Entries Tagged 'Internet' ↓

Video: My HOPE XV talk: Survey and Scrutiny of Election Security (45min)

TL;DR: Here’s my talk as a DRM-free .mp4 and my corrected English subtitles in .srt or .vtt format. Watch below, and the corrected subtitles are already inside the embed, but you’ll probably need to click the three vertical dots at the video’s bottom right and select “Captions” to turn them on (Chrome) or click the [cc] box at the video’s bottom right to toggle them on (Firefox). The subtitles greatly remediate editing errors and also gaps in my speech where I omitted transitions or didn’t make certain logical connections fully explicit. You’ll want to watch with them on. Don’t forget the recommended resource list. Enjoy!

Note: You might also be interested in my Foreign Policy article from two months ago about G, the global commons for public data collaboration. Gift hyperlink; alternate hyperlink.

On Oct. 9, the Hackers on Planet Earth (HOPE) staff made every talk from this summer’s HOPE XV conference in New York City available via their website. Buy them all on a thumbdrive or download individually. I bought just mine and embedded the DRM-free .MP4, meant for sharing, above. It’s also on my youtube. HOPE staff said then that sometime soon, they’ll put this year’s presentations on theirs.

I gave the talk on Friday, July 12 starting at 7 p.m. on the main Marillac Auditorium stage. Sure, there were technical difficulties and I used too many filler words—it was my first time presenting to adults without scripting it all before, and due to life/journactivism exigiencies, I’d prepared the outline just hours prior, meaning no rehearsals or revisions, especially as I was busy writing the 14-page recommended resource list (PDF) that accompanies my presentation, as mentioned in my talk.

But if your goal is to learn from a Survey and Scrutiny of Election Security, the video will meet that need, especially if you employ the corrected subtitles.

The $.99 downloadable from HOPE came with subtitles—English, German, Spanish, French—and the transcript .txt they’re based on. I edited the numerous errors, some at the hands of 2600 (I replaced these), others my own mistakes while speaking [fixed in brackets]. Here’s the corrected transcript and the corrected English subtitles (.srt; .vtt). If anyone wants to translate my corrected version to any language, email me and I’ll add your subtitles to this post for others to peruse.

Much of my talk is simply trying to steer you toward the recommended resource list—your homework, so to speak. That document definitely puts election security and activism knowledge in your hands so you can do something awesome with it—which would make a great story to leave in the comments. In my presentation, I also mention uploading the flowchart to my site; I’ll do that at some future date when I have time and can improve it. For my June post and one-minute video promoting this talk, go here.

Embedded below, the full Biden video I showed on stage during my talk (all 41 seconds). HOPE’s after-the-fact editing removed the audience gasp and shortened Biden’s three kisses to two. Following the full Biden video, a few final notes for my presentation overall, in quick bullet points.

  • Here are the two RAMRANTS tweet-thread URLs, mentioned in my talk, leading to many more examples of Biden being creepy, mostly C-SPAN footage:

    https://x.com/RAMRANTS/status/930122872000995328
    https://x.com/RAMRANTS/status/930065838387863552

  • In the Q&A, someone asked about the accuracy of recent U.S. elections. I gave two answers: we need more data, and second, that though former pollster Jonathan Simon’s exit poll forensics show many voting jurisdictions presenting legitimate results, there have also been enough jurisdictions with significant enough disparities between totals and exit polls to raise serious alarm.

    A third answer would have been to give a bird’s eye view of the strength and frequency of official audits. These are voting jurisdiction staff doing sort of the same thing Simon is, but drawing on very different data sets, usually spot-checking handmarked paper ballots and comparing those samples with the vote totals, ideally according to Stark risk-limiting audit protocols. If you can see what’s going into a black box and what’s coming out of a black box, and it makes sense against a neutral standard (i.e., spot-checked handmarked paper ballots), then you don’t have to fear, say, the proprietary black box software so much—though people debate that too, particularly if audits aren’t conducted, as they should be, for every single contest regardless of margins of victory.

    Here’s what the Senate Intelligence Committee wrote in 2018 in the first volume of their underexamined report on Kremlin election interference in the 2016 U.S. elections: “Statistically sound audits may be the simplest and most direct way to ensure confidence in the integrity of the vote. States should begin to implement audits of election results. Logic and accuracy tests of machines are a common step, but do not speak to the integrity of the actual vote counting. Risk-limiting audits, or some similarly rigorous alternative, are the future of ensuring that votes cast are votes counted. [Unnamed] State 8, State 12, State 21, State 9, State 2, State 16, and others already audit their results, and others are exploring additional pilot programs. However, as of August 2018, five states conducted no post-election audit and 14 states do not do a complete post-election audit. The Committee recognizes states’ concern about the potential cost of such audits and the necessary changes to state laws and procedures; however,the Committee believes the benefit of having a provably accurate vote is worth the cost.”

    Verified Voting has a map/visualizer, as of 2022, for post-election audit law and practices. It appears that two years ago—i.e., four years after Senate Intelligence Committee passage above—we had five states carrying out risk-limiting audits, though not always binding or fully comprehensive ones. And we had eight states with no post-election audit law. The remaining states (and setting aside the territories) were somewhere in between: audits, but not the risk-limiting gold standard kind; or audits that were optional, partial, nonbinding, or otherwise deficient …

    It’s a hodgepodge mess. The results are likely trustworthy, except where they aren’t; you just can’t trust ’em, except where you really can because of overlapping accountability layers of high-quality audits, statistical forensics, scrutineers, and more. And all of this is in motion every single day. It does seem to be slowly getting better…so the swing state majority who come to consensus for a particular presidential candidate can impose on the rest of the country, and more can feel confident that the destined-to-be-unfair hierarch will enter into the White House above them fairly.


  • In the video, I mention MAGA’s Stop the Steal lawsuits tanking except for one minor case in Pennsylvania. A great resource on all that is the July 2022 report Lost, Not Stolen: The Conservative Case that Trump Lost and Biden Won the 2020 Presidential Election.

  • For details on the 3000+ counties versus 6000+ voting jurisdictions nuance, I’ve been pointed to the 2015 book “Administering Elections: How American Elections Work,” which I haven’t read yet sadly.

  • One great thing about Scrutineers.org that I neglected to mention in the talk is that they’re specifically working to bring together—to bridge the gap between—on the one hand, the grassroots, boots-on-the-ground movement activists, often black activists, fighting decades-old voter suppression tactics—which stymie vote capture—with, on the other hand, the academic, cerebral, often white guys who are digging into the proprietary voting computer vulnerabilities, which interfere with the vote tallying side. These two disparate realms really need to come together, as they increasingly have in Coffee County, Georgia, for example.

  • I mention in the talk that Trump almost certainly owes China substantial money. Here’s my 2021 blog post on that (CTRL+F “China” to jump to the relevant section). Some other information on the topic worth checking out: Jan 2024 report on Chinese-owned or -backed entities spending millions of dollars at Trump’s properties while he was in office, likely a violation of the Constitution’s Foreign Emoluments Clause; in 2016 he described himself as the “king of debt,” saying, “I’ve made a fortune by using debt, and if things don’t work out I renegotiate the debt. I mean, that’s a smart thing, not a stupid thing” and explained, “You go back and you say, ‘Hey guess what, the economy crashed, I’m going to give you back half'”; In 2023 Trump said of Xi Jinping, who abolished his own term limits in 2018, “He runs 1.4 billion people with an iron fist. Smart, brilliant, everything perfect.”

  • Just two notes to self for future talks. First, I’m going to practice not using filler words when I leave voicemails on Signal or whatnot. Second, as in fiction, my examples should have been on theme. My example of a dominance hierarchy struggle, for instance, should have been political candidates vying to win the same office (on theme) instead of two boxers fighting (not on theme).

  • Finally, links to my election security journalism, all from 2023: Texas Observer article on whistleblower Reality Winner; investigative article on Coffee County Georgia and accompanying AM/FM nationally syndicated radio appearance on the BradCast; another investigative article related to Georgia not patching voting software despite the Coffee County elections office breach; Daily Dot investigative article about the missing laptop in Coffee County, GA with accompanying blog post. Those are all in the recommended resource list (PDF).

This blog post, Video: My HOPE XV talk: Survey and Scrutiny of Election Security (45min), by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (summary). The license is based on the work at this URL: https://douglaslucas.com/blog/2024/10/26/video-hope-xv-survey-scrutiny-election-security/. You can find the full license (the legalese) here. To learn more about Creative Commons, I suggest this article and the Creative Commons Frequently Asked Questions. Please feel free to discuss this post in the comments section below, but if you’re seeking permissions beyond the scope of the license, or want to correspond with me about this post (or related topics) one on one, then email me: dal@riseup.net. And gimme all your money!

My talk at HOPE XV: Survey and Scrutiny of Election Security: July 12-14, NYC

Promo video for my talk (also on youtube)

ADDITIONAL UPDATE: 14-page PDF I put together: a recommended resource list for this talk, presented July 12, 2024. The resource list contains the following sections: Books and papers; Documentaries; Reality Winner and Kremlin cyberattacks on 2016 elections; BMD vulnerabilities, Coffee County, Georgia elections office breach, and ongoing statewide voting software compromise; Election activism; General deep politics and activism; Douglas Lucas.

UPDATE: The conference schedule is now available. My talk is at 7 p.m. on Friday July 12 in Marillac Auditorium; 50 minutes total including Q&A.

A decade ago, I was a panelist at HOPE X, the tenth Hackers on Planet Earth conference in New York City. Youtube of that panel — on crowdsourcing research into the cyber-intelligence complex — still collects views.

On the way home from the conference, I wrote a humorous article describing my experience: my surprising, then interviewing NSA whistleblower Thomas Drake; the private spies who showed up to surveil the panel and seemed more interested in my articles than most people I actually know are; my rooted smartphone getting hacked … Ah, wonderful times, so long ago.

Now — well, next month, July 12-14 — I’ll give a solo talk at HOPE XV titled Survey and Scrutiny of Election Security.

Wait, what’s this conference again? Sponsored by the magazine 2600: The Hacker Quarterly, HOPE is held every other year in New York City — previously in Manhattan, now in Queens at St. John’s University. Top-billed speakers over the years have included Apple cofounder Steve Wozniak, Dead Kennedys singer Jello Biafra, frenemy of the state Edward Snowden, you get the idea. Typical offerings include lockpicking villages, ham radio and vintage computer stuff, vendors, film screenings, socializing, controversy real or ginned up, private spies watching me, people hacking my phone … plus panels/talks.

You can check out the conference website here, speakers’ bios over here, various promo videos HOPE requested way over here, and short descriptions of every panel/talk all the way over here. The description for mine:

Fake news or flawless? Our computerized elections are neither. To truly understand corporate, closed-source election computers requires understanding how they fit into the wider electoral system and its interlocking parts. Douglas’s investigative journalism will provide case studies documenting how it can go haywire: the 2016 Kremlin cyberattacks on U.S. election infrastructure exposed by whistleblower Reality Winner, the MAGA-led Coffee County elections office breach still compromising Georgia’s statewide voting software, and more. Such details will show how you can help secure elections: scrutineers, statistical forensics, free software voting companies … the list goes on. He will address democracy’s evolution, too, scrutinizing statist voting within the bigger picture of human collaboration.

I’ll create an online reading list for attendees interested in learning more, as well as an overview diagram of the election system’s interlocking parts.

As of this writing, I don’t know which exact day and time my talk will be, but the conference website should be updated with that information any moment [see update above]. If you decide to attend and want to get together, email me: dal@riseup.net. I plan to arrive a day early and stay a day after. Otherwise just watch my talk afterward on Youtube or at the happenin’ headquarters of DouglasLucas.com.

Will I get into any zany HOPE incidents this decade around? Probably. If I encounter anyone from Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) — their three uses of the word security there totally isn’t overcompensation or anything — I have some remarks for them, including regarding my potential lawsuit over their FOIA deni… but that’s another story.

Just remind me not to root my phone.

Creative Commons License

This blog post, My talk at HOPE XV: Survey and Scrutiny of Election Security: July 12-14, NYC, by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (summary). The license is based on the work at this URL: https://douglaslucas.com/blog/2024/06/02/talk-hope-election-security-july-nyc/. You can find the full license (the legalese) here. To learn more about Creative Commons, I suggest this article and the Creative Commons Frequently Asked Questions. Please feel free to discuss this post in the comments section below, but if you’re seeking permissions beyond the scope of the license, or want to correspond with me about this post (or related topics) one on one, email me: dal@riseup.net. And gimme all your money!

My letter to Coffee County, Georgia officials highlighting three key findings of my recent investigative article

Previously unpublished surveillance image of Trump co-defendant Misty Hampton outside the Coffee County elections office on Dec. 15, 2020.

Today I emailed a PDF letter to the Coffee County Commissioners, the Board of Elections and Registration, the election supervisor, the county administrator, the County and/or elections board’s legal representation—Jennifer Herzog and Tony Rowell for Hall Booth Smith; Ben Perkins and Wes Rahn for Oliver Maner—and the only newsman in the otherwise news desert county, editor of Douglas Now Robert Preston. I separately sent the letter to multiple Coffee County residents who have a history of boldly speaking out during public meetings.

The four-page letter does what this blog post’s headline says. On Dec. 19 of last year, the Daily Dot published my latest investigative article, of some 4000 words. It concerns a federal lawsuit over procuring the county’s records related to the infamous elections office breach, most memorably the missing silver laptop used at work for years by then-election supervisor and now Trump co-defendant Misty Hampton. Also on Dec. 19, I self-published a blog post with additional important information cut from the article due to length considerations. My letter takes three revelations from the article, and some information from the blog post—mostly, truths I uncovered about the county not coughing up records—and compressed them down to bullet points for the county leaders’ convenience.

Of the many goals here, one of them is for Coffee County to produce all records from the breach, its run-up, and its aftermath (another interesting goal is Hudson’s proposal; see the article and blog post for more on that one). The unprecedented elections office intrusions in Coffee County were part of an unprecedented campaign planned by top Trumpers, even Trump himself, to arrange for technicians/operatives to make, and take off with, exact copies of the voting software still used across the battleground state of Georgia and myriad jurisdictions beyond. Amplifying this information, sending it to editors, or even advancing it in some useful way (via phone calls, emails, records requests, digging in trash bins outside Dominion Voting Systems offices, et cetera) might, I don’t know, affect some sort of huge upcoming election thing and (more important than that outcome) the narratives we are made to tell ourselves about it. Yeah, seems like there’s something happening later this year on the 5th of November, what could it be again? Remember remember…

Without further ado, the PDF letter as a fancy embed (or download):

Creative Commons License

This blog post, My letter to Coffee County, Georgia officials highlighting three key findings of my recent investigative article, by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (summary). The license is based on the work at this URL: https://douglaslucas.com/blog/2024/01/04/letter-to-coffee-officials-highlighting-three-findings-investigative/. You can find the full license (the legalese) here. To learn more about Creative Commons, I suggest this article and the Creative Commons Frequently Asked Questions. Please feel free to discuss this post (or the underlying article) in the comments section below, but if you’re seeking permissions beyond the scope of the license, or want to correspond with me about this post (or related topics) one on one, email me: dal@riseup.net. And gimme all your money!

Extra material for my Daily Dot investigative article about Coffee County, Georgia missing laptop likely relevant to Curling and Trump cases

Misty Hampton in the Coffee County elections office with the silver laptop, Feb. 22, 2021

Note: All four surveillance images in this post, previously unpublished, are published here for the first time.

Today the Daily Dot published my new investigative article, entitled EXCLUSIVE: A missing laptop could be key to prosecuting Trump. This rural Georgia county only recently admitted that it exists. Prior to publication, I worked on it for about half a year.

Some material was cut to make the article shorter and more focused on the missing silver laptop.

However, of the cut passages, I can post below as paragraphs in a bullet-point list the ones that are, in my view, urgent and important. Think of them as DVD extras showing you deleted scenes from the theatrical release.

To be serious, I believe it might help residents of Coffee County—in the swing state of Georgia—as well as interested people elsewhere to have access to this information immediately. Without further ado:

  • Here’s a summary of the breach by the federal judge presiding over Curling v. Raffensperger, Amy Totenberg in the Northern District of Georgia.

    For her account of the intrusions, Totenberg drew on cybersecurity experts’ declarations—including their review of computer forensics and the surveillance footage—in a Nov. 10, 2023 ruling: the breach included “various individuals and entities (1) providing and gaining unauthorized access to Coffee County voting equipment, data, and software over the course of multiple dates; (2) copying, downloading, and imaging the County’s equipment, data, and software; (3) uploading and sharing that data and software on the internet via a file-sharing website; and (4) further distributing physical copies of forensic voting material downloaded from Coffee County.” (Online distribution was via private access, not public internet.)

  • Some, notably Coffee breach-funding lawyer and onetime Trump lieutenant Sidney Powell, who has pleaded guilty, have tried to justify the intrusions by claiming the elections board approved the electronic collection of the computers’ contents. They offer insufficient documentation to support this claim; further, no board quorum has ever been found to have authorized copying the elections data nor does the security video show any quorum in the elections office during the breach. In a deposition, then-Board of Elections chair Wendell Stone denied that the board gave permission to examine their systems. The civil disobedience or altruism arguments sometimes made are undercut by the plundered proprietary voting software, almost three years later, having never reached the public, nor rival political campaigns, only the breachers’ allies, as far as can be determined.

  • If the subpoenas lawsuit is successful, it might spell out why the county’s public statements, which have focused on Hampton, have been so careful not to mention by name then-elections board member Eric Chaney, who was caught on film participating in the breach. “I didn’t do anything without the direction of Eric Chaney,” Hampton said in deposition. The plaintiffs in the subpoenas case go further, saying Chaney, who has not been charged, “warned Ms. Hampton of her impending termination the evening before” and characterizing him as a “key participant[] in planning and executing the breach.”

  • A letter that counsel for the plaintiffs in the subpoenas case sent to county attorneys in April and filed this month argues that crucial Eric Chaney-related records were improperly withheld by county manager Wesley Vickers and senior county lawyer Tony Rowell, a pair multiple interviewees described to me as the area’s de facto diarchy.

  • Examples of how the lawyers seem to have more power than the people they represent:

    Listening to their lawyer Ben Perkins discuss legal issues at their Nov. 14 meeting, every elections board member said they were not informed of the desktop seizure before it happened, which he told them their then-underling, former election supervisor Rachel Roberts, had been involved in. Ernestine Thomas-Clark, who has long sat on the board, asked the lawyer to clarify how they could in theory terminate him when they hadn’t hired him. Fireable like any board vendor, Perkins was retained by county manager Vickers this June—an appointment some members have described as appearing out of nowhere one day, without their input or vote, something Perkins acknowledged in the meeting. Except for the two initial Oct. 24 motions, he has provided lawsuit filings to board members only when asked, according to board members who told me such requests were rare.

  • Surveillance footage—procured by Coalition for Good Governance despite months of Coffee claiming it had been irrevocably lost— shows senior county lawyer Tony Rowell in December 2020 meetings with people who would go on to participate in the breach. The plaintiffs’ analysis of the video shows that prior to the intrusions, Rowell spent hours and hours in the elections office with, among others, Misty Hampton, Eric Chaney, Ed Voyles, and Cathy Latham. Voyles, who has not been charged in the Georgia-Trump RICO case, chaired the elections board two years prior to the meetings. Latham, like Hampton a Trump co-defendant who has pleaded not guilty, chaired the Coffee Republican party at the time of the intrusions. Also a Trump fake elector (imposter in the Electoral College process), Latham was in a position to have possibly connected Coffee County with MAGA D.C. shortly before the breach.
Misty Hampton, Ed Voyles, and holding the coffee mug, Tony Rowell, in the elections office, Dec. 3, 2020
Ed Voyles (seated), Eric Chaney, Tony Rowell (holding cup) in elections office, Dec. 10, 2020
  • The Coffee County Commissioners, almost never mentioned in discussions on the breach and the most powerful county executives under law, have the ability to fire their vendor Hall Booth Smith—including Tony Rowell—and county manager Vickers, though not Oliver Maner (the elections board’s vendor for legal services). I repeatedly contacted all five commissioners with questions on the subpoenas lawsuit and a CCTV still of the silver laptop, asking if they’re satisfied with the performance of the county’s de facto diarchy. County commissioner Jimmy Kitchens told me “I have no comment”; county commissioner Oscar Paulk deferred to legal counsel Tony Rowell. The other three commissioners never responded.

  • In Judge Totenberg’s same Nov. 10, 2023 ruling, she concisely addressed the underexamined cybersecurity plight of state voting systems and the possible ripple effects of the breach: “The importance of the security, reliability, and functionality of state election systems, classified by the U.S. Homeland Security Department as critical national infrastructure, cannot be overstated in a world where cybersecurity challenges have exponentially increased in the last decade. The dynamics of how a breach in one part of a cyber system may potentially carry cybersecurity reverberations for the entire system for years to come exemplifies the important concerns raised in this case.”

  • The Curling v. Raffensperger plaintiffs seek to force the swing state of Georgia to (on the vote capture side) abandon mandatory electronic ballots and in most circumstances use hand-marked paper ones, that will (on the vote tallying side) still be scanned by computers but always audited.

  • The GBI report (critique; critique) omits reference to the silver Hewlett Packard altogether and instead, any laptops it mentions are either nondescript or an old black Toshiba. Their report acknowledges that the Toshiba had last been used in 2015—the Obama era, and thus not relevant to the breach, the run-up to it, or the aftermath, except as a red herring that the county many times brought up in place of the silver laptop.

    Also per the GBI report, in August 2022, surrounded by three of his lawyers—including Rowell of the de facto diarchy—recently resigned elections board chair Wendell Stone refused to participate when the Bureau tried to interview him in person. Then, making his public statement in June 2023, Stone promised “transparent” elections to the locals in front of him—but did not share that eight days earlier, the GBI had seized their elections office desktop.

  • Local lawyer Jim Hudson’s proposal for independent and possibly pro bono counsel and the idea of asking the Department of Justice for help are not necessarily mutually exclusive. Hudson’s idea, while nebulous to some ears, at best would allow those most affected by the intrusions—Coffee voters—to participate in a bottom-up inquiry into all aspects of the breach and its aftermath, aided by the independent counsel and able to notify the Justice Department of any criminality discovered. The Department of Justice, by contrast, boasts multistate range and federal muscle, but without a strong defense of the local public interest in place, they would risk being seen, fairly or not, as just another set of politicized outsiders, at worst sparking more resentment than repair.

  • A November poll in the New York Times shows Trump ahead of President Joe Biden in five of six battleground states, including Georgia. Legally, nothing prevents an incarcerated individual from running for president, nor indeed, from serving as president. However, the Supreme Court might affirm state or local officials disqualifying Trump due to his inciting of the Jan.6 auto-coup attempt. If not, my guess is, Mar-a-Lago house arrest would be set up for such a presidency.

  • My final two paragraphs from an earlier iteration of the article:

    With bold leadership missing like a silver laptop, jitters about the GBI or other law enforcement behind every Eastern red cedar—paranoid or justified—proliferate; simultaneously, the known extent of the Trumpers’ multistate breach plot grows, reminding voters from coast to coast that their jurisdiction could have been hit. “Scared to death” Matthew McCullough, fulminating against the Georgia Bureau of Investigation, must not be the only Coffee County official afraid “to go to jail.”

    Aside from the immense force of the breach records lawsuit and its costs, it seems the only way the county’s status quo will change is if the region’s residents, perhaps in conjunction with the DOJ, perhaps aided by Hudson’s vision for independent counsel, reshape the area’s stepped landscape of power themselves. The Trump era cannot be locked up by any prosecutor, nor can it be compartmentalized away with the click of a television remote—the healing of truth and reconciliation would be more realistic. Cybervulnerable Election 2024 is less than a year away. Self-governance requires effort.
Misty Hampton with the silver laptop in the elections office, Dec. 15, 2020

Creative Commons License

This blog post, Extra material for my Daily Dot investigative article about Coffee County, Georgia missing laptop likely relevant to Curling and Trump cases, by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (summary). The license is based on the work at this URL: https://douglaslucas.com/blog/2023/12/19/extra-material-dailydot-investigative-article-laptop/. You can find the full license (the legalese) here. To learn more about Creative Commons, I suggest this article and the Creative Commons Frequently Asked Questions. Please feel free to discuss this post (or the underlying article) in the comments section below, but if you’re seeking permissions beyond the scope of the license, or want to correspond with me about this post (or the article) one on one, email me: dal@riseup.net. And gimme all your money!

Why’s the CIA’s David Shedd texting me out of the blue?

The image shows a text-message sent from 17034082506 on Wednesday August 3 at 5:20 a.m. The message reads: "Good morning Ed. This is David Shedd writing from our new place in south Florida in response to your wonderful update letter. Before writing more, I want to make sure that you get this note and the text works.  Warm regards, David"
There’s more to this than meets the eye

On August 3, I woke to see on my smartphone a text from David Shedd, a retired career intelligence officer who started at the CIA as an intern decades ago and climbed the ranks to senior management, even meeting with Obama face to face in 2008 to discuss continuing the agency’s torture program. Why is a lifelong spy who also headed the Defense Intelligence Agency messaging me at five in the morning? He’s as spooky as anybody in international espionage: he was on the transition team of organized crime-linked Donald Trump, he’s on faculty at Patrick Henry University — a Creationist school requiring all students and staff to attest that the Bible is their deity’s inerrant word — and who knows what else. And now he’s in my texts.

Back to back in 2018, I wrote one article, for Buffalo’s Daily Public, and contributed to the writing of another, at Boing Boing, regarding video footage Shedd ordered censored that year. So that’s why I’m on his radar generally. But all that was more than four years ago. Why ping me now?

First, some background to contextualize his odd message.

The Backstory

Left to right on the whistleblowing panel: Heather Marsh, moderator Laali Vadlamani, David Shedd, Ewen MacAskill

On February 27, 2018, the Oxford Union held, then censored at Shedd’s demand, a three-person panel on the very topic of whistleblowing. Here in the United States we don’t hear much about this debating society, but in the United Kingdom the Oxford Union is a huge deal: not only have Malcolm X, Winston Churchill, and additional historic figures spoken there, but over the years three of their student presidents have become U.K. prime ministers. A few months ago, one of the planet’s biggest newspapers offered the headline: How the Oxford Union created today’s ruling political class.

The controversial panel, held in the forum’s Goodman Library, consisted of philosopher and human rights activist Heather Marsh, longtime Guardian reporter Ewen MacAskill, and Shedd. Toward the end of the evening, the spy didn’t fare well in a back-and-forth with Marsh about torture and other subjects involving how hurting people in shadowy cages is bad actually, so with a politican’s pettiness, Shedd told the Union never to release the video recording. Marsh and her lawyers contend the Union is contractually obliged to upload the film as promised to youtube, which they’ve so far failed to do. The handful of photos they posted don’t count.

Marsh, Shedd debating during panel. Her friend is former Guantanamo Bay prisoner Omar Khadr.

A few months later, Marsh became a whistleblower herself, posting audio of her portion of the panel as well as a transcript. She wrote an accompanying analysis of the censorship, too, discussing how free speech for corporations, predators, and tyrants is shrilly upheld but the words of women and other marginalized people against the powerful are regularly shut down. When the Oxford Union bills itself as the “world’s most prestigious debating society” and the “last bastion of free speech” — then agrees to third party censorship of their own footage of a panel on whistleblowing — the society reveals its ultimate loyalty to the likes of Shedd making up the protection racket that today’s governance amounts to, where the arch-abusers run wild, occasionally promising security and belonging to the gullible who surrender their self and become obedient.

Learning of Marsh defeating Shedd, and Shedd’s subsequent censorship demand, I decided to cover the story and bought phone numbers for the his homes so I could ask him for comment. Through public records sites, personally identifiable information of just about anyone in the United States, king or streetsweeper, is available online legally in exchange for lucre. I politely called the Shedd-associated numbers, which did not include the one he texted me from. His wife — I think that’s who answered — came to the phone, but didn’t put him on the line. “Stop with the harassing phone calls!” she said, though I’d been well mannered, and though her husband had been a senior manager at a notorious worldwide purveyor of waterboarding, stress positions, sleep deprivation — you know, harassing people, to say the least.

Marsh, Shedd debating during panel. Read more about ICE.

Politely seeking comment is harassment? They clearly have an outsize sense of persecution. I simply wanted to ask him straightforward questions such as Mr Shedd, should I describe you in my article as petulant? Or do you prefer petty? How about sore loser? Anyway, my calls to his homes were the only contact I’ve ever had with Clan Shedd, and since I didn’t get ahold of the man himself, I’d never had contact with him until his weird SMS. It’s a routine thing: journalist writing article requests comment; doesn’t hear back. But more than four years later, a sudden text?

To finish up the backstory, note that while the Oxford Union student newspaper mentioned the controversy in 2018, and so did the World Socialist Web Site that same year (one; two; three; four), nobody else — besides me (with my in-depth reporting), Marsh, and social media supporters — has uttered a peep. Even Ewen MacAskill, the third panelist, has said nothing from his perch on good terms with the highly influential Guardian newspaper. Likely that’s because in the aftermath of the censorship, the Oxford Union gave MacAskill a paid lecture series to talk to audiences about, you guessed it, whistleblowing. You see, experts on whistleblowing don’t talk about censorship they know of. They keep quiet like good puppies awaiting treats. War is peace. Freedom is slavery. Ignorance is strength.

Now fast-forward to this summer, what triggered Shedd to contact me out of the blue.

Why now?

In the time frame of Shedd’s message, two things were occuring that might have prompted him to send me his strange little note.

One: Unbeknownst to me until late August, the Oxford Union in July asked Marsh to give a solo talk, something she wrote about today on her Patreon in a public post. She asked if they’d post the panel video — with Shedd blurred and muted if necessary, something they’ve done before when an individual didn’t want her performance published. In response, the Union ghosted Marsh. Presumably the debating society, following up on her question, asked Shedd if he’d change his mind, and the hierarch must have said No. And had nothing better to do than text a freelance journalist deceptively — petty and petulant and a sore loser — worrying about how all this is going to reflect on his legacy. Silverbacks like Shedd love legacy: parades, presidental libraries, pyramids. Retired and aging, he must fear the facts around February 27, 2018 will correctly tarnish his status in history. Books and articles are routinely published that trumpet Shedd (and separately, the Oxford Union), so he’s accustomed to accolades, not dissent.

Shedd sitting on the panel looking angry.
Subterfuge Shedd losing debate

The other: On an ongoing basis I have for years submitted pieces to mainstream and alternative media sites that either focus on, or include, Shedd’s censorship. Revelation of the facts in a large venue would greatly help impute guilt to Shedd in the public record so he can accordingly be shunned and feel shame, unless of course his emotional processing is atrophied, which it probably is from aiding in the command of the CIA. That organization has a long history of propagandistic manipulations of the media. See for instance Watergate reporter Carl Bernstein’s 1977 Rolling Stone deep dive on the topic addressing cover-ups of how the United States news media “worked hand in glove with the Central Intelligence Agency.” All that said — to indicate the water I’m swimming in — I have no evidence, nor even intuition, that anything illicit has happened with my freelancing, but it’s within the realm of possibility somebody at such a venue told somebody who told somebody who told somebody a freelancer named Doug is still working on winning amplification for this story, and it reached Shedd’s ears.

With the 2018 and 2022 contexts established, let’s scrutinize the spy’s missive.

Scaredy cat’s sneak attack

Good morning Ed. This is David Shedd writing from our new place in south Florida in response to your wonderful update letter. Before writing more, I want to make sure that you get this note and the text works. Warm regards, David

The message arrived at 5:20 a.m. Pacific time (I’m in Seattle). Assuming he was actually in Florida, that would be 8:20 a.m. Eastern. Pretty early to shoot off a mysterious communiqué — maybe he was in a bad mood, rising on the wrong side of the bed after earlier listening to the Oxford Union ask his permission to publish the video. Since he apparently controls them now and apparently told them No way.

I have no idea who Ed is, if anyone. In December 2020, Shedd authored an op-ed titled “Edward Snowden Should Not Get A Pardon Under Any Circumstances,” so I don’t think Shedd means him.

Shedd looking offended and off guard.
Shedd on the debate panel he lost

As stated above, I’d never before seen this (703) 408-2506 number, but it’s a northeastern Virginia area code where the CIA is located some ten miles from D.C. And my trusty public records services confirmed it belongs to David R. Shedd. Now I have a convenient number to call him at in case I need to request comments again. And so do you.

Regarding Shedd obtaining my phone number, maybe he paid for public records too, maybe he successfully stored my digits for over four years and put in the effort to move them to his (703) 408-2506 device, or maybe, as I documented the Austin-based private spy firm Stratfor assisting with in an unrelated but similar matter, he called a friend with access to surveillance databases and got it that way, saved himself a few bucks. He spearheaded the 2008 revisions to Executive Order 12333, which outlines when and how federal intelligence agencies may spy, so I’m sure he knows multiple ways to grab someone’s digits.

Here’s the big question. Why the deception gambit? The message asks the recipient to respond to confirm the connection is good. Why not just address me as Douglas and say … what exactly? Stop talking about me getting whopped in that debate?

Surely after more than four years, it was no mere pocket-dial or oopsident. If you’ve spent time reading leaked cables between government agents and the like, you know they pick words carefully and stamp security classifications on their papers and all that jazz. Somebody in the spy-versus-spy, backstabber-versus-backstabber world of meetings in the White House and the intelligence agencies is probably going to take his communications pretty seriously especially in light of Marsh concurrently asking the Oxford Union to release the recording.

To understand this better, let’s turn to the spy glossary created by that Austin firm Stratfor, sometimes called a “shadow CIA,” staffed with former military, former intelligence agency spooks, and an assistant to corporations in defending against activists. They define disinformation in part as “A plausible story designed to confuse the other side or to create an uncomfortable political situation.” Pinging the system means in part “Emitting information that is designed to be intercepted by the other side. Usual purpose: figure out their response patterns. Other uses, confusing the other side.” In short, subterfuge is a way of life for these people, including propaganda and manipulation of media like freelance journalists. They’re not serving the public honestly; they’re serving the shareholders and themselves; so why expect a message from a straight shooter?

My guess is Shedd, too timid to use his own name, was trying to bait me into responding, and/or stress me out: I’m watching. CIA is watching. But if you ask them for comment, they’ll just say I must have dialed the wrong number. Hahaha!

Since vanishingly few have ever published about the whistleblowing panel censorship, you have to wonder who else besides the Oxford Union Shedd is intimidating. He’s not stopping me.

David Shedd keeps losing

This is a color photograph of the whistleblowing panel showing the moderator on the left, Ewen MacAskill on the right, and in the center, Shedd looking surprised and off guard

Such childish antics are among the activities of egregious human rights-violating hierarchs — when they’re not losing debates. Because on their side, they don’t have the truth. He prefers propaganda and fears the facts.

If Shedd’s goal was to scare me, he failed. Fragile Shedd lost again. Whatever the CIA (or Stratfor) may say, protection rackets for the highest bidders, as Marsh pointed out on the panel, aren’t security. As she said, “security is strong involved and supportive communities networked with other communities.” When I moved to Seattle in 2016, I began participating with local chapters of the Hearing Voices Network and Food Not Bombs. These egalitarian movements — and more associations with genuine activists — have afforded me close friends who, unlike many among the civilian/loyalist population, understand my work and show up to support me regularly or when something spooky happens like Shedd’s text. Protective, interlocking horizontal networks turned Shedd’s grenade into a grape bouncing off me harmlessly.

I think, somehow, one day, the whistleblowing video will be released. And then Shedd will have an opportunity to realize he’s not entitled to exceptional treatment. It’s not just his lifelong subterfuge that he tried to deploy on me. I think he’s also trying to fool himself. The longer the footage stays secret, the more easily he — and the public — can follow the head-in-sand, pro-impunity bipartisan philosophy of “look forward, not back” to avoid facing the truths Marsh (and others) have brought forward about our real legacy of torture, governance protection rackets, and so many more injustices. And the more petty and petulant Shedd’s sore loser legacy becomes.

Shot of panel shows moderator watching Marsh with her hand raised, likely making a point, as Shedd looks on with angry expression.
Still the debate winner

Creative Commons License

This blog post, Why’s the CIA’s David Shedd texting me out of the blue?, by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (summary). The license is based on the work at this URL: https://douglaslucas.com/blog/2022/09/01/why-cia-david-shedd-messaging-me/. You can find the full license (the legalese) here. To learn more about Creative Commons, I suggest this article and the Creative Commons Frequently Asked Questions. Seeking permissions beyond the scope of this license, or want to correspond with me about this post one on one? Email me: dal@riseup.net. And gimme all your money!

#PardonRealityWinner: Whistleblower moves to three years of supervised release on November 23, 2021

Note: In 2021, I’m writing a new blog post every weekend or so. This is entry 46 of 52.

You probably remember the name Reality Winner and at least some of her story: in May 2017, when Trump fired then-FBI director James Comey for his investigation into the Putin regime’s interference with the presidential election on behalf of a certain cheeto-colored demagogue, a whistleblower in her twenties leaked a classified document detailing how the Russian military hacked US election systems just days before the November 2016 election. I reported in person from her August 2018 sentencing in Augusta Georgia, where, in the Trump administration’s first espionage case against a domestic whistleblower, Reality Winner was given the longest prison term ever for a disclosure to the media.

This week, news in the United States — whether social, corporate, or other — will likely focus on Reality Winner again since the Bureau of Prisons on Tuesday is changing her status from her current home confinement situation (began June 9) to three years of supervised release, phase similar to the more familiar, state-level term parole, which technically no longer exists on the federal level. Her ankle monitor will finally be removed. Recent and ongoing media of various types continue to focus on her case, especially this week.

As a result of the news, the public may have a lot of questions. This post provides an overview of her case, the leaked document and its implications, as well as the surrounding media discourse, plus definitions of relevant Bureau of Prisons jargon and a menu of actions you can pick from to help Reality Winner gain a pardon, the chief goal her family is calling for help with.

Who’s Reality Winner again? What was that document about?

Reality Winner is an idealistic, intelligent, and altruistic Texan. The two best sources of information about her as a person are probably the 2017 New York Magazine profile titled “The World’s Biggest Terrorist Has a Pikachu Bedspread” and the twitter feeds of her family: her mother Billie J. Winner-Davis, her sister Brittany Winner, and her (step)father Gary Davis. If you’re interested, follow those accounts, or at least know how to search their tweets. A good rule of thumb for whistleblower cases: get your information not from the social-climbers and co-opters, but from their families, loved ones, and lawyers like Reality Winner’s attorney Alison Grinter. (The whistleblowers themselves are usually under gag orders.)

Beginning of the document Winner leaked

Winner is also an Air Force veteran who, at the time she snailmailed the restricted document to The Intercept, was working for Virginia-based spy contractor Pluribus International. You might know the US spy agencies — rebranded intelligence agencies especially following 1970s revelations of scandals such as Operation Mockingbird — are mostly staffed by contractors, whose trade secrets and other private properties are exempt from public oversight due to the laws of biz. In other words, the so-called intelligence community, its structure if not particular individuals within, is motivated not by public safety, but by profit and worse. For Pluribus International, the multilingual Winner translated into English surveilled terrorist communications from languages such as Farsi and Pashto. As Trump was firing Comey, a secret network board system, akin to a classified version of Reddit and accessible by Pluribus International staff, ranked a certain document highly, indicating wide interest in it.

The document, and The Intercept article about it, describes cyberattacks, carried out just days before the 2016 elections, by Russian military hackers against more than 100 local election officials in the United States and at least one U.S. supplier of software used to manage voter rolls in multiple counties. In short, Winner gave everyone information required for self-governance, gave everyone necessary knowledge otherwise unavailable. That includes any voting vendor staff who, without security clearances, would not have been able to access such protective classified information unless it appeared in open discourse. Computer security expert Bruce Schneier, a fellow at Harvard Law School’s Berkman Center for Internet & Society, wrote in a June 9, 2017 post on his personal website that the cyberattacks disclosed by Reality Winner “illustrate the real threats and vulnerabilities facing our elections, and they point to solutions.”

Such computer vulnerabilities ultimately show how state, corporate, or other criminal actors (or combinations thereof), anywhere in the world, can manipulate elections, anywhere in the world, to secretly condition the public into believing lies. As philosopher and former Wikileaks Central editor Heather Marsh explains in my article from Winner’s sentencing:

“This document is more than just evidence of Russian interference. In many ways, the US election is a high-profile, long-term investigation into the nature of how democracies work today. Opinions are manipulated by organizations such as Cambridge Analytica in conjunction with intelligence collection by organizations such as Wikistrat. These are problems which have plagued all democracies for years now–Canada’s 2011 voter suppression robocalls and Andrés Sepúlveda’s decade-long manipulation of Latin American elections are two earlier reported examples of modern election interference.”

Marsh’s quotation continues in my article from her sentencing. The public’s understanding of TrumPutin wouldn’t have developed to the extent it did, had Winner not gifted us (and Congress) with the secret document.

In that same article of mine, long-time elections integrity activist Bev Harris explains the cyberattacks described Winner’s in disclosure are part of the same cyberattacks that make up the last count in then-special counsel Robert Mueller’s ’12 Russians’ indictment against the Putin regime’s military hackers. The top prosecutorial agency in the United States issuing an international criminal indictment drawing in part from the deed of this imprisoned whistleblower, an individual in her mid-twenties wrongly called by that same agency’s lawyer Bobby L. Christine “the quintessential example of an insider threat,” suggests, as do many other things, that Winner deserved a medal, not a prison sentence, and at the very least deserves a pardon now.

Sinners in the hands of an angry audience

First page of revivalist preacher Jonathan Edwards's 1741 sermon "Sinners in the Hands of an Angry Audience
Reality Winner did nothing wrong

FOX News ran a paint-by-numbers campaign tarring Winner, the arguments of which are easy to dismantle. The TV hosts, typically on whatever forms of speed — just hit pause and look at their eyes; also, how do you think they manage to broadcast nonstop? — raged about how on social media, Winner called Trump an “orange fascist” and messaged her sister about hating America. Besides considering Trump’s actual fascism and horrible things done by the United States (for instance, by the CIA), just imagine for an analogy that you’re waiting at Discount Tire for the mechanics to finish with your car. In the morning, a caffeine-deprived mechanic in the back employee area, perhaps a decorated veteran like Winner, grouses to another mechanic about hating Discount Tire’s early start times and lack of vegan food in the break room. As afternoon arrives, the same mechanic and a third mechanic talk together about how the company does offer them good things too, including the opportunity to tinker with a steady stream of various automobiles. By evening, the mechanic says they have mixed feelings about Discount Tire and the company should make some improvements. That’s essentially what the comments of Winner and everyone else venting about politics on social media boil down to. It isn’t difficult for those outside tunnel vision to understand.

Meanwhile, on the mainstream US left, comfy members of the public have seemingly decided that nothing is possible except voting for evil on un-auditable computerized election infrastructure while making fun of whistleblowers’ unusual names. If horrific human rights violations happen every day and humanity goes extinct, well, the thinking seems to go, at least they got a few more moments to [insert distractions here]. Expecting lifelong entertainment, these audiences will get angry when instead they’re presented with education.

The duopoly stereotypes above are fortunately dissolving faster and faster as the public, especially younger generations, communicate interpersonally more and more, thanks to the Internet. However, the propaganda battles online continue, as does increasing authoritarian control of the online world.

Bottom line, fight for justice: don’t be a newb whose biggest ‘contribution’ this week is shitposting lazy remarks about Reality Winner’s excellent aptronym; instead, learn more about her case (below) and select a way to help her get a pardon (also below).

Recent or ongoing media offering more about the whistleblower and/or the document she disclosed

Photo from stageplay Is This a Room

Reality Winner is the subject of Is This A Room, a new Broadway stageplay based on the transcript of her FBI interrogation, during which she was not Mirandized: she was not read her rights, not for remaining silent, not for a lawyer’s presence. This (il)legal sleight of hand was pulled off in the courtroom by the prosecutors denying the context and insisting Winner “would have felt free to terminate the encounter.” But the eleven FBI agents, each male and almost all of them armed, pressured her in many ways, tantamount to coercion, including by bullying her into the titular seven-by-nine-foot unfurnished back room she told them was “creepy” and “weird.” With her cramped into the claustrophobic space, they blocked the doors and proceeded with the supposedly voluntary interrogation. According to reviews, the stageplay — I’ve yet to see it — reunites the transcript and the context, helping to alter our crazymaking world into something new that actually drives people sane.

(Such isolation and control as the FBI agents’ is similarly employed elsewhere in our lives to produce bogus psuedo-realities. To take one example out of zillions, consider an antidepressant trial started when the COVID-19 pandemic started. How’s the confound of a terrifying pandemic removed from the analysis of the psychopharmaceutical’s efficacy? Likewise, the context of study participants being paid and promised better lives, is likewise snipped out by contractor scientists who sometimes even hold conflict-of-interest patents on the pills in question, since unlike salaried scientists, contractor scientists, akin to those contractors staffing spy agenices, are exempt from disclosure requirements, that is, transparency and accountability requirements.)

Is This A Room, 70 minutes with no intermission, runs at the Lyceum Theatre through November 27. Official website; buy tickets. The stageplay has received critical acclaim and sudden popularity.

Given the success of the stageplay, the Broadway Podcast Network recently launched a series entitled This Is Reality. With more on the way, they presently offer four full episodes, released between October 18 and November 17. I recommend listening for great, up-to-date information about Reality Winner, her case, and more, including how the 1917 Espionage Act, more than a century old, is used federally not to prosecute individuals for sharing military movements with foreign enemies, but to prosecute domestic whistleblowers for sharing restricted knowledge with the public (usually via the media), i.e. the enemy of authoritarians is the public, you and me.

The DC-based Dworkin Report, hosted by politico Scott Dworkin, cofounder of The Democratic Coalition political action committee, offers a trio of recent interviews. First, from August 4, an interview with Winner’s lawyer, Dallas-based Alison Grinter. Second, from October 5, an interview with the whistleblower’s sister, Brittany Winner. Third, from October 7, an interview with Billie J. Winner-Davis, Reality Winner’s mother who on social media fiercely advocates for her family every single day. Those Dworkin Report links have been going down sometimes, so if they’re temporarily unavailable, try elsewhere: first interview, second interview, third interview. Make sure you listen to Scott Dworkin’s interview of Billie J. Winner-Davis, the whistleblower’s mother. I’ll note two things about it. First, she calls upon Biden to grant her daughter clemency (a pardon is a form of clemency). Second, about Glenn Greenwald. After I spearheaded a successful effort to drag him in 2014 long before it became popular to do so (see here, here, here, here, and elsewhere), I switched to just ignoring Greenbacks, since that’s often the most effective way to turn someone’s volume down. However, Billie J. Winner-Davis says something in the third interview that I think is worth making an exception for, worth amplifying. Reality Winner was burned (arrested) as a source for The Intercept because (as the official story goes, anyhow), journalists there not only talked with government officials trying to confirm the document’s veracity (which is fine), but also sent them the document itself (which isn’t fine), enabling them to track the whistleblower down from various clues associated with the document. Asked about that, Billie J. Winner-Davis told Scott Dworkin:

“Glenn Greenwald is, I mean, he’s hard to figure out; he likes to use Reality to create, you know, a social media storm. But that’s what he’s doing: he’s using her. I wish he would just stop. You know, I have gotten so much support from people from The Intercept and from First Look Media who have reached out to me personally who have expressed the regret about what happened to Reality and who have expressed their support for her and for our family. Glenn Greenwald is not one of those people, and I just wish he would go away.”

I predict that during this new decade, revelations will arrive of popular US-based or US-ish lefty journalists being on the take (receiving illicit money from) the BRICS regimes such as Putin’s. Occasionally I look at job openings at tiny “radical news” outlets and see the high pay and think, yeah, this doesn’t add up. As Spock might say, simple logic. An important byproduct of Winner’s leak has been the reactions of others, exposing who cares about inflating themselves as Great Men while supporting red-brown alliance (red commies cliquing up with brown fascists as oft black-clad anarchists go on as DIY as ever) and BRICS interests (here’s looking at you, clan Assadnge), versus who cares about human rights, including for whistleblowers who are women (and thus too often downplayed or ignored), as well as open democracy over authoritarianism.

Another source of information: documentary filmmaker Sonia Kennebeck’s 93-minute movie United States vs. Reality Winner that premiered earlier this year.

Finally, my August 2018 article from her sentencing is the only detailed narrative from the courtroom, and one of the very few written detailed analyses, besides the original Intercept article, of the leaked document. I’ve also written posts about her case here, which you can find via clicking my blog’s Reality Winner tag. I have some additional unpublished investigative material I plan to pull together for release soon.

Cover art for Worldly Wise vocabulary book 4 shows a pencil sketch of an owl with words on the owl's front
Vocabulary workbook series given to students at in my K-12 in the eighties and nineties, in Texas

Frequently asked vocabulary

Like any bureaucracy, the carceral industry and the Bureau of Prisons in particular have their own specialized, intentionally impenetrable jargon. Since these terms will be thrown around this workweek — and in the future regarding other federal whistleblower cases — here’s a quick glossary explaining what the lingo actually means on the federal level and how it pertains to Reality Winner.

Note: To follow the below, it helps to understand the timeline of Winner’s imprisonment: after sentencing, she was moved to incarceration at FCC Carswell in Fort Worth. Then on good time earned, she was moved a little early to incarceration in person at a halfway house. Next, on June 9, she moved to home confinement, still considered incarceration, involving conditions such as a buzzing electronic ankle monitor, and requiring frequent reporting to the halfway house for drug testing and the like. Then Tuesday she’s no longer incarcerated, but on three years of supervised release, basically the federal equivalent of parole.

Now the definitions. On Monday I asked Winner’s lawyer Alison Grinter about these terms, but any mistakes are mine.

Supervised release) A period of time after incarceration that’s supposed to help prisoners re-integrate back into society. Sort of a midpoint between full Bureau of Prisons custody and living out in the free world. It’s close to the more familiar, state-level concept of parole, which no longer exists on the federal level. If a prisoner on supervised release is held to have violated conditions, the Bureau of Prisons can yank them back behind bars for the remainder of the sentence.

Halfway house) To be exact, halfway house is an umbrella term that encompasses a few different types of facilities. Generally, though, and in Reality Winner’s case, a halfway house means what the Bureau of Prisons calls a Residential Reentry Center (RRC), unsurprisingly run by a private contractor. Typically, federal prisoners go to these halfway houses directly after incarceration and physically stay there. Later, during home confinement, the prisoners frequently report to the halfway houses, which set the conditions of their home confinement period.

Home confinement) Still considered incarceration, home confinements see prisoners living at home with a heavy electronic ankle monitor. They’re expected to obey strict conditions and report to the halfway house periodically.

Clemency) Formally speaking, clemency isn’t a federal concept. Informally, though, it refers to the remedies an executive can give prisoners, among them commutations and pardons. Reality Winner asks for clemency, specifically (and more precisely) a pardon.

Commutation) A commutation is a federal remedy that essentially speeds up a prisoner’s sentence. A commuted sentence is stopped early; prisoners’ sentences are over sooner than they would have been otherwise. But with the behind bars, halfway house, and home confinement phases over on Tuesday, Reality Winner is no longer seeking a commutation; instead, she’s seeking a pardon.

Pardon) A convict receiving a federal pardon is no longer a felon; in the eyes of the law at least, they’re fully and completely forgiven. Yet there’s no federal expungement: the pardoned individual’s case still happened. The point of the pardon is that legally, any and all the felony conviction disabilities, as the adverse consequences are called, are removed. That said, what specific employers or apps choose to do regarding a pardoned former felon, may be up to them.

Expungement) This isn’t available at the federal level. Expungement is a state-level remedy. For example in Texas, an expungement (“expunction” in the Texas statutes) means files about a crime are destroyed and the offense is removed from the person’s criminal record.

Parole) A state-level concept. Parole technically no longer exists at the federal level; it’s been replaced by the concept of supervised release. For general audiences, though, it’s fair enough to imprecisely refer to someone’s supervised release as parole, but for the more exact among us, supervised release is correct.

Probation) This doesn’t relate to Reality Winner’s case. Probation is something imposed in place of incarceration. For example, at a sentencing, a federal judge might impose two months of probation on a defendant as opposed to two years in prison.

Office of Probation and Pretrial Service) Also known as the U.S. Probation and Pretrial Services System, this is the bureau in the judicial branch that not only administers probation, but also administers supervised release.

Probation officer or supervised release officer) Employed by the Office of Probation and Pretrial Service, this person is the one making the day-to-day decisions about a felon’s supervised released conditions. Technically, they’re called a supervised release officer. They might refer to themself as a probation officer, given their employer. That may even be true of Reality Winner’s officer, despite her being on supervised release, not probation.

Those are the vocabulary terms for how the federal carceral system is supposed to work, although as a May 2017 article I wrote for The Cryptosphere shows, things may play out differently in practice, suggesting a strange mix of incompetence and/or decision-makers who aren’t on the up and up, to say the least.

#PardonRealityWinner

It’s important to recognize that even on supervised release and afterward, Reality Winner, though outside prison walls, isn’t free. Her felony record and plea agreement will continue to prevent her from fully speaking out about her case and the leaked document and its implications. On Monday, I asked Winner’s lawyer Alison Grinter about that adverse consequence of her conviction and the additional adverse consequences I describe in the two paragraphs below, but again, any mistakes are mine.

Reality Winner standing next to a Christmas tree at home and smiling
Photo of Reality Winner taken by her mother in December 2016. A pardon would be the best present

While Winner’s on supervised release for three years, she must obey strict conditions, which may vary according to her supervised release officer’s interpretations or caprices. To legally dispute the officer requires expensive, time-consuming, and stressful requests to the court in Augusta Georgia. Winner on supervised release has a curfew (can’t leave before 6 a.m. and has to be home by 10 p.m.) and must remain physically within the Southern District of Texas, though it’s the Augusta Georgia court that convicted her that ultimately calls the shots. The officer may choose to continue the surveillance of her smartphone. References in interviews to dating apps blocking her as a user revolve not around the supervised release conditions, but rather those apps querying databases and determining she’s a felon and thus barred from swiping.

Without a pardon, Winner will suffer what lawyers refer to as the disabilities of being a felon. For example, she’s banned from certain federal lands (the specifics are complicated). She’s not eligible for various federal benefits such as housing. She can’t own weapons (not uncommon in rural Texas), nor, in a strange provision, may she own body armor. Certain other countries may forbid entry or permanent residency to a U.S. felon. The list goes on.

A pardon would delete all of the above problems and restore Reality Winner’s freedom. It would allow her to share the full story. Like the full story, a pardon would also send an enormous domestic and international signal that the United States does not endorse TrumPutin-style autocracy. In other words, in the interest of open democracy, the United States Government has the need and ability to pardon Reality Winner not just for her, but also for itself and the public. Obama commuted the sentence of, but did not pardon, whistleblower Chelsea Manning; that suggests a pardon for Reality Winner can indeed happen under the Biden administration, but it will take significant effort.

Here are several ways to make #PardonRealityWinner happen:

  • Correspond with the US Pardon Attorney by phone +1 202 616 6070, by email USPardon.Attorney@usdoj.gov, and/or by snailmail: U.S. Department of Justice / Office of the Pardon Attorney / 950 Pennsylvania Avenue – RFK Main Justice Building / Washington, DC 20530. It would be very helpful for them to be deluged with international messages explaining how a pardon for Reality Winner would improve the international standing of the United States after the Trump administration convicted her for keeping the investigation into Russian interference alive.
  • Share articles and posts about pardoning Reality Winner, including in places other than your most familiar/comfortable social media sites. For example, during offline conversations, on social media sites you aren’t yet familiar with, via art such as graffiti or music, and so on.
  • If you know more than one language, translate and share articles and posts about pardoning Reality Winner.

  • Politely badger elected officials about Reality Winner, always pushing for the goal: pardoning her. Schedule appointments, call, donate a small amount to get them to actually reply (hey if corporate interests can bribe so can constituents). I’ve talked about Reality Winner with Kamala Harris at one of her campaign stops; I’ve talked to federal staffers, etc. If you haven’t done similar already in your life, you should, even just for the interesting experience.

  • Anything else you can dream up. Don’t listen to the naysayers boasting of their cynicism to promise themselves it was wise to have given up in life. Beautiful Trouble is a handy resource book / toolkit for learning nonviolent tactics.

  • Sign the online petition, but don’t let that stop you from doing any or all of the above.
Photo shows Reality Winner sitting atop a bale of hay petting a large horse looking up at her.
Billie J. Winner-Davis’s photo of Reality Winner on Nov. 19, 2021

Creative Commons License

This blog post, #PardonRealityWinner: Whistleblower moves to three years of supervised release on November 23, 2021, by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (human-readable summary of license). The license is based on the work at this URL: https://douglaslucas.com/blog/2021/11/22/realitywinner-whistleblower-supervised-release-pardon/. You can view the full license (the legal code aka the legalese) here. For learning more about Creative Commons, I suggest reading this article and the Creative Commons Frequently Asked Questions. Seeking permissions beyond the scope of this license, or want to correspond with me about this post one on one? Email me: dal@riseup.net.

Quick, funny story about a phone scammer trying to get a Riseup email invite code from me

Note: In 2021, I’m writing a new blog post every weekend or so. This is entry 45 of 52.

On September 4, I answered my phone to hear the voice of a man in his thirties or forties: “I’m calling you out of nowhere, and this is a pretty strange call and pretty strange request, so bear with me.” With an opening like that, how could I not keep listening? (I recorded what happened at the time but never got around to blogging about it until tonight.)

Just before the phone rang, I was at home in my high castle, right, reading obscure histories of northeast Oregon towns, digitizing old documents, or whatever it is I do with my eccentric life when I’m not substitute teaching, ghostwriting for dimes scraped off someone else’s dollar, or otherwise answering to the trade economy’s myriad commercial imperatives.

When my phone rang, I thought, Probably another damn spam call. Those in the United States know how they’ve been getting worse in the past few years: another sign of the times, likely. But hey, the area code was 213. Los Angeles! Maybe, just maybe, opportunity was knocking. Hey, even anti-careerists can daydream.

Well, I was wrong. Opportunity wasn’t knocking. Hilarity was.

You won’t believe what happened next

After his fantastic opening line, the mystery caller then explains he’s looking to get an email account with Riseup Networks. For the uninitiated, Riseup is a longstanding Seattle-based provider of email and other tech services for millions of activists worldwide. They’re a savvy collective with decades of meritorious history.

I’ve been using Riseup email—dal@riseup.net—since 2012. Back then, Riseup gave out email accounts to anyone who agreed, or clicked that they agreed, with certain basic human decency principles, free of charge, donations encouraged. Nowadays, Riseup no longer just hands out email accounts. If I recall correctly, they stopped around 2016. Tightening things up; could be. Yet another sign of the times, likely. Currently, to get a Riseup email account, aspiring users need an invite code from someone who already has an account and is willing, in some algorithmic digital trust network sense, to vouch for them.

So, the mystery caller tells me he specifically wants a Riseup email invite code. I say I’m curious how he got my number—not because I’m offended, I explain, but because as a journalist/researcher, I often dig up information on people, and I want to know his tricks.

Like steam exiting the depressurizing coolant expansion tank of an overcompensating pickup truck’s tortured engine system, he barks odd laughter. He can’t help but tell me he ran a search for “riseup.net” and came across my email address and phone number in some online Freedom of Information Act filing of mine. When I used to conduct adversarial interviews more often than I do now, I was amazed at how readily interviewees expectorated the information I sought. Today I understand it’s because they’re tightly wound bio-psycho-socially. If, like Kevin Costner at the climax of his cheesy Robin Hood movie, you aim your interviewing bow and arrow just right, they become spectacularly undone with unintentionally confessional words torrenting out of their big mouths. You might be surprised at how far playing dumb as an interviewer can get you in life, unless you watch the old detective show Columbo.

En garde!

Climactic scene from Spaceballs where, in the evil spaceship, the lovable rogue character and the Darth Vader character face off as if in fencing, but hold their base of their lightsabers just above their clothed, uh, groins.
Spaceballs, the 1987 film masterpiece for every serious thinker

To his black market credit, the mystery caller recovered his poise quickly. Of course, under no circumstance was I going to give him, a total stranger, a Riseup invite code. But I wanted to see how this call was going to go down, and I think he wanted to see, too. That meant at this point in the conversation, the two duelists had taken stock of each other’s lightsabers. The battle was now to begin in earnest.

He launches into a predictable sob story about how he lost his wife and dog and money and homework, could I please give him a Riseup invite code. Man, that’s all he’s got?

I tell him No, I don’t give Riseup invite codes to people I don’t know personally, ever. But I can tell him a good way of going about getting one.

He doesn’t understand I’m hinting at volunteering. He tells me of some corner of the Internet where people are, he says, selling Riseup invite codes. I tell him if a Riseup account is linked to scammers, it poisons the reputation of the account that invited the scammer in, or more generally poisons the trust network of email accounts associated with the scammer, so don’t bother.

With the embarrassing bravado of a demagogue, he pivots to his next attack.

Really? Really?

Then the caller tells me he knows, of all people … the founder of Bitcoin! None other than the pseudonymous Satoshi Nakamoto, whose legal identity, despite many theories, remains uncertain. Wow, someone knows the founder of Bitcoin and just so happened to call me on a random Saturday morning. Que suerte! Not.

Rule number one of an adversarial interview is to keep the interviewee talking. The more words they emit, the more likely they’ll mis-step. So I ignore, sorta acting like I, too, know Satoshi Nakamoto. Doesn’t everyone?

But wherever he’s going with his Bitcoin founder thing is lost because I start laughing, unfortunately breaking character. Out of my typical benevolence, I tell the guy he should join the Riseup Internet Relay Chat channel and volunteer his time, building karma that way until he earns an invite code.

The caller’s totally not interested in ye olde effort. By this point in the call, I’m getting bored. Time to wrap this crap up.

He asks me a final time for an invite code. I say No. “Why are you against it?” he pleads. And I say, “For one thing, because I do get these requests [by email] every other month or so, and they take up way too much time while I’m trying to get work done. Bye!”

A half hour later, he text-messages me a giant poop emoji. The poor thing.

If you use Riseup Networks and can afford to, please donate to them!

Modification of the Debian logo to include an A for anarchy and command line interface code to the effect of installing anarchism.
Riseup Networks images may be found here

Creative Commons License

This blog post, Quick, funny story about a phone scammer trying to get a Riseup email invite code from me, by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (human-readable summary of license). The license is based on the work at this URL: https://douglaslucas.com/blog/2021/11/13/phone-scammer-riseup-email-invite-codes/. You can view the full license (the legal code aka the legalese) here. For learning more about Creative Commons, I suggest reading this article and the Creative Commons Frequently Asked Questions. Seeking permissions beyond the scope of this license, or want to correspond with me about this post one on one? Email me: dal@riseup.net.

Reading ‘The catalyst effect of COVID-19’, a year and a half later

Note: In 2021, I’m writing a new blog post every weekend or so. This is entry 44 of 52. I skipped entry 43 due to travel in the last week of October. I took the photos herein from that trip. The coastal beach pics are off Highway 101 just south of Oregon’s city of Gold Beach. The forest ones are from northwest California’s Jedediah Smith Redwoods State Park. You can find more photographs on my instagram account. Enjoy; I sure did!

Redwood trees and other forest items in northwest California

On March 11, 2020, the World Health Organization for the first time characterized COVID-19 as a pandemic. Problems with the United Nations and its agencies aside, WHO is the authoritative international body providing global health education and coordination, a situation likely to remain until supranational power or the (hopefully informed) public replaces it with their or our next organization. Thus, its director-general’s written opening remarks from that fateful Wednesday’s press conference are quite historically notable. If you’ve never read them, you should; the document’s expertly composed and concise, put together in the heat of a very stressful geopolitical moment.

On April 25, 2020, philosopher Heather Marsh wrote a piece titled “The catalyst effect of COVID-19.” Her post too has had significant impact around the planet already, but if you’re from, or answer to, an intellectual background deriving from the last few centuries in Europe, you might find that assessment a little strange: How could something I’m not already aware of and that’s not on Netflix be important? I actually know an erudite, older activist in Texas who explicitly believes the corporate amplification awarded to Eurocentric thinkers, including Nietzsche, is based not on their demographics and proximity to power, but on merit. For such readers, consider it might be challenging to measure impact for an author who gets censored and who in 2014/2015 sparked worldwide and ongoing discussion of pedo human trafficking. Or just look at the academic credibility she already has. Or recall that the Communist Manifesto, which Karl Marx and Friedrich Engels sent from London to the European continent behind schedule, wasn’t considered historically important until decades after the 1848 revolutions it was meant to influence. Not everything important is already in the important! section of the university bookstore, and who’s arranging the shelving, right?

Walking through the California state park marveling at the redwoods, I was having reminded of Marsh’s “The catalyst effect of COVID-19” due to a wonderful conversation that led me to put a two-and-two together in, I believe, a new way. I’d like to share that small insight. Plus, let’s take a fresh look at Marsh’s post (her glossary may help in reading it; the reading grade is pretty high). A year and a half later, have her predictions about how COVID-19 would catalyze the world come to pass?

Beach and sea on a cloudy day in southwest Oregon

Why the most radical transformation the world has ever seen?

The main of Marsh’s post starts with an astonishing sentence: “We are, or will be, going through the most radical transformation the world has ever seen; people are justly terrified, excited, depressed, heartbroken and hopeful, all at once.” Humans in today’s form have been around for hundreds of thousands of years—and now, the most radical transformation ever? Why?

My little insight answer—besides other factors such as election cycles—that I came up with while the interlocutor and I were hiking back from the redwoods to the de facto trailhead, is that we have two pan- things arriving together, one of them unique, for the first time in our history. As the globe has learned in the past two years, pan- means every, as in everyone and/or everywhere.

The first pan- thing, the unique one, is global communication. As opposed to feudal villages, where you might go your whole life knowing your entire town but never a stranger, we’ve now been approaching a point where everyone can communicate with everyone else, or at least try to do so. Many have made or hinted at this “Information Age” observation—whether that’s Marsh, journalist Barrett Brown, or simply Seattle-based heavy metal band Queensrÿche. Even Marx and Engels noted nearly two centuries ago the importance of “the improved means of communication that are created by modern industry, and that place the workers of different localities in contact with one another.” In 2010, merely six years after the introduction of Facebook in 2004, then-CEO of Google Eric Schmidt said: “There were five exabytes of information created by the entire world between the dawn of civilization and 2003. Now that same amount is created every two days.” Some are still left out of this info-flood—perhaps people with developmental disabilities, or those doomed to spend their lives down in mineshafts, or others somehow blocked from or not desiring tech access. However, though estimates vary, social media platforms nowadays have billions of users, and that doesn’t count the tremendous amount of additional people if you consider shared accounts and shared devices.

The second pan- thing is the pandemic; humans have suffered pandemics before, but now everybody can talk about one of them—in real time. In the past, crises that have affected all have been too complicated or too removed to impact the daily experience of plenty of individuals such that they understand what’s going on. For instance, issues are around ozone layer depletion/recovery and the Montreal Protocol banning CFCs are simply over the heads (pun intended) of individuals unfamiliar with the subject: Something new will go wrong with the sky? Yeah whatever! Even the frustrating topic of money, seemingly universal, is pretty much irrelevant for decorative members of contemporary royalty, kept in lifelong gilded cages. Yet everyone is threatened by contagion; the novel coronavirus can infect anyone, no matter who or where you are. I imagine there must be exceptions, very few, to universal awareness of the idea of COVID-19 contagion risk (even if some disagree it’s a genuine risk), but—perhaps to the surprise of reactionaries—refugees near the Del Rio International Bridge between Texas and Mexico (a human rights crisis heightened in Sept/Oct of this year but existing previously and surely again) understood the concept of anti-coronavirus mitigation measures, and so do infants, in their own faint way, when they feel their parents’ stress or enjoy/endure longer, soapy bath-times. To sum up, basically everyone on the planet has some understanding, however minimal, that a serious pandemic, or the idea of it for those who (incorrectly) disagree it’s serious, is going on.

In short, for the first time in human history, rare exceptions aside, not only is everyone talking with everyone, but everyone is talking with everyone about a somewhat easy to understand problem that affects all: contagion, from a widespread respiratory virus. I think that’s one huge reason why COVID-19 is catalyzing unprecedented change. Humans are fundamentally driven by knowledge and communication, and are now equipped to share their actions, experiences, and ideas in hopes of overcoming the more or less understandable (if in some aspects shrouded in mystery) planetary crisis and any other crises that surface.

The key point: two rival economic ideologies converting into a single global mono-empire

After saying the thought-provoking lines “It is very tempting to stop everything and live in the moment, but some things need us to be alert, careful and creative. One thing I have been saying for years is the US, China and Russia (and others) are all headed for a major crisis in 2020 (which is here now!) and so is the world generally. While some states are undergoing terror and totalitarianism, others are seeing unprecedented opportunities for healing,” Marsh continues: “The key point is that we are scaling up into a mono-empire from a system of two rival economic ideologies (cold war communism and capitalism).”

In the United States, a younger person may be familiar with trying to convince a reactionary Boomer that capitalism is dumb. The reactionary Boomer might, well, react by saying: “A little stupid sometimes maybe, but communism is far worse, therefore capitalism is the only answer.” Reminiscent of former UK prime minister and arch-conservative Margaret Thatcher insisting that “there is no alternative” to market economy worth anyone spending any time on. If you try to ask Boomers not about capitalism versus communism, but rather about capitalism versus feudalism, or capitalism versus whatever’s coming next, you might get blank stares, or the conversation might improve and open up. Such dialogue demonstrates that Cold War-era USians generally see political options forever boiled down, as in Manicheanism, to two opposing choices: communism or capitalism. That vanishing, yet still influential, stage of history is getting converted, and converted fast, into a single planetary empire.

What is this global mono-empire of supranational power? International tech corporations manipulating, disappearing, and propagandizing knowledge or “knowledge” while permanently storing our personal data that joins other permanently recorded information for their management of a reputation economy that will continue and worsen the extermination of the poor (read more and evidence here). To know what to do about it, we need, among other things, to see what’s before our eyes, as Marsh’s post explains.

Beach, crags, hills, road, etc.

Three things to watch for: diminishing trade economy, law of the last circle, and escaping the mono-empire

Before getting started on this section proper, a quick vocabulary note. To read the below passages, as a kind of shorthand, you can think of an endogroup as, due to emergency conditions and fear/guilt symbiosis, affiliated people claiming they have an exclusive identity, idealizing an image (perhaps a leader or symbol), and believing an exceptional myth of their endogroup, while empathic and euphoric conduits to life outside their endogroup are blocked. Endosocial strategies are not necessarily bad, but endosocial extremism is. Endosocialism is contrasted with exosocial expansion, the “[u]ninhibited expansion of self through continual establishment of euphoric conduits through relationships, discovery, creation, spirituality, etc.” Exosocial expansion is something humanity needs more of. (Read Marsh’s book on self since it’s more complicated than this quick Cliffs Notes-style summary.)

Here’s the first thing to watch for from Marsh’s April 2020 post: dramatically decreasing importance of trade.

One, the [trade] economy is not going to be nearly as important as it was before. This may be unimaginable to people who have been accustomed to framing all of our problems in terms of economics, but think of how religions and states faded as the dominant endogroups when new transcendental endogroups appeared. Things that appear essential to society can fade into irrelevance if they are based only on endoreality, as [trade] economics is. The crash we started the year [2020] off with will not simply produce a depression and then recovery. Instead, it will illustrate the fact that economics now is simply an abstracted power structure [consider] with no underlying support in universal reality (like all endoreality). Economics as we know it, is dead. This does not mean it will disappear completely overnight, or that it will not remain in some form in some places, but, like religions, states, families, and other formerly dominant endogroups, it will no longer be the dominant or authoritative power structure in our lives. This is explained in great detail in The Approval Economy which will be published one day.

I’m not sufficiently knowledgeable about how the trade collapse/change is playing out in most countries, but I’m aware of what’s happening here in the United States and in a few other places. Of course USians have heard about supply chain problems, such as the article last month in The Atlantic titled “[The United States] is running out of everything.” Those in the know for the past few decades have acknowledged the taboo subject of how in the US, far from its intelligentsia able to remain forever smug about not signing portions of international law from a catbird seat position, will find itself increasingly dependent on, and unable to force compliance from, those it previously mocked (or invaded). USians might notice non-USians are more and more vocal on global social media every day, and that the centuries-old hell is other people Eurocentric philosopher tomes are not stopping, say, Myanmar rebels from sharing their news online. But like trusting Nate Silver in 2016 that Hillary Clinton would win the White House, many in the United States today promise themselves that we’re in just another merely temporary economic downturn. Instead, what’s happening will be far more transformative. I’ve started tracking this topic on my blog using the tag economics and the header “worldwide trade economy collapse/change.” You might consider that, as international experience demonstrates, USians are typically exceptionally helpless and all too often admire an idiocracy, especially when it comes to insisting social support is for only weaklings and imposing shame for it. But the US is going to need social support badly; and, the US won’t be able to provide enough of it from within. For more on this, and other topics such as the international implications of US federal FATCA law (Foreign Account Tax Compliance Act), see my blog’s Leaving the US tag.

Verdict? Yeah, we’re seeing the worldwide trade economy collapse/change come to pass, even if arriving in a strange, slow-mo, lumbering Frankenstein’s monster sort of way.

Here’s the second thing to watch for from Marsh’s “The catalyst effect of COVID-19”:

Two, in accordance with the law of the last circle, also explained in The Creation of Me, Them and Us, places like the US, and China are going to try to fall back to old real or imagined endogroups such as those around states, religions, etc. as the economic endogroups weaken. We have already seen this in the global reversion to various forms of endogroups producing widespread nationalism, sexism, racism, religious cults and every other form of endosocial extremism. This will continue in some regions, and we are still at risk of civil wars and other endogroup atrocities from this.

The retreat to far-right demagoguery playing out in many countries currently is an example of Marsh’s law of the last circle; think fascist Jair Bolsarano in Brazil, for instance, or the likely return of Trump in November 2024. Revivals of authoritarian, patriarchal religion would be another example, as in the “Christian America” antagonists in science fiction writer Octavia Butler’s 1990s Parable novels, who decades before Trump, chanted “Make America Great Again.” Another example would be Steve Bannon allying with Moonie cults that literally worship assault rifles and are setting up compounds in Tennessee and Texas. A lighthearted and non-harmful example would be my reading the recent autobiographies of the heavy metal rock star men I grew up idolizing, when I’m tired, depleted, and want to turn my brain off before bed. We all employ various endosocial strategies from time to time, but endosocial extremism threatens atrocities, already existent or forthcoming, and threatens to block exosocial expansion.

Verdict? Yes, the law of the last circle is increasingly observable, with people retreating from the possibility of evolution by fleeing, in greater numbers than just prior, toward their former (real or imagined) endogroups.

The third and final thing to watch for from Marsh’s post is the global mono-empire, and how to resist it. The global mono-empire can be seen, for example, in Mark Zuckerberg’s October 28 announcement—in response to revelations, of the manipulation and misery of Facebook and Instagram users, that whistleblower Frances Haugen provided to the Wall Street Journal and the Facebook Consortium—that Facebook will rebrand to Meta. The prefix meta- means “transcending”; it’s seen in terms such as metaverse, metacognition, and metafiction. Facebook’s new brand identity, Meta, suggests transcendental improvement, but will mean only transcendence above that Cold War binary of capitalism or communism, into the global mono-empire of knowledge hoarding and manipulation (propaganda), permanent personal data storage (no privacy), reputation economy, and so on. Note that Facebook, and any future Meta, will (continue to) have users who think of themselves as small biz capitalist, state communist, corporate capitalist, anarcho-communist, or as humans equal to some other ideology, but it doesn’t matter, with surveilled fixed identities, they will all answer to these tech corporations … unless,

Thankfully, the public can also scale up with its pan- connections to each other, with regional communities interconnecting for mutual benefit while retaining insofar as possible, their own autonomy, self-governance, and cultures. The public can resist the global mono-empire, while supporting, or revoking support for, international, transparent, peer-promoting epistemic communities providing expertise with the help of knowledge bridges (decode that mouthful here). In her post, Marsh provides a 14-point list of opportunities activists can pursue to take advantage of the pandemic to achieve worthy goals. The COVID crisis is not only an opportunity for the global mono-empire, but also for us. For instance, one of her suggestions is, since public transit was becoming free of charge in many places, not to let it become unfree ever again. Seattle failed to accomplish that goal. During the early phases of the pandemic, the City of Seattle made bus rides free; then in later phases, the transit authorities said, time to return to paying bus fare. As far as I’ve been able to make out from my high castle, Seattleites hearing news of the upcoming change explained to each other they just knew that doing anything to stop it would be unrealistic, so the transit authorities said Wow that was easy and resumed charging money for bus rides, unhindered. And Seattle conservatives don’t care if bus rides cost money because they hate the idea of anybody (beyond families, churches, and other masculinist endogroups) providing or using goods and services for sheer fun, like basking in the sunlight that funds Earth life for free. (All of life is literally free; ultimately, the sun is paying for all this.) I don’t know what the status of the free public transit goal is outside the United States. Imagine if there had been just 14 journ-activists available, each one tracking a single of the 14 goals worldwide; then we’d know, and maybe more people would have been persuaded to understand and pursue the 14 aims! It can still happen, there’s some word that starts with d and rhymes with phonate that may be relevant. Regarding resisting the mono-empire, Marsh writes about the importance of her proposed global commons for public data (GetGee) and suggests using the news of supply chain problems to encourage, not development of evermore hierarchical forced trade dependency, but development of collaboration through networked fostering of strength and support. Check out her ‘The catalyst effect of COVID-19’ post for the other fascinating points on her list of 14 goals, which might call to mind, somewhat, how Marx and Engels created a 10-point plan in the Communist Manifesto (recommending for instance the abolition of all rights of inheritance) or the Black Panther Party put forth their 10-point plan in 1966 (demanding among other things an immediate end to police brutality and murder of black people).

Beach on cloudy day with small island in distance

All of the above in one encounter

Driving back to Seattle, I parked along the way—somewhere off Highway 38 in southwest Oregon—to buy a cap for the air inflation valve of one of my tires. As the commercial jingle has it, I got in the zone: AutoZone! Therein I had a single encounter that encompasses all three points Marsh’s post recommends watching for.

A heavily tatted clerk rung up my tiny plastic bag of four tire air valve caps at the register and grumbled aloud about how AutoZone store staff (trade) is supposed to be a family (families are fine but converting workplaces to one hints of the law of the last circle) and how the other employees were letting him down by not coming in and working overtime (economic trade collapse/change, as r/antiwork posts from this month also suggest). Forgetting I was apparently the only dude in the store, and perhaps the whole rural red area, with long hair and an anti-COVID19 face mask on, I tried to make a joke about how the forthcoming zombie apocalypse might be filmed by Tarantino, you know, Quarantine Tarantino. The tatted clerk ignored me entirely, instead initiating a new conversation with an employee in the back (sticking with his workplace trade endogroup dominance battles rather than experiencing an emotional conduit with an outsider offering something punny). The tatted guy beseeched the second employee to come in as soon as possible for overtime. That other employee refused. The heavily tatted clerk began loudly bemoaning the general state of things. “I want to rejoin the Army,” he said bluntly. “I want to go back to Afghanistan!” Since his trade economy endogroup is collapsing, then it’s law of the last circle, at least in his imagination, reverting or regressing back to his former cherished endogroup, the hierarchical militia of Pentagon mercenaries he’d belonged to before. I punched in my payment card’s PIN and did the remaining button-presses, thereby entering my transaction and other personal data into permanent ledgers for manipulation use by the global mono-empire, regardless of whether the bureaus of that mono-empire advertise themselves to their populations as capitalist, communist, or perhaps someday soon, neither. When I left O̶m̶e̶l̶a̶s̶ AutoZone, I enjoyed the cool night weather (primary euphoria / exosocial joy), reminded myself to be grateful for the valve cap as I installed it and for my knowing how to install it in the first place, i.e. not being afraid of car maintenance as many are (gratitude, another emotion associated with exosocial interactions, in this case with older siblings who taught me car stuff), and finally, plain ol’ smiling and feeling good from this great trip I’d just enjoyed (rather than, as I know some do, including Western thinkers amplified by academia, arguing that happy nature hikes should be permanently off the table since the trails eventually come to a end, causing nihilistic sadness). Were the public having a blast sharing free essentials (among the recommended goals in Marsh’s post), providing for one another, as Food Not Bombs does (it’s real! it’s realistic!), I and others would be freed from unwanted paid-employment, and could more often enjoy examples, small or big, of expansive exosocial life.

These dark sands may secretly proffer platinum and other lil’ resources

Timelessness and chaos

Visiting the redwoods, you inevitably think of how these giant trees, sometimes hundreds, sometimes thousands of years old, were here long before you were, and will be here long after you’re gone. A thought that might feel scary in an extreme endosocial headspace/environment, becomes natural and good in the exosocial great outdoors. Your time is part of, not some stupid endogroup cult, but the greater timelessness of Mother Nature.

In the United States, it can be common for activists to brag that any proposed change is unrealistic, especially if the origin of the proposal is not the usual vaunted Angry Intellectual Men. People telling each other (due to propaganda) that they just know of good change, that’ll never happen, is actually the only real obstacle. If people went out by the truckloads to catch invisible Pokemon a few years back, they can be convinced in truckloads to read books. Well, maybe. Among many other reasons, as a result of such US-specific barriers to activism (at least among my generation), I’m leaving the country, eventually, an aim of mine fans of this blog will be familiar with. It might take a while, and I worry over leaving people I care about in a metaphorical sinkhole they or those around them might not be able to see, but …

Elsewhere in the world, the COVID-19 catalyst effect might mean many people going outside and rediscovering efforts like Food Not Bombs, sharing food with each other in new and joyous ways. In the United States, movements afoot to ban dual citizenship, lock down borders permanently, and deprive residents even further of quality knowledge and trust might eventually mean something horrifying countrywide. Myanmar, and the open air prison of Palestine, a stage-setting for security forces training and live weapons industry advertising expo, come to mind.

Philip K. Dick also comes to mind, one of my favorite science fiction authors, whose stories have been popularized by Hollywood movies that strip out almost all his philosophical content and replace it with action heroes and fight scenes. PKD’s stories deal with questions around defining reality and acting authentically. Ultimately, he banked on the courage of the public and his “secret love of chaos.” Instead of picking identities demanded by the mono-empire’s drop-down menus, we can choose to change daily, or even moment to moment, in our chaotic world. You see a lot of that in the forest or on the beach. Crashing waves, bickering birds, falling trees. Slowly erranding slugs. Happily climbing humans.

I’ll give PKD the last word:

I have a secret love of chaos. There should be more of it. Do not believe — and I am dead serious when I say this — do not assume that order and stability are always good, in a society or in a universe. The old, the ossified, must always give way to new life and the birth of new things. Before the new things can be born the old must perish. This is a dangerous realization, because it tells us that we must eventually part with much of what is familiar to us. And that hurts. But that is part of the script of life. Unless we can psychologically accommodate change, we ourselves begin to die, inwardly. What I am saying is that objects, customs, habits, and ways of life must perish so that the authentic human being can live. And it is the authentic human being who matters most, the viable, elastic organism which can bounce back, absorb, and deal with the new.

Photo of fallen leaves, standing redwoods, etc.

Creative Commons License

This blog post, Reading ‘The catalyst effect of COVID-19’, a year and a half later, by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (human-readable summary of license). The license is based on the work at this URL: https://douglaslucas.com/blog/2021/11/07/reading-catalyst-effect-covid19-year-half-later/. You can view the full license (the legal code aka the legalese) here. For learning more about Creative Commons, I suggest reading this article and the Creative Commons Frequently Asked Questions. Seeking permissions beyond the scope of this license, or want to correspond with me about this post one on one? Email me: dal@riseup.net.

Postmortem on a specific failure to #AbolishICE…and a reboot?

Note: In 2021 I’ll publish one blog post per week. Here’s entry 17 of 52.

The image is a high quality photograph of protestors, primarily Hispanic, crossing a bridge above a freeway. One in front, a young boy, carries a stark sign that simply says "ICE Kills" in black and red against a white background.
From Los Angeles, July 2019, the Homeland Security Kills Rally. Photo by Ronen Tivony via Getty Images

This post is a reflection on my failed, and unfortunately short-lived, attempt to help #AbolishICE in the summer of 2018. When considering the horrifying cruelties of the camps of U.S. Immigration and Customs Enforcement (ICE), an agency under the federal Department of Homeland Security, I think it’s important to look at the experiences of everyday activists and what we’re trying — or shrugging off trying — to do. Maybe then we can reboot our efforts and try again, better this time.

ICE camp in McAllen, Texas, I believe in 2019. Nietzsche wrote approvingly of “men without pity” in 1881: “it does not seem to them so unfair that others should suffer” In the video, the big cheese without pity is former vice president Mike Pence

For those who think calling the ICE centers concentration camps is extreme, consider the words of multiple Holocaust survivors in 2019 (Rene Lichtman, Ruth Bloch, Bernard Marks): ICE is equivalent to the Gestapo, and their current ‘detention centers’ really are concentration camps where genocidaires crush minorities. The sadistic abuse by la migra at these camps is well-documented here by Gabriela C. Romeri. Borrowing from her article, the DHS’s own oversight reports found that children imprisoned at the camps reported wide-ranging abuses: officials pointing their guns at the children, shooting them with tasers for amusement or punishment, hitting or kicking them, and threatening them with rape or death. Additional reported abuse included: agents stomping children; punching children in the head, sometimes repeatedly; kicking one child in the ribs; tasering several children; denying them food and forcing minors into stress positions. Further, children held in freezing rooms with no blankets, food, or clean water; forced to sleep on concrete floors or share overcrowded cells with adult strangers; denied necessary medical care; bullied into signing self-deportation paperwork; and subjected to physical assault and rape. Mothers of infants were denied diapers; trashcans were removed from crowded holding cells and feces and other fluids were seen along the floor. The Associated Press reported in September 2018 that federal Health and Human Services (somehow or supposedly) “lost track” of 1,488 migrant children — a number that must be no coincidence: 14 represents the Fourteen Words white supremacist slogan, and the number 88 is HH (H is the eighth letter of the alphabet), a common code for Heil Hitler. Furthermore, Nazis frequently combine 14 and 88 into 1488. Presumably many of the “lost” children were enslaved (trafficked). The pedosadist likes of Jeffrey Epstein do not obtain their slaves singlehandedly; the powerful trafficking networks are planetwide organized crime. They have to grab kids from somewhere, and ICE camps along with everything surrounding them make for perfect crime scenes.

What the IBM-Nazi collaboration says about the importance of knowledge control

The color photo shows, sitting atop a wood board or table, an IBM Hollerith tabulator, which looks like a strange combination of a telephone, computer, sewing machine, and typewriter.
An IBM Hollerith machine. (Source.)

It’s a little, but increasingly, known fact that the International Business Machines Corporation (IBM), popularly recognized for products such as the Deep Blue chess-playing supercomputer and the first-rate line of Thinkpad consumer laptops (prior to Lenovo acquiring them in 2005), aided Nazi Germany in carrying out the Holocaust. The collaboration, overseen by IBM in New York City, was carried out in Germany by IBM subsidiary the Dehomag Corporation. Dehomag’s punch-card tabulating machines, called Hollerith machines, were installed at the major Nazi concentration camps, where SS personnel, following training by IBM who knew what was going on, used the tabulators to track information on prisoners. Arrivals, transfers, deaths, occupations, and slave labor details were all catalogued on IBM Hollerith machines. The SS also supplied Reich central authorities in Berlin with that data on an ongoing basis.

In addition to the outright horror, killing millions relatively quickly is a complicated logistical challenge. As explained in investigative journalist Edwin Black’s book IBM and the Holocaust: The strategic alliance between Nazi Germany and America’s Most Powerful Corporation, the Hollerith machines helped Nazi leadership “prioritize, schedule, and manage the seemingly impossible logistics of genocide across dozens of cities in more than twenty countries and territories. It was not just people who were counted and marshaled for deportation. Boxcars, locomotives, and intricate train timetables were scheduled across battle-scarred borders—all while a war was being fought on two fronts. The technology had enabled Nazi Germany to orchestrate the death of millions without skipping a note.”

The black-and-white image shows a punch card, an old-fashioned, gridlike paper record about the size of a dollar bill. It has a German word, Rassenamt, printed in the midle, along with the SS bolts and the number one.
Example of IBM custom punch-card for the SS Race Office. (Source.)

The Reich using Hollerith machines at their concentration camps representated a huge, profitable commercial victory for Big Blue. Further, IBM didn’t sell the machines to the Nazis, but instead, merely leased them (as in today’s corporate software ecosystem where endusers rarely own much but typically just lease ‘their’ apps, ebooks, etc). The leasing arrangment forced the Nazis into dependency on Dehomag/IBM, just as individuals and schools/universities and even governments presently are dependent on, rather than governing over, Silicon Valley. In 1934, Dehomag’s director, Willy Heidinger, bragged (in a statement that emphasizes with astonishing bluntness the role of medical control):

We are recording the individual characteristics of every single member of the nation onto a little card […] We are proud to be able to contribute to such a task, a task that makes available to the physician [i.e. Adolf Hitler] of our German body-social the material for his examination, so that our physician can determine whether, from the standpoint of the health of the nation, the results calculated in this manner stand in a harmonious, healthy relation to one another, or whether unhealthy conditions must be cured by corrective interventions […] We have firm trust in our physician and will follow his orders blindly, because we know that he will lead our nation toward a great future. Hail to our German people and their leader!

Dehomag was directed from New York City by IBM head Thomas J. Watson. Between 1933 and 1940, Watson courted Nazi business and made Hitler’s regime dependent not just on the leases of Hollerith machines, but also on the unique punch-card paper IBM sold. When the Nazis ran out of that fluid capital, they had to replenish their stock of paper by going as customers to IBM, who, at the same time as its employees even had sales quotas for working with the Reich, somehow continually managed to evade the Treasury Department in D.C., a top-echelon bureau formally tasked with stopping domestic firms from trading with official enemies. Hmm, curious, that. The business between IBM and the Nazis kept going: Dehomag serviced/repaired the Hollerith machines on site at the concentration camps regularly. Even food allocation (i.e., who would starve and who would be fed) was managed by the Nazis using an IBM proprietary database system. Unless humanity elects to establish a universal database, a global commons, owned by everyone, for organizing and sharing public data, we’ll continue to have such opaque databases of proprietary control as the Nazi’s, where injustices occur aided by secrecy. (Of course, injustices also occur in plain sight, especially since nowadays people lack shame or a sense of duty to the vulnerable, and have trouble putting the disparate puzzle pieces together to recognize that their emotional responses have been conditioned from above; it’s ‘secrecy’ through flooding everyone with distracting trivia and corporate entertainment.)

The black-and-white photo shows men in suits sitting around a table.
Hitler and IBM president Thomas J. Watson (among others) meeting in Berlin, 1937. (Source.)

Did IBM face consequences? As World War II progressed, Big Blue sold Hollerith machines to the Allies also, playing both sides. After Armistice Day, no IBM executives were charged with war crimes, and their profits from working with the Axis were shielded from reparations. Not only that, but Hollerith machines were used to handle records at the Nuremberg Trials — Big Blue playing both sides and the referees too — and IBM formally requested compensation for its Hollerith machines getting damaged during the war. Legal cases since have had mild success but nothing full, due to reasons such as statute of limitations. IBM’s business steamrolled on: not as IBM contracting with the powers that be, which is the usual phrasing, but IBM (and big tech today) as the power that is, needing to trade its products somewhere anywhere, and looking down to the lowly governments below as dependent customers. Two examples follow. Victor Marchetti and John D. Marks’ The CIA and the Cult of Intelligence (1974) — an interesting instance of a U.S-published book that has been censored; my paperback copy has black ( DELETED ) marks throughout — says “The first step in the [CIA’s] evaluation process [for obtaining a spy] is to run a ‘namecheck,’ or trace, on the person, using the CIA’s extensive computerized files located at headquarters in Langley [Virginia]. This data bank was developed by International Business Machines exclusively for the CIA and contains information on hundreds of thousands of persons.” Investigative journalist Tim Shorrock’s book Spies for Hire: The Secret World of Intelligence Outsourcing (2008) mentions IBM’s work “as a major provider of computer systems to the Pentagon and the NSA.” Have the highest levels of warfighters ever really been defeated?

What does all this mean — is it just a random contingency that tech companies happen to be so powerful, and is interest in the Internet and technology a mere “subgenre” of anarchism or activism, less important than, say, the heart-pounding physicality of black bloc streetfighters skirmishing with cops? After all, Edwin Black, author of IBM and the Holocaust, wrote “Make no mistake — The Holocaust would still have occurred without IBM. To think otherwise is more than wrong. The Holocaust would have proceeded — and often did proceed — with simple bullets, death marches, and massacres based on pen and paper persecution.” Is the difference merely something quantitative, that the technology enabled the Nazis to automate genocide and to massively multiply the killing, murdering millions relatively quickly with cold efficiency, beginning a new era of military intelligence, two words combined that can’t make sense?

The image is a black-and-white poster showing an open eye looking upon a city. German words are written on the poster, translated in my caption.
Creepy Dehomag poster from circa 1934 reads in German: “See everything through Hollerith punch cards.” (Source.)

It’s more than quantity: the IBM-Nazi use of Hollerith tabulating machines were the contemporary beginnings of yoking genocidal domination based on knowledge together with mass data. Although you might debate the particulars, big picture wise, human behavior has always stemmed from knowledge: everything else is downstream. It might appear that the celebrity who’s the sexiest calls the most shots, but emanating like magic from the high, remote towers of the intelligentsia, the definitions of sexy and celebrity (and whatever else) are too often imposed, not from a community’s storytellers and mythmakers who must answer to their neighbors, but from above. Similarly with initial definitions and emotional responses around things like black blocs and cops. Community storytellers lack the amplification and computing power of the powerful intelligentsia-magicians. To outsmart, or route around, the force-multiplying technology wielded by the supranational powers (especially spy agencies), is like seizing a staff away from a wizard, or besting a wizard in spellcasting. If the public wins at this magical duel over abstractions (and the logic systems for organizing our abstractions and connecting them to the physical realm, i.e., software, networks, etc.), then control of mythmaking and other knowledge creation finally return to the public’s control, and hence the public regains control of all that which is downstream as well. That controlling the fount yields the most power must have been why, for instance, Winston Churchill was obsessed with, and kept close tabs on, the Bletchley Park professor types, including Alan Turing, whose organization after World War II grew into GCHQ, the British equivalent of the NSA; unlike many other British leaders in his orbit, prime minister Churchill intuitively understood how powerful this wizard-staff of software structuring of abstraction information was and would become. Computer software isn’t just goofy game apps on a smartphone: it’s ‘instruction tables’ (to use Turing’s phrase that later was changed into ‘software programs’) for logically processing information itself, and that can translate into knowledge itself, which not spy agencies from above, but the public from below, must control, if control over everything else is sought. Such a picture, introduced to the public from 2010 to 2012 by WikiLeaks Central (an adjacent but separate organization from WikiLeaks, including in terms of ideas and agenda), was challenging to see a decade ago, but based on offline conversations in Seattle anyway, with those roughly ages 25-30, I imagine many bright young people really into the Internet can see it more easily these days. It’s become all the more obvious, at least in broad strokes. Then again, it’s a picture that, though comprehensive and incisive, can quickly be overwritten for some when the louder, seemingly more accessible advertisements from various ideologies (e.g., Marxist groups) pop up, as they do nonstop here in Seattle, diverting people from taking on corporations and spy agencies (through mechanisms such as lawsuits, the Magnitsky Act, inventions, mutual aid infrastructure, etc.), toward smaller goals regrettably fleeting.

Now imagine refusing a defector from the IBM-Nazi collaboration

The image shows a screenshoot from the game. It's a low-tech three-dimensional shooter from the first person perspective. The player sees their gun. They're in a stone castle, where images of swastikas and Hitler decorate the walls.
Wolfenstein 3d computer game from ’92. No information technology, no propaganda, just shoot, you grunt.

Pretend it’s the early 1940s and a higher-up at IBM’s German offices, perhaps one of the lowest executives in the C suite, goes to meet with the Nazis about more Hollerith machines they want for a planned concentration camp. The Nazis give him completed paperwork describing plans for the camp and what they expect from the Dehomag tabulators. Walking back to his office, our fictional employee, sickened by his collaboration with the Reich (sickening which began a few months back), decides to defect to the public. He worries passersby can see the growing sweat stains on his suit. Hell, he worries he’s going to bang right into another pedestrian, because he can’t focus on walking correctly for all the thoughts wheeling in his head: about the opposition newspaper he sometimes bought when no one was looking (telling himself it was out of mere curiosity), about an antifa group he heard gathered sometimes in the back of a nearby art gallery, and about his family, especially his son, who though ten and unusually talented at the violin — which won him enrollment at a special music conservatory — still has trouble reading simple German, and always seems disconnected from everything around him.

The black-and-white photograph shows the Buchenwald concentration camp in the bakground, with a rally in the foreground.
Antifa rally at Bunchenwald concentration camp, 1945. (Source)

That night, the defector pretends to his wife over the dinner she cooked that he has back pain forcing him to stand and not sit nor sleep. Then he stays awake into the small hours, drafting an anonymous letter stating his severe disagreement with IBM’s Dehomag. It’s something of a rant; it doesn’t mention the plans, nor does it make any threats to his employer. But it’s powerfully worded, and it does demand Dehomag drop its relationship with the Nazis. Between the lines, the letter conveys: Or else. He isn’t quite sure or else what, but then again, he’s now not quite sure how far he wants to go with this, or if he’ll chicken out and change his mind. Maybe it’s all just crazy thoughts arising from the back pain he really does sometimes have? And his son does love the conservatory — music is the only time he’s not spaced out. But the sun comes up and, after downing some coffee and putting on a suit without sweat stains, our defector leaves home for the office of the opposition press newspaper. His conversation with the editors, filled with specific details, lead them to conclude he’s telling the truth about who he is and the planned concentration camp, and the editors print his anonymous letter as soon as possible.

Switch from our defector focal character, to the back of the art hall, where indeed an antifa collective comes together the next afternoon. There are just three of them, one woman and two men, relatively inexperienced and young, not at all the hardened crew the defecting executive imagined. Perhaps against their better judgment, they’re proudly discussing the successful sabotage another antifa group apparently carried out last week, covertly cutting signalling cables. They lament reports of human cargo packed into freight cars, of people beat with batons. Then one of the men asks if the others saw the anonymous letter in the opposition newspaper. They haven’t, so the guy fills the rest in. He’s the most ungainly in the group, bookish and a little overweight. He says, “Through our contacts, we should find the person who wrote the anonymous letter, and help him break from Dehomag. He probably knows a lot. He probably has a lot of coworkers sympathizing with him. Fucking up Dehomag could really save lives, protect the vulnerable from the Reich.”

“What, are you joking?” says another of the men. “Those bourgeois businesspeople. They wear fancy suits, they have fancy salaries, and their kids go to fancy schools. I don’t want to do anything that benefits them.”

The ungainly guy blinks, staring startled at the other two as if they must know something he never has. Maybe the other man is simply dissing him in an effort to impress the woman (who’s turned aside to straighten a portrait hanging on the wall), but so petty a motivation is typically beyond his own rationale. He dismisses the possibility from his mind, which suddenly feels destabilized, dizzy somehow. There simply must be a logical misunderstanding somewhere. “No,” he says, “the beneficiaries of this effort would be the concentration camp prisoners, not the letter-writer.” The other man repeats himself: “I’m just not going to help those bougie business types.” Later the ungainly guy thinks, he could have added, The letter-writer is a means to an end: not palling around with him, but saving the victims. Besides, who knows what this letter-writer is really like; we have to find him first. Had he more social skill, he might also have said: You won’t try anything far riskier than trying to seduce women. The letter-writer opposing the Gestapo seems braver than you. But such conversational ability is beyond him, and his own background — his own suits and schools — hangs heavy in the silence. He stumbles away, not sure where he’s going, and realizes he could take a breather in the bathroom. As he opens the bathroom door, the other man heads for the portrait-straightening woman with a new grin stretching wider and wider across his face.

Who are your sympathies with in this admittedly thrown-together, cliche-ish story? I’d suppose people would support the defector, the irritatingly inept ungainly guy, the violin-playing child, and maybe the two women (although their stories are sadly only hinted at, if that).

The image is from the video game. It shows Hitler's face as he's being resurrected out of some sci-fi cryo chamber. According to the dialogue box, he's saying to the player:  "What, you're going to fight against me? You damn fool."
From the 1988 NES video game Bionic Commando and my childhood.

But when something loosely analogous happened in summer 2018, when Microsoft employees anonymously told their employer to drop contracts with ICE, those I imagined would be sympathetic reacted in a way I didn’t expect. After reading the news of the Microsoft employees (presumably living in and around Seattle), I suggested to Seattle activists offline that we figure out who the anonymous Microsoft employees nearby were and support/encourage them in shutting down Microsoft’s contract with ICE. Perhaps we could bring them food, or introduce them to other activists, or something? I was shocked how many Seattle activists immediately balked at the idea of helping ICE camp prisoners by locating and offering strike support to rebelling Microsoft employees. The Microsoft employees don’t need their employer’s permission to cease coding and maintaining software platforms for ICE; they could just stop. But in that case, they’d definitely need support from wider society, which our conversation unfortunately quickly depicted as a bean-counting debate over whether the programmers, unknown to us personally, likely could or couldn’t afford to purchase their meals, rather than as an issue of support overall (including legal and emotional support and connecting with others). The balking activists cited software developers’ salaries and lifestyles as justification for choosing not to help ICE camp prisoners in this way. Decent disgreement might have been, say, if Microsoft drops their contract with ICE, wouldn’t la migra simply redirect to get the vanished help from another company instead, for instance Dell or IBM? Or, couldn’t Microsoft just hire more programmers to replace any striking ones refusing to code for ICE? Those weren’t the disagreements that happened. Despite posters in Seattle bedrooms calling upon viewers to #AbolishICE, deciding how to (not) accomplish that goal was based on affinity for apparently well-off programmers or lack of affinity thereof, as if abolishing ICE should be based on personality contests or who you would or wouldn’t go to a bar with. That being said, fortitude and social/verbal skill is required from anyone (including 2018-era me, who didn’t have enough of either) who suggests face to face that people collaborate in actually planning out and following through on doing something as huge as providing strike support to employees walking out on their jobs to challenge a Gestapo-like federal agency.

As the history of the Reich using IBM’s Hollerith machines shows, information technology is crucial in multiplying and structuring mass genocide, and in gaining control over the information associated with it, information people get used to and start taking for granted. Somebody should unplug that stuff, and not everyone in the world — of seven billion people, 190-odd countries, multiple major religions — is going to see eye to eye on lifestyle topics like suits and violins, and not everyone is going to come from the same background of economic class. Perhaps instead of using those differences as excuses for pettiness, we could use them as strengths. Am I missing something?

It ain’t over till it’s over: rebooting

Unplugging the computer systems upon which ICE crucially depends would have, and still could, have a tremendous effect in fucking up la migra. I haven’t followed how the internal Microsoft rebellion has played out since the New York Times published the above-linked Microsoft anonymous employee letter in 2018, and I’m unsure what the present status of the ICE camps is. However, Reuters reported last month that the Biden administration wants to increase their funding by 22% supposedly to root out white supremacy, and I know from my day job that released children are making their way into the public school system, a system already overwhelmed for the usual reasons, plus trying to return in-person during coronavirus. I’d assume ICE camps are continuing as usual, and by default, I’d distrust messages from the blue religion saying all is well or will be shortly if we just trust the authorities, or messages from the red religion saying the White House is trying to overrun the country with terrorists by uncaging children.

As sources such as ItsGoingDown.org, Crimethinc.com, and search.twitter.com show, there are still people out there in the United States working to #AbolishICE in various ways. Focused on other concerns instead, I haven’t followed the topic as much as I should have. If anyone has any good leads on projects for abolishing ICE, or thoughts, please drop them in the comments.

Creative Commons License

This blog post, Postmortem on a specific failure to #AbolishICE…and a reboot?, by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (human-readable summary of license). The license is based on a work at this URL: https://douglaslucas.com/blog/2021/05/02/postmortem-specific-failure-abolishice-reboot. You can view the full license (the legal code aka the legalese) here. For learning more about Creative Commons, I suggest this article and the Creative Commons Frequently Asked Questions. Seeking permissions beyond the scope of this license, or want to correspond with me about this post one on one? Please email me: dal@riseup.net.

Updated: My #OpDeathEaters review of Investigation Discovery’s “Who Killed Jeffrey Epstein?” airing Sun May 31, 2020

Note: I published this review on 31 May 2020. It received substantial attention, including more than 1,300 retweets of my tweet announcing the post. Now, on 7 June 2020, I’m updating the review a little. Adding a table of contents, the #OpDeathEaters goals, links to research on RMS and Bill Gates and others, more stuff, plus some copyediting and proofreading. Thanks! (Note also that today 7 June 2020 it’s reported that the United States Department of InJustice is demanding the United Kingdom hand over Prince Andrew to appear in court over Jeffrey Epstein child trafficking links.)

Table of contents

  • Intro – #OpDeathEaters trending; the common denominator for street executions by cops and child rape by pedosadists is impunity
  • What “Who Killed Jeffrey Epstein?” does sorta right
  • What “Who Killed Jeffrey Epstein?” does wrong
  • Practical and realistic solutions to impunity
  • Recommended reading
  • Epstein survivor Maria Farmer: “2020 is the year when…”

Intro

Today (31 May 2020), #OpDeathEaters trends on Twitter. The three tweets in just a bit below, all regarding the trending, address how the hashtag and Anonymous operation, founded in 2014 by Heather Marsh as a continuation and amalgamation of earlier ops she’d previously initiated (#OpGabon, #OpRohingya, #OpCanary, #OpGTMO, as well as others), pre-dated the Pizzagate and QAnon efforts to drown it out, and like previous waves, gains traction now.

Illustrating academic credibility, here are excerpts from criminology professor Dr Michael Salter’s book published by Routledge in 2016, Crime, Justice and Social Media, discussing #OpDeathEaters’ goals and more than half a decade of ongoing online public research drawn from court pleadings and investigative journalism reports and similar reputable sources, by thousands of accountholders, into child trafficking by the powerful. The #OpDeathEaters Frequently Asked Questions is also a good place to start; it’s from 2014.

https://twitter.com/TheBoobla/status/1267119564271190018

Tonight (31 May 2020), the US cable television channel Investigation Discovery, known for true crime programming, airs at 9 p.m. Eastern a three-hour special called “Who Killed Jeffrey Epstein?” The first third was released on 25 May 2020 online, but the show as a whole premiers tonight. A marketing staffperson from Investigation Discovery gave me advance access to video screener files of the entire special. I watched it early, to review it for you here in this post.

Why do Jeffrey Epstein and the ongoing international child trafficking networks associated with him and many others matter while, during more than 100,000 pandemic deaths here in the United States, this country is on fire like a Seattle cop car photographed yesterday (30 May 2020), pictured below the following stark New York Times front page from 24 May 2020 with a pic superimposed over it of Trump on one of his many golf outings as president. “What better place to make backroom deals, blackmail guests, and contact transnational organized crime assets than in the middle of an empty golf course and resort”, @YourAnonCentral tweeted 7 Sept 2019.

Trump golfing superimposed on the stark Sunday 24 May 2020 New York Times front page with the names of the nearly 100,000 dead from coronavirus
Seattle cop car on fire during protest 30 May 2020

Simply put, Jeffrey Epstein and all the other powerful pedosadists matter presently because (among other reasons) the common problem with both VIPredators raping kids and street executions of black people is impunity: the exemption from punishment or consequences. This tweet from @YourAnonCentral, an account I recommend you follow on Twitter, explains:

You can skip the Investigation Discovery special if you want, unless you want full details on the program, because I’ll tell you my take on what the program does sorta right, what it does wrong, and most importantly, link you to better readings on the topic and practical, realistic solutions for ending impunity. That way tonight you can fill, or support those who are filling, the streets.

Also currently happening (7 June 2020), #opTrumpTweets: twitter users replying to Donald Trump’s tweets, posting #OpDeathEaters information. In other words, lately if you click on one of Trump’s individual tweets, the top reply may well be about evidence of his pedosadism. See this thread from @OpDeathEaters, an account I reckon you might should follow, for more:

What “Who Killed Jeffrey Epstein?” does sorta right

  • The special opens effectively with audio from Jane Doe 3 talking with police: “Jeffrey’s gonna get me. You guys realize that, right? He’s gonna figure this out, and he’s gonna … I’m not safe now. You understand that, right? I’m not safe.” If humanity doesn’t value the lives of children, then logically, we go extinct.
  • The special incorporates many of the photos linking idols with Jeffrey Epstein, which effectively make the clear point of the blackmail power of pedosadist networks. Below, I provide screenshots from the program:
Jeffrey Epstein and Bill Clinton at a table together
Jeffrey Epstein, former US president Bill Clinton
Dirty Dersh (Harvard Law School’s Alan Dershowitz) and Jeffrey Epstein
Fugitive pimp for child trafficker Jeffrey Epstein, Ghislaine Maxwell, with scared Elon Musk
Prince Andrew walking in New York City with Jeffrey Epstein
Trump and Melania Knauss, Jeffrey Epstein, and fugitive Ghislaine Maxwell
Donald Trump looks like he’s trying to impress arms-folded Jeffrey Epstein. This was at Trump’s Mar-a-Lago in 1992.
Same, years before Trump in the 2005 Access Hollywood tape, in line with his usual garbage, bragging about assault.
  • The special also includes some good to great quotes from various interviewees. I reproduce them below.

Lawyer for Epstein victims, Lisa Bloom: “We are talking about at a minimum hundred of victims, potentially thousands — I believe it was probably thousands of victims. Because I believe those who came forward are just the tip of the iceberg. Most of them are never going to want to come forward.”

Writer Conchita Sarnoff: “The Epstein case goes from Palm Beach to New York to the White House to Buckingham Palace. Where you have politicians [image of Bill Clinton shown], business leaders [image of Bill Gates shown], opinion makers [image of Elon Musk with Ghislaine Maxwell shown], very powerful people implicated [image of Prince Andrew shown] in one way or another — is so expansive, it is a global case. It crosses the political barrier and it is the longest-running child sex trafficking case in US legal history to date.”

Writer Conchita Sarnoff: “What this case has, I think, shown is that we live in a society with two systems of justice: one for the rich, and one for the poor. And Epstein knew this all along.”

TV journalist Diane Dimond: “All these people, from federal prosecutors to politicians to prison officials, say ‘There will be accountability’ — really? I don’t see any indictments. No accountability at all.”

Lawyer for Epstein victims Spencer Kuvin (I believe this is an outtake): “Now that the world is coming to a realization that really what’s, you know, happening by powerful men, by wealthy men, abusing young women and taking advantage of young women.”

Writer Conchita Sarnoff (I believe this is an outtake): “government officials looked the other way; and newspaper editors and networks; and everyone looked the other way, for many years.” She also says (I believe in another outtake) the case implicates “politicians, bankers, heads of universities, heads of think tanks”

  • The special also includes the deposition footage where Jeffrey Epstein is asked about his notoriously “egg-shaped” (or oval-shaped) penis. This is an important fact about Jeffrey Epstein because 1) especially back then, a way of corroborating his victims’ stories, and 2) it’s a weapon for keeping the story in the news. The question-asker during the deposition is lawyer for Epstein victims Spencer Kuvin, who explains in the special that 3) it was a power move by him against Epstein (Eggstein?). “I wanted Epstein to know that despite his wealth, despite his power, and despite who he felt he held influence over, I didn’t care. I didn’t care who he was; he wasn’t going to intimidate me. And I was going to ask him the most personal, embarrassing question I could possibly think of.” and “My hope was, the question alone would get him upset, that he’d slip up, he’d get mad at me. And he essentially pled the fifth to every question that was asked of him.”

Spray #JeffreyEggstein on the White House.

  • The special at least mentions the flight logs (published by Gawker in 2015) for Jeffrey Epstein’s private plane which according to multiple of his associates had secret surveillance equipment installed (for blackmail). Among those on that jet in 2002 and 2003, for a flight to Africa, Bill Clinton (soon after his White House terms ended), entertainers Chris Tucker and Kevin Spacey, and from the Obama administration, Obama appointee Gayle Smith.

Finally, given that most investigative journalism doesn’t include victims’ voices much or center them, except as impersonal blocks of hard-to-hear Jane Doe voices on police tapes that then well-dressed WASP-y professional interviewees explain to the camera lenses, “Who Killed Jeffrey Epstein?” presented more from victims, especially Maria Farmer, than I expected.

The audience is shown recorded footage of Epstein victim Chauntae Davis answering a reporter: “Do I feel his death is an appropriate punishment? Absolutely not. It gives nobody justice, and it leaves a lot of unanswered questions.”

Maria Farmer gets airtime to say: “I would love to see justice in the form of every co-conspirator needs to be behind bars. They belong there. They’re criminals.”

There’s more great stuff from Maria Farmer regarding her paintings of Epstein’s network and victims/survivors. I will share much of that at the end of this post.

However, the good aspects of this special, most of which honestly anyone can find with some decent Internet searches, don’t make up for the wrongs.

What “Who killed Jeffrey Epstein?” does wrong

Click through to see more #OpDeathEaters research into Bill Gates
  • Nor does the special touch another ‘tech god,’ Richard M. Stallman aka RMS. Here’s an #OpDeathEaters thread with research into him.
Click through to see many more pedosadism quotes and sources for RMS

The pro-pedosadism payoff of keeping the focus mostly on Jeffrey Epstein as an individual personality is that he becomes a fall guy, and audiences do not look at the ongoing global child trafficking networks. The special fails in this regard, though not as badly as I feared, because it does talk at least some about other individuals, such as Brunel (see below), at least a tiny bit, perhaps a reflection of pressure from interviewees, increasingly sophisticated Internet-attuned audiences, etc. Still, to really keep up with these ongoing global child trafficking networks in a dynamic way as we must, we need a framework for a global commons for public data collaboration, namely GetGee.

There are plenty of other powerful pedosadists the special avoids. Click to this @OpDeathEaters thread and page up or page down to see links to threads investigating particular VIPredators. Today (7 June 2020), @OpDeathEaters tweeted: Despite the fact that Epstein is a far bigger story than media is trying to reduce it to, Epstein is not that big a deal compared to many – Demmink, Kashoggi, Berlusconi, Gaddafi, Bongo, Brunel, so many in Russia and China … networks in every state and industry. #opDeathEaters

Searching twitter for @OpDeathEaters tweets or #OpDeathEaters tweets is another great way to find information on whichever VIPredator. For example, in January, I ridiculed FOX News personality Tucker Carlson for giving airtime to a pseudo-expert warning of the “global tyranny of the metric system,” but I neglected to check for #OpDeathEaters research into Carlson. It’s easy to do. After logging in to twitter (which seems to yield better search results), at https://search.twitter.com just type “tucker carlson from:OpDeathEaters” or “tucker carlson from:OpDeathEatersUS” or “tucker carlson from:YourAnonCentral”. You can also try https://twitter.com/search-advanced or study online how to improve search techniques for social media. Whenever you’re thinking or writing about some celebully or other, it should become a habit to search #OpDeathEaters or from:OpDeathEaters on twitter to see the real story behind the personality.

  • The special uses a great deal of false, soft, go-to-sleep language that normalizes pedosadism. This thread from the @OpDeathEaters twitter account, which you should follow along with the United States-specific @OpDeathEatersUS account, teaches you the basics.
Please click through for much more

For more about how language controls your thoughts and you have a right to change your words and own your thoughts, consult authors George Orwell, Philip K. Dick, Heather Marsh, or a good dictionary, particularly etymologies.

Below, examples of offending, false language from “Who Killed Jeffrey Epstein?” Often, the key problem is the false language conflates sex with rape.

  • Forensic pathologist Cyril H. Wecht is given airtime to say “the kinds of crimes that Jeffrey Epstein was charged with — fooling around with 14, 15, 16 year old girls.” Epstein was not “fooling around,” he was raping children.
  • For Jeffrey Epstein’s death circumstances in jail, the special discusses US attorney general William P. Barr saying “I was appalled […] perfect storm of screw-ups.” The special doesn’t explain that “perfect storm of screw-ups” is obvious bullshit meant to evoke sympathy for imaginary kindhearted authorities and their accidental blundering, and further, William P. Barr’s ridiculous focus on William P. Barr’s emotions, limbic system, etc, whether he was or was not appalled or perhaps shocked or would it be startled? No one should give a shit about complicit Barr’s alleged emotional reaction to Epstein’s death circumstances; his dialogue is a ploy to redirect attention toward the feelings of a person in a fancy suit, him. Don’t let these people redirect.
  • Over images of Bill Clinton, Donald Trump, Bill Gates, the special at one point describes Epstein as being connected with “big name people, famous people,” thus putting some of the most powerful people in the world on par with Kim Kardashian, the Real Housewives of $City, etc. It may have been a mistake of that particular interviewee — from my own appearances in documentaries, sometimes you get one try; the camera’s there for ninety minutes on an afternoon, and in my experience and from reading, filmmakers have way too much power over the final version relative to interviewees — but audiences hearing such language endlessly makes generations forget or fear using or even just reading other words: criminal conspirator. rapist. pedosadist.
  • Epstein “should have been safe there” somebody in the documentary said of MCC jail which locked up Epstein. No. Whether it’s prisons (hear activist Azzurra Crispino discuss prison conditions on Democracy Now!) or psych wards (see Disability Rights Washington’s May 2020 report on the hospital to jail pipeline), nobody who’s not trying to propagandize thinks such lockups are safe. Doesn’t take a genius.
  • TV journalist Ashleigh Banfield says Epstein was “hiding his sexual proclivities” Raping kids is not a sexual proclivity; sex is not an attack. Epstein was covering up his participation in raping and child trafficking in hopes of capturing more prey, escaping reprisals, etc.
  • Someone (I forget who) in the special describes Jean Luc Brunel, owner of the MC2 modeling agency, as a “French modeling scout” rather than accused child trafficker. I would have to watch again, but I believe the special does not say that Brunel actually owns MC2; I believe it uses vague language. More on Brunel.

There are also the completely wrong interviewees. To take just one example, convicted debt collector and Epstein financier partner Steven Hoffenberg says in the special that “The victims are getting zero right now.” Interview others, especially more Epstein victims who if they require more protection to go on camera must therefore be furnished more protection. More on “Who Killed Jeffrey Epstein?” interviewee Steven Hoffenberg:

The sensationalizing throughout the special belongs to entertainment, not education. Spooky tech noir music to get your heart racing plays in the background of “Who Killed Jeffrey Epstein?” as a deep male voice slowly narrates about how an ultra-rich pedo somehow associated with ‘famous people’ ‘fools around’ with young girls and gets away with it. That does not nurture the individual minds and social environments required for the public to impose justice.

Finally, the special completely evades the work of thousands of #OpDeathEaters participants and the op’s founder Heather Marsh, not mentioning it whatsoever, when in fact in February 2018, on an Oxford Union panel about whistleblowing, which that supposed “last bastion of free speech” immediately censored, Marsh told the audience all about Epstein. Before the Miami Herald‘s Epstein reporting months later. Note to the intelligentsia and commentariat, exploiting the unpaid backbone of investigative journalism—the world’s lovely social media sleuths and autodidacts—does not end well, especially since we outnumber and outsmart you. See the suggested reading below for more on Heather Marsh’s censored Oxford Union panel. For now, I’ll just embed the audio of her portion and excerpt from her transcript of what she said on the censored panel about Jeffrey Epstein and the former Oxford Union president and UK prime minister Ted Heath.

Jeffrey Epstein is a man in the United States known to have raped and trafficked dozens or hundreds or who knows how many children. The US Attorney General at the time, Alberto Gonzales, said he would have instructed the US Justice Department to “pursue justice without making a political mess”. Epstein’s little black book contains people like Donald Trump, Bill Clinton, Prince Andrew. There is only one way to interpret that directive and that is impunity for anyone above a certain social strata or anyone with blackmail on them. The Pentagon, since 2010, has refused to investigate, at that time it was over 1700 cases, of child abuse media they have found on Pentagon computers. The people in the US are finally starting to talk about all the taxpayer funded NDA’s that protect people in congress against reports of rape and sexual assault. California alone has reportedly paid more than $25 million in the last three years to buy criminal impunity for their politicians. In the UK, you have your own child rape inquiry where UK police have spoken many times of investigations which have a strata they can’t go above – where those above that strata are referred to as the Untouchables, protected by the Official Secrets Act and many other layers of secrecy. Your former Oxford Union president and UK Prime Minister, Ted Heath, how many people came forward and said they were his victims as children, but there was never an investigation during his lifetime. So security for them means immunity from criminal prosecution, not just for their actions against so-called enemies but against anyone.

Practical and realistic solutions to impunity

Now, the portion so often left out of corporate edutainment describing a problem: how to solve it.

Yesterday (30 May 2020), protesters in Minneapolis and Atlanta posted on social media images of child soldiers. It is unclear if these kids are with JROTC or white supremacist families or what. But allowing your VIPredators, with all their power over conditioning systems from corporate media megaphones to video games to textbooks, to rape kids, logically leads eventually to this from your neighbors and even your own kids.

OpDeathEaters meme shows child's hands bound with rope begging for help from audience against a black background with the words Your Move. The image also says: You let your militaries torture, murder and sodomize children in 'other countries' because they were The Enemy. You let your police torture, murder and sodomize children from 'other ethnic groups' because it is The Law. Now you find your politicians torture, murder and sodomize children in your neighbourhood because it is Fun for them.
OpDeathEaters meme. Has an anime style image of a child. Mostly, white text on black. What are Death Eaters? Members of a sociopathic society where the societal norms or culture are driven by sadism or sexual sadism disorder. The agony of others is not a side effect of their actions but a goal. Death eaters are distinct from those with an individual personality disorder in that their society's norms, structure and actions are all constructed to feed their sadism.
OpDeathEaters meme. Mostly, red or white, on black. Child's hands bound appealing to the audience for help. The meme says, What is the objective of Operation DeathEaters?  The objective of OpDeathEaters is an internationally linked, independent, victim-led pedosadist inquiry / tribunal which is in no way affiliated with all of the institutions of power which have created and run this industry.

The above three memes from here and created by @SpartaZC / @YourAnonCentral. Same for the two similar memes farther below.

The objective of Operation Death Eaters is an internationally linked, independent, victim-led pedosadist inquiry / tribunal which is in no way affiliated with all of the institutions of power which have created and run this industry. Here are the eighteen long-term goals of #OpDeathEaters. Goal #5: Clearly define possible independent inquiry options for each country and build support for them. 

But what’s an inquiry or tribunal? People might remember the Nuremberg trials at the end of World War II. But let’s hold off on tribunals for now, since convictions require public examinations and discussions of evidence, and dive into inquiries, which make those examinations and discussions happen.

To explain what inquires are, let’s start with a very familiar phenomenon that they are not. Remember Obama’s Look forward not back regarding torture by the Bush II administration? That’s when Obama repeatedly explained there would be no prosecutions, and thus only impunity and normalization, for torture. In the United States, something like 1% of people in the country have a security clearance (think top secret; to see the deep state, go to https://www.usajobs.gov/search and filter job openings by required security clearance). These individuals are part of a parallel un-society, where torture is accepted and practiced. Because Obama announced we would have no public inquiry into why the United States “tortured some folks” as he put it, when you’re trying to talk radical politics with salaried liberals at board game night, there’s a good chance that one of them or someone they’re close to has a security clearance for accessing classified information and doesn’t like what you’re saying (and that’s the end of it, if you’re lucky). A person you pass on the sidewalk might be, or might have a family member who is, involved in torturing people (including assisting with the infrastructure for it as a contractor). To date, there’s been no reckoning with this reality as a country because of Obama’s Look forward not back (among other reasons). It’s the same with the pacto del olvido (pact of forgetting) in Spain, where that country in 1975-1977 decided to avoid dealing with the legacy of their 1939 to 1975 dictator Francisco Franco. A third example would be in families or small communities where a person who behaves strangely gets labelled / scapegoated as the identified patient with a psychosis diagnosis, but all the (anti)social and other forces (such as pollution) pressuring that person into that strange behavior remain elephants in the room, skeletons in the closet, etc. Street executions, torture, and dictatorships are also, relative to healthy prosocial people, psychoses.

Collectively turning a blind eye — with formal announcements like Look forward not back, pacto del olvido, or a psychiatric diagnosis — is the opposite of an inquiry, whereas an inquiry is the public participating in a hearing and discussion of the evidence, the accusations of wrongdoing. During inquiries, everyone publicly links together the past, present, and future to ask, who were we, that certain things happened (street executions or torture or pedosadism), and what can we do about it now to ensure it never happens again in the future?

There are examples of inquiries, or efforts toward them, on both the small family/community level and for entire countries and planetwide. For instance, in Finland, the Open Dialogue method, under experimentation for implementation in the United States, is getting the best documented results for first episode psychosis (mental health): 85+% of the people helped by Open Dialogue never have a psychotic break again and never need psychiatric drugs. In Open Dialogue, if a person acts bizarrely, say a teenager at a family home, the mental health professionals head over instantly (not: schedule a thousand-dollar appointment for two months later after the patient’s psych ward lockup and the professional’s ski trip). The Open Dialogue practitioners maybe given the teen a benzo for sleep. While he’s sleeping, his family or friends might say to the professionals: “Let me tell you what really happened.” In other words, control the narrative and cover up wrongdoing. The Open Dialogue professionals don’t permit this. No one can begin until everyone can participate. Then, once the person who was in an altered state wakes and is calmer thanks to sleep, everyone gathers to have a small-scale inquiry. What happened? Is the coach at the school abusive? Let’s get that coach present to hear what he says about the accusation of abuse. Is the food at home causing the teenager distress? What can we do differently, together? It’s the same on the country or global level. For example, consider the South African Truth and Reconciliation Commission (TRC), which took place as apartheid was formally ending in that country. With varying degrees of success and failure, the South African TRC required human rights violators from both the white supremacist reactionaries and the revolutionary liberation movements to—on live television, on live radio, and with the victims’ families present and participating—confess their crimes in detail (while asking for limited amnesty). Inquiries and their similar cousin, truth and reconciliation commissions, existed prior to the South African TRC, but in studying and discussing how to set up such solutions, the South African TRC is a landmark people often start from.

“Who Killed Jeffrey Epstein?” didn’t get anywhere remotely close to this, but there’s every reason for us all to now work, in our various little and big ways, to create independent, internationally linked, victim-led inquires and/or tribunals to stop the impunity of street executions by cops, the impunity of torture, and the impunity of the common denominator that catches the most powerful wrongdoers in the net, pedosadism.

Recommended reading

Writer Conchita Sarnoff’s book TrafficKing: The Jeffrey Epstein case

Lawyer Bradley J. Edwards’ book Relentless Pursuit

Heather Marsh: OpDeathEaters Frequently Asked Questions (FAQ) and Operation Death Eaters long-term goals.

Heather Marsh (2014): The other battle for the Internet

Heather Marsh (2014): Sociopaths, psychopaths, and death eaters

Heather Marsh (2014): How we came to be ruled by death eaters

Heather Marsh (April 2020): The catalyst effect of COVID-19. (See also her glossary.)

Heather Marsh (May 2018): Transcript of whistleblowing panel censored by Oxford Union and her analysis of that censorship. See also my article about the censorship and my contribution to Boing Boing about calling a home of David Shedd, the CIA senior management panelist who demanded the panel disappear.

Heather Marsh’s books in the Binding Chaos series published by Must Read Books

Bound intro and volume one of the South African TRC on my carpet alongside other books you might should read!

I’ve only read some material on the South African TRC but here’s what I’ve found thought provoking and informative so far. The book A Country Unmasked by Alex Boraine, TRC’s deputy chairperson, the documentary Long Night’s Journey Into Day (try Kanopy.com and your public library for access), and the South African TRC official website, including the official TRC report and the online register of reconciliation where members of the public formally apologize, sometimes at length, for turning a blind eye and not doing more to help themselves and others overcome apartheid.

Follow on Twitter: @YourAnonCentral, @OpDeathEaters, @OpDeathEatersUS, @OpGabon, @OpRohingya, @OpCanary, @OpGTMO…and me.

And now, from “Who Killed Jeffrey Epstein?”, over to Epstein victim—and survivor—Maria Farmer for the mic drop.

Epstein survivor Maria Farmer: “2020 is the year when…”

The Investigation Discovery special concludes with Epstein victim/survivor Maria Farmer talking about her artwork. First she shows her painting of Epstein and his network.

Fugitive and pimp for Epstein, Ghislaine Maxwell, defined in a painting by Maria Farmer
Dirty Dersh (Harvard Law School’s Alan Dershowitz) defined in a painting by Maria Farmer
Epstein stuck into a UFO, painted by Maria Farmer

Then Maria Farmer shows artworks from her project to paint Epstein victims/survivors.

She explains: “I’m doing a series, drawing all the women, all their portraits. Honoring them, because they’re victims, but they’re also survivors. I’m giving them each a drawing so that they know that they matter. We’re binding together, and there’s strength in numbers, let me tell you something! They’re not getting away with it anymore. 2020 is the year the predators become the prey.”

Creative Commons License

This blog post, Updated: My #OpDeathEaters review of Investigation Discovery’s “Who Killed Jeffrey Epstein?” airing Sun May 31, 2020 by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (human-readable summary of license). The license is based on a work at this URL: https://douglaslucas.com/blog/2020/05/31/opdeatheaters-review-investigation-discovery-who-killed-jeffrey-epstein/. You can view the full license (the legal code aka the legalese) here. For learning more about Creative Commons, I suggest this article and the Creative Commons Frequently Asked Questions. Seeking permissions beyond the scope of this license, or want to correspond with me about this post otherwise? Please email me: dal@riseup.net.