr></div><h2>Third Bypass Technique: Teams Interface Mimicry</h2><p>The email&#8217;s visual design appears crafted to resemble a Microsoft Teams channel notification:</p><ul><li><p>The button color (#6264a7) is the exact purple used in Microsoft Teams</p></li><li><p>The text &#8220;Human Resources posted a message in General Feeds&#8221; mimics Teams channel syntax</p></li><li><p>The grey message box matches Teams&#8217; visual design language</p></li><li><p>The file icon emoji (&#128196;) adds visual authenticity</p></li></ul><p>This wasn&#8217;t accidental. <strong><a href="https://abnormal.ai/blog/hr-policy-announcement-attacks">Abnormal Security</a></strong> documented near-identical HR policy phishing campaigns in November 2025, showing that attackers are systematically studying collaboration platform interfaces and replicating them in email.</p><p>The psychology is straightforward: people see the familiar Teams purple button and their brain pattern-matches to &#8220;legitimate company announcement.&#8221; The fact that it arrived via email instead of the Teams app itself gets lost in the visual noise.</p><div><hr></div><h2>Fourth Bypass Technique: The Tracking Link</h2><p>The <strong>&#8220;Open to Read Policy&#8221;</strong> button linked to <strong>&#8220;mail.notifyvisitors.com&#8221;</strong>:</p><pre><code><code>https://mail.notifyvisitors.com/tracker/email_tracker/handler/click/59300/1423?cd=aktPMUFtRXRLeXhOT3pUYzZJeEw1Y2ptMzBDSDJkYm1IWEdmNk5GVEFvVitXcUIyNzk4NkEwWE4zaFJWMWNNRjRIdFM2RTJaV2YvaHNxOVVTcVRETTdQdE9jazJFeG1LT2dYMDR4aThCeDlDTlZoc3VhSEw5Ymw4U1lhRE[...]</code></code></pre><p>This link <strong><a href="https://levelblue.com/blogs/spiderlabs-blog/beyond-the-facade-unraveling-url-redirection-in-google-services">*appears*</a></strong> to be a legitimate email tracking link, but in reality, the attacker has embedded a hidden phishing destination inside.</p><p>When you click a link in an email, you assume the domain you see is where you're going. But attackers exploit a loophole in how legitimate websites work: they use trusted companies' redirect functions to secretly send you somewhere dangerous.</p><p>NotifyVisitors is a legitimate email marketing platform used by thousands of businesses for campaign tracking and analytics. Email providers and network protection suites &#8220;whitelist&#8221; established services like NotifyVisitors, Mailchimp, and HubSpot because they send millions of legitimate emails daily, meaning phishing emails inherit that institutional trust.</p><p>Because of this, email authentication systems have a harder time distinguishing between legitimate emails from NotifyVisitors and phishing emails using NotifyVisitors infrastructure. Both come from the same real servers and may be able to pass all security checks. Users will see a professional domain and assume legitimacy without realizing it's a redirect to a phishing page.</p><p>For attackers, this is ideal: they pay for a cheap monthly subscription, send thousands of phishing emails through legitimate infrastructure, extract profit before the account is suspended, all without needing to build their own email servers or compromise major email providers. This pattern repeats across dozens of legitimate services: Mailchimp, Amazon SES, SendGrid, Google Forms, Bit.ly, and others have all been abused for phishing by actors violating their Terms of Service because they are designed to be trusted, useful, and legitimate. </p><div class="pullquote"><p>It is also true that some companies fail to apply sufficient resources towards keeping their platforms safe in a manner that is commensurate to the scale of the problem.</p><p>Many of those would argue they do the best they can under difficult circumstances.</p></div><p>NotifyVisitors isn't just abused for its high reputation. Bad guys use it because it can generate tracking links with <strong><a href="https://levelblue.com/blogs/spiderlabs-blog/trusted-domain-hidden-danger-deceptive-url-redirections-in-email-phishing-attacks">redirects</a></strong>. </p><p>To identify the final phishing destination hidden behind the Base64-encoded redirect chain, I used <strong><a href="https://dfir.blog/unfurl/">Unfurl</a></strong>, a free OSINT tool that automatically follows URL redirects and extracts metadata at each hop, easily revealing the complete attack infrastructure without requiring me to click the malicious link myself.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qjzD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qjzD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png 424w, https://substackcdn.com/image/fetch/$s_!qjzD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png 848w, https://substackcdn.com/image/fetch/$s_!qjzD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png 1272w, https://substackcdn.com/image/fetch/$s_!qjzD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qjzD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png" width="727" height="329.5467032967033" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:660,&quot;width&quot;:1456,&quot;resizeWidth&quot;:727,&quot;bytes&quot;:1138886,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qjzD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png 424w, https://substackcdn.com/image/fetch/$s_!qjzD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png 848w, https://substackcdn.com/image/fetch/$s_!qjzD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png 1272w, https://substackcdn.com/image/fetch/$s_!qjzD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39c71be-bdfd-455b-a6e1-78d9c5e340df_3328x1508.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://dfir.blog/unfurl/">https://dfir.blog/unfurl</a></figcaption></figure></div><p>The URL structure breaks down like this:</p><ul><li><p><strong>Domain</strong>: mail.notifyvisitors.com (legitimate ESP subdomain)</p></li><li><p><strong>Path</strong>: /tracker/email_tracker/handler/click/</p></li><li><p><strong>Campaign ID</strong>: 59300</p></li><li><p><strong>Tracking ID</strong>: 1423</p></li><li><p><strong>Parameter</strong>: cd=[576 characters of Base64-encoded data]</p></li></ul><p>That last <code>cd</code> parameter is the key. It contains a Base64-encoded redirect chain. This is a technique that helps obscure the final destination from email security scanners that had the opportunity to intercept the message before it arrived in my inbox. </p><p>Another way we can tell something is off is that legitimate NotifyVisitors tracking typically <strong><a href="https://support.notifyvisitors.com/support/solutions/articles/84000364764-configure-conversion-tracking">appends</a></strong> a <code>nv_uid</code> parameter for conversion tracking, but compromised campaigns replace legitimate redirects with multi-stage phishing chains.</p><p>When decoded, these types of parameters typically reveal multiple redirect hops:</p><ol><li><p>First hop: Disposable domain (.icu, .xyz, .sbs, or similar low-reputation top level domain)</p></li><li><p>Second hop: Cloudflare Workers instance acting as a traffic filter</p></li><li><p>CAPTCHA challenge: Blocks automated security scanners while appearing legitimate to humans</p></li><li><p>Final destination: Reverse proxy server mimicking Google Workspace or Microsoft 365 login</p></li></ol><p>This architecture is characteristic of Phishing-as-a-Service (PhaaS) platforms which are professionally operated services that rent attack infrastructure to cybercriminals. </p><h4>What is Phishing-as-a-Service?</h4><p>PhaaS works exactly like Netflix, Spotify, or any other subscription service, but instead of streaming movies, you're renting complete phishing attack infrastructure. You don't need coding skills, hacking knowledge, or technical infrastructure. </p><p>The PhaaS provider handles everything. You just pay, point it at your targets, and collect stolen credentials.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!edj9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!edj9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png 424w, https://substackcdn.com/image/fetch/$s_!edj9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png 848w, https://substackcdn.com/image/fetch/$s_!edj9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png 1272w, https://substackcdn.com/image/fetch/$s_!edj9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!edj9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png" width="1456" height="1565" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1565,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1808753,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!edj9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png 424w, https://substackcdn.com/image/fetch/$s_!edj9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png 848w, https://substackcdn.com/image/fetch/$s_!edj9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png 1272w, https://substackcdn.com/image/fetch/$s_!edj9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e80a31-6019-4804-b086-f83721c1eb1d_1624x1746.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">FBI Flash Bulletin, April 29, 2025, Source: <a href="https://www.fbi.gov/file-repository/cyber/csa/phishing-domains-associated-with-labhost-phaas-platform-users-042925.pdf/view">fbi.gov</a></figcaption></figure></div><h4>Tycoon 2FA: The PhaaS Behind the Attack</h4><p>The email wasn&#8217;t an isolated attack. Multiple security researchers have detonated highly similar NotifyVisitors tracking URLs in public malware sandboxes.</p><p>An ANY.RUN <strong><a href="https://any.run/report/061ba2f25dbd97f56566e95dff1f7e139dff555b1e5216c222cd720f21817a4e/3a339c5f-d465-418f-8575-58c133813134">analysis</a></strong> from February 17, 2025 explicitly tagged the infrastructure as <strong>Tycoon 2FA</strong>, a PhaaS platform designed to bypass multi-factor authentication on Microsoft 365 and Gmail accounts. Additional targets <strong><a href="https://any.run/report/1497e5d06d91748be1ec6d1e03663411c0dfdd2ad8bd2feebbd56e9c00866aa5/cbefebff-48dc-4432-b609-b47473a081a6">documented</a></strong> on ANY.RUN include <strong><a href="https://any.run/report/a9c7cfcaf0b89076759040e4f7f90d7d32d120186e38496ece280fd1412edc11/d7b28673-606d-427a-8291-c6c53b6a2f4b">Habi</a></strong> (Colombian real estate unicorn, March 26, 2025), <strong><a href="https://any.run/report/9866d8908c14a998f9f2ab332d823bc56abf2de0d16c98796bea9b1516e8e59e/f15a7a80-2f21-4d90-9f81-0ada714fea4f">Conde Nast</a></strong> (January 7, 2026), and <strong><a href="https://any.run/report/d8dc032715e0aa25293daab1339c5a60613023ab774ef738e0039b68193e3d55/129bf61a-c670-4b19-8759-ab56716a2a68">Keyline Ltd</a></strong> (UK construction supplier, January 7, 2026). The titles of the above-named targets include Vice President of Finance, Finance Director, and Branch Manager. Their domains (habi.co, condenast.com, and keyline.co.uk) all use Google Workspace services. </p><p>The reports match on the NotifyVisitors infrastructure with the same HR policy lure and Base64-encoded redirect parameters.</p><p>This suggests attackers may be running large-scale operations targeting:</p><ul><li><p>Western countries</p></li><li><p>Multiple industries</p></li><li><p>Teams with procurement/financial authority over large financial transactions</p></li></ul><p><strong><a href="https://www.cybereason.com/blog/tycoon-phishing-kit-analysis">Cybereason documented</a></strong> Tycoon 2FA in December 2024, noting over 64,000 incidents. In January 2025, Barracuda <strong><a href="https://blog.barracuda.com/2025/01/22/threat-spotlight-tycoon-2fa-phishing-kit">reported</a></strong> the platform had been updated with enhanced evasion capabilities.</p><p>Microsoft Threat Intelligence tracks Tycoon 2FA as <strong>&#8220;Storm-1747&#8221;</strong> and <strong><a href="https://www.microsoft.com/en-us/security/blog/2025/11/21/storm-1747-tycoon-2fa-evolves-with-new-techniques/">reported</a></strong> in November 2025 that it was &#8220;the most prolific phishing-as-a-service platform observed by Microsoft&#8221; throughout 2025, with Microsoft Defender for Office 365 blocking more than 13 million malicious emails linked to the platform in October 2025 alone.</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/MsftSecIntel/status/1991921025181786202&quot;,&quot;full_text&quot;:&quot;Throughout 2025, Tycoon2FA (tracked by Microsoft as Storm-1747) has consistently been the most prolific phishing-as-a-service (PhaaS) platform observed by Microsoft. In October 2025, Microsoft Defender for Office 365 blocked more than 13 million malicious emails linked to &quot;,&quot;username&quot;:&quot;MsftSecIntel&quot;,&quot;name&quot;:&quot;Microsoft Threat Intelligence&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1268200269277351936/a2naHzbe_normal.png&quot;,&quot;date&quot;:&quot;2025-11-21T17:25:55.000Z&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/G6S5nZGXoAAq3hq.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/Mw5JjdT5Ue&quot;}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:3,&quot;retweet_count&quot;:40,&quot;like_count&quot;:126,&quot;impression_count&quot;:17806,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><h4>How AiTM works for credential theft</h4><p>Traditional phishing sends you to a fake login page, captures your password, and that&#8217;s pretty much it, but modern PhaaS platforms use Adversary-in-the-Middle (AitM) techniques:</p><ol><li><p>You enter credentials on the fake Microsoft login page</p></li><li><p>The attacker&#8217;s server relays those credentials to the <em>real</em> Microsoft server</p></li><li><p>Microsoft sends back an MFA challenge (SMS code, authenticator app prompt)</p></li><li><p>The fake page shows you the same MFA prompt</p></li><li><p>You complete MFA authentication</p></li><li><p>Microsoft issues a session cookie proving you authenticated successfully</p></li><li><p>The attacker captures that session cookie</p></li></ol><p><strong>The session cookie is the prize.</strong> </p><p>It remains valid for days or weeks, allowing the attacker to access your account even after you change your password. This is why standard MFA (SMS codes, authenticator apps, push notifications) provides zero protection against these attacks.</p><p>Only phishing-resistant authentication (hardware security keys using FIDO2/WebAuthn cryptographic verification) can prevent AitM credential theft. The authentication is cryptographically bound to the origin domain, so even if you try to authenticate on the phishing site, your security key detects the domain mismatch and refuses.</p><h4>The Intelligence Agency Angle</h4><p>PhaaS platforms like Tycoon 2FA don&#8217;t just enable cybercriminals. They also provide <strong><a href="https://www.trellix.com/blogs/research/blurring-the-lines-how-nation-states-and-cybercriminals-are-becoming-alike">plausible deniability</a></strong> for nation-state actors. </p><p>Intelligence agencies and Advanced Persistent Threat (APT) groups <strong><a href="https://www.proofpoint.com/us/blog/threat-insight/cobalt-strike-favorite-tool-apt-crimeware">increasingly use</a></strong> commodity tools and commercial phishing infrastructure alongside custom malware, a trend <strong><a href="https://www.cybersecuritydive.com/news/cobalt-strike-apt-threat/602722/">documented extensively</a></strong> with tools like Cobalt Strike (which saw 161% increased use by cybercrime actors between 2019-2020.</p><p>By routing operations through the same PhaaS platforms, compromised routers, and email marketing services used by common cybercriminals, state-sponsored groups can &#8220;blend in with the crowd,&#8221; making attribution nearly impossible. </p><p>When a phishing email originates from a South African compromised router, routes through a US marketing platform (NotifyVisitors), and uses Russian hosting infrastructure, investigators face the <strong><a href="https://www.sciencedirect.com/science/article/pii/S0167404825002950">attribution problem</a></strong>; determining whether the attack came from organized crime, a lone hacker, or a nation-state intelligence service. </p><p>North Korea&#8217;s <strong><a href="https://www.radware.com/cyberpedia/ddos-attacks/the-lazarus-group-apt38-north-korean-threat-actor/">Lazarus Group</a></strong> exemplifies this convergence: the same APT group conducts both state-sponsored espionage and financially motivated cybercrime (with a focus on cryptocurrency theft to <strong><a href="https://blog.barracuda.com/2025/09/23/lazarus-group--a-criminal-syndicate-with-a-flag">fund weapons programs</a></strong> under international sanctions), while using commercial tools and infrastructure that are often indistinguishable from typical cybercrime.</p><p>For intelligence agencies, PhaaS platforms reduce operational costs, provide ready-made infrastructure, and most importantly, create ambiguity. Every phishing attack could be criminal fraud, or it could be espionage. </p><p>The operational security benefit is immense: if caught, the attacker appears to be just another cybercriminal using rented infrastructure rather than a state intelligence operative.</p><div><hr></div><h2>Fifth Bypass Technique: The Compromised Router</h2><p>When I examined the email headers more closely, I found something unexpected.</p><pre><code>x-client-ip: 165.0.0.143</code></pre><p>This is the IP address where the email was actually composed and sent from (not the mail server, but the device the attacker used to access the Reagan.com webmail interface).</p><p>I ran the IP through <strong><a href="https://www.shodan.io/">Shodan</a></strong>, a search engine that indexes internet-connected devices, and widened my search to match similar systems. The results were both alarming and devastatingly common, revealing thousands of vulnerable systems.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OmjD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OmjD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png 424w, https://substackcdn.com/image/fetch/$s_!OmjD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png 848w, https://substackcdn.com/image/fetch/$s_!OmjD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png 1272w, https://substackcdn.com/image/fetch/$s_!OmjD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OmjD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png" width="1372" height="424" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e577733e-7c5a-4975-9589-7de2268396b2_1372x424.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:424,&quot;width&quot;:1372,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:71723,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OmjD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png 424w, https://substackcdn.com/image/fetch/$s_!OmjD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png 848w, https://substackcdn.com/image/fetch/$s_!OmjD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png 1272w, https://substackcdn.com/image/fetch/$s_!OmjD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe577733e-7c5a-4975-9589-7de2268396b2_1372x424.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fz09!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fz09!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png 424w, https://substackcdn.com/image/fetch/$s_!fz09!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png 848w, https://substackcdn.com/image/fetch/$s_!fz09!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!fz09!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fz09!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png" width="491" height="521.3207171314741" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1066,&quot;width&quot;:1004,&quot;resizeWidth&quot;:491,&quot;bytes&quot;:98615,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fz09!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png 424w, https://substackcdn.com/image/fetch/$s_!fz09!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png 848w, https://substackcdn.com/image/fetch/$s_!fz09!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!fz09!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3867d5-4449-4368-a5c8-aa773e48f1cb_1004x1066.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Shodan.io search results, January 20, 2026</figcaption></figure></div><p>These appear to be home or business routers with <strong><a href="https://www.shadowserver.org/what-we-do/network-reporting/open-cwmp-report/">TR-069</a></strong> exposed to the public internet, which is a protocol (CPE WAN Management Protocol, or CWMP) that Internet Service Providers use to remotely manage customer routers and perform necessary functions such as updating firmware, changing settings, and troubleshooting issues.</p><p>A correctly configured server will demand authentication *before* processing any HTTP request, and will respond with an HTTP 401 Unauthorized and a challenge for credentials. If an unauthenticated scanner like Shodan receives HTTP 404 Not Found instead, it means the server processed the request without authentication, routed it through its application logic, and determined the requested path didn't exist, proving authentication was bypassed entirely.</p><p><strong>This service should never be accessible from the public internet.</strong></p><p>Why? Well, once an attacker confirms the router responds to unauthenticated HTTP requests, they can probe for known vulnerabilities and exploit Remote Code Execution flaws to take complete control of the device.</p><blockquote><p>&#128204;  The <strong><a href="https://www.qacafe.com/resources/home-router-attack-tr-069-vulnerability/">Mirai botnet</a></strong> famously used TR-069 exploits to compromise hundreds of thousands of routers in 2016, knocking Deutsche Telekom offline. </p><p>More recently, Chinese APT groups have used the <strong><a href="https://www.team-cymru.com/post/botnet-7777-are-you-betting-on-a-compromised-router">Quad7 botnet</a></strong> (200,000+ compromised routers) for Microsoft 365 password spraying campaigns.</p></blockquote><p>The threat actor didn&#8217;t send this phishing email from their own computer or a VPN. They routed it through a compromised router in South Africa which is possibly owned by some innocent RSAWEB customer who has no idea their internet connection is being used for international cybercrime.</p><p>This adds three layers of operational security for the attacker:</p><ol><li><p><strong>IP diversity</strong>: Thousands of residential IPs instead of a few datacenter IPs that trigger spam filters</p></li><li><p><strong>Geographic misdirection</strong>: The attack appears to originate from South Africa when the attacker could be anywhere</p></li><li><p><strong>Legal deniability</strong>: If traced, investigators initially find an innocent router owner in Cape Town, not the actual culprit</p></li></ol><div><hr></div><h2>Sixth Bypass Technique: Scale of the Infrastructure</h2><p>The most concerning finding came when I investigated whether the South African router compromise was an isolated incident.</p><p>I ran a Shodan query for all RSAWEB customer IP addresses with port 7547 exposed:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!820Q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!820Q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png 424w, https://substackcdn.com/image/fetch/$s_!820Q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png 848w, https://substackcdn.com/image/fetch/$s_!820Q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png 1272w, https://substackcdn.com/image/fetch/$s_!820Q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!820Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png" width="1060" height="842" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:842,&quot;width&quot;:1060,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:97978,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!820Q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png 424w, https://substackcdn.com/image/fetch/$s_!820Q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png 848w, https://substackcdn.com/image/fetch/$s_!820Q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png 1272w, https://substackcdn.com/image/fetch/$s_!820Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9159d197-aa4c-4988-9ebb-f038e9d5bbd5_1060x842.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Shodan.io search results, January 20, 2026</figcaption></figure></div><p><strong>Results: 7,676 vulnerable RSAWEB devices in South Africa are completely unauthenticated and accessible to anyone who connects.</strong></p><p>For context, when Virgin Media had a <strong><a href="https://www.jmwhite.co.uk/blog/what-is-going-on-with-tr-069-and-virgin-media-routers">similar</a></strong> TR-069 exposure in October 2020, Shodan indexed 800,000 vulnerable routers out of their 5.6 million UK customers (about 14% of their customer base). </p><p>RSAWEB is a mid-sized South African ISP with an estimated 50,000 to 200,000 customers. If 7,676 routers are exposed, that represents 3% to 15% of their entire customer base. This is a systemic security failure, not isolated compromises.</p><p>Each of these routers can be exploited for:</p><ul><li><p><strong>Botnet recruitment</strong>: DDoS attacks, spam campaigns, cryptocurrency mining</p></li><li><p><strong>Phishing infrastructure</strong>: Email send proxies (like the one used to target me)</p></li><li><p><strong>Traffic interception</strong>: All unencrypted data passing through the router is visible to the attacker</p></li><li><p><strong>Lateral movement</strong>: Compromising devices on the home/business network behind the router</p></li></ul><p>A Shodan search for the open port and vulnerable status shows 123,315 vulnerable devices exposed to the Internet, with the vast majority of devices located in Russia, Brazil, Ukraine, Belarus, and Taiwan.</p><pre><code>port:7547 http.status:404 &#8220;cwmp&#8221;</code></pre><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OnK7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OnK7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png 424w, https://substackcdn.com/image/fetch/$s_!OnK7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png 848w, https://substackcdn.com/image/fetch/$s_!OnK7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png 1272w, https://substackcdn.com/image/fetch/$s_!OnK7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OnK7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png" width="368" height="593.0057142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1692,&quot;width&quot;:1050,&quot;resizeWidth&quot;:368,&quot;bytes&quot;:186628,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OnK7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png 424w, https://substackcdn.com/image/fetch/$s_!OnK7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png 848w, https://substackcdn.com/image/fetch/$s_!OnK7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png 1272w, https://substackcdn.com/image/fetch/$s_!OnK7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0446a7d3-8704-4fea-a3c3-915ea53c2774_1050x1692.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Geographic distribution of Shodan.io search results (port:7547 http.status:404 &#8220;cwmp&#8221;), January 20, 2026.</figcaption></figure></div><p>Widening the Shodan search to remove the &#8220;cwmp&#8221; server string and searching on port and http status alone widens the results to <strong>8.2 million records</strong>, with the majority of potentially-vulnerable systems located in the United States, Russia, and Australia.</p><pre><code>port:7547 http.status:404</code></pre><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!d8lG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!d8lG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png 424w, https://substackcdn.com/image/fetch/$s_!d8lG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png 848w, https://substackcdn.com/image/fetch/$s_!d8lG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png 1272w, https://substackcdn.com/image/fetch/$s_!d8lG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!d8lG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png" width="360" height="566.4" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1652,&quot;width&quot;:1050,&quot;resizeWidth&quot;:360,&quot;bytes&quot;:200703,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!d8lG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png 424w, https://substackcdn.com/image/fetch/$s_!d8lG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png 848w, https://substackcdn.com/image/fetch/$s_!d8lG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png 1272w, https://substackcdn.com/image/fetch/$s_!d8lG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F688869d2-b295-4496-bbde-14c270731ecb_1050x1652.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Geographic distribution of Shodan.io search results (port:7547 http.status:404), January 20, 2026</figcaption></figure></div><div><hr></div><h2>How Google APP Missed This One</h2><p>Google&#8217;s <strong><a href="https://landing.google.com/intl/en_in/advancedprotection/">Advanced Protection Program</a></strong> is supposed to represent the state of the art in email security. It&#8217;s designed for high-risk users who face targeted attacks: journalists, campaign staffers, activists, business executives.</p><p>This email bypassed it completely. The reason why might be lost somewhere within the following layers of <strong>&#8220;<a href="https://en.wikipedia.org/wiki/Swiss_cheese_model">swiss cheese</a></strong>&#8221;:</p><h4>1. Perfect Authentication (By Design)</h4><p>Advanced Protection can&#8217;t distinguish between a legitimate Reagan.com user and an attacker who registered a throwaway Reagan.com account. Both pass SPF, DKIM, and DMARC because both are using the same legitimate infrastructure.</p><p>The authentication protocols verify <em>identity</em> (this email came from reagan.com), but they cannot verify <em>intent</em> (this email was sent for malicious purposes).</p><h4>2. Content Legitimacy (Machine Learning Poisoning)</h4><p>The email contained 95% legitimate business correspondence: real quotes from Kinetic GPO, Saskatchewan Health Authority, and Los Angeles Department of Building and Safety. </p><p>Only 5% was the malicious payload at the top. Therefore, Google&#8217;s machine learning models might have calculated something like this:</p><pre><code>Risk Score = malicious_indicators / total_content_signals
           = 1 suspicious link / 50+ legitimate content elements
           = LOW RISK &#8594; DELIVER</code></pre><p>The massive HTML padding (hundreds of blank and unnecessary tags, white space, useless content, and email signatures) was specifically designed to dilute the suspicious indicators and fool ML-based detection.</p><h4>3. No Domain Spoofing (Expected External Email)</h4><p>Advanced Protection aggressively flags emails that spoof internal domains or impersonate specific individuals. But this email came from <strong>Reagan.com</strong> (an external domain) and didn&#8217;t claim to be from anyone in my organization.</p><p>It appeared in an existing thread with external participants, so Google&#8217;s systems correctly categorized it as &#8220;expected external correspondence&#8221; rather than &#8220;suspicious impersonation attempt.&#8221;</p><p>However, as I flagged earlier in this report, Gmail also independently decided to upgrade the email&#8217;s visibility in my inbox by tagging it with an &#8220;Important&#8221; <strong><a href="https://support.google.com/mail/answer/186543?hl=en">importance marker</a></strong>. </p><h4>4. High-Reputation Link Dilution</h4><p>The email thread contained legitimate links to:</p><ul><li><p><strong>eventbrite.com</strong> and <strong>eventbrite.ca</strong> (calendar scheduling)</p></li><li><p><strong>kineticgpo.ca</strong> (procurement organization)</p></li><li><p><strong>ladbs.org</strong> (LA Department of Building and Safety)</p></li><li><p><strong>dbs.lacity.gov</strong> (Los Angeles city government)</p></li></ul><p>These high-reputation domains helped to drown out the single suspicious NotifyVisitors link in the risk calculation.</p><h4>5. No Attachment-Based Malware</h4><p>Advanced Protection includes aggressive attachment scanning (sandboxing suspicious files, blocking macros, flagging executables). But this attack had no attachments. Just a link, and not even a link to an obviously malicious domain: a link to NotifyVisitors, a legitimate email marketing platform used by thousands of businesses.</p><h4>5. Display name and Header Forgery</h4><p>Gmail correctly validated that a legitimate Reagan.com account sent the email, but it displayed the forged <code>From:</code> header to the user, mirroring the &#8220;Ronald Reagan Attack&#8221; pattern documented by Check Point Research in which authentication passes while the visible sender is silently impersonated.&#8203;</p><div><hr></div><h2>How To Protect Yourself</h2><h4>Report It Immediately</h4><p>Folks who aren&#8217;t cybersecurity analysts can use the three-dot menu once a Gmail message is open to <strong>&#8220;<a href="https://support.google.com/mail/answer/8253?hl=en">Report phishing</a>&#8221;</strong>. This will move the email to your Spam folder, limit your ability to load images, and alert Google Threat Intelligence to help protect other Internet users.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H76H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H76H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png 424w, https://substackcdn.com/image/fetch/$s_!H76H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png 848w, https://substackcdn.com/image/fetch/$s_!H76H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png 1272w, https://substackcdn.com/image/fetch/$s_!H76H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H76H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png" width="334" height="568.3301587301587" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1072,&quot;width&quot;:630,&quot;resizeWidth&quot;:334,&quot;bytes&quot;:91472,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/185220579?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!H76H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png 424w, https://substackcdn.com/image/fetch/$s_!H76H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png 848w, https://substackcdn.com/image/fetch/$s_!H76H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png 1272w, https://substackcdn.com/image/fetch/$s_!H76H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff431b2ae-4edd-4b6a-9415-6ffcea7cf684_630x1072.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">How to report a phishing email in Gmail</figcaption></figure></div><p>Besides Google, other email providers like Microsoft, Apple Mail, Yahoo Mail, ProtonMail, etc. have equivalent reporting capabilities built into their platforms. </p><p>Search &#8220;report phishing [service name]&#8221; to find the specific steps for your provider.</p><h4>Spotting Thread Hijacking</h4><ol><li><p><strong>Verify strange content via secondary channel</strong>: If an email appears in an existing thread but seems odd or off-topic, call the sender or message them on Signal/Teams/Slack to verify</p></li><li><p><strong>Check for topic drift</strong>: Legitimate conversations evolve naturally, but phishing payloads sometimes introduce abrupt topic changes</p></li><li><p><strong>Hover over all links before clicking</strong>: In today&#8217;s email, the display text says <strong>&#8220;Employee Policy 2026.docx&#8221;</strong> but the URL is <strong>mail.notifyvisitors.com</strong></p></li><li><p><strong>Watch for missing attachments</strong>: If an email references a file but provides only a link to &#8220;view&#8221; it, that&#8217;s a red flag!</p></li></ol><h4>Get a Hardware Security Key</h4><p>If you use Gmail, Google Workspace, or any service supporting FIDO2/WebAuthn authentication, the single most effective defense against phishing is a hardware security key. These devices are small USB or USB-C authenticators that cryptographically verify you&#8217;re logging into the legitimate service, not a phishing replica.</p><p>The <strong><a href="https://amzn.to/4jL9Jrm">YubiKey 5C</a></strong> is one of the most popular options: it&#8217;s durable, widely compatible with major platforms (Google, Microsoft, GitHub, Apple, social media platforms, etc.), and costs less than $50. When you attempt to authenticate on a phishing site, your YubiKey detects the domain mismatch and refuses to complete the authentication, providing absolute protection against AitM attacks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LNIz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LNIz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LNIz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LNIz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LNIz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LNIz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg" width="280" height="337.2541382667965" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1237,&quot;width&quot;:1027,&quot;resizeWidth&quot;:280,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!LNIz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LNIz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LNIz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LNIz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec403ecf-3245-4a0c-acc7-86f75a16ceb8_1027x1237.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Yubico&#8217;s YubiKey 5C </figcaption></figure></div><p>This is why Google Advanced Protection Program requires hardware security keys for enrollment. They represent the only authentication method that cannot be compromised by credential theft or session hijacking. You can also consider purchasing Google&#8217;s own hardware key, the <strong><a href="https://cloud.google.com/security/products/titan-security-key">Titan Security Key</a></strong>.</p><div><hr></div><h2>The Big Picture</h2><p>This probably wasn&#8217;t a targeted attack against me specifically. I happened to end up on a list that was possibly scraped from LinkedIn, a data broker, or a prior breach. The attack landed in my inbox, not because of sophisticated zero-day exploits or advanced persistent threat techniques, but because it exploited the gap between what email authentication can verify (sender identity) and what users need to know (sender intent).</p><p>PhaaS has industrialized cybercrime. What I experienced wasn't built by a lone hacker. It was rented from Tycoon 2FA for probably less than $500/month.<br><br>The attacker didn't need to know how TR-069 exploits work, how to bypass Google Advanced Protection Program, or how to build AitM infrastructure. They just logged into a dashboard, selected &#8220;HR Policy Campaign,&#8221; uploaded a target list, and clicked &#8220;Launch.&#8221; </p><p>The person in Cape Town whose router was used to send the email and the US- and Canada-based office workers shown in the stolen email exchanges used as decoys have no clue they&#8217;ve been made unwitting parts of a cybercrime operation. If just one wire transfer fraud succeeds, those who deployed the campaign stand to profit handsomely. </p><p><strong>This is modern phishing: anonymized, industrialized, globally distributed, and profitable enough to sustain professional criminal organizations.</strong></p><div><hr></div><p><em>This publication runs on reader subscriptions. If this analysis demonstrated value, please consider becoming a paid subscriber to help my research reach more people.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=185220579&quot;,&quot;text&quot;:&quot;Get 25% off for 1 year&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=185220579"><span>Get 25% off for 1 year</span></a></p>]]></content:encoded></item><item><title><![CDATA[They're Coming for the UN]]></title><description><![CDATA[The Secretary-General says American withdrawal is illegal. The fight over 17 acres of Manhattan is just beginning.]]></description><link>https://www.hackingbutlegal.com/p/theyre-coming-for-the-un</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/theyre-coming-for-the-un</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Fri, 09 Jan 2026 01:37:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zn36!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Key Takeaways</h2><ul><li><p>The UN Secretary-General has implicitly challenged President Trump&#8217;s authority to withhold assessed contributions, asserting they are &#8220;a legal obligation under the UN Charter&#8221; that cannot be unilaterally abrogated by executive action.</p></li><li><p>The United States owes approximately $4 billion in unpaid UN dues, representing 80% of all regular budget arrears globally. America has already crossed the threshold where voting rights suspension becomes legally mandated.</p></li><li><p>This withdrawal follows the UN&#8217;s criticism of the January 3 Venezuela military operation, mirroring the administration&#8217;s <a href="https://www.reuters.com/world/us-imposes-sanctions-international-criminal-court-officials-2025-01-02/">sanctions campaign</a> against the ICC after it issued arrest warrants for Israeli officials.</p></li><li><p>New <a href="https://america2.news/the-russian-roots-of-trumps-venezuela-and-greenland-operations/">investigative reporting</a> reveals that Russia proposed the Venezuela-Greenland strategy to Trump as early as 2017: America gets the Western Hemisphere, Russia gets Ukraine. Fiona Hill <a href="https://s3.documentcloud.org/documents/6543445/Fiona-Hill-Testimony.pdf">testified to Congress</a> that her NSC team received these offers directly from Russian counterparts. John Bolton blocked them. Bolton was indicted in October 2025.</p></li><li><p>The UN headquarters occupies 17 acres of extraterritorial land in Manhattan under the <a href="https://treaties.un.org/doc/Publication/UNTS/Volume%2011/volume-11-I-147-English.pdf">1947 Headquarters Agreement</a>. The U.S. cannot unilaterally abrogate this treaty or expel the UN.</p></li><li><p>NYC Mayor <a href="https://www.cnn.com/2026/01/01/politics/nyc-mayor-oath-zohran-mamdani-inauguration">Zohran Mamdani</a> controls the NYPD and city services surrounding UN headquarters. He has already demonstrated willingness to oppose Trump&#8217;s foreign policy on legal grounds.</p></li><li><p>Silicon Valley ideologues are proposing &#8220;Freedom Cities&#8221; to replace institutions destroyed by regime change. Two days after the Venezuela operation, Charter Cities Institute director Mark Lutter <a href="https://www.thenerdreich.com/network-state-comes-for-venezuela/">called for</a> corporate-governed enclaves there. Russia provides the geopolitical logic; the Thiel network provides the economic model for what comes after.</p></li><li><p>The UN has announced it will continue operations regardless of U.S. participation. China will fill the vacuum America creates.</p></li><li><p>Historical precedent is ominous: The <a href="https://history.state.gov/milestones/1914-1920/league">League of Nations</a> collapsed after major powers withdrew, paving the way for World War II.</p></li></ul><div><hr></div><p>The <a href="https://www.un.org/sg/en/content/sg/statements/2026-01-08/statement-attributable-the-spokesperson-for-the-secretary-general-us-decision-withdrawal-un-entities">statement</a> reads like diplomatic boilerplate: four sentences, no named officials beyond the spokesperson, a formulaic expression of &#8220;regret.&#8221; To the casual observer, it might appear that the United Nations simply acknowledged another policy dispute and moved on.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IXtT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IXtT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png 424w, https://substackcdn.com/image/fetch/$s_!IXtT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png 848w, https://substackcdn.com/image/fetch/$s_!IXtT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png 1272w, https://substackcdn.com/image/fetch/$s_!IXtT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IXtT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png" width="598" height="870.6322795341098" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1750,&quot;width&quot;:1202,&quot;resizeWidth&quot;:598,&quot;bytes&quot;:281932,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/183953604?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IXtT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png 424w, https://substackcdn.com/image/fetch/$s_!IXtT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png 848w, https://substackcdn.com/image/fetch/$s_!IXtT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png 1272w, https://substackcdn.com/image/fetch/$s_!IXtT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2f4aa1d-5fa1-47a8-811e-5b80767a6fd3_1202x1750.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: United Nations</figcaption></figure></div><p><strong>Those who understand the context know better.</strong> The $4 billion in unpaid American dues. The systematic defunding campaign. The looming voting rights suspension. The military strike on Caracas five days earlier that the Secretary-General condemned as potentially violating international law. These words constitute something far more consequential than diplomatic pleasantries. They are the opening salvo in what could become the most significant constitutional crisis in United Nations history.</p><p>Less than 24 hours after President Donald Trump signed the <a href="https://www.whitehouse.gov/presidential-actions/2026/01/withdrawing-the-united-states-from-international-organizations-conventions-and-treaties-that-are-contrary-to-the-interests-of-the-united-states/">presidential memorandum</a> withdrawing the United States from 66 international organizations, UN Secretary-General Ant&#243;nio Guterres issued a response through his spokesperson St&#233;phane <a href="https://www.aljazeera.com/news/2026/1/8/trump-to-withdraw-us-from-dozens-of-un-international-organisations">Dujarric</a> that amounts to a reminder of Charter law and of the Trump administration&#8217;s treaty obligations:</p><blockquote><p>&#8220;Assessed contributions to the United Nations regular budget and peacekeeping budget, as approved by the General Assembly, are a legal obligation under the UN Charter for all Member States, including the United States... All United Nations entities will go on with the implementation of their mandates as given by Member States. The United Nations has a responsibility to deliver for those who depend on us. We will continue to carry out our mandates with determination.&#8221;</p></blockquote><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;aad41fc4-6dc4-45f0-abec-068d0c13dcb3&quot;,&quot;duration&quot;:null}"></div><p>The diplomatic language barely conceals the message: The UN will not allow American financial pressure to halt operations. The United States remains legally bound to pay its assessed contributions regardless of what President Trump orders.</p><p><strong>The statement does not function as a negotiation, but as a legal confrontation.</strong></p><div><hr></div><p><em><strong>This essay is the third part of an ongoing analysis of President Trump&#8217;s withdrawal from international organizations. </strong></em></p><p><em><strong>Part One, &#8220;<a href="https://www.hackingbutlegal.com/p/america-exits-66-international-organizations">America Exits 66 International Organizations</a>,&#8221; examines the institutional and geopolitical consequences abroad. Part Two, &#8220;<a href="https://www.hackingbutlegal.com/p/the-psychological-costs-of-americas">The Psychological Costs of America&#8217;s Exit</a>,&#8221; traces the domestic psychological, media, and coercive dynamics that make this retreat possible.</strong></em></p><div><hr></div><h2>Why the UN Matters to Americans</h2><p>The United Nations is not, as its critics caricature, a world government or a forum for anti-American rhetoric. It is the infrastructure through which the United States has exercised global leadership for 80 years.</p><p><strong>The UN system encompasses far more than General Assembly debates.</strong> The World Health Organization coordinates pandemic response that protects Americans from outbreaks originating abroad. The International Atomic Energy Agency monitors nuclear programs in Iran and North Korea. The World Food Programme feeds 150 million people annually and prevents the famines that destabilize regions and create refugee crises. Peacekeeping operations keep conflicts from escalating into wars requiring American military intervention.</p><p>The UN also provides forums where the United States sets international standards on telecommunications, aviation, shipping, and intellectual property. American businesses benefit from rules America helped write. When the U.S. withdraws from these standard-setting bodies, it does not eliminate the standards. It simply transfers control to China.</p><p>For Americans specifically, reduced UN engagement means:</p><ul><li><p><strong>Diminished early warning on disease outbreaks</strong> that could become pandemics affecting U.S. public health</p></li><li><p><strong>Reduced intelligence sharing</strong> on terrorism, trafficking, and transnational crime through UN coordination mechanisms</p></li><li><p><strong>Lost influence over trade standards</strong> that affect billions of dollars in American exports</p></li><li><p><strong>Increased likelihood of regional conflicts</strong> escalating into crises requiring expensive U.S. military intervention</p></li><li><p><strong>Accelerated climate impacts</strong> as coordinated global response collapses, affecting American agriculture, coastal cities, and disaster costs</p></li><li><p><strong>Brain drain</strong> as American scientists excluded from international bodies lose professional standing and career opportunities</p></li></ul><p>American withdrawal creates vacuums that authoritarian powers are eager to fill. The rules-based international order that has prevented great power war for 80 years depends on its architect remaining committed to its maintenance.</p><h2>The Legal Foundation</h2><p>The Secretary-General&#8217;s position rests on solid legal ground. <a href="https://legal.un.org/repertory/art17_2.shtml">Article 17(2)</a> of the UN Charter states unequivocally: &#8220;The expenses of the Organization shall be borne by the Members as apportioned by the General Assembly.&#8221;</p><p>This language is not discretionary. It does not say &#8220;may be borne&#8221; or &#8220;should be borne if Members agree.&#8221; <strong>It says &#8220;shall be borne,&#8221; which in treaty law constitutes a binding obligation.</strong></p><p>The definitive interpretation came in 1962, when the <a href="https://www.icj-cij.org/case/49">International Court of Justice</a> ruled that peacekeeping expenses constitute &#8220;expenses of the Organization&#8221; and that the General Assembly&#8217;s apportionment creates binding legal obligations on all member states.</p><p>Under the U.S. Constitution&#8217;s Article VI, treaties ratified by the Senate are &#8220;the supreme Law of the Land.&#8221; The UN Charter was ratified in 1945. President Trump cannot unilaterally abrogate treaty obligations through executive action any more than he could unilaterally repeal a federal statute.</p><p>The Trump <a href="https://www.whitehouse.gov/presidential-actions/2026/01/withdrawing-the-united-states-from-international-organizations-conventions-and-treaties-that-are-contrary-to-the-interests-of-the-united-states/">memorandum</a> itself tacitly acknowledges these constraints, specifying that &#8220;withdrawal means ceasing participation in or funding to those entities <em>to the extent permitted by law</em>.&#8221; <strong>That caveat matters enormously.</strong></p><h2>The $4 Billion Question</h2><p>The Secretary-General&#8217;s statement gains urgency from a financial reality that has reached crisis proportions. As of January 2026, the United States owes the United Nations approximately $4 billion in unpaid assessed contributions.</p><p>According to the <a href="https://www.congress.gov/crs-product/IF10354">Congressional Research Service</a>, U.S. unpaid assessments stand at $1.5 billion for the regular budget and $2.4 billion for peacekeeping. The United States alone accounts for 80% of all regular budget arrears globally. China, the second-largest debtor, owes less than a quarter of U.S. arrears.</p><p>The <a href="https://news.un.org/en/story/2025/12/1166480">Secretary-General warned</a> in December 2025 that the organization faces &#8220;a race to bankruptcy&#8221; unless member states pay their dues. The financial strangulation has been ongoing. According to testimony before the UN <a href="https://press.un.org/en/2025/gaab4504.doc.htm">Fifth Committee</a>, the organization started 2024 with only $67 million in liquidity reserves. To make payroll, it borrowed from the Working Capital Fund, Special Account, and closed tribunals. A senior official told the committee that &#8220;the Secretariat almost ran out of cash in December.&#8221;</p><p>The Trump administration&#8217;s FY2026 budget request proposed ending UN peacekeeping payments entirely. This represents an 83% reduction from pre-rescission funding levels. Call it what it is: effective organizational destruction.</p><h2>The Voting Rights Threshold</h2><p>Embedded in the Secretary-General&#8217;s statement is an implicit warning. <a href="https://www.un.org/en/ga/about/art19.shtml">Article 19</a> of the UN Charter provides that a member in arrears &#8220;shall have no vote in the General Assembly if the amount of its arrears equals or exceeds the amount of the contributions due from it for the preceding two full years.&#8221;</p><p><strong>The United States is already at this threshold.</strong> Current arrears of $1.5 billion essentially equal the two-year assessment of roughly $1.52 billion.</p><p>If the United States continues non-payment through 2026, the General Assembly would be legally entitled to suspend U.S. voting rights. America would become the first permanent Security Council member ever sanctioned for non-payment.</p><p><strong>The Trump administration likely views this as acceptable, perhaps even desirable.</strong> Article 19 applies only to General Assembly voting; U.S. veto power in the Security Council remains unaffected. Being sanctioned might reinforce Trump&#8217;s narrative that the UN is biased against American interests.</p><p>The precedent could run deeper. In theory, crossing the Article 19 threshold creates legal grounds, as some scholars argue, for other members to invoke Article 60 of the Vienna Convention on the Law of Treaties, which permits states to suspend obligations toward a party in &#8220;material breach.&#8221; <strong>U.S. refusal to pay could release other nations from their Charter obligations toward America.</strong></p><h2>What the Statement Does Not Say</h2><p>The Secretary-General&#8217;s statement is notable for what it omits. It does not mention Article 19 voting rights suspension, despite the U.S. being at the threshold. It does not threaten expulsion under Article 6 (persistent Charter violations) or invoke Article 60 of the Vienna Convention permitting other states to suspend treaty obligations toward a state in material breach.</p><p><strong>This restraint reflects political reality.</strong> The UN cannot effectively sanction its most powerful member and largest financial contributor without triggering the cascade of consequences described above.</p><p>The Secretary-General also refrains from directly criticizing the withdrawal decision itself. He expresses &#8220;regret&#8221; but does not characterize the action as wrong, harmful, or counterproductive. This diplomatic caution contrasts with stronger statements from others.</p><p>The Executive Secretary of the UN Framework Convention on Climate Change (UNFCCC) called the climate withdrawal a &#8220;strategic blunder that gives away American advantage.&#8221; Former Secretary of State John Kerry characterized it as &#8220;a gift to China and Russia and a get-out-of-jail-free card to polluters who want to avoid responsibility.&#8221; The Natural Resources Defense Council warned it is &#8220;not only self-defeating to let other countries write global rules of the road but also to skip out on trillions of dollars in investment.&#8221;</p><p>By remaining diplomatically neutral, the Secretary-General preserves space for future U.S. re-engagement while avoiding giving Trump ammunition to claim the UN is &#8220;attacking&#8221; America. But this restraint also reveals the organization&#8217;s fundamental weakness. <strong>The UN cannot compel U.S. compliance.</strong> It can only assert legal obligations and hope that domestic political constraints, allied pressure, or future administrations restore American participation.</p><h2>An Attempted Humiliation</h2><p>Part and parcel of political reality is Trump&#8217;s <a href="https://www.cnn.com/2025/09/23/politics/takeaways-trump-un-speech">September 2025</a> address to the UN General Assembly. This attempt to publicly humiliate the institution from its own podium largely backfired, drawing international condemnation and reinforcing perceptions of American chaos and unreliability.</p><p>Trump asked &#8220;What is the purpose of the United Nations?&#8221; while standing at its lectern. He complained about broken escalators and a malfunctioning teleprompter, mobilizing the Secret Service to investigate alleged UN &#8220;sabotage&#8221; of his equipment. He dismissed climate science as &#8220;the greatest con job ever perpetrated&#8221; and predictions as &#8220;made by stupid people.&#8221; He accused the organization of &#8220;funding an assault on Western countries&#8221; through migration support.</p><p>He told assembled world leaders their countries were &#8220;going to hell&#8221; and warned that &#8220;if you don&#8217;t get away from this green scam, your country is going to fail.&#8221; The rambling, nearly hour-long speech veered repeatedly off-script.</p><div id="youtube2-lw9foqNRpyE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;lw9foqNRpyE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/lw9foqNRpyE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>The global response was swift and negative. French President Emmanuel <a href="https://www.cnn.com/politics/live-news/trump-presidency-unga-speech-09-23-25">Macron</a> responded that same day by declaring France &#8220;proud to be among the people of the United Nations&#8221; and asserting the organization &#8220;cannot be replaced.&#8221; South African President Cyril Ramaphosa <a href="https://www.reuters.com/world/africa/south-africa-seeks-tariff-reduction-talks-with-us-2025-09-23/">criticized</a> the use of trade as &#8220;a weapon against a number of countries in the world.&#8221;</p><p>A foreign diplomat texted the Washington Post&#8217;s Ishaan Tharoor: &#8220;This man is stark, raving mad. Do Americans not see how embarrassing this is?&#8221; </p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/ishaantharoor/status/1970500411267391540&quot;,&quot;full_text&quot;:&quot;A senior foreign diplomat posted at the UN texts me: \&quot;This man is stark, raving mad. Do Americans not see how embarrassing this is?\&quot;&quot;,&quot;username&quot;:&quot;ishaantharoor&quot;,&quot;name&quot;:&quot;Ishaan Tharoor&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/963801661465681920/YXiPTxCP_normal.jpg&quot;,&quot;date&quot;:&quot;2025-09-23T14:48:02.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:4649,&quot;retweet_count&quot;:9859,&quot;like_count&quot;:58856,&quot;impression_count&quot;:3855171,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>The <a href="https://globalaffairs.org/commentary-and-analysis/blogs/trumps-un-speech-odds-american-public-opinion">Chicago Council on Global Affairs</a> noted that Trump&#8217;s views diverged sharply from American public opinion: 79% of Americans consider climate change at least an important threat, and majorities support multilateral engagement. Former U.S. diplomat Hugh Dugan <a href="https://www.foxnews.com/politics/world-leaders-laugh-squirm-trump-blasts-un-climate-ukraine-gaza-general-assembly">observed</a> that despite hammering the UN, Trump &#8220;left a vacuum instead of a narrative&#8221; on reform. &#8220;Next: let&#8217;s see if China is editing its speech now to swoop down to fill the missing narrative vacuum,&#8221; he predicted.</p><p>The speech was not diplomacy. It was performance; one that damaged American credibility far more than the institution it targeted.</p><h2>Why U.S. Withdrawal Could Destroy the UN</h2><p>The Secretary-General&#8217;s restraint in not threatening punitive measures reflects a brutal reality: the UN cannot effectively sanction its most powerful member without triggering consequences that could destroy the organization itself.</p><p>The United States provides approximately 22% of the UN regular budget and 26% of peacekeeping funding. No obvious combination of other contributors can easily replace this. If the U.S. withdraws entirely:</p><ul><li><p><strong>Immediate operational collapse</strong>: Many UN agencies would face 20-30% budget cuts overnight. The World Food Programme, UNHCR refugee operations, and peacekeeping missions would require immediate downsizing. Peacekeeping missions already reduced by 25% due to cash shortages would face further troop repatriations, potentially allowing conflicts in Mali, South Sudan, and the Democratic Republic of Congo to reignite.</p></li><li><p><strong>Headquarters relocation pressure</strong>: The UN headquarters in New York operates on U.S. soil under a 1947 headquarters agreement. A hostile administration could make operations increasingly difficult through visa restrictions on diplomats, security complications, and infrastructure neglect. Pressure to relocate to Geneva, Vienna, or elsewhere would intensify&#8212;an enormously expensive and disruptive proposition.</p></li><li><p><strong>Legitimacy crisis</strong>: The UN&#8217;s authority rests partly on the participation of all major powers. An organization that excludes the world&#8217;s largest economy and most powerful military loses credibility as a universal forum. Other nations might question why they should remain bound by UN decisions the United States ignores.</p></li><li><p><strong>Security Council paralysis</strong>: While the U.S. would presumably maintain its Security Council seat even if General Assembly voting rights are suspended, relations would deteriorate to the point where productive Council action becomes nearly impossible. The U.S. might begin vetoing resolutions out of spite, grinding the Council to a halt.</p></li><li><p><strong>Cascade of withdrawals</strong>: If the United States demonstrates that withdrawal carries no meaningful consequences, other dissatisfied members (Ex. Russia, which has its own UN grievances, or developing nations frustrated by Western dominance) might follow. The organization could fragment into irrelevance.</p></li></ul><p>This is why the Secretary-General treads carefully. Any punitive action risks provoking the very outcome it seeks to prevent.</p><h2>The Venezuela Connection</h2><p>The timing of this withdrawal raises an unavoidable question: <strong>Is this punitive?</strong></p><p>On January 3-4, 2026, <a href="https://en.wikipedia.org/wiki/2026_United_States_strikes_in_Venezuela">U.S. forces struck targets</a> around Caracas and captured Venezuelan President Nicol&#225;s Maduro. The Secretary-General responded: &#8220;These developments constitute a dangerous precedent... The rules of international law have not been respected.&#8221;</p><p>Less than a week later, the Trump administration <a href="https://www.hackingbutlegal.com/p/america-exits-66-international-organizations">announced withdrawal</a> from 66 international organizations.</p><p>The pattern mirrors the administration&#8217;s approach to the International Criminal Court. After the ICC issued <a href="https://www.icc-cpi.int/news/situation-state-palestine-icc-pre-trial-chamber-i-rejects-state-israels-challenges">arrest warrants</a> for Israeli Prime Minister Benjamin Netanyahu in November 2024, the administration launched sanctions against the court itself. Secretary of State Marco Rubio has sanctioned 11 ICC judges and prosecutors, freezing assets, revoking visas, and devastating their ability to function. Canadian ICC judge Kimberly Prost told reporters she lost access to all credit cards and bank accounts: &#8220;How do you order an Uber? How do you get a hotel?&#8221;</p><p>The administration has even demanded that the ICC amend its Rome Statute to guarantee that Donald Trump himself can never be prosecuted for war crimes.</p><p><strong>The message is consistent:</strong> International institutions that criticize or constrain U.S. actions will face retaliation.</p><h2>Calling Trump&#8217;s Bluff</h2><p>The Secretary-General&#8217;s commitment to continue mandate implementation despite U.S. withdrawal represents operational defiance, not rhetoric. <strong>It signals specific survival strategies the UN is already implementing.</strong></p><p>The organization has proposed unprecedented measures to continue operations without full U.S. funding. These include suspending the return of $298.9 million in unspent funds to member states (keeping it as cash reserve instead), authorizing supplementary assessments on member states not in arrears to cover amounts owed by delinquent states, and exploring voluntary contributions from non-traditional donors.</p><p>The supplementary assessment option is particularly significant. The General Assembly could effectively make compliant countries subsidize U.S. non-payment by increasing their assessment rates to compensate for American arrears. This would shift the financial burden to European nations, Japan, Canada, and other reliable contributors.</p><p>The alternative funding strategy carries its own risks. Increased reliance on voluntary contributions from China, Gulf states, and private foundations risks what some experts call &#8220;donor capture,&#8221; where funders gain disproportionate influence over UN priorities and operations.</p><p>But the core message is unmistakable: the UN will not allow U.S. financial pressure to force organizational collapse. This demonstrates resilience, but it also normalizes a UN system functioning without American participation; a situation that China has been positioning itself to exploit.</p><h2>The China Opportunity</h2><p>While the Secretary-General&#8217;s statement carefully avoids mentioning alternative funders, the geopolitical reality is impossible to ignore. <strong>China has systematically positioned itself to fill the upcoming vacuum.</strong> </p><p>Beijing now pays approximately 20% of the UN regular budget, second only to the United States. Chinese nationals lead four of 17 specialized UN agencies. China has expanded its civil servant presence across the UN system. The Belt and Road Initiative provides alternative development financing for more than 150 countries. China is championing the &#8220;Global Development Initiative&#8221; and &#8220;Global Security Initiative&#8221; as alternatives to Western frameworks.</p><p>Chinese Foreign Ministry statements characterize U.S. withdrawals as America &#8220;placing self-interest first&#8221; and drawing &#8220;growing, intense criticism from the international community.&#8221; This narrative positions China as the responsible stakeholder committed to multilateral cooperation while America retreats into isolationism.</p><p>If the UN successfully continues mandate implementation with reduced U.S. involvement but increased Chinese financial and diplomatic support, it permanently shifts the organization&#8217;s center of gravity eastward. American influence contracts to Security Council veto power while China gains operational control over developmental, humanitarian, and environmental programs.</p><p>This is already underway. China leads the International Telecommunication Union, the Food and Agriculture Organization, the International Civil Aviation Organization, and the UN Industrial Development Organization. Chinese officials occupy senior positions throughout the UN system, embedding Beijing&#8217;s priorities in institutional DNA.</p><p>The Secretary-General&#8217;s statement attempts to maintain the fiction that the UN can continue current operations with existing resources, even as internal documents reveal desperate cash shortages. The reality is that continued operations will require someone to fill the funding gap. Europe lacks the fiscal capacity. That leaves China, Gulf states, or a combination thereof.</p><p><strong>Each option transforms the UN&#8217;s character.</strong> European dominance would preserve Western influence but at reduced capacity. Gulf state funding comes with conservative social policy strings attached. Chinese funding comes with geopolitical expectations. None preserves the U.S.-led order of the past 80 years.</p><h2>The &#8220;My Way or the Highway&#8221; Doctrine</h2><p>Daniel Forti of the <a href="https://en.wikipedia.org/wiki/International_Crisis_Group">International Crisis Group</a> <a href="https://www.crisisgroup.org/">characterizes</a> U.S. policy: &#8220;What we&#8217;re witnessing is the crystallization of the U.S. stance on multilateralism, which can be summarized as &#8216;my way or the highway.&#8217;&#8221;</p><p>This approach fundamentally misunderstands power in the 21st century. Unlike the post-Cold War era when the U.S. could dictate terms, today&#8217;s world requires coalition-building and sustained engagement. By demanding compliance rather than seeking partnership, the U.S. accelerates the formation of blocs designed to counter American influence.</p><p>Secretary of State Marco Rubio <a href="https://www.state.gov/releases/office-of-the-spokesperson/2026/01/withdrawal-from-wasteful-ineffective-or-harmful-international-organizations">framed</a> the withdrawals in ideological terms, characterizing the targeted organizations as part of &#8220;a sprawling architecture of global governance, often dominated by progressive ideology and detached from national interests. From DEI mandates to &#8216;gender equity&#8217; campaigns to climate orthodoxy, many international organizations now serve a globalist project rooted in the discredited fantasy of the &#8216;End of History.&#8217;&#8221;</p><p>This rhetoric positions multilateralism itself as an enemy. But the institutions being abandoned are not ideological constructs; these are the mechanisms through which the United States has exercised global leadership for 80 years. </p><p><strong>Their abandonment does not eliminate the functions they serve. It simply transfers control to others.</strong></p><h2>Movement Towards Full UN Withdrawal</h2><p>The escalating pattern suggests the Trump administration may be deliberately building toward complete UN withdrawal, pursuing a strategy similar to its apparent goal of weakening NATO until American withdrawal becomes politically feasible.</p><p><strong>The progression is unmistakable.</strong> During Trump&#8217;s first term (2017-2021), the U.S. withdrew from UNESCO, the UN Human Rights Council, WHO, and stopped funding UNRWA. Biden reversed these decisions (2021-2025), rejoining WHO, restoring UNESCO funding, and re-engaging with UN agencies. Now in his second term, Trump has re-withdrawn from WHO, the Paris Agreement, and the Human Rights Council (January 2025), ordered a comprehensive review of all international organizations (February 2025), and withdrawn from 66 organizations including 31 UN entities (January 2026).</p><p>This trajectory suggests not selective pruning but systematic dismantling.</p><p>Congressional legislation reveals growing Republican consensus on full withdrawal. Senator Mike Lee and Senator Marsha Blackburn introduced the <a href="https://www.congress.gov/bill/119th-congress/senate-bill/669/text">&#8220;DEFUND Act&#8221;</a> on February 20, 2025. The bill would repeal the 1945 UN Participation Act, terminate U.S. membership, close the U.S. Mission to the United Nations, expel UN headquarters from U.S. territory, withdraw diplomatic immunity for UN employees, end all payments, and prohibit participation in peacekeeping.</p><p>While this bill has not passed, its existence signals that full withdrawal has moved from fringe position to mainstream Republican policy option. The Trump administration&#8217;s systematic defunding and withdrawal creates conditions where the DEFUND Act becomes not radical departure but logical conclusion.</p><p><strong>The parallels to NATO are instructive.</strong> Trump has repeatedly questioned NATO&#8217;s value, threatened withdrawal, and demanded that allies pay more. His administration&#8217;s actions, including reducing troop commitments, questioning Article 5 obligations, and publicly berating allies, have weakened the alliance without formally leaving it. The pattern suggests a strategy of gradual disengagement that makes formal withdrawal appear inevitable rather than revolutionary.</p><p>The same pattern is visible with the UN: systematic non-payment, hostile rhetoric, withdrawal from component organizations, and public humiliation of the institution all working synergistically to create conditions where complete withdrawal seems like merely the final step in an already-accomplished transition.</p><h2>17 Acres of Extraterritorial Land</h2><p><strong>One dimension of this confrontation has received insufficient attention: the physical territory of the United Nations itself.</strong></p><p>The UN Headquarters occupies 17 acres along the East River that is, under the <a href="https://avalon.law.yale.edu/20th_century/decad036.asp">1947 Headquarters Agreement</a>, &#8220;under the control and authority of the United Nations.&#8221; This is not a metaphor. The Agreement, signed by Secretary of State George Marshall and ratified by Congress, creates essentially extraterritorial space within U.S. borders.</p><p>Section 9(a) states: &#8220;The headquarters district shall be inviolable. Federal, state or local officers or officials of the United States... shall not enter the headquarters district to perform any official duties therein except with the consent of and under conditions agreed to by the Secretary-General.&#8221;</p><p>The FBI, federal marshals, and ICE cannot enter UN territory without explicit permission. Section 23 provides: &#8220;The seat of the United Nations shall not be removed from the headquarters district unless the United Nations should so decide.&#8221; The U.S. cannot unilaterally expel the UN.</p><p>The 1988 ICJ precedent reinforces these protections. When Congress prohibited the PLO from maintaining UN offices, the Secretary-General invoked arbitration. The ICJ ruled that the United States is legally obligated to arbitrate such disputes. The U.S. backed down rather than face international condemnation.</p><p>The DEFUND Act explicitly calls for expelling UN headquarters and withdrawing diplomatic immunity. If enacted, it would trigger the most significant property dispute between the U.S. and an international organization in history.</p><p><strong>But there is a complicating factor.</strong></p><h2>The Mamdani Variable</h2><p>On January 1, 2026, one week before Trump announced the 66-organization withdrawal, <a href="https://www.cnn.com/2026/01/01/politics/nyc-mayor-oath-zohran-mamdani-inauguration">Zohran Mamdani</a> was inaugurated as New York City&#8217;s 112th mayor.</p><p>Mamdani is a 34-year-old democratic socialist, DSA member, immigrant from Uganda, the city&#8217;s first Muslim mayor, and youngest to hold the office in over a century. He was sworn in by Senator Bernie Sanders and declared he would &#8220;govern as a democratic socialist&#8221; and not &#8220;abandon my principles for fear of being deemed radical.&#8221;</p><p><strong>His relevance became immediately apparent.</strong> Two days after his inauguration, when Trump launched the operation that captured Maduro, Mamdani <a href="https://www.cityandstateny.com/politics/2026/01/mamdani-calls-trump-venezuela-oppose-pursuit-regime-change/410441/">called Trump directly</a> to register opposition. In a <a href="https://www.nyc.gov/mayors-office/news/2026/01/mayor-zohran-mamdani-statement-on-u-s--strikes-in-venezuela">public statement</a>: </p><blockquote><p>&#8220;Unilaterally attacking a sovereign nation is an act of war and a violation of federal and international law.&#8221;</p></blockquote><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/NYCMayor/status/2007513875709669540&quot;,&quot;full_text&quot;:&quot;I was briefed this morning on the U.S. military capture of Venezuelan President Nicol&#225;s Maduro and his wife, as well as their planned imprisonment in federal custody here in New York City. \n\nUnilaterally attacking a sovereign nation is an act of war and a violation of federal and&quot;,&quot;username&quot;:&quot;NYCMayor&quot;,&quot;name&quot;:&quot;Mayor Zohran Kwame Mamdani&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/2006600789297422336/YMdJHVNE_normal.jpg&quot;,&quot;date&quot;:&quot;2026-01-03T18:06:20.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:73156,&quot;retweet_count&quot;:43159,&quot;like_count&quot;:344485,&quot;impression_count&quot;:42720135,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>This matters because the Mayor controls the NYPD, city services, permits, and infrastructure surrounding the UN campus. The 1947 Agreement establishes UN territory as inviolable by federal authorities, but depends on a cooperative relationship with the host city for external security, utilities, and the thousands of diplomatic missions generating <a href="https://www.nyc.gov/assets/internationalbusiness/downloads/pdf/UN-Economic-Impact-2023.pdf">$3.69 billion in annual economic output</a>.</p><p>Mamdani&#8217;s political profile suggests he views the UN as a bulwark against Trump&#8217;s unilateralism. He has pledged to arrest Netanyahu if he visits New York under ICC warrants. His immigrant background as a refugee from Idi Amin&#8217;s Uganda means he understands personally what happens when international protections fail.</p><p>If the administration attempts to make UN headquarters &#8220;uncomfortable&#8221; through harassment tactics, Mamdani could become an active obstacle. The NYPD provides external security. City agencies control permits and infrastructure. A mayor determined to protect UN operations could use these levers to counteract federal pressure.</p><p>This creates a potential three-way standoff: Trump pushing to expel the UN, the Secretary-General asserting legal protections, and New York City&#8217;s mayor actively defending operations through municipal authority.</p><p>The <a href="https://www.amny.com/news/mamdanis-security-clearance-pending-maduro/">first week of Mamdani&#8217;s term</a> already involved coordinating with the NYPD on security for Maduro&#8217;s federal prosecution. His statement condemning the Venezuela operation as illegal under international law signals ideological alignment with the UN&#8217;s position.</p><p>International law lacks effective enforcement mechanisms against powerful states. The United States can violate the Headquarters Agreement with impunity. ICJ advisory opinions and General Assembly resolutions carry no material consequences.</p><p>A 34-year-old democratic socialist mayor of New York City might provide more effective resistance than the entire UN system. If federal agents attempt to enter UN headquarters without Secretary-General consent, Mamdani could order NYPD to maintain a protective perimeter. If federal authorities attempt to seize UN property, the city could challenge it in court.</p><p>The irony: the international legal order&#8217;s survival depending not on international law itself, but on domestic political resistance within the host country.</p><p>What remains <a href="https://theloop.ecpr.eu/explaining-the-surprisingly-friendly-trump-mamdani-meeting/">unclear</a> is whether Mamdani will actually fight. His first week has shown willingness to criticize Trump publicly and coordinate on security matters professionally. But there is a difference between rhetorical opposition and the kind of sustained institutional resistance that would genuinely protect UN operations against determined federal pressure.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zn36!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zn36!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zn36!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zn36!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zn36!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zn36!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;New York City Mayor-Elect Zohran Mamdani Meets With President Trump At The White House&quot;,&quot;title&quot;:&quot;New York City Mayor-Elect Zohran Mamdani Meets With President Trump At The White House&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="New York City Mayor-Elect Zohran Mamdani Meets With President Trump At The White House" title="New York City Mayor-Elect Zohran Mamdani Meets With President Trump At The White House" srcset="https://substackcdn.com/image/fetch/$s_!Zn36!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zn36!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zn36!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zn36!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f775e2-13a6-4d0a-a551-9716b9fb5ecc_2048x1365.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">U.S. President Donald Trump shakes hands with New York City Mayor-elect Zohran Mamdani (L) during a meeting in the Oval Office of the White House on November 21, 2025 in Washington, DC. Trump congratulated Mamdani on his election win as the two political opponents met to discuss policies for New York City, including affordability, public safety, and immigration enforcement. Photo Credit: Andrew Harnik/<a href="https://www.gettyimages.com/detail/news-photo/president-donald-trump-shakes-hands-with-new-york-city-news-photo/2247835272">Getty Images</a></figcaption></figure></div><p><strong>The next 90-180 days will reveal whether Mamdani is a true obstacle to Trump&#8217;s UN agenda or merely a symbolic critic.</strong> If the former, the UN headquarters question becomes far more complicated than the administration anticipated. If the latter, the path to eventual expulsion clears considerably.</p><h2>The Freedom City Scenario</h2><p>One dimension of this crisis connects the Venezuela operation, recent threats towards Greenland, UN withdrawal, and Silicon Valley ideologues in ways that have received insufficient attention.</p><p>Two days after U.S. forces captured Maduro, Mark Lutter, executive director of the Charter Cities Institute (funded by Peter Thiel&#8217;s venture network), issued a <a href="https://www.thenerdreich.com/network-state-comes-for-venezuela/">public call</a>:</p><blockquote><p>&#8220;Venezuela doesn&#8217;t need to become another Iraq. It needs a Freedom City... A Freedom City = new land, new rules, real property rights, real rule of law&#8212;jointly built with the U.S.&#8221;</p></blockquote><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/MarkLutter/status/2008618511111688471&quot;,&quot;full_text&quot;:&quot;Venezuela doesn&#8217;t need to become another Iraq.\nIt needs a Freedom City.\n\nThe mission is not endless war. It is to end a criminal regime without another trillion-dollar disaster.\n\nReality: the old system is still there&#8212;corrupt courts, cartels, broken institutions. Fixing&quot;,&quot;username&quot;:&quot;MarkLutter&quot;,&quot;name&quot;:&quot;Mark Lutter&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1864650559845744640/ZagR2nG__normal.jpg&quot;,&quot;date&quot;:&quot;2026-01-06T19:15:46.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:27,&quot;retweet_count&quot;:4,&quot;like_count&quot;:19,&quot;impression_count&quot;:41655,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>&#8220;Freedom City&#8221; is Trump&#8217;s term for what the tech-right calls a <a href="https://newrepublic.com/article/177733/billionaire-solano-california-tech-secession">&#8220;Network State&#8221;</a>: sovereign territory governed by corporations rather than democratic governments. The concept has developed in Silicon Valley for over a decade, backed by Thiel, Marc Andreessen, and other tech billionaires through <a href="https://en.wikipedia.org/wiki/Pr%C3%B3spera">Pronomos Capital</a>.</p><p><strong>The operational prototype exists.</strong> <a href="https://www.thenerdreich.com/prospera-the-network-state-and-the-new-york-times-2/">Pr&#243;spera</a>, a charter city on Honduras&#8217;s Roat&#225;n island, operates under its own legal framework: 1% business taxes, Bitcoin as legal tender, governance by corporate board rather than elected officials. When Honduras attempted to repeal enabling legislation, Pr&#243;spera&#8217;s backers filed an <a href="https://www.resilience.org/stories/2025-09-11/charter-cities-attempting-to-create-a-new-atlantis/">$11 billion lawsuit</a>. That&#8217;s 31% of Honduras&#8217;s GDP.</p><p><strong>The connection to the Trump administration is direct.</strong> JD Vance is a former Thiel employee. Roger Stone argued that pardoning Honduras&#8217;s drug-trafficking ex-president could <a href="https://www.thenerdreich.com/trump-pardons-drug-trafficker-who-backed-network-state-city/">&#8220;crush socialism and save a freedom city.&#8221;</a> Trump&#8217;s 2024 platform included plans for &#8220;Freedom Cities&#8221; on federal land.</p><p>These projects emerge from what researchers Timnit Gebru and &#201;mile Torres call <a href="https://washingtonspectator.org/understanding-tescreal-silicon-valleys-rightward-turn/">&#8220;TESCREAL&#8221; ideology</a>: overlapping beliefs (Transhumanism, Extropianism, Singularitarianism, Cosmism, Rationalism, Effective Altruism, Longtermism) that justify authoritarian means through appeals to civilizational advancement. As Dave Troy writes, TESCREAL proponents have an &#8220;ends justify the means&#8221; mindset antithetical to democratic governance. The charter city movement operationalizes this: if democratic governments obstruct progress, create territories where democracy and its bothersome regulations don&#8217;t apply.</p><h3>The Pattern: Venezuela, Cuba, Greenland, Manhattan</h3><p>Now apply this framework across four targets, each facing different forms of U.S. pressure, each with charter city interests waiting.</p><p><strong>Venezuela: Military Capture.</strong> Trump stated January 6: <a href="https://en.wikipedia.org/wiki/2026_United_States_strikes_in_Venezuela">&#8220;I&#8217;ve spoken with several U.S. oil companies about commitments to rebuilding Venezuela&#8217;s infrastructure. They wanna go in so bad.&#8221;</a> Within 48 hours of Maduro&#8217;s capture, Lutter proposed his Freedom City.</p><p><strong>Cuba: Economic Strangulation.</strong> Trump and Rubio have explicitly stated their goal of collapsing Cuba&#8217;s government by cutting off Venezuelan oil. <a href="https://www.foxnews.com/world/trump-says-cuba-ready-fall-after-capture-venezuelas-maduro">&#8220;Cuba is ready to fall,&#8221;</a> Trump said. Rubio <a href="https://fortune.com/2026/01/08/why-trump-strike-venezuela-was-really-about-cuba/">warned</a>: &#8220;If I lived in Havana and I was in the government, I&#8217;d be concerned.&#8221; Lutter has published proposals for converting Guantanamo Bay into a charter city.</p><p><strong>Greenland: Threats Against a NATO Ally.</strong> The same week, the administration escalated threats to seize Greenland from Denmark, <a href="https://www.npr.org/2026/01/06/nx-s1-5668080/danish-prime-minister-us-takeover-greenland-end-of-nato">declaring</a> &#8220;utilizing the U.S. military is always an option.&#8221; Danish Prime Minister Mette Frederiksen warned this would end NATO.</p><p><a href="https://www.insidehook.com/internet/peter-thiel-praxis-next-great-city-greenland">Praxis</a>, a $525 million &#8220;network state&#8221; startup backed by Thiel through Pronomos Capital, has pursued Greenland since 2019. That&#8217;s the same year Trump first proposed buying the island. Founder Dryden Brown traveled to Nuuk in 2024, tweeting: &#8220;I went to Greenland to try to buy it.&#8221; When Trump renewed acquisition threats in January 2026, Praxis&#8217;s account <a href="https://x.com/praxisnation/status/1884016944690683939">responded</a>: &#8220;According to plan.&#8221;</p><p>Trump&#8217;s nominated ambassador to Denmark is Ken Howery, Thiel&#8217;s former business partner and Founders Fund co-founder. If confirmed, Howery would lead Greenland negotiations while maintaining financial ties to the network state movement.</p><p>The 1951 U.S.-Denmark Defense Agreement already gives America extensive military access to Greenland. Danish officials are baffled by Trump&#8217;s threats because the U.S. can achieve virtually any legitimate security objective under existing agreements. The threats make sense only if the goal is sovereignty transfer for projects requiring territorial control beyond what treaties permit.</p><p><strong>UN Headquarters: Financial Strangulation.</strong> Now apply the same logic to 17 acres of prime Manhattan waterfront.</p><p>If the UN relocates to Geneva, Vienna, or Nairobi, the property becomes available. Under Section 22 of the Headquarters Agreement, the UN must offer it first to the U.S. government. The federal government could claim $4 billion in arrears as offset against fair market value.</p><p>The site could be designated a &#8220;Special Economic Zone&#8221; under expanded Opportunity Zone legislation. Private governance by Thiel network figures, crypto billionaires, and Trump associates could replace democratic accountability. Corporate tenants would replace diplomatic missions.</p><p>The marketing writes itself: &#8220;Freedom City Manhattan: Former site of failed international bureaucracy, now global innovation hub.&#8221;</p><h3>The Russian Angle</h3><p>The Greenland dimension becomes more troubling when examined through <a href="https://america2.news/the-russian-roots-of-trumps-venezuela-and-greenland-operations/">recent investigative reporting by Dave Troy</a>, which reveals that the Venezuela-Greenland strategy did not originate in Silicon Valley boardrooms. <strong>It appears to have originated in the Kremlin.</strong> </p><p>According to Troy&#8217;s investigation, Vladimir Putin has been attempting to influence Trump to seize both Venezuela and Greenland since at least 2017. The reasoning is simple: if Trump would disengage in Ukraine, Putin would give Trump free rein in Venezuela. Each country is in the other&#8217;s &#8220;backyard.&#8221;</p><p><strong>A swap.</strong></p><p>The Greenland idea came not from security officials but from Ron Lauder, the Est&#233;e Lauder cosmetics heir and confidant to both Trump and Putin. As reported in <em><a href="https://www.penguinrandomhouse.com/books/646871/the-divider-by-peter-baker-and-susan-glasser/">The Divider</a></em> by Peter Baker and Susan Glasser, Lauder approached Trump in 2017 saying he could help acquire Greenland. Lauder volunteered to serve as &#8220;back channel&#8221; to the Danish government. <a href="http://www.en.kremlin.ru/catalog/keywords/30/events/60108">Kremlin records confirm</a> that Lauder met with Putin on March 19, 2019, right when the administration&#8217;s still-private Greenland talks were at their peak. Lauder subsequently made <a href="https://www.arctictoday.com/trump-ally-who-inspired-greenland-purchase-idea-quietly-invests-in-greenlandic-companies/">direct investments</a> in Greenland&#8217;s infrastructure, energy, and mining sectors.</p><p>The explicit quid pro quo came in spring 2019. Fiona Hill, then serving on the National Security Council under John Bolton, <a href="https://s3.documentcloud.org/documents/6543445/Fiona-Hill-Testimony.pdf">testified to Congress</a> that her team received informal proposals from Russian counterparts signaling willingness to back off Venezuela if the United States would disengage in Ukraine:</p><blockquote><p>&#8220;You have your Monroe Doctrine. You want us out of your backyard. Well, you know, we have our own version of this. You&#8217;re in our backyard in Ukraine.&#8221;</p></blockquote><p>Bolton blocked the overtures, dismissing them as absurd. Hill was instructed to &#8220;go out to Russia to basically tell the Russians to knock this off.&#8221; The deal went nowhere during Trump&#8217;s first term.</p><p>On Russian state television in November 2020, days after Trump&#8217;s election loss, nationalist commentator Vladimir Zhirinovsky <a href="https://america2.news/the-russian-roots-of-trumps-venezuela-and-greenland-operations/">articulated the offer explicitly</a>: &#8220;He will take Venezuela, we will take Ukraine. And he will say to everyone: Look&#8212;Venezuela. Tomorrow I will take Cuba. I would help him... If we need Trump, then let&#8217;s help him.&#8221;</p><p>Bolton resigned in September 2019 after repeated clashes with Trump over Russia policy. In August 2025, FBI agents raided Bolton&#8217;s home. He was <a href="https://www.cnn.com/2025/10/16/politics/read-john-bolton-full-indictment">indicted in October 2025</a> on 18 counts related to classified information in his memoir that documented these incidents. The man who blocked Russia&#8217;s Monroe Doctrine offers is now facing prosecution. The man who made those offers is executing them.</p><p>This reframes the Thiel network&#8217;s charter city interests not as the origin of the strategy but as opportunistic alignment with it. Putin provides the geopolitical logic. Silicon Valley provides the economic model for what comes after. The destination is the same: American withdrawal from the international order, territorial expansion in the Western Hemisphere, and corporate governance in the vacuum.</p><p>As Troy concludes: &#8220;NATO, the United Nations, and the European Union will all be challenged if the US continues on this hemispheric romp.&#8221;</p><h3>The Through-Line</h3><p>This is the thread connecting Venezuela, Cuba, Greenland, and potentially UN headquarters: weaponization of U.S. power to create &#8220;inflection points&#8221; where desperate governments or displaced institutions cede territory to corporate governance projects.</p><p>The pattern is consistent: create crisis, force institutional collapse, establish private governance in the vacuum. The actors overlap. The funding sources overlap. The ideology is explicit.</p><p>This is not speculative fiction. The legal infrastructure exists. The ideological framework exists. The operational prototype exists. The political access exists. The Venezuela precedent demonstrates willingness to convert regime change into corporate territorial control.</p><h2>A Historical Warning</h2><p>The current crisis invites comparison to the most consequential failure of international organization in modern history: the <a href="https://history.state.gov/milestones/1914-1920/league">League of Nations</a>.</p><p>The League was Woodrow Wilson&#8217;s brainchild, the centerpiece of his Fourteen Points for peace after World War I. But the United States never joined. Despite Wilson&#8217;s advocacy, including a speaking tour that contributed to his incapacitating stroke, the Senate refused ratification. Republican Senator Henry Cabot Lodge led opposition, arguing League membership would entangle America in foreign conflicts.</p><p>Without its most powerful potential member, the League was <a href="https://www.nationalgeographic.com/history/article/league-nations-doomed-before-began">set to fail from its inception</a>. Its failures accumulated: Japan invaded Manchuria in 1931, the League condemned it, Japan withdrew and kept Manchuria. Italy invaded Ethiopia in 1935; limited sanctions proved ineffective. Hitler remilitarized the Rhineland, annexed Austria, dismembered Czechoslovakia. The League proved impotent.</p><p><strong>By 1939, the <a href="https://www.historyonthenet.com/why-did-the-league-of-nations-fail">League was irrelevant</a>.</strong> <strong>World War II killed an estimated 70-85 million people.</strong> </p><p>The United Nations was explicitly designed to avoid these failures. It gave major powers permanent Security Council seats with veto authority, ensuring continued participation. It established assessed contributions as legal obligations. Most importantly, the United States joined, and for 80 years remained committed.</p><p>The parallels are uncomfortable. Then as now, American critics argued international organization constrained national sovereignty. Then as now, isolationists promised withdrawal would free America from costly obligations. Then as now, absence of American leadership created vacuums aggressive powers exploited.</p><p>The lesson is not that international organizations always succeed. It is that their failure carries catastrophic consequences.</p><h2>The Trust Deficit</h2><p>Even if a future administration attempts to reverse withdrawals and resume funding, the credibility collapse may prove irreversible. Developing countries have now experienced two full cycles of U.S. withdrawal-reengagement-rewithdrawal: Trump 1.0 withdrew from Paris, WHO, and UNESCO. Biden rejoined. Trump 2.0 withdrew again, far more comprehensively.</p><p><strong>No rational actor will structure long-term planning around American commitments after this pattern.</strong> Countries will not build energy transitions around U.S. climate commitments. Allies question NATO reliability if the U.S. won&#8217;t honor UN Charter obligations. Aid recipients diversify toward Chinese, European, and Gulf alternatives. Trading partners negotiate frameworks designed to function without U.S. participation.</p><p>The League of Nations&#8217; inability to function after major power withdrawal led to World War II. The difference this time: China stands ready to lead a post-American international order. Not to destroy the UN, but to remake it in Beijing&#8217;s image.</p><h2>Probability Assessment</h2><p><strong>How likely is any of this? Unlikely, but no longer absurd.</strong></p><p>The chain of events faces obstacles at each stage. Most probable outcome: the UN stays put, operates under financial strain, and the headquarters question remains theoretical.</p><p>But &#8220;most probable&#8221; isn&#8217;t &#8220;certain.&#8221; A year ago, U.S. forces capturing a sitting head of state and flying him to Brooklyn for arraignment would have seemed like fiction. Now Maduro sits in the Metropolitan Detention Center. The Overton window for what this administration will attempt has shifted dramatically.</p><p><strong>What to watch:</strong> Thiel network figures meeting with State Department or NSC officials. Legislation expanding Opportunity Zone authority. Trump riffing about &#8220;wasted space&#8221; at the UN. Ken Howery&#8217;s confirmation hearing. Quiet property acquisitions near Turtle Bay. Any of these would suggest the scenario is moving from ideological fantasy toward operational planning.</p><h2>Conclusion</h2><p>The UN Secretary-General&#8217;s statement today, while measured in tone, constitutes a sophisticated legal and political counteroffensive. Its goal: establish a firewall around UN operations allowing continued functioning as the U.S. withdraws. Whether this succeeds depends on factors beyond the Secretary-General&#8217;s control: European willingness to increase contributions, Chinese restraint, developing country loyalty to multilateral institutions, and the posture of New York City&#8217;s government.</p><p>The headquarters dimension adds complexity the Trump administration may not have anticipated. The 1947 Agreement creates legal obligations that cannot be abrogated by executive fiat. The mayor who controls the surrounding city has already challenged Trump&#8217;s foreign policy on legal grounds. And waiting in the wings are Silicon Valley ideologues with blueprints for converting institutional collapse into corporate territorial control.</p><p>International law lacks effective enforcement mechanisms against powerful states. The United States can violate treaty obligations with impunity. But domestic political resistance from courts, Congress, states, or cities can provide constraints international institutions cannot. The strange truth emerging from this crisis: the international legal order&#8217;s survival may depend less on international law itself than on subnational actors within powerful states who refuse to comply with federal abandonment of treaty obligations. A 34-year-old democratic socialist immigrant from Uganda may matter more to the UN&#8217;s physical survival than the Security Council.</p><p>The liberal international order constructed after 1945 provided frameworks that prevented major power war for eight decades, lifted billions from poverty, and facilitated unprecedented prosperity. <strong>That order is now in its death throes.</strong></p><p>The question is what replaces it: a Chinese-centric order with the UN as instrument, a fractured world of competing blocs unable to cooperate on existential challenges, or a network of corporate enclaves where the billionaires who helped destroy multilateralism profit from its ruins.</p><p>The League of Nations collapsed because its most powerful potential member refused to join. The United Nations may collapse because its most powerful founding member decided to leave. America, having learned from the League&#8217;s failure that international institutions require great power commitment, is now teaching the world that American commitments cannot be trusted.</p><p><strong>The contest is joined.</strong> On one side: the Secretary-General, developing countries clinging to multilateral frameworks, European allies torn between Atlantic partnership and institutional preservation, and a democratic socialist mayor who may or may not choose to fight. On the other: a president determined to destroy what he sees as constraints on sovereignty, a Congress aligned with withdrawal, and an ideological movement viewing democratic governance itself as obsolete.</p><p><strong>The stakes could not be higher.</strong> The battle will be fought not only in diplomatic forums but on 17 acres of Manhattan real estate representing either the enduring promise of international law or its final grave.</p><div><hr></div><p><em>This publication operates on reader subscriptions. If this analysis demonstrated value, please consider becoming a paid subscriber to help my research reach more readers.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=183953604&quot;,&quot;text&quot;:&quot;Get 25% off for 1 year&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=183953604"><span>Get 25% off for 1 year</span></a></p>]]></content:encoded></item><item><title><![CDATA[The Psychological Costs of America’s Exit]]></title><description><![CDATA[Musings On The High Price of Walking Away]]></description><link>https://www.hackingbutlegal.com/p/the-psychological-costs-of-americas</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/the-psychological-costs-of-americas</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Thu, 08 Jan 2026 06:08:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YCII!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YCII!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YCII!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png 424w, https://substackcdn.com/image/fetch/$s_!YCII!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png 848w, https://substackcdn.com/image/fetch/$s_!YCII!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png 1272w, https://substackcdn.com/image/fetch/$s_!YCII!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YCII!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png" width="1456" height="1684" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1684,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2027706,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/183877405?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YCII!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png 424w, https://substackcdn.com/image/fetch/$s_!YCII!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png 848w, https://substackcdn.com/image/fetch/$s_!YCII!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png 1272w, https://substackcdn.com/image/fetch/$s_!YCII!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf3336b-a74d-48b4-a172-3138cd08df40_1484x1716.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Watching woman die &#8216;will change my life forever,&#8217; neighbor says. Source: <a href="https://www.hackingbutlegal.com/p/america-exits-66-international-organizations">NBC News</a></figcaption></figure></div><p>Trump&#8217;s <a href="https://apnews.com/article/united-nations-trump-international-organizations-withdrawal-d704fb9b444dc9cf569865d391b544a6">January 7 withdrawals</a> didn&#8217;t just suddenly redraw lines on global organizational charts; they also began to redraw the mental map inside the United States. The same moves that weaken international institutions and empower rival powers abroad are being sold to the American public through a steady diet of fear, militarized spectacle, and controlled information, reshaping what citizens understand &#8220;security,&#8221; &#8220;patriotism,&#8221; and &#8220;normal politics&#8221; to mean. </p><p>This second part follows that domestic arc: from the machinery of fear that casts multilateralism itself as a conspiracy, through the hyper&#8209;militarization of everyday governance and the hollowing&#8209;out of independent media, to a self&#8209;reinforcing feedback loop in which anxious citizens, emboldened executives, and sidelined institutions steadily normalize more coercive, less democratic foreign and domestic policy.</p><div><hr></div><p><em><strong>This essay is the second part of a two&#8209;part analysis of President Trump&#8217;s January 7, 2026 withdrawal from 66 international organizations. </strong></em></p><p><em><strong>Part One, &#8220;<a href="https://www.hackingbutlegal.com/p/america-exits-66-international-organizations">America Exits 66 International Organizations</a>,&#8221; examines the institutional and geopolitical consequences abroad; this installment traces the domestic psychological, media, and coercive dynamics that help make that retreat possible and sustainable.</strong></em></p><div><hr></div><h2>The Psychological Toll on the American People</h2><p>The withdrawals are not just about institutions abroad, but also about reshaping how Americans think and feel at home, using fear of &#8220;globalist&#8221; enemies to justify isolation and control. Months of rhetoric casting multilateral bodies as conspiratorial threats have worked to heighten anxiety, normalize permanent emergency, and make citizens more willing to trade civil liberties and openness for the promise of protection by subtly rewiring expectations of what &#8220;security&#8221; and &#8220;patriotism&#8221; mean. </p><p>These trends are not uncontested. State and local governments, independent journalists, civil society groups, and some courts continue to resist authoritarian drift and defend pluralistic norms, creating pockets of resilience that complicate any simple story of linear democratic collapse.</p><h3>I. The Machinery of Fear</h3><p><strong>The January 7th withdrawals do not occur in isolation.</strong> They are the latest culmination of a months-long rhetorical campaign designed to reframe international cooperation as threat and foreign institutions as enemies. Since the third quarter of 2025, administration officials have increasingly deployed language <a href="https://www.state.gov/releases/office-of-the-spokesperson/2026/01/withdrawal-from-wasteful-ineffective-or-harmful-international-organizations">characterizing</a> multilateral organizations as a &#8220;sprawling architecture of global governance&#8221; dominated by &#8220;progressive ideology,&#8221; advancing a &#8220;globalist project&#8221; that &#8220;actively seeks to constrain American sovereignty.&#8221; The State Department&#8217;s <a href="https://www.state.gov/releases/office-of-the-spokesperson/2026/01/withdrawal-from-wasteful-ineffective-or-harmful-international-organizations">description</a> of a &#8220;multilateral NGO-plex&#8221; employs the linguistic architecture of conspiracy: shadowy networks, elite capture, ideological infiltration.</p><p><strong>This rhetoric serves a psychological function beyond policy justification.</strong> Research in political psychology demonstrates that <a href="https://www.nature.com/articles/s44159-023-00161-4">fear-based messaging</a> activates authoritarian predispositions, increasing citizens&#8217; willingness to trade civil liberties for perceived protection. When authorities frame issues through a lens of national security and existential threat, populations become more accepting of extraordinary measures. The administration&#8217;s framing of routine international cooperation as an attack on American sovereignty exploits this dynamic, manufacturing threat where none exists.</p><p><strong>The past 90 days have witnessed an acceleration of this fear-based governance.</strong> The <a href="https://en.wikipedia.org/wiki/2026_United_States_strikes_in_Venezuela">Venezuela operation</a> on January 3rd in which the Trump administration bombed a sovereign nation&#8217;s capital, capturing its president, and declared the United States would &#8220;run&#8221; the country, demonstrated an active interest in translating rhetorical aggression into highly visible kinetic action.</p><p>Defense Secretary Hegseth&#8217;s framing of the invasion as accessing &#8220;a<a href="https://www.nbcnews.com/world/latin-america/live-blog/venezuela-explosions-trump-maduro-live-updates-rcna251053">dditional wealth and resources</a>&#8221; without &#8220;American blood&#8221; came amid rapidly escalating casualty estimates: a senior Venezuelan official told the New York Times that at least 40 people, including civilians and soldiers, had been killed, with subsequent reports raising the toll to around 80 dead. That framing normalizes imperial extraction as foreign policy. When the President threatens Mexico as &#8220;<a href="https://www.npr.org/2026/01/03/nx-s1-5665659/venezuela-us-strikes-maduro">run by drug cartels</a>&#8221; requiring that &#8220;something is gonna have to be done,&#8221; Americans internalize that their government views military action against neighbors as routine and even desirable.</p><p><strong>Fear&#8209;based politics is not entirely new in the United States.</strong> From McCarthyism&#8217;s anti&#8209;communist purges to the &#8220;War on Terror&#8221; era&#8217;s color&#8209;coded threat alerts and PATRIOT Act surveillance, elites have repeatedly used security rhetoric to expand executive power and constrict dissent. What distinguishes the current moment is the fusion of that repertoire with an explicit retreat from multilateralism and an open attack on the very institutions that once constrained such overreach, both at home and abroad.</p><h3>II. Domestic Militarization and the Normalization of Violence</h3><p><strong>The psychological impact extends beyond foreign policy.</strong> Throughout 2025, Americans witnessed the <a href="https://www.americanimmigrationcouncil.org/report/mass-deportation-trump-democracy/">militarization of immigration enforcement</a> at unprecedented scale. The $170.1 billion allocated to enforcement under the &#8220;One Big Beautiful Bill Act&#8221; made ICE the highest-funded federal law enforcement agency in history, funded at levels exceeding some foreign militaries. Military-style raids on apartment complexes, <a href="https://www.npr.org/2025/11/03/nx-s1-5593112/national-guard-mass-deportations-trump-2026">National Guard deployments</a> to Democratic-led cities, drone surveillance in urban areas, and the designation of border regions as military zones have habituated Americans to armed federal presence in civilian life.</p><p>The <a href="https://www.lemkininstitute.com/items-5/trump-administration%E2%80%99s-mass-deportation-operations:-update-october-2025">Lemkin Institute</a>, which monitors genocide risk globally, documented &#8220;hyper-militarized mass deportation operations&#8221; involving Black Hawk helicopters, armored vehicles, and agents from multiple federal agencies conducting pre-dawn raids. Videos of agents smashing car windows, tackling mothers, and deploying tear gas against peaceful protesters circulated on social media, images the White House amplified through its own channels by posting photographs of shackled deportees and &#8220;perp walk&#8221; footage. This publicity campaign, described by commentators as coming close to &#8220;<a href="https://en.wikipedia.org/wiki/Deportation_in_the_second_Trump_administration">glorifying violence and rough justice</a>,&#8221; was run by political appointees in their twenties and received criticism for promoting imagery associated with <a href="https://time.com/7326233/trump-remigrate-homeland-security/">white nationalism and &#8220;remigration&#8221; ideology</a>, a term with <a href="https://www.npr.org/2025/12/08/nx-s1-5637253/trump-administration-urges-remigration-borrowing-white-nationalist-language">documented ties to ethnic cleansing movements</a> in Europe.</p><p><strong>The psychological literature on authoritarianism identifies this pattern precisely.</strong> When governments deliberately display state violence against designated out-groups, they achieve multiple objectives: demonstrating power, defining who belongs and who does not, and habituating the majority population to accept escalating coercion as normal. Each raid that proceeds without consequence expands the boundaries of acceptable state action.</p><h3>III. Information Control and Epistemic Isolation</h3><p><strong>Simultaneously, the administration has <a href="https://www.poynter.org/reporting-editing/2025/project-2025-actions-against-press/">systematically dismantled</a> independent information sources.</strong> Two days ago, the <a href="https://www.nbcnews.com/politics/trump-administration/corporation-public-broadcasting-officially-shutting-months-gop-funding-rcna252443">Corporation for Public Broadcasting</a> formally dissolved after 58 years, its board voting to shut down rather than allow the organization to &#8220;remain defunded and vulnerable to additional attacks.&#8221; Congress rescinded over $1 billion in funding last summer, and the FY 2026 appropriations bill excluded CPB funding for the first time since 1967. </p><p>The consequences have cascaded through local journalism: New Jersey PBS will cease operations in 2026, GBH in Boston paused production of American Experience, WQED in Pittsburgh laid off 35% of its staff, and stations from Indiana to Wisconsin have eliminated reporting teams and emergency broadcast capabilities. <strong>The infrastructure that delivered trusted local news, educational programming, and emergency alerts to rural and underserved communities is collapsing.</strong></p><p>The assault on broadcast journalism extends to commercial media. In October 2025, Paramount Skydance <a href="https://firstamendment.mtsu.edu/post/bari-weiss-is-new-editor-in-chief-of-cbs-news-after-paramount-buys-her-website/">installed Bari Weiss</a> as editor-in-chief of CBS News after acquiring her website The Free Press for $150 million. Weiss, who built her career attacking &#8220;woke&#8221; culture and has no broadcast television experience, immediately began reshaping coverage at the network of Walter Cronkite and 60 Minutes. In December, she <a href="https://www.cnn.com/2025/12/22/media/bari-weiss-60-minutes-cecot-cbs-alfonsi-ellison">spiked a 60 Minutes segment</a> about Venezuelan men deported to El Salvador&#8217;s notorious CECOT prison hours before airtime, overruling correspondents and standards departments that had cleared the story. Correspondent Sharyn Alfonsi&#8217;s internal memo <a href="https://www.pbs.org/newshour/nation/cbs-editor-in-chief-bari-weiss-pulls-60-minutes-piece-on-trump-deportation-policy-hours-before-air">warned</a> that &#8220;the public will correctly identify this as corporate censorship.&#8221; Staff have threatened to quit. <strong>The pattern is clear: critical coverage of administration actions faces interference at the editorial level.</strong></p><p>Meanwhile, the administration has <a href="https://www.npr.org/2025/06/06/nx-s1-5424581/voa-job-cuts-kari-lake">attempted to destroy Voice of America</a>, <a href="https://nsarchive.gwu.edu/briefing-book/climate-change-transparency-project-foia/2025-02-06/disappearing-data-trump">purged government databases</a> of <a href="https://www.npr.org/2025/08/08/nx-s1-5495338/climate-change-environment-websites-trump">climate</a> and <a href="https://insideclimatenews.org/news/04022025/todays-climate-trump-climate-data-purge-archive/">health information</a>, fired scientists producing congressionally mandated assessments, and launched the taxpayer-funded &#8220;<a href="https://www.axios.com/2025/04/30/trump-white-house-drudge-style-website-launch">White House Wire</a>&#8221; as what critics call a &#8220;<a href="https://rsf.org/en/usa-trump-cuts-public-media-uses-taxpayer-funds-propaganda-instead">propaganda outlet</a>.&#8221; When the FCC <a href="https://www.npr.org/2025/08/25/nx-s1-5515480/fcc-abc-nbc-reviews">investigates news organizations</a> for coverage the President dislikes, when reporters are <a href="https://www.npr.org/2025/04/08/nx-s1-5342369/ap-white-house-court-ruling-oval-office-gulf-of-mexico-america">barred from the Oval Office</a> for refusing to adopt state-mandated terminology, when the administration <a href="https://www.npr.org/2025/09/16/nx-s1-5543030/donald-trump-nytimes-lawsuit">sues journalists</a> and <a href="https://www.npr.org/2025/03/22/nx-s1-5337218/trump-revokes-security-clearances-biden-clinton">revokes security clearances</a> of former officials who speak publicly, these actions create chilling effects that extend far beyond their immediate targets.</p><p><strong>The withdrawal from 66 international organizations compounds this epistemic isolation.</strong> Americans will no longer benefit from <a href="https://www.noaa.gov/stories/ipcc-climate-change-2022-impacts-report-why-it-matters">IPCC climate assessments</a> that have long <a href="https://www.ucs.org/resources/ipcc-who-are-they">informed domestic policy</a>, from <a href="https://www.unfpa.org/data/world-population-dashboard">UNFPA data</a> on global health trends, from UNCTAD analysis of trade dynamics affecting American workers, or from the <a href="https://www.idea.int/theme/democracy-assessment">democracy monitoring</a> that International IDEA provides to help <a href="https://www.idea.int/sites/default/files/publications/chapters/assessing-the-quality-of-democracy/assessing-the-quality-of-democracy-an-overview-of-the-international-idea-framework.pdf">citizens evaluate their governments</a>. The organizations being abandoned are not merely diplomatic conveniences; they are sources of independent information that enable citizens to evaluate their government's claims. Their elimination leaves Americans more dependent on official narratives they have fewer tools to verify.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>This is a 100% reader-supported publication.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h3>IV. Fear, Militarization, and the Foreign Policy Feedback Loop</h3><p><strong>The withdrawals and accompanying rhetoric do not just reflect foreign&#8209;policy choices; they actively reshape the domestic psychology that will govern future choices.</strong> Fear&#8209;based messaging about &#8220;globalist&#8221; enemies, migrant &#8220;invasions,&#8221; and neighboring states &#8220;run by cartels&#8221; constructs a sense of permanent siege, blurring the line between routine politics and existential emergency. This is consistent with political&#8209;psychology work showing that threat framing increases willingness to trade civil liberties for security; for instance, research published in the <a href="https://www.uvm.edu/~dguber/POLS234/articles/huddy.pdf">American Journal of Political Science</a> demonstrates that perceived national threats significantly bolster support for punitive surveillance and restricted dissent. Experimental and comparative studies of fear appeals and authoritarian predispositions find that when people perceive threats as real and proximate, especially when elites frame them as national&#8209;security challenges, they become more supportive of strong leaders and restrictive policies, a phenomenon detailed in <a href="https://www.psychologytoday.com/us/blog/psych-unseen/202404/why-do-people-choose-authoritarianism-over-democracy">Psychology Today&#8217;s analysis of authoritarian appeal</a>.</p><p><strong>Militarized spectacle then embeds this mindset in daily life.</strong> Hyper&#8209;militarized immigration and policing operations&#8212;raids using helicopters, drones, armored vehicles, and tactical teams&#8212;create the lived impression that society is under siege and that military&#8209;style force is the normal instrument for managing social problems. The ACLU&#8217;s landmark report, <a href="https://www.google.com/search?q=https://www.aclu.org/report/war-comes-home-excessive-militarization-american-policing">War Comes Home: The Excessive Militarization of American Policing</a>, documents how these paramilitary tactics shift the public&#8217;s perception of their own neighborhoods into &#8220;war zones.&#8221; Public opinion research on support for the use of force shows that when interventions are framed as responses to &#8220;national security&#8221; threats, backing for coercive tools is significantly higher than when motivations are purely humanitarian or economic. <strong>Each unpunished display of state violence against designated out&#8209;groups tends to widen the boundary of acceptable coercion,</strong> <strong>making more aggressive external action easier to justify and even politically rewarding as a demonstration of &#8220;toughness.&#8221;</strong></p><p>Inside the state, this psychological and political environment shifts incentives and narrows the menu of live options. Agencies and officials who deliver visible kinetic &#8220;wins&#8221; gain resources and prestige, while those arguing for multilateral cooperation or restraint are more easily sidelined as na&#239;ve or disloyal. As noted by the <a href="https://carnegieendowment.org/posts/2020/10/the-militarization-of-us-politics?lang=en">Carnegie Endowment for International Peace</a>, this produces a selection bias in favor of unilateral, hard&#8209;power solutions&#8212;from airstrikes and punitive raids to expansive enforcement and sanctions. This &#8220;militarization of foreign policy,&#8221; further explored by <a href="https://ncafp.org/2016/wp-content/uploads/2013/02/amb-eikenberry-mil-usfp.pdf">former Ambassador Karl Eikenberry</a>, suggests that over-reliance on the military organ of the state erodes diplomatic capacity. Each new operation then generates images of chaos and backlash abroad that can be fed back into domestic narratives as proof that enemies are everywhere and only further force will suffice. In this way, fear&#8209;based messaging, domestic militarization, and aggressive foreign policy form a self&#8209;reinforcing feedback loop that, over time, can steadily marginalize cooperative, law&#8209;bound approaches to international order.</p><h3>V. The Psychology of Siege</h3><p>Research on <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC9983523/">authoritarian governance</a> identifies a characteristic psychological syndrome: citizens experiencing persistent threat develop chronic anxiety, hypervigilance, and self-censorship. They narrow their &#8220;circle of compassion&#8221; to immediate in-groups while becoming suspicious of outsiders. They convert fear into anger, an emotion that restores a sense of agency, and direct that anger toward targets designated by authorities. <strong>Over time, this fear can become internalized for many people, affecting decision&#8209;making, dampening civic engagement, and weakening social cohesion, even as others respond with mobilization and resistance.</strong></p><p>The administration's rhetorical pattern exploits these dynamics systematically. </p><p>International organizations become threats serving a &#8220;<a href="https://www.state.gov/releases/office-of-the-spokesperson/2026/01/withdrawal-from-wasteful-ineffective-or-harmful-international-organizations">globalist project</a>&#8221; rooted in &#8220;progressive ideology&#8221; that &#8220;actively seek to constrain American sovereignty.&#8221; Immigrants perpetrate an &#8220;<a href="https://www.propublica.org/article/trump-administration-immigration-invasion-rhetoric-courts">invasion</a>&#8221;&#8212;language deliberately chosen because, as budget director Russell Vought has explained, it &#8220;unlocked&#8221; extraordinary presidential powers under the Constitution. Journalists become &#8220;<a href="https://en.wikipedia.org/wiki/Donald_Trump%27s_conflict_with_the_media">the enemy of the people</a>&#8221; and purveyors of &#8220;<a href="https://time.com/7338411/white-house-media-bias-tracker-trump-attacks/">fake news</a>,&#8221; now tracked on an official White House &#8220;<a href="https://rsf.org/en/usa-new-white-house-hall-shame-webpage-expands-trump-s-war-press-disparaging-media">Media Bias Portal</a>.&#8221; Climate scientists are dismissed as promoters of &#8220;<a href="https://www.deccanchronicle.com/world/americas/trump-pulls-us-out-of-key-un-climate-treaty-global-bodies-1929076">climate orthodoxy</a>&#8221; and &#8220;<a href="https://www.suncommercial.com/brazil_times/news/national/article_4303f6c7-be9c-585e-8b03-408c620243da.html">climate alarmism</a>,&#8221; their assessments characterized as &#8220;<a href="https://www.dailywire.com/news/how-the-trump-administration-changed-the-climate-conversation">junk science</a>.&#8221;</p><p><strong>Each designated enemy justifies expanded state power; each expansion normalizes the next.</strong> The psychological research is unambiguous: populations subjected to sustained threat-based messaging become more accepting of authoritarian measures, more hostile to out-groups, and less capable of collective action to protect democratic institutions.</p><h3>VI. Human Rights Erosion and Its Witnesses</h3><p><strong>The human rights infrastructure being dismantled served functions beyond its overseas beneficiaries.</strong> When the United States participated in UN Women, the Freedom Online Coalition, and the various mechanisms protecting children in armed conflict, these commitments established normative boundaries that constrained domestic policy as well. Withdrawal signals that these norms no longer bind American conduct, a message received by both foreign and domestic audiences.</p><p>Americans watching their government abandon organizations protecting women from violence, children from armed conflict, and refugees from persecution absorb lessons about whose suffering matters. The <a href="https://theconversation.com/2026-begins-with-an-increasingly-autocratic-united-states-rising-on-the-global-stage-271670">defunding of the UN Voluntary Fund for Victims of Torture</a>, which the United States funded at 85% of its annual budget since 1998, communicates that torture survivors&#8217; recovery is no longer an American priority. The termination of gender-based violence programming communicates that women&#8217;s safety is expendable. These messages shape what Americans come to expect from their government and what they believe their government owes to anyone.</p><p><strong>The psychological toll compounds across these domains.</strong> Citizens experience their country conducting <a href="https://en.wikipedia.org/wiki/2026_United_States_strikes_in_Venezuela">military strikes that kill civilians abroad</a>&#8212;independent and official estimates <a href="https://en.wikipedia.org/wiki/2026_United_States_strikes_in_Venezuela">suggest</a> that between 40 and roughly 80 people, including civilians and military personnel, were killed in the January 3 Venezuela operation alone, with <a href="https://en.wikipedia.org/wiki/United_States_strikes_on_alleged_drug_traffickers_during_Operation_Southern_Spear">prior strikes on alleged drug vessels</a> killing what governments and families say were <a href="https://en.wikipedia.org/wiki/United_States_strikes_on_alleged_drug_traffickers_during_Operation_Southern_Spear">primarily fishers and civilians</a>. They witness <a href="https://www.npr.org/2025/11/03/nx-s1-5593112/national-guard-mass-deportations-trump-2026">military forces deployed to their own communities</a>, with <a href="https://www.npr.org/2025/05/15/nx-s1-5399656/national-guard-immigration">20,000 National Guard troops requested</a> for <a href="https://www.npr.org/2025/06/06/nx-s1-5425421/dhs-national-guard-immigration-enforcement">deportation operations</a> including &#8220;night operations and rural interdiction&#8221; and &#8220;riot control&#8221; in <a href="https://capitalbnews.org/trump-national-guard-city-updates/">cities across the country</a>&#8212;operations that have resulted in documented <a href="https://lemkininstitute.com/items-5/trump-administration's-mass-deportation-operations:-update-october-2025">human rights violations against both citizens and noncitizens</a>, including today&#8217;s <a href="https://apnews.com/article/minnesota-immigration-enforcement-shooting-crackdown-surge-173e00fa7388054e98c3b5b9417c1e5a">homicide</a> of an unarmed civilian in Minneapolis by Immigration and Customs Enforcement which has already been <a href="https://www.cnn.com/2026/01/07/us/video/minneapolis-woman-fatally-shot-by-ice-witness-video-digvid">viewed</a> by millions of Americans as of the time of this writing.</p><p>They see their government <a href="https://www.npr.org/2025/06/06/nx-s1-5424581/voa-job-cuts-kari-lake">eliminate independent information sources</a> and <a href="https://www.npr.org/2025/02/03/nx-s1-5285696/trump-un-human-rights-council-withdrawal">abandon human rights commitments</a> by <a href="https://www.washingtonpost.com/nation/2025/02/04/united-nations-human-rights-council-unhrc-trump/">withdrawing from the UN Human Rights Council</a> and <a href="https://www.cfr.org/expert-brief/trumps-boycott-uns-human-rights-process-puts-america-last-not-first">boycotting the Universal Periodic Review</a>, all while being told this represents &#8220;<a href="https://www.whitehouse.gov/fact-sheets/2026/01/fact-sheet-president-donald-j-trump-withdraws-the-united-states-from-international-organizations-that-are-contrary-to-the-interests-of-the-united-states/">restoring American sovereignty</a>&#8221; and putting &#8220;America First.&#8221; The cognitive dissonance between democratic self-image and authoritarian reality produces either denial, rationalization, or despair. None of these responses support healthy civic engagement.</p><h3>VII. The Long Shadow</h3><p><strong>Psychological research on post-authoritarian societies documents that <a href="https://www.researchgate.net/publication/389813629_Fear_and_Authoritarianism_Psychological_and_Social_Strategies_for_Maintaining_Power_alkhwf_fy_zl_aldyktatwryt">fear persists</a> long after the conditions that created it change.</strong> Even after regime collapse, populations exhibit chronic anxiety, avoidance behaviors, reduced civic participation, and weakened social trust. The trauma becomes collective, shaping not just individuals but the society&#8217;s capacity for democratic self-governance.</p><p>The United States has not experienced full&#8209;scale authoritarian governance in living memory, and most Americans lack lived experience of overt autocracy, even though communities of color and political dissidents have long confronted state overreach and repression. That uneven history leaves large parts of the population with little preparation for the psychological dynamics now being activated: the fear-based mobilization, the designated enemies, the spectacular displays of state violence, the information control, the abandonment of normative constraints. The <a href="https://www.whitehouse.gov/fact-sheets/2026/01/fact-sheet-president-donald-j-trump-withdraws-the-united-states-from-international-organizations-that-are-contrary-to-the-interests-of-the-united-states/">66 withdrawals announced today</a> via one single executive order accelerate a process already well underway, the psychological reconditioning of the American public to accept as normal what, for many Americans outside directly targeted communities, would have seemed <a href="https://www.hackingbutlegal.com/p/the-case-for-american-genocide-a">unthinkable</a> a year ago.</p><p><strong>The damage extends beyond policy reversibility.</strong> Even if future administrations rejoin these organizations, the psychological impact on Americans who lived through this period, who watched their government bomb foreign capitals, deploy military force against their neighbors, celebrate the detention of families, and systematically dismantle the architecture of international cooperation, will persist. A generation is learning that American power serves extraction rather than cooperation, that international institutions are enemies rather than partners, and that human rights are obstacles rather than principles.</p><p><strong>This is the cost that no policy analysis fully captures:</strong> the reshaping of American civic psychology to accept isolation, aggression, and indifference to suffering as the natural condition of a great power. The international organizations being abandoned today were imperfect institutions, but they embodied a vision of America as a nation that builds rather than destroys, that cooperates rather than dominates, that protects rather than exploits. Their abandonment teaches Americans a different lesson about who they are and who they are becoming.</p><div><hr></div><h2>Conclusion</h2><p>Taken together, these two parts trace a single, integrated transformation: outwardly, a United States that walks away from the architecture of multilateral cooperation and cedes rule&#8209;making space to others; inwardly, a polity conditioned by fear, militarization, and epistemic isolation to accept that retreat as both necessary and virtuous. The withdrawals accelerate the shift from a system in which U.S. influence flowed through institutions, norms, and development to one where power is pursued through naked leverage and episodic displays of force&#8212;precisely as the domestic audience is primed to distrust compromise and regard international law as a threat. This is not an overnight collapse but a path&#8209;dependent choice: each treaty abandoned, each institution defunded, each raid or strike applauded as &#8220;toughness&#8221; makes it harder for future leaders to rebuild credibility, re&#8209;enter cooperative regimes, or persuade citizens that shared rules are a source of strength rather than shackles. Whether this trajectory becomes locked in or can still be reversed will depend less on the next communiqu&#233; from an international body than on how quickly Americans recognize that the real cost of &#8220;America Alone&#8221; is not just diminished influence abroad, but a steadily shrinking horizon of freedom and possibility at home.<br></p><div><hr></div><p><em>This publication operates on reader subscriptions. If your felt this analysis was valuable, please consider becoming a paid subscriber to help my research reach more people.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=183857540&quot;,&quot;text&quot;:&quot;Get 25% off for 1 year&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=183857540"><span>Get 25% off for 1 year</span></a></p>]]></content:encoded></item><item><title><![CDATA[America Exits 66 International Organizations]]></title><description><![CDATA[Retreat Has Consequences. What Happens Next?]]></description><link>https://www.hackingbutlegal.com/p/america-exits-66-international-organizations</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/america-exits-66-international-organizations</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Thu, 08 Jan 2026 05:38:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0MEn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today, January 7, 2026, President Donald Trump signed a <a href="https://www.whitehouse.gov/presidential-actions/2026/01/withdrawing-the-united-states-from-international-organizations-conventions-and-treaties-that-are-contrary-to-the-interests-of-the-united-states/">presidential memorandum</a> directing the withdrawal of the United States from 66 international organizations&#8212;35 non-UN entities and 31 UN-affiliated bodies.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://apnews.com/article/united-nations-trump-international-organizations-withdrawal-d704fb9b444dc9cf569865d391b544a6https://earth.org/trump-pulls-us-out-of-key-global-climate-assessment-ahead-of-meeting-in-china/https://www.iucnredlist.orghttps://academic.oup.com/ejil/article/25/2/579/406221" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0MEn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png 424w, https://substackcdn.com/image/fetch/$s_!0MEn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png 848w, https://substackcdn.com/image/fetch/$s_!0MEn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png 1272w, https://substackcdn.com/image/fetch/$s_!0MEn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0MEn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png" width="724" height="813.0082417582418" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1635,&quot;width&quot;:1456,&quot;resizeWidth&quot;:724,&quot;bytes&quot;:2342613,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://apnews.com/article/united-nations-trump-international-organizations-withdrawal-d704fb9b444dc9cf569865d391b544a6https://earth.org/trump-pulls-us-out-of-key-global-climate-assessment-ahead-of-meeting-in-china/https://www.iucnredlist.orghttps://academic.oup.com/ejil/article/25/2/579/406221&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/183857540?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0MEn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png 424w, https://substackcdn.com/image/fetch/$s_!0MEn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png 848w, https://substackcdn.com/image/fetch/$s_!0MEn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png 1272w, https://substackcdn.com/image/fetch/$s_!0MEn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda09a6e2-3e60-4b3b-8355-708279c5d3e3_1694x1902.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://apnews.com/article/united-nations-trump-international-organizations-withdrawal-d704fb9b444dc9cf569865d391b544a6">AP News</a></figcaption></figure></div><p>This unprecedented action represents the most comprehensive retreat from multilateral cooperation in American history, surpassing even the isolationist period preceding World War II. The <a href="https://www.state.gov/releases/2026/01/withdrawal-from-wasteful-ineffective-or-harmful-international-organizations/">State Department</a> justified these withdrawals by characterizing the organizations as &#8220;redundant, mismanaged, unnecessary, wasteful, poorly run, captured by interests advancing agendas contrary to our own, or a threat to our nation&#8217;s sovereignty, freedoms, and general prosperity.&#8221;</p><p><strong>The scale and scope of this withdrawal fundamentally reshapes America&#8217;s role in global governance, with profound implications across climate policy, democratic institutions, development assistance, and international security.</strong></p><p>This analysis examines the likely short-term (0-2 years), medium-term (2-5 years), and long-term (5+ years) impacts of these withdrawals across their major categories. The scope is limited to today's executive action alone and does not account for the cumulative effects of the administration's broader policy agenda. </p><p>The volume of policy changes enacted in a single day necessitated significant AI assistance in this research.</p><div><hr></div><h4><strong>  Contents</strong></h4><h5><strong>       I. Climate &amp; Environment</strong></h5><h5><strong>       II. Democracy, Rule of Law &amp; Human Rights</strong></h5><h5><strong>       III. Peace, Security &amp; Counterterrorism</strong></h5><h5><strong>       IV. Development &amp; Economic Security</strong></h5><h5><strong>       V. Governance &amp; Administrative Bodies of the UN</strong></h5><h5><strong>       VI. Cross-Cutting Strategic Impacts</strong></h5><h5>              China&#8217;s Ascendancy to Global Leadership</h5><h5>              The &#8220;My Way or the Highway&#8221; Doctrine</h5><h5>              Financial and Economic Consequences</h5><h5>              Credibility Collapse and Alliance Erosion</h5><h5>              The Paradox of Isolationism</h5><h5><strong>        Conclusion: The Reshaping of Global Order</strong></h5><div><hr></div><h2>I. Climate &amp; Environment</h2><p>Climate and environment withdrawals broadcast that climate cooperation is now framed as a sovereignty threat and economic burden, not a security or competitiveness imperative, even though some allies and private actors will still try to keep the U.S. loosely plugged into climate markets and tech flows. </p><p>By walking away from UNFCCC, IPCC, and major clean&#8209;energy and conservation platforms, the administration signals it is comfortable trading away a significant share of scientific leadership and standard&#8209;setting power in the green economy for short&#8209;term fossil and extraction gains, accepting that others will partially fill gaps.</p><h3>Affected Organizations</h3><ul><li><p><em>UN Framework Convention on Climate Change (<a href="https://unfccc.int/process-and-meetings/what-is-the-united-nations-framework-convention-on-climate-change">UNFCCC</a>)</em></p></li><li><p><em>Intergovernmental Panel on Climate Change (<a href="https://www.ipcc.ch/">IPCC</a>)</em></p></li><li><p><em>International Renewable Energy Agency (<a href="https://www.irena.org/">IRENA</a>)</em></p></li><li><p><em>International Solar Alliance</em></p></li><li><p><em>International Union for Conservation of Nature (<a href="https://www.iucn.org/">IUCN</a>)</em></p></li><li><p><em>24/7 Carbon-Free Energy Compact</em></p></li><li><p><em>Renewable Energy Policy Network for the 21st Century</em></p></li><li><p><em>Commission for Environmental Cooperation</em></p></li><li><p><em>Inter-American Institute for Global Change Research</em></p></li><li><p><em>International Tropical Timber Organization</em></p></li><li><p><em>Secretariat of the Pacific Regional Environment Programme</em></p></li></ul><h3>Short-Term Impact (0-2 years)</h3><p>The withdrawal from UNFCCC, the 1992 foundational treaty ratified by the U.S. Senate, isolates America as the only nation outside this framework governing climate negotiations among <a href="https://unfccc.int/process-and-meetings/parties-non-party-stakeholders/parties/party-and-observer-states">198 countries</a>. This creates immediate diplomatic fallout and eliminates U.S. influence over trillions of dollars in global climate investments and policies. The exit from IPCC silences American climate scientists from the world&#8217;s authoritative climate assessment body, with federal researchers at NOAA, NASA, and the U.S. Global Change Research Program barred from participating in the <a href="https://www.ipcc.ch/assessment-report/ar7/">2029 assessment report</a>.</p><p>Financial disruptions cascade immediately. The U.S. previously contributed substantial voluntary funding to climate mechanisms, and its sudden withdrawal leaves funding gaps for climate adaptation projects in vulnerable developing nations. Research collaborations halt abruptly: IUCN&#8217;s <a href="https://www.iucnredlist.org/">Red List</a> assessments tracking over 45,000 threatened species lose American biodiversity data and expertise. The <a href="https://www.seforall.org/programmes/un-energy/energy-compacts/247-carbon-free-energy-compact">24/7 Carbon-Free Energy Compact</a> and renewable energy networks lose their largest technological and financial contributor.</p><p>Diplomatic credibility is suffering acutely. Former Biden climate adviser <a href="https://www.nbcnews.com/world/north-america/us-will-exit-66-international-organizations-retreats-global-cooperatio-rcna252914">Gina McCarthy</a> characterized these moves as &#8220;shortsighted, embarrassing, and foolish,&#8221; warning that the U.S. surrenders its ability to shape &#8220;trillions of dollars in investments and policies&#8221; while remaining exposed to worsening climate disasters. International allies express dismay, with <a href="https://x.com/jrockstrom/status/1892881887556698459">Johan Rockstr&#246;m</a> of Germany&#8217;s influential <a href="https://www.pik-potsdam.de/en/home">Potsdam Institute</a> calling it &#8220;irresponsible self-destructive US behaviour that will damage US science and society.&#8221;</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/jrockstrom/status/1892881887556698459&quot;,&quot;full_text&quot;:&quot;More on US pulling out of IPCC. Whatever Trump thinks of climate change or climate policy, pulling out of the most authoritative source on risks, impacts and pathways, will damage US science and society.  <a class=\&quot;tweet-url\&quot; href=\&quot;https://www.axios.com/2025/02/20/us-delegation-pulled-climate-science-meeting\&quot;>axios.com/2025/02/20/us-&#8230;</a>&quot;,&quot;username&quot;:&quot;jrockstrom&quot;,&quot;name&quot;:&quot;Johan Rockstr&#246;m&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1118592687538606081/EK4TRrvN_normal.png&quot;,&quot;date&quot;:&quot;2025-02-21T10:19:44.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:21,&quot;retweet_count&quot;:93,&quot;like_count&quot;:184,&quot;impression_count&quot;:10559,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><h3>Medium-Term Impact (2-5 years)</h3><p>China consolidates climate leadership during this vacuum. Already the dominant supplier of solar panels, wind turbines, and batteries (with solar power costs down <a href="https://www.irena.org/Publications/2024/Sep/Renewable-Power-Generation-Costs-in-2023">90% since 2010</a>) China leverages U.S. absence to set global clean energy standards and secure critical mineral supply chains. The Belt and Road Initiative expands aggressively into climate infrastructure, binding developing nations to Chinese technical standards and financing models.</p><p>American clean energy industries face competitive disadvantages. Without participation in international renewable energy agencies and standards bodies, U.S. companies lose influence over emerging technology protocols and miss intelligence on global market trends. The <a href="https://www.eenews.net/articles/doe-to-pull-back-13b-from-clean-energy-projects/">$13 billion cancellation</a> of U.S. clean energy funding compounds domestic technological stagnation.</p><p>Scientific capacity degrades. The exclusion of U.S. federal scientists from IPCC work diminishes America&#8217;s climate research reputation globally. As Northern Arizona University researcher <a href="https://insideclimatenews.org/news/15032025/us-ipcc-scientific-authors-climate-report/">Kevin Gurney</a> warns, &#8220;I worry about what this says to young scientists who may feel underappreciated, or worse, that they are almost viewed as unwanted, that science is no longer a wanted endeavor.&#8221; Brain drain accelerates as leading climate scientists seek opportunities abroad or leave the field entirely.</p><p>The U.S. experiences increasing climate vulnerability without international coordination mechanisms. As extreme weather intensifies (droughts, wildfires, hurricanes, floods, etc.) America lacks access to international early warning systems, climate adaptation best practices, and coordinated disaster response that these organizations facilitate.</p><h3>Long-Term Impact (5+ years)</h3><p>The U.S. permanently cedes climate leadership to China, which by 2040 will have comprehensively reshaped the global clean energy economy in its image. Chinese technical standards, financing mechanisms, and diplomatic frameworks govern the multi-trillion-dollar energy transition, locking in advantages for decades. American influence in climate negotiations (critical for protecting U.S. economic and security interests!) becomes marginal.</p><p>Economic costs multiply. U.S. firms face discriminatory treatment in international clean energy markets, excluded from projects financed through mechanisms the U.S. no longer influences. Tariffs and non-tariff barriers target American clean tech exports as retaliation for climate isolationism. The International Energy Agency estimates the global clean energy market will exceed <a href="https://www.iea.org/news/global-market-for-key-clean-technologies-set-to-triple-to-more-than-2-trillion-over-the-coming-decade-as-energy-transitions-advance">$2 trillion annually by 2035</a>&#8212;American companies&#8217; market share contracts sharply.</p><p>Climate change impacts intensify domestically while international cooperation mechanisms remain inaccessible. Without participation in global climate adaptation networks, American communities replicate expensive solutions already solved elsewhere. Agricultural disruptions, water scarcity, and climate-driven migration from Central America strain U.S. resources without the buffering capacity international cooperation provides.</p><p>Geopolitical realignment becomes permanent. The European Union, despite limited capacity, attempts to fill gaps alongside China, but lacks resources to prevent fragmentation of the global climate regime. A two-track system emerges: a China-led developing world bloc and a weakened Western coalition, with the U.S. as an outlier threatening the viability of both.</p><div><hr></div><h2>II. Democracy, Rule of Law &amp; Human Rights</h2><p>Democracy, rule of law, and human rights withdrawals announce that liberal norms have been visibly demoted from identity to convenience, even if some U.S. rhetoric and bilateral programs persist. </p><p>Exiting IDEA, the Venice Commission, UN Women, and related bodies tells the world that election integrity, independent courts, and gender equality are now negotiable chips rather than consistent red lines, raising the odds that authoritarian models and digital repression spread in borderline cases where external support once made a difference.</p><h3>Affected Organizations</h3><ul><li><p><em>Venice Commission (<a href="https://www.venice.coe.int/">Council of Europe</a>)</em></p></li><li><p><em>International Institute for Democracy and Electoral Assistance (<a href="https://www.idea.int/">International IDEA</a>)</em></p></li><li><p><em>Freedom Online Coalition</em></p></li><li><p><em>International Institute for Justice and the Rule of Law</em></p></li><li><p><em>International Development Law Organization</em></p></li><li><p><em>UN Alliance of Civilizations</em></p></li><li><p><em>UN Democracy Fund</em></p></li><li><p><em>UN Entity for Gender Equality and Empowerment of Women (UN Women)</em></p></li><li><p><em>Office of Special Representatives (Children in Armed Conflict, Sexual Violence in Conflict, Violence Against Children)</em></p></li><li><p><em>Permanent Forum on People of African Descent</em></p></li></ul><h3>Short-Term Impact (0-2 years)</h3><p>U.S. withdrawal devastates democracy assistance infrastructure globally. International IDEA, an intergovernmental organization with 35 member states supporting electoral processes and democratic institutions worldwide, loses its largest financial backer and most influential member. The organization&#8217;s capacity to monitor elections, provide technical assistance to emerging democracies, and develop democratic norms contracts immediately. The 2026 electoral calendar, which marks critical elections in multiple fragile democracies, proceeds with diminished international observation and support.</p><p>The Venice Commission, the Council of Europe&#8217;s constitutional advisory body that has guided democratic transitions across Eastern Europe and beyond, loses American expertise and resources. Countries seeking constitutional reform and rule of law strengthening, particularly in the Western Balkans, Eastern Europe, and former Soviet states, face weakened international support structures precisely when Russian and Chinese authoritarian influence expands.</p><p>The <a href="https://freedomonlinecoalition.com/">Freedom Online Coalition</a>, comprising 40 democracies coordinating responses to internet censorship, surveillance, and digital authoritarianism, fractures without U.S. leadership. This coalition has issued joint statements condemning internet shutdowns, coordinated diplomatic responses to digital rights violations, and supported digital activists through the Digital Defenders Partnership. American withdrawal creates immediate operational confusion and signals to authoritarian regimes that the costs of internet repression have diminished.</p><p>UN Women loses substantial U.S. funding as part of the broader <a href="https://www.womensrefugeecommission.org/wp-content/uploads/2025/06/How-US-Aid-Cuts-Are-Threatening-GBV-Prevention-and-Response.pdf">$400 million termination</a> of gender-based violence programming. The immediate impact affects programs supporting women in conflict zones such as Ukraine, Sudan, Syria, Democratic Republic of Congo, Haiti, and Afghanistan, where gender-based violence surges amid humanitarian crises. Service delivery for survivors collapses in multiple countries as organizations lose 28% of all humanitarian gender equality funding from the single largest donor.</p><h3>Medium-Term Impact (2-5 years)</h3><p>Democratic backsliding accelerates in vulnerable states without robust international support mechanisms. The &#8220;third wave of autocratization&#8221; identified by International IDEA intensifies as countries experience democratic erosion without the technical assistance, electoral monitoring, and rule of law strengthening these organizations provided. Disputed elections lacking credible international observation trigger instability&#8212;coups, civil conflict, refugee flows affecting U.S. security interests.</p><p>China and Russia aggressively promote authoritarian governance models to fill the democracy assistance void. China&#8217;s &#8220;whole-process people&#8217;s democracy&#8221; narrative gains traction in developing countries disillusioned by Western withdrawal. Russia&#8217;s influence operations in former Soviet states operate unchecked by the rule of law programs the U.S. previously supported. The ideological contest between democracy and authoritarianism tilts decisively toward autocracy.</p><p>Digital authoritarianism expands. Without the Freedom Online Coalition&#8217;s coordinated responses, autocratic governments implement invasive surveillance, internet shutdowns, and censorship with impunity. The coalition previously deterred such actions through diplomatic pressure and public statements; its weakening emboldens China&#8217;s cyber sovereignty model and Russia&#8217;s internet control framework to spread to dozens of additional countries.</p><p>Gender inequality worsens dramatically. The <a href="https://www.womensrefugeecommission.org/press-releases/wrc-statement-on-fy-2026-white-house-budget-request/">Women&#8217;s Refugee Commission</a> projects that U.S. funding cuts reverse decades of progress, with women-led organizations bearing the brunt of impact. Gender expertise within the humanitarian sector erodes. Evidence, tools, and guidance for gender-transformative humanitarian action risk being lost entirely. By 2030, maternal mortality rates rise significantly, gender-based violence increases in conflict zones, and women&#8217;s political participation declines in countries that previously received U.S. support.</p><h3>Long-Term Impact (5+ years)</h3><p>A generation of democratic reversals becomes entrenched. Countries that democratized in the 1990s and 2000s with substantial American support from Eastern Europe to Latin America to Southeast Asia experience authoritarian consolidation. Constitutional courts weaken, independent media disappears, civil society faces repression, and electoral manipulation becomes normalized, all in environments where international democracy assistance has evaporated.</p><p>American moral authority collapses irreversibly. For seventy years, the U.S. positioned itself as democracy&#8217;s champion. Withdrawal from organizations supporting democratic governance, rule of law, and human rights reveals this commitment as transactional and unreliable. Even when future administrations attempt to re-engage, skepticism about American credibility prevents meaningful cooperation.</p><p>The authoritarian-democratic divide hardens into opposing blocs. China&#8217;s model of state-directed development without political liberalization, enabled by sophisticated digital surveillance, becomes the default for developing countries. Russia&#8217;s illiberal nationalism spreads across Eurasia. The post-Cold War assumption that democracy represents the inevitable future collapses, replaced by competing governance systems&#8212;and the U.S. lacks influence in this new landscape.</p><p>Gender equality setbacks prove difficult to reverse. An entire generation of girls and women in conflict-affected regions experiences violence, denial of education, and exclusion from economic opportunity that could have been prevented by the programs the U.S. abandoned. The compounding effects of reduced education, increased child marriage, and higher maternal mortality create structural disadvantages lasting decades.</p><div><hr></div><h2>III. Peace, Security &amp; Counterterrorism </h2><p>Peace, security, and counterterrorism withdrawals declare a tilt from shared security toward more go&#8209;it&#8209;alone hard power, while still leaving intact some legacy alliances and intelligence channels. </p><p>Leaving GCTF, the Science and Technology Center in Ukraine, ReCAAP, and UN peacebuilding tools signals that preventing terrorism, piracy, proliferation, and conflict relapse through broad&#8209;based cooperation is being downgraded relative to preserving unilateral freedom of action, accepting higher long&#8209;term risk even if not everywhere and not all at once.</p><h3>Affected Organizations</h3><ul><li><p><em>Global Counterterrorism Forum (<a href="https://www.thegctf.org/">GCTF</a>)</em></p></li><li><p><em>European Centre of Excellence for Countering Hybrid Threats</em></p></li><li><p><em>Global Community Engagement and Resilience Fund</em></p></li><li><p><em>Global Forum on Cyber Expertise</em></p></li><li><p><em>International Institute for Justice and the Rule of Law</em></p></li><li><p><em>Science and Technology Center in Ukraine (<a href="https://www.stcu.int/">STCU</a>)</em></p></li><li><p><em>Regional Cooperation Agreement on Combating Piracy and Armed Robbery (<a href="https://www.recaap.org/about_ReCAAP-ISC">ReCAAP</a>)</em></p></li><li><p><em>UN Peacebuilding Commission</em></p></li><li><p><em>UN Peacebuilding Fund</em></p></li><li><p><em>International Residual Mechanism for Criminal Tribunals</em></p></li><li><p><em>Regional Cooperation Council</em></p></li><li><p><em>Partnership for Atlantic Cooperation</em></p></li></ul><h3>Short-Term Impact (0-2 years)</h3><p>The Global Counterterrorism Forum, <a href="https://2017-2021.state.gov/the-global-counterterrorism-forum-a-multilateral-approach-to-address-terrorism/index.html">founded in 2011</a> with the U.S. as a founding member, loses its primary driver and largest financial contributor. This informal network of 30 countries plus the EU provides a venue for counterterrorism officials to share best practices on countering violent extremism, rule of law approaches, detention and reintegration, and foreign terrorist fighters. American withdrawal immediately diminishes the forum&#8217;s effectiveness and signals reduced U.S. commitment to multilateral counterterrorism cooperation.</p><p>The Science and Technology Center in Ukraine, established in 1993 to redirect former Soviet WMD scientists toward civilian research and prevent proliferation, faces funding collapse amid the Ukraine war. The U.S., Canada, and the EU fund STCU to employ Ukrainian scientists on peaceful projects, preventing brain drain to hostile actors. With <a href="https://www.nti.org/education-center/treaties-and-regimes/science-and-technology-center-ukraine-stcu/">$109 million invested</a> since inception and recent projects on <a href="https://ustda.gov/ustda-advances-ukraines-civil-nuclear-power-sector/">small modular reactor licensing</a>, the U.S. withdrawal during Ukraine&#8217;s existential conflict represents both a strategic and humanitarian abandonment.</p><p>ReCAAP, the first regional government-to-government agreement against piracy in Asia with <a href="https://www.mofa.go.jp/policy/piracy/pagewe_000001_00086.html">21 contracting parties</a>, loses American participation in information-sharing on maritime security threats. The ReCAAP Information Sharing Centre in Singapore coordinates responses to piracy incidents in critical shipping lanes (Straits of Malacca, South China Sea) where <a href="https://chinapower.csis.org/much-trade-transits-south-china-sea/">over $3 trillion</a> in annual trade transits. U.S. withdrawal reduces intelligence quality and response coordination.</p><p>The <a href="https://www.un.org/peacebuilding/content/fund">UN Peacebuilding Commission and Fund</a>, which has invested $1.9 billion in over 60 conflict-affected countries since 2006, loses substantial U.S. financial and diplomatic support. These mechanisms provide rapid-response funding for post-conflict stabilization such as support for peace agreements, local governance, economic recovery, and reconciliation. Ongoing peacebuilding efforts in Burkina Faso, Colombia, Somalia, Papua New Guinea, and the Great Lakes region face funding shortfalls at critical junctures.</p><h3>Medium-Term Impact (2-5 years)</h3><p>Counterterrorism coordination fragments. Without U.S. participation, the Global Counterterrorism Forum&#8217;s capacity to develop and promulgate international good practices erodes. Regional counterterrorism efforts in the Sahel, Horn of Africa, and Southeast Asia (areas under acute terrorist threat) lose the convening power and technical expertise the U.S. provided. Information sharing on foreign terrorist fighters, terrorist financing, and cross-border operations deteriorates, creating gaps that terrorist networks exploit.</p><p>Ukraine loses critical nonproliferation and scientific support infrastructure at the worst possible time. The STCU has kept Ukrainian nuclear scientists employed on civilian projects throughout the war, preventing recruitment by adversaries. Without U.S. funding, scientists face unemployment or worse: potential recruitment by Russia, China, Iran, or North Korea seeking WMD expertise. The proliferation risk multiplies significantly.</p><p>Maritime security in Asia weakens. ReCAAP&#8217;s diminished capacity allows piracy and armed robbery to increase in Southeast Asian waters. China leverages this security vacuum to position itself as the maritime security provider, expanding its naval presence and influence in the South China Sea under the guise of anti-piracy operations. Regional states grow more dependent on Chinese security architecture.</p><p>Conflict recurrence increases as peacebuilding efforts collapse. The UN Peacebuilding Fund&#8217;s rapid-response capacity, which is critical for consolidating fragile peace, degrades without adequate resources. Countries like South Sudan, Central African Republic, and Somalia, where peacebuilding funding prevents conflict relapse, experience renewed violence. This triggers humanitarian crises, refugee flows, and regional instability that costs far more to address later than the peacebuilding investments would have.</p><h3>Long-Term Impact (5+ years)</h3><p>Global counterterrorism architecture deteriorates into competing national efforts, lacking coordination and shared intelligence. Terrorist organizations adapt to fragmented responses, exploiting gaps between national approaches. The international consensus on counterterrorism norms, especially around human rights protections, rule of law, and preventing violent extremism, fractures as countries pursue unilateral strategies.</p><p>WMD proliferation risks materialize. The collapse of programs like STCU that redirect weapons scientists toward peaceful research increases the likelihood that expertise reaches hostile state and non-state actors. By 2030, the international nonproliferation regime faces unprecedented stress as more actors possess advanced weapons knowledge without the safety net of programs that once mitigated these risks.</p><p>China dominates Asian maritime security. With the U.S. withdrawn from regional cooperation mechanisms like ReCAAP, Beijing constructs a China-centric maritime security order across Southeast Asia. Regional states, dependent on Chinese anti-piracy and maritime domain awareness capabilities, acquiesce to Chinese interpretations of maritime law and territorial claims. The U.S. loses naval access and basing rights as its security partnerships atrophy.</p><p>Chronic instability in post-conflict regions becomes normalized. Without effective peacebuilding mechanisms, countries cycle between periods of fragile peace and renewed violence. The Sahel, Central Africa, and parts of Asia become permanent conflict zones, generating continuous humanitarian emergencies, mass displacement, and terrorist safe havens. The costs of military intervention and humanitarian response which the U.S. inevitably bears in a disproportionate manner far exceed the peacebuilding investments that could have prevented these outcomes.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>This work is labor-intensive. Subscribe to support me and receive my posts by email.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2>IV. Development &amp; Economic Security</h2><p>Development and economic security withdrawals recast development from core strategic investment into something closer to disposable charity, though a patchwork of EU, Gulf, Chinese, and private funding will blunt some immediate shocks. </p><p>Abandoning UNCTAD, the International Trade Centre, UNFPA, regional economic commissions, and education and humanitarian funds signals that stabilizing poor countries, reducing migration pressure, and advancing the SDGs have slipped behind tariffs, leverage, and short&#8209;term fiscal optics, making comprehensive goal achievement far less likely even if pockets of progress remain.</p><h3>Affected Organizations</h3><ul><li><p><em>UN Conference on Trade and Development (<a href="https://unctad.org/">UNCTAD</a>)</em></p></li><li><p><em>International Trade Centre (ITC)</em></p></li><li><p><em>UN Department of Economic and Social Affairs</em></p></li><li><p><em>UN ECOSOC Regional Commissions (Economic Commission for Africa, Economic Commission for Latin America and the Caribbean, Economic and Social Commission for Asia and the Pacific, Economic and Social Commission for Western Asia)</em></p></li><li><p><em>UN Population Fund (<a href="https://www.unfpa.org/">UNFPA</a>)</em></p></li><li><p><em>UN Human Settlements Programme</em></p></li><li><p><em>International Development Law Organization</em></p></li><li><p><em>International Cotton Advisory Committee</em></p></li><li><p><em>International Lead and Zinc Study Group</em></p></li><li><p><em>Intergovernmental Forum on Mining, Minerals, Metals, and Sustainable Development</em></p></li><li><p><em>Global Forum on Migration and Development</em></p></li><li><p><em>Education Cannot Wait</em></p></li></ul><h3>Short-Term Impact (0-2 years)</h3><p>UNCTAD, the UN&#8217;s principal development economics body supporting <a href="https://unctad.org/about/membership">195 member states</a>, loses its largest contributor. The organization provides crucial trade analysis, technical assistance on tariff negotiations, and economic policy guidance to developing countries navigating global markets. The U.S. withdrawal coincides with America&#8217;s own &#8220;reciprocal tariff&#8221; policy imposing 25%+ tariffs on dozens of developing countries, including <a href="https://unctad.org/news/mapping-size-new-us-tariffs-developing-countries">28 countries that each represent less than 0.1%</a> of the U.S. trade deficit, among them several least developed countries. This double blow of withdrawal of development support plus punitive trade barriers devastates vulnerable economies.</p><p>The International Trade Centre, the joint UN/WTO agency exclusively dedicated to micro, small, and medium-sized enterprises in developing countries, faces funding collapse. ITC provides the practical trade capacity that allows developing country SMEs to access global markets&#8212;from quality standards to market intelligence to export financing. ITC&#8217;s programs on women&#8217;s entrepreneurship, youth employment, and critical mineral value chains halt abruptly.</p><p>The UN Population Fund loses <a href="https://www.unfpa.org/press/statement-unfpa-executive-director-united-states-government-funding-cuts">$377 million</a> in U.S. funding, with 48 grants terminated immediately. This affects life-saving maternal healthcare, rape treatment, and protection from violence in humanitarian crises&#8212;Gaza, Sudan, Ukraine, Syria, Afghanistan, Haiti, DRC, Chad, Mali, Yemen. In <a href="https://yemen.unfpa.org/">Yemen</a> alone, 1.5 million women lose reproductive health services and 300,000 lose gender-based violence prevention programs. In Bangladesh, <a href="https://asiapacific.unfpa.org/en/news/bangladeshi-midwives-save-lives-rohingya-refugee-camps-coxs-bazar">obstetric care facilities</a> for Rohingya refugees face closure.</p><p>Regional UN Economic Commissions covering Africa, Latin America/Caribbean, Asia/Pacific, and Western Asia lose critical U.S. technical support and funding. These commissions coordinate regional economic development, infrastructure planning, and SDG implementation. Their capacity to assist member countries with economic recovery from COVID-19, climate adaptation, and digital transformation degrades significantly.</p><h3>Medium-Term Impact (2-5 years)</h3><p>Developing countries face a catastrophic combination of reduced development assistance, increased trade barriers, and lost technical support. Countries that each represent less than 0.1% of the U.S. trade deficit now face reciprocal tariffs that generate negligible U.S. revenue but devastate their export sectors. Simultaneously, they lose the UNCTAD and ITC technical assistance that helped them navigate trade negotiations and build export capacity. The compound effect pushes vulnerable economies toward financial crises.</p><p>China&#8217;s development finance model fills the void, but with fundamentally different approaches. Where USAID and UN development agencies emphasized health, education, governance, and emergency response through grants, China&#8217;s <a href="https://greenfdc.org/countries-of-the-belt-and-road-initiative-bri/">Belt and Road Initiative</a> focuses on large-scale infrastructure and natural resource extraction through loans. While Gulf states and the EU increase aid commitments, they cannot match the scale of U.S. withdrawals and operate with shorter-term, less comprehensive frameworks.</p><p>The lack of development alternatives accelerates migration pressures toward the U.S. and Europe. Economic desperation in Central America, sub-Saharan Africa, and Asia exacerbated by loss of U.S. development support and punitive tariffs drives increased irregular migration. This creates the very border security challenges the Trump administration claims to prioritize.</p><p>Maternal and child health crises intensify. The UNFPA funding cuts result in millions of additional unwanted pregnancies and preventable maternal deaths annually, according to the <a href="https://www.guttmacher.org/2025/01/family-planning-impact-trump-foreign-assistance-freeze">Guttmacher Institute</a>. Maternal mortality rates reverse decades of progress. In conflict zones where UNFPA provided the only reproductive healthcare, preventable deaths from childbirth complications surge.</p><h3>Long-Term Impact (5+ years)</h3><p>A development architecture centered on China replaces the Western-led post-World War II system. Developing countries, lacking alternatives, accept Chinese financing terms, technical standards, and governance expectations. This debt-dependency creates long-term political leverage for Beijing across Africa, Latin America, and Asia. American influence in these regions built over decades evaporates.</p><p>Economic divergence between developed and developing worlds accelerates. Without institutions like UNCTAD and ITC facilitating developing country integration into global value chains, poor countries remain trapped in commodity exports and low-value manufacturing. The gap between rich and poor nations widens dramatically, creating geopolitical instability, mass migration, and humanitarian crises that ultimately cost the U.S. far more than the development assistance would have.</p><p>The Sustainable Development Goals (SDGs) for 2030 fail comprehensively. The SDG framework: ending poverty, achieving gender equality, ensuring quality education, promoting decent work, etc. depended substantially on U.S. support through UN agencies and multilateral development banks. American withdrawal guarantees that most SDGs remain unmet, with cascading consequences for global stability.</p><p>Public health crises recur without the reproductive health infrastructure UNFPA built. Higher maternal mortality, inadequate family planning, and poor reproductive health outcomes create demographic pressures (read: population growth exceeding economic capacity) that drive instability and migration for generations.</p><div><hr></div><h2>V. Governance &amp; Administrative Bodies of the UN</h2><p>UN governance and administrative withdrawals telegraph an intent to weaken the UN&#8217;s role as the world&#8217;s coordination backbone, while recognizing that certain humanitarian and security functions will continue by inertia and with other sponsors. </p><p>Stepping away from DESA, system&#8209;wide coordination forums, training institutes, UN Energy/Water/Oceans, the UN University, and legal and arms registers signals that shared rules, data, and expertise are treated as expendable at the margins, inviting other powers, especially China, to gain outsized influence over how global governance evolves even if they may not succeed in fully dominating it.</p><h3>Affected Organizations</h3><ul><li><p><em>UN Department of Economic and Social Affairs</em></p></li><li><p><em>UN System Chief Executives Board for Coordination</em></p></li><li><p><em>UN System Staff College</em></p></li><li><p><em>UN Institute for Training and Research</em></p></li><li><p><em>Office of the Special Adviser on Africa</em></p></li><li><p><em>International Law Commission</em></p></li><li><p><em>UN Register of Conventional Arms</em></p></li><li><p><em>UN Energy</em></p></li><li><p><em>UN Water</em></p></li><li><p><em>UN Oceans</em></p></li><li><p><em>UN University</em></p></li><li><p><em>UN Collaborative Programme on Reducing Emissions from Deforestation and Forest Degradation</em></p></li></ul><h3>Short-Term Impact (0-2 years)</h3><p>The U.S. withdrawal from core UN administrative and coordination bodies creates immediate operational chaos within the UN system. The UN Department of Economic and Social Affairs, which coordinates the UN&#8217;s work on the SDGs and provides analytical support to ECOSOC and the General Assembly, loses critical resources and expertise. The UN System Chief Executives Board, which coordinates policies and management across 31 UN entities, fractures as its largest contributor withdraws.</p><p>Knowledge generation and training capacity collapses. The UN Institute for Training and Research, which builds capacity of diplomats and officials globally, and the UN Staff College, which trains UN personnel, face funding crises. This degradation of institutional knowledge and professional development creates long-term competency gaps across the UN system.</p><p>Critical environmental coordination mechanisms (UN Energy, UN Water, UN Oceans) lose their integrative capacity. These inter-agency platforms coordinate UN activities on shared challenges requiring multiple expertise areas. Their weakening means duplicative, uncoordinated UN responses to environmental crises, reducing effectiveness and wasting resources.</p><p>The UN University, a global network of research institutes providing evidence-based policy solutions to the UN, faces existential funding challenges. Its loss diminishes the UN&#8217;s capacity for independent, rigorous research on emerging global challenges from AI governance to sustainable development.</p><h3>Medium-Term Impact (2-5 years)</h3><p>UN system coordination deteriorates significantly. Without U.S. participation in coordination bodies, the UN&#8217;s already-fragmented agencies and programs operate in greater isolation. Duplication of efforts increases, resources are wasted, and comprehensive responses to complex challenges become impossible.</p><p>The quality of UN analysis and policy recommendations declines markedly. The Department of Economic and Social Affairs produces less rigorous research without U.S. data contributions and analytical expertise. The International Law Commission&#8217;s work on developing international legal frameworks proceeds without American legal scholarship and diplomatic engagement.</p><p>China and other powers exploit coordination gaps to advance parochial interests. Without the U.S. as a counterweight in coordination bodies, China shapes UN priorities, staffing, and operations to align with its strategic goals. The UN gradually transforms from a Western-led to a China-influenced organization, with profound implications for global governance norms.</p><p>Environmental coordination failures lead to ineffective responses to cascading crises. Climate-driven water scarcity, ocean acidification, and energy transitions require coordinated UN action across multiple agencies. Without functioning coordination platforms, the UN&#8217;s response becomes fragmented and inadequate, allowing crises to worsen.</p><h3>Long-Term Impact (5+ years)</h3><p>The UN as an effective multilateral institution declines into irrelevance. Coordination failures, funding shortfalls, and great power manipulation render the organization incapable of addressing major global challenges. Its legitimacy and effectiveness diminish to levels approaching the <a href="https://history.state.gov/milestones/1914-1920/league">League of Nations</a> before its collapse.</p><p>A bifurcated international system emerges: a Western bloc around NATO and the EU pursuing one set of policies, and a China-led bloc including the BRICS and developing countries pursuing alternative frameworks. The UN, unable to bridge these blocs effectively, ceases to function as a unifying global body.</p><p>Knowledge and training capacity losses create permanent institutional weakness across international organizations. A generation of diplomats, officials, and experts lacks proper training in multilateral cooperation, international law, and global governance. This human capital deficit makes eventual reconstruction of effective international institutions far more difficult.</p><p>The absence of coordinated environmental governance leads to unmanaged ecological crises (water wars, fisheries collapse, ecosystem destruction) that destabilize entire regions and create humanitarian disasters the international community cannot address coherently.</p><div><hr></div><h2>VI. Cross-Cutting Strategic Impacts</h2><p>The cross&#8209;cutting strategic impacts of these policy changes underscore that these withdrawals amount less to isolated bureaucratic tweaks and more to a coordinated reordering of global power that measurably accelerates China&#8217;s rise, reduces the restraint of hostile states, erodes U.S. credibility, and carries substantial economic downside, even if American structural strengths and some alliances endure.</p><p>Taken together, they signal an &#8220;allergic reaction&#8221; to multilateral constraint that fractures the existing order, encourages alternative blocs to harden against Washington, and trades modest budget savings for a higher probability of future losses in market access, security, and long&#8209;term influence.</p><h3>China&#8217;s Ascendancy to Global Leadership</h3><p>The single most consequential long-term impact of U.S. withdrawals is China&#8217;s emergence as the dominant shaper of international governance. As one <a href="https://ucigcc.org/blog/how-america-first-aids-chinas-global-influence/">analysis</a> notes, &#8220;When America retreats, China leads.&#8221; Beijing has systematically increased its presence in international organizations: leading <a href="https://www.csis.org/analysis/great-power-competition-multilateral-system">four of 15 specialized UN agencies</a>, expanding its civil servant ranks, and boosting financial contributions. <strong>U.S. withdrawal eliminates the primary counterweight to Chinese influence.</strong></p><p>China leverages this vacuum through its concept of &#8220;<a href="https://digichina.stanford.edu/work/lexicon-discourse-power-or-the-right-to-speak-huayu-quan/">discourse power</a>&#8221;: the use of narrative to gain global influence. Chinese Foreign Ministry statements characterize U.S. actions as putting &#8220;<a href="https://www.fmprc.gov.cn/mfa_eng/xw/fyrbt/202504/t20250414_11594362.html">its own interests over the public good of the international community</a>: and brushing &#8220;aside international law and international order in pursuit of its <a href="https://www.fmprc.gov.cn/mfa_eng/xw/fyrbt/202504/t20250425_11604503.html">selfish interests</a>,&#8221; actions &#8220;<a href="https://www.mfa.gov.cn/eng/xw/fyrbt/202504/t20250408_11590199.html">widely opposed by the international community</a>.&#8221; This narrative positions China as the responsible stakeholder and the U.S. as an unreliable partner, winning support particularly from developing countries seeking solutions to global challenges.</p><p>In concrete terms:</p><ul><li><p><strong>Climate</strong>: China sets global clean energy standards and controls critical mineral supply chains</p></li><li><p><strong>Technology</strong>: China establishes norms for AI governance, cyber sovereignty, and internet governance</p></li><li><p><strong>Development</strong>: The BRI becomes the primary development financing mechanism for <a href="https://chinapower.csis.org/china-belt-and-road-initiative/">150+ countries</a></p></li><li><p><strong>Governance</strong>: Chinese nationals occupy senior positions across UN agencies, embedding Chinese priorities in institutional DNA</p></li></ul><p>By 2040, China comprehensively replaces the U.S. as the architect of international order, not through military conquest but through patient institution-building while America withdraws. As Professor <a href="https://lithub.com/what-donald-trumps-isolationism-means-for-america-and-the-world/">Michael McFaul</a> warns, &#8220;Trump&#8217;s United States could easily emerge as a greater threat to liberal internationalism than Putin&#8217;s Russia or Xi&#8217;s China.&#8221;</p><h3>The &#8220;My Way or the Highway&#8221; Doctrine</h3><p><a href="https://www.nbcnews.com/world/north-america/us-will-exit-66-international-organizations-retreats-global-cooperatio-rcna252914">Daniel Forti</a> of the International Crisis Group characterizes U.S. policy as: &#8220;What we&#8217;re witnessing is the solidification of the U.S. stance on multilateralism, which can be summarized as &#8216;my way or the highway.&#8217; It reflects a clear desire for international cooperation strictly on Washington&#8217;s terms.&#8221;</p><p><strong>This approach fundamentally misunderstands power in the 21st century.</strong> Unlike the unipolar post-Cold War era when the U.S. could dictate terms, today&#8217;s multipolar world requires coalition-building and sustained engagement. By demanding compliance rather than seeking partnership, the U.S. accelerates the formation of alternative blocs explicitly designed to counter American influence.</p><p>The paradox: Trump administration officials claim these withdrawals protect U.S. sovereignty and advance American interests. In practice, they achieve the opposite, reducing American influence over outcomes that directly affect U.S. security and prosperity while empowering rivals.</p><h3>Financial and Economic Consequences</h3><p><strong>The immediate fiscal &#8220;savings&#8221; from these withdrawals are minuscule compared to potential economic losses.</strong> In FY2022, total <a href="https://www.state.gov/wp-content/uploads/2024/10/FY22-U.S.-Contributions-to-International-Organizations-_10.24.2024.pdf">U.S. contributions to international organizations</a> were $21 billion, roughly 0.06% of U.S. GDP. Of this, the majority was voluntary funding directed toward specific programs the U.S. deemed beneficial.</p><p>The costs of withdrawal compound rapidly:</p><ul><li><p><strong>Lost market access</strong>: U.S. companies lose influence over international standards, regulations, and procurement worth trillions of dollars. Clean energy markets alone exceed $2 trillion annually by 2035. American firms&#8217; market share contracts as they&#8217;re excluded from standard-setting bodies.</p></li><li><p><strong>Increased security costs</strong>: Without peacebuilding and development assistance, conflict zones proliferate. Military interventions and humanitarian responses cost orders of magnitude more than preventive assistance. The <a href="https://civil-protection-humanitarian-aid.ec.europa.eu/where/middle-east-and-northern-africa/syria_en">Syria crisis</a> alone has cost over &#8364;38 billion in EU humanitarian aid&#8212;<strong>far exceeding what conflict prevention would have cost.</strong></p></li><li><p><strong>Trade disruption</strong>: Developing countries losing U.S. development support while facing punitive tariffs default on debts, experience currency crises, and reduce imports of American goods. The compounding effect on global supply chains disrupts U.S. businesses dependent on international trade.</p></li><li><p><strong>Migration surges</strong>: Economic collapse and instability in regions losing U.S. support drive massive migration toward U.S. borders. The costs of border enforcement, detention, and asylum processing exceed development assistance that could stabilize source countries.</p></li></ul><h3>Credibility Collapse and Alliance Erosion</h3><p>America&#8217;s reliability as a partner has become the central question in global affairs. As one European leader <a href="https://www.pbs.org/newshour/politics/trump-says-russia-should-be-allowed-in-g-7">stated</a>, the rules-based international order is challenged &#8220;not by the usual suspects, but by its main architect and guarantor, the U.S.&#8221; </p><p><strong>This credibility crisis manifests across domains:</strong></p><p>NATO allies question U.S. commitment when America withdraws from European security coordination bodies like the European Centre of Excellence for Countering Hybrid Threats and the Regional Cooperation Council. If the U.S. won&#8217;t participate in threat assessment and information sharing, will it honor Article 5 collective defense obligations?</p><p>Asian partners face similar doubts as the U.S. withdraws from ReCAAP and other regional security mechanisms. Japan, South Korea, Philippines, and Australia, facing Chinese assertiveness, question whether U.S. security guarantees remain credible if America won&#8217;t participate in basic security coordination.</p><p>Developing country partners conclude U.S. commitments are worthless. After decades of American promises on development assistance, climate finance, and institution-building, wholesale withdrawal demonstrates that U.S. support is contingent on the views of a single leader and can be reversed instantly. </p><p><strong>Future U.S. administrations will find it nearly impossible to rebuild trust.</strong></p><h3>The Paradox of Isolationism</h3><p>The Trump administration frames these withdrawals as &#8220;America First&#8221; policy focused on U.S. interests. The historical record shows this approach consistently produces the opposite outcome:</p><ul><li><p><strong>Interwar isolationism (1920s-1930s)</strong>: U.S. rejection of the League of Nations and withdrawal from international cooperation allowed Nazi Germany and Imperial Japan to expand unchecked, ultimately forcing American intervention in World War II at catastrophic cost.</p></li><li><p><strong>Vietnam withdrawal without transition planning (1970s)</strong>: Abrupt U.S. disengagement from Southeast Asia created power vacuums that China and the Soviet Union exploited, leading to regional instability and proxy conflicts that drew the U.S. back in.</p></li><li><p><strong><a href="https://en.wikipedia.org/wiki/2020%E2%80%932021_U.S._troop_withdrawal_from_Afghanistan">Afghanistan withdrawal</a> (2021)</strong>: Hasty American exit without coordination with allies resulted in unnecessary casualties, emboldened Russia to invade Ukraine, encouraged China to accelerate pressure on Taiwan, and signaled to adversaries that U.S. commitments are ephemeral.</p></li></ul><p>The current wave of withdrawals follows this pattern. Rather than &#8220;America Alone&#8221; as intended, the result is &#8220;America Isolated&#8221; and lacking influence over outcomes that directly affect U.S. interests while rivals readily fill the voids.</p><div><hr></div><h2>Conclusion: The Reshaping of Global Order</h2><p><strong>The withdrawal from 66 international organizations doesn&#8217;t represent a national policy adjustment. This is a civilizational retreat.</strong> </p><p>The liberal international order constructed after 1945 (admittedly imperfect and quite often serving narrow U.S. interests) nevertheless provided frameworks for cooperation that prevented major power war for eight decades, lifted billions from poverty, and facilitated unprecedented prosperity.</p><ul><li><p><strong>In the short term (0-2 years)</strong>, these withdrawals create operational chaos, funding gaps, and diplomatic acrimony. Organizations struggle to maintain core functions. Beneficiaries of programs, from women in conflict zones to scientists working on climate solutions to officials building democratic institutions, lose critical support. Rival powers begin positioning themselves to exploit the emerging vacuum.</p></li><li><p><strong>In the medium term (2-5 years)</strong>, alternative power structures crystallize. China constructs a parallel international order through the BRI, expanded UN engagement, and new institutions like the Asian Infrastructure Investment Bank. Authoritarian governance models spread as democracy assistance evaporates. Regional conflicts intensify without effective peacebuilding mechanisms. Climate change accelerates unchecked by international cooperation. Migration, public health crises, and economic instability multiply.</p></li><li><p><strong>In the long term (5+ years)</strong>, the consequences become irreversible. American influence over global outcomes, from trade rules to security architecture to technological standards, diminishes to marginal status. China establishes itself as the architect of 21st-century international order, embedding its interests, values, and governance models in institutions that will shape global affairs for decades. The democratic-authoritarian divide hardens into separate, competing systems with the U.S. relegated to leadership of a declining Western bloc.</p></li></ul><p><strong>Future U.S. administrations will find reconstruction nearly impossible. </strong></p><p>The trust deficit, China&#8217;s entrenched institutional advantages, and developing countries&#8217; shift toward alternative partners create structural barriers to American re-engagement. Even if the U.S. attempts to rejoin these organizations, it will do so as a supplicant lacking the influence it once commanded.</p><p>The Trump administration justifies these withdrawals by claiming the organizations &#8220;advance globalist agendas over U.S. priorities.&#8221; The fundamental error in this flawed worldview is the assumption that U.S. interests can be secured through unilateral action. The challenges of the 21st century, including climate change, pandemics, terrorism, technological disruption, economic instability, and mass migration, are inherently transnational, and require coordinated responses. By withdrawing from the crucial mechanisms that enable coordination, the Trump administration guarantees our inability to shape outcomes on issues that directly affect American security and prosperity.</p><p><strong>The world is not choosing between the United States and China. The world is <a href="https://www.bloomberg.com/news/articles/2025-11-23/carney-says-world-can-move-on-without-the-us-stresses-new-ties">moving on without the United States</a>.</strong> This analysis has examined each withdrawal category systematically, and the verdict is unambiguous. Across every domain&#8212;climate, democracy, security, development, governance&#8212;these withdrawals damage U.S. interests in the short term, substantially degrade American influence in the medium term, and produce irreversible strategic disadvantage in the long term.</p><p>The beneficiaries are America&#8217;s rivals; the losers include the American people, whose security and prosperity depend on our stable, prosperous, cooperative international system. <strong>Donald J. Trump's policy actions since Inauguration Day are placing that system in mortal peril.</strong></p><p>My <a href="https://www.hackingbutlegal.com/p/the-psychological-costs-of-americas">second essay</a> examines how these same choices are reshaping Americans&#8217; psychology, media environment, and tolerance for coercion at home.</p><div><hr></div><p><em>This publication operates on reader subscriptions. If this analysis demonstrated value, please consider becoming a paid subscriber to help my research reach more people.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=183857540&quot;,&quot;text&quot;:&quot;Get 25% off for 1 year&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=183857540"><span>Get 25% off for 1 year</span></a></p>]]></content:encoded></item><item><title><![CDATA[Lockbox: Sovereign Credential Management on Solana]]></title><description><![CDATA[My password manager just won a rare honorable mention at the largest crypto hackathon]]></description><link>https://www.hackingbutlegal.com/p/lockbox-sovereign-credential-management</link><guid isPermaLink="false">https://www.hackingbutlegal.com/p/lockbox-sovereign-credential-management</guid><dc:creator><![CDATA[Jackie Singh]]></dc:creator><pubDate>Tue, 06 Jan 2026 22:57:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FhNQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9S8m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9S8m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png 424w, https://substackcdn.com/image/fetch/$s_!9S8m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png 848w, https://substackcdn.com/image/fetch/$s_!9S8m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png 1272w, https://substackcdn.com/image/fetch/$s_!9S8m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9S8m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png" width="1456" height="1979" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1979,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1414111,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/183716377?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9S8m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png 424w, https://substackcdn.com/image/fetch/$s_!9S8m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png 848w, https://substackcdn.com/image/fetch/$s_!9S8m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png 1272w, https://substackcdn.com/image/fetch/$s_!9S8m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8befbc7d-be03-41ea-9b4a-bc2864166846_1538x2090.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://lockbox.web3stud.io/">Lockbox</a></figcaption></figure></div><p>I spent the last quarter of 2025 building something that grew out of a straightforward observation: every mainstream password manager still depends on centralized infrastructure and recurring fees, and even the &#8220;self&#8209;hosted&#8221; or &#8220;zero&#8209;knowledge&#8221; options force people to manage a second, separate set of encryption keys on top of their wallet keys. That model clashes with what blockchains are supposed to offer. It fragments a user&#8217;s security posture, increases the number of ways things can go wrong, and forces people to juggle multiple critical secrets just to keep access to their own data. Not ideal.</p><p>When I considered how credential management could look given the unique advantages of a decentralized network like Solana, the existing approaches suddenly seemed inadequate. The result was <a href="https://arena.colosseum.org/projects/explore/lockbox?ref=hackingbutlegal.com">Lockbox</a>, a protocol for secure, recoverable credential management that lives entirely on-chain with zero central servers, zero subscriptions, and no mandated user interface. </p><div class="pullquote"><p><em><strong>Lockbox just received a coveted honorable mention at the Solana Cypherpunk Hackathon, the largest crypto hackathon on record.</strong></em> </p></div><p>This breakdown walks through what we built, why the hackathon itself demonstrates the scale of innovation happening in the Solana ecosystem, what technical approaches make Lockbox distinct, and why this kind of work matters for my own analytical practice. </p><h2>Hackathon Scale &amp; Winners</h2><p>While I led Lockbox&#8217;s design and implementation, my partner, Jason Schorr, provided targeted implementation guidance, drawing on his experience as an Ecosystem Engineer at the Solana Foundation and his work with other companies in the broader Solana ecosystem. </p><p>To be honest, I was initially intimidated to compete when Jason suggested submitting my app to the hackathon (which I only learned about after building the initial prototype), but he saw the vision, and I am glad he pushed for it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FhNQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FhNQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png 424w, https://substackcdn.com/image/fetch/$s_!FhNQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png 848w, https://substackcdn.com/image/fetch/$s_!FhNQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png 1272w, https://substackcdn.com/image/fetch/$s_!FhNQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FhNQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png" width="1264" height="1336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1336,&quot;width&quot;:1264,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1186656,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/183716377?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FhNQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png 424w, https://substackcdn.com/image/fetch/$s_!FhNQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png 848w, https://substackcdn.com/image/fetch/$s_!FhNQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png 1272w, https://substackcdn.com/image/fetch/$s_!FhNQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6ff755-e323-4814-b7e2-11f80110273e_1264x1336.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://blog.colosseum.com/announcing-the-winners-of-the-solana-cypherpunk-hackathon/">Colosseum.com</a></figcaption></figure></div><p>Solana is a blockchain network that processes transactions far faster and cheaper than Bitcoin or Ethereum. It's not some niche experiment anymore: Visa partnered with Solana to build payment infrastructure on the network, signaling that major financial institutions see real utility in what Solana can do. The nonprofit Solana Foundation and this hackathon&#8217;s commercial sponsors, such as Phantom, Arcium, Forward Industries, Raydium, Reflect, and Triton, organize these recurring coding competitions to identify the next wave of products that could strengthen the ecosystem.</p><p>The sheer numbers around Cypherpunk matter because they signal something very real about developer momentum in the Solana ecosystem. More than <strong>9,000</strong> participants from <strong>150+ countries</strong> submitted <strong>1,576 final projects</strong> across <strong>six tracks</strong>: Infrastructure, Consumer, DeFi, Stablecoins, Real World Assets, and Undefined Applications.</p><div class="pullquote"><p><strong>That volume made Cypherpunk the largest crypto hackathon to date.</strong></p></div><p>Solana Breakpoint is the main industry event where the ecosystem gathers each year to see what builders have actually shipped. The Cypherpunk Hackathon winners were announced there, which meant the top projects had a real audience watching: other developers, founders with capital, and people who actually understand what good technical work looks like.</p><p>It&#8217;s the kind of stage where a project either lands or it doesn&#8217;t, depending on whether you&#8217;ve built something that solves a real problem. </p><div id="youtube2-iSg1bBa3uRs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;iSg1bBa3uRs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/iSg1bBa3uRs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>We received an honorable mention in the &#8220;Undefined&#8221; track. To contextualize this, the <strong>baseline win rate</strong> was roughly <strong>5-6%</strong> for projects receiving either top-five placements or public recognition.</p><p>First place went to <a href="https://arena.colosseum.org/projects/explore/attn.markets?ref=hackingbutlegal.com">attn.markets</a> with its revenue tokenization protocol. Second through Fifth places went to <a href="https://arena.colosseum.org/projects/explore/echo?ref=hackingbutlegal.com">Echo</a>, <a href="https://arena.colosseum.org/projects/explore/plaipin?ref=hackingbutlegal.com">PlaiPin</a>, <a href="https://arena.colosseum.org/projects/explore/solana-atm?ref=hackingbutlegal.com">Solana ATM</a>, and <a href="https://arena.colosseum.org/projects/explore/humanship-id?ref=hackingbutlegal.com">Humanship ID</a>, respectively. Honorable mentions in that track included <a href="https://arena.colosseum.org/projects/explore/legends.fun?ref=hackingbutlegal.com">legends.fun</a> and <a href="https://arena.colosseum.org/projects/explore/scanna?ref=hackingbutlegal.com">Scanna</a>. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pEhs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pEhs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png 424w, https://substackcdn.com/image/fetch/$s_!pEhs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png 848w, https://substackcdn.com/image/fetch/$s_!pEhs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png 1272w, https://substackcdn.com/image/fetch/$s_!pEhs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pEhs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png" width="1070" height="882" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:882,&quot;width&quot;:1070,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:146550,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/183716377?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pEhs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png 424w, https://substackcdn.com/image/fetch/$s_!pEhs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png 848w, https://substackcdn.com/image/fetch/$s_!pEhs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png 1272w, https://substackcdn.com/image/fetch/$s_!pEhs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4161208e-6ca0-4327-8a38-7928bf71bf8d_1070x882.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://blog.colosseum.com/announcing-the-winners-of-the-solana-cypherpunk-hackathon/">Colosseum.com</a></figcaption></figure></div><p>The density of competing projects and the breadth of approaches to novel problems say this ecosystem isn&#8217;t short on builders attempting to solve tough technical challenges.</p><h2>What Lockbox Actually Does</h2><p>I described Lockbox to the hackathon judges as a functional proof of concept for the first Solana infrastructure layer that lets wallets and dApps treat encrypted credential storage as a native, composable, permanent system. The user experience is intentionally familiar: users can store encrypted vaults directly on-chain, associated with their wallet, without any central server ever seeing plaintext data.</p><p>The technical architecture works like this: user data is encrypted client-side, before it ever leaves the user&#8217;s device. The plaintext is cleared from memory immediately after encryption. A user&#8217;s encrypted vault is stored on-chain as a program-derived account associated with their wallet. Our dApp never touches the keys or the plaintext. Instead, wallets, dApp developers, and enterprises can build their own interfaces on top of the Lockbox protocol and SDK, or use the reference implementation we built.</p><p>Where Lockbox diverges substantially from existing blockchain-adjacent solutions is in its recovery mechanics. If a user loses access to their wallet seed phrase, they can still recover limited access to their encrypted vault using offline-generated backup codes. These codes are generated off-chain, never exposed to any server, and provide what I think of as an &#8220;offline lifeline&#8221; for recovery after seed loss. </p><p>Based on my research into blockchain password managers and credential storage solutions, this recovery mechanism appears to be unique. Other approaches I examined either abandon users who lose their keys or require centralized servers to hold recovery data.</p><h2>Technical Approach &amp; Cryptographic Design</h2><p>The core security assumption is straightforward: the user&#8217;s encryption key is derived from material they control, and the plaintext is never transmitted to or stored on untrusted infrastructure. I used industry-standard encryption with authenticated encryption to prevent tampering. The vault structure allows for multiple encrypted credential entries, so a user can store passwords, API keys, or other secrets under one wallet-associated account.</p><p>The backup recovery codes are the most novel part of the approach, because they provide that &#8220;offline lifeline&#8221; without ever exposing plaintext or relying on a server.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!InU4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!InU4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png 424w, https://substackcdn.com/image/fetch/$s_!InU4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png 848w, https://substackcdn.com/image/fetch/$s_!InU4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png 1272w, https://substackcdn.com/image/fetch/$s_!InU4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!InU4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png" width="1332" height="1378" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1378,&quot;width&quot;:1332,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:514841,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.hackingbutlegal.com/i/183716377?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!InU4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png 424w, https://substackcdn.com/image/fetch/$s_!InU4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png 848w, https://substackcdn.com/image/fetch/$s_!InU4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png 1272w, https://substackcdn.com/image/fetch/$s_!InU4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c2143e8-5dcd-42df-88de-d0f49b956556_1332x1378.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://lockbox.web3stud.io/">Lockbox</a></figcaption></figure></div><p>They are generated using a cryptographic scheme that produces short, memorable codes that can be stored offline. When a user later wants to recover access after losing their wallet keys, they can use one of these codes to restore access to a subset of their vault data. The codes themselves don&#8217;t store plaintext; they&#8217;re derived from the recovery seed in a way that allows verification and re-encryption with new key material.</p><p>What makes this architecture interesting from a security engineering perspective is the constraint: the Lockbox server and dApp must never see the plaintext keys or credential data, even during recovery. This means the recovery flow has to rely entirely on material the user stores offline and cryptographic primitives that don&#8217;t require server-side decryption. I used zero-knowledge proofs in parts of the verification logic to prove ownership of recovery material without exposing it, which keeps recovery interactive without widening the trust boundary.</p><blockquote><p>For enginers who want to go deeper, full architecture and cryptography documentation for <a href="https://github.com/hackingbutlegal/solana-lockbox">Lockbox</a> is available in the project repository&#8217;s <a href="https://github.com/hackingbutlegal/solana-lockbox/tree/main/docs">docs</a> directory.</p></blockquote><h2>Business Model &amp; Ecosystem Integration</h2><p>Existing password managers charge either a recurring subscription (roughly $36-60 per year for consumers; that&#8217;s $360-600 over a decade just to keep access to your passwords) or per-user-per-month fees for enterprise (often $5-10 per employee, which balloons for larger teams). In both cases, users face recurring costs indefinitely, and enterprises face mounting annual overhead that procurement teams actively try to escape.</p><p><em>Lockbox&#8217;s model is fundamentally different.</em> </p><p>Users pay linear, one-time fees for storage upgrades as they need them. If a user decides to close their vault, the storage rent is returned immediately&#8212;there is no subscription trap and no year-after-year extraction. This is technically possible because the vault data lives on-chain, which means Solana&#8217;s rent mechanism handles the economic model. Additionally, Lockbox transactions create network activity every time a credential is added, expanded, or accessed, which supports a sustainable fee structure through transaction costs.</p><p>For wallets like Phantom or Solflare, Lockbox integration could become a significant product differentiator. A wallet that offers secure, built-in password management, integrated with the wallet SDK and delivered through a partner protocol rather than developed in-house, becomes much stickier for users. It increases daily active use cases for holding and accessing the wallet. The wallet bears no backend infrastructure cost, because the infrastructure is decentralized and on-chain. For Lockbox, integration drives daily network activity and user adoption across multiple wallet platforms simultaneously.</p><p>The actual moat here is less about the code and more about the credibility and operational burden required to maintain a security-critical application like this in production. <em>Vulnerabilities in a password manager are catastrophic for end users.</em> A credible founding team in this space needs demonstrable infosec expertise, rigorous code review practices, ongoing vulnerability management, and clear incident response procedures. <em>These are not negligible requirements.</em> That burden of proof and operational complexity is what makes it less likely that a wallet would attempt to build password management in-house rather than integrating a specialized partner solution.</p><h2>The Role of AI</h2><p>Claude Code sat in the middle of the Lockbox development process, not as an author of security-critical logic but as an accelerant for getting there. I used it obsessively to draft and refactor non-sensitive scaffolding, propose alternative patterns for account layout on Solana, and quickly explore different ways to structure the vault lifecycle without touching the cryptographic core or recovery semantics.</p><p>From a security standpoint, Claude&#8217;s main value was speed under constraint: it let me explore implementation options quickly while preserving a hard rule that anything touching secrets or recovery had to pass manual review and testing. I could ask for multiple candidate implementations for state transitions, error handling, or client-side flows, then stress-test those against the threat model documented in the architecture and cryptography notes. That let me refine the design for how vaults are created, updated, and closed and how recovery codes are handled while keeping the trust boundary tight and the plaintext exposure surface as tiny as possible.</p><p>This is where AI-assisted development becomes part of the new professional baseline rather than a gimmick. Used correctly, tools like Claude Code help surface implementation options quickly, but cannot replace disciplined review, adversarial thinking, or formal reasoning about how secrets move through a system. In Lockbox, AI-suggested changes touching the vault model, encryption flow, or recovery path were treated as untrusted input: reviewed manually, tested, and checked against documented assumptions in the design docs.</p><h2>How This Work Fits My Practice</h2><p>I publish investigative pieces on national security, geopolitical interference, and the connections between government agencies and private actors. Those investigations require tools. I need to parse large datasets, understand network relationships, trace funding flows, and sometimes assess the technical credibility of claims I encounter.</p><p>Building Lockbox and experimenting with Solana development is not a departure from that core work; it&#8217;s a necessity. I do a lot of development work that never ships, never gets published, and never appears on my public profiles. That experimental space is where I develop the technical depth I need to continue producing quality analytical output. </p><p>When I analyze surveillance systems, evaluate the credibility of cybersecurity claims, or work through the technical implications of government hacking capabilities, I&#8217;m drawing on a reservoir of practical engineering experience. I&#8217;ve implemented cryptographic primitives, designed and defended systems where failure is not acceptable, and thought through threat models where an adversary has significant resources. That hands-on work sharpens my ability to read a technical claim in a news article and understand whether it&#8217;s plausible or whether someone is making assertions that don&#8217;t hold up under scrutiny.</p><p>An honorable mention at a hackathon of this scale won&#8217;t lead to consulting contracts or convert directly into newsletter subscribers. What it does is demonstrate that the experimental work I&#8217;m doing is rigorous enough to compete at scale and sufficiently substantive to warrant recognition from peers and judges who understand the space. Readers of my analytical work should know that when I make technical claims about cryptographic systems, surveillance infrastructure, or the capabilities of state actors, I draw from hands-on experience.</p><h2>Conclusion</h2><p>Lockbox sits at an interesting intersection: it solves a universal user pain point that crypto has failed to address; it demonstrates a business model fundamentally different from centralized competitors; and it showcases a technical approach to credential recovery that I believe is novel in the blockchain space. The fact that it earned recognition alongside 1,575 other projects at the largest crypto hackathon to date is validation that the work was worth doing.</p><p>More importantly, it represents exactly the kind of technical experimentation that makes my primary analytical work more credible and more substantive. Understanding infrastructure that people depend on for security is not a hobby outside my main career. </p><p>It is core professional development for writing with authority about systems that matter.</p><div><hr></div><p><em><strong>This publication operates on reader subscriptions. If this analysis demonstrated value, please consider becoming a paid subscriber to support continued investigation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=183716377&quot;,&quot;text&quot;:&quot;Get 25% off for 1 year&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.hackingbutlegal.com/subscribe?coupon=21a391d0&amp;utm_content=183716377"><span>Get 25% off for 1 year</span></a></p><div><hr></div>]]></content:encoded></item></channel></rss>