How to take down an Economic Region – OPEN SOURCE INSURGENCY and other Ideas from Global Guerrillas

OPEN SOURCE INSURGENCY >> How to start

Superempowerment — an increase in the ability of individuals and small groups to accomplish tasks/work through the combination of rapid improvements in technological tools and access to global networks — has enabled small groups to radically increase their productivity in conflict. For example, if a small group disrupts a system or a network by attacking systempunkts, it can amplify the results of its attacks to achieve as much as a 1,400,000 percent return on investment.

Open source warfare is an organizational method by which a large collection of small, violent, superempowered groups can work together to take on much larger foes (usually hierarchies). It is also a method of organization that can be applied to non-violent struggles. It enables:

  • High rates of innovation.
  • Increased survivability among the participant groups.
  • More frequent attacks and an ability to swarm targets.

Here are some suggestions (this is but one of many methods based on recent history, I’m sure that over time a better method will emerge) for building an open source insurgency:

A)The plausible promise. The idea that holds the open source insurgency together. The plausible promise is composed of:

  • An enemy. The enemy serves as the target of attacks. This enemy can either be either received or manufactured (any group or organization that can be depicted as a threat). The enemy can be any group that currently holds and exerts power: invader, the government, a company, an ethnic group, or a private organization.
  • A goal. This objective animates the group. Because of the diversity of the groups and individuals that join together in an open source insurgency, the only goal that works is simple and extremely high level. More complex goal setting is impossible, since it will fracture/fork the insurgency.
  • A demonstration. Viability. An attack that demonstrates that its possible to win against the enemy. It deflates any aura of invincibility that the enemy may currently enjoy. The demonstration serves as a rallying cry for the insurgency.

B)The foco. Every open source insurgency is ignited by a small founding group, a foco in guerrilla parlance. The foco sets the original goal and conducts the operation that provides the insurgency with its demonstration of viability. It’s important to understand that in order to grow an open source insurgency, the founding group or individuals must follow a simple path:

  • Relinquish. Give up any control over the insurgency gained during its early phases. In practice, this means giving up control of how the goal is achieved, who may participate, how to communicate, etc. The only control that remains is the power of example and respect gained through being effective.
  • Resist (temptation). Stay small. Don’t grow to a size that makes the original group easy for the enemy to target (very few new members). Further, don’t establish a formal collection of groups, a hierarchy of control, or set forth a complex agenda. This will only serve to alienate and fragment/fork the insurgency. In some cases, it will make the foco a target of the insurgency itself. It will also slow any advancement on the objective since it limits potential pathways/innovation.
  • Share. Provide resources, ideas, information, knowledge, recruits, etc. with other groups and individuals that join the insurgency. Share everything possible that doesn’t directly compromise the foco’s integrity (operational security and viability). Expect sharing in return.

Will keep adding to this doctrine over the next couple of months. Could potentially package it into a PDF document for wider distribution when done.

The Hollow State Politics: The Left Behinds vs. Technorati

The shift from a marginally functional nation-state in manageable decline to a hollow state often comes suddenly…”Onward to a Hollow State

The western-style democratic nation-state is in deep decline. As I’ve been warning for nearly a decade, the nation-state as we’ve known it is rapidly hollowing out.  Simply, this century’s spike in globalization, financialization, and technological change is gutting it and there’s nothing that can be done about it.  Further, this decline isn’t a secret anymore.  It’s real and tangible and visible — it’s playing out in US politics right now.

Recently, we hit a new milestone in this decline.  The forces hollowing us out have enabled the development of a unified ruling class. A class united by global outlook, education, financial success, status, and technological adoption.

This milestone became crystal clear after Super Tuesday, when everyone in the establishment, from the Democratic and Republican party regulars to the media elites to academic policy wonks to senior government employees to the heads of large corporations and financial firms, banded together to denounce Trump.

In that moment, connected as they were on social networks to confront their existential enemy, America’s technorati was born.

The technorati, a group held together by social networking and unified by common values. A group that strongly senses it has more in common with the technorati of different countries than it does with the other people living in this country.  A group that now understands their common interests are far more important than the petty political issues, party loyalties, and policy nuances that divide them.

Of course, the only problem facing the technorati is that it is a very small slice of the population.  A small segment of the population that isn’t growing.  Globalization, financialization, and rapid technological change is not delivering the improvements it promised — at least, not to anyone but the technorati.  The rest of America is being left behind.

The left behinds are the supermajority of Americans getting creamed by the hollowing out of America.

Americans who lose more good good jobs, benefits, and status with each passing year. Americans who went deep into debt for college (in order to ascend to a slot in the technorati) but are perpetually underemployed. Americans who work all day but can only make enough to buy food with the money they earn.  Americans now adrift in an America so culturally unmoored, it makes the “people of walmart” not only possible, but common.

The problem for the technorati is that the left behinds are starting to realize they’ve been conned.

They are starting to find their political voice, and their candidates want big changes.   A demand that will only grow more intense as the hollowing out of America continues.

Social Violence Networking

Mb dallas
Social Violence Networking 
This use of social media has led to a new dynamic that bypasses the “redirecting – calming – slowing” influence of traditional media and the government.  This new dynamic is raw, unfiltered, and fast.  It also radically increases both the likelihood and the intensity of social violence.
Let’s dive into some of the details:
  • Violence as performance art.  Selfies.  Instagram videos.  Twitter.  We’ve been conditioned to record our experiences using social media.   Naturally, we’re are seeing the same thing with violence. Recording violence and showing it to the world, raw and unedited, can be used to “elevate the act” and memorialize it.    NOTE:   ISIS recently stumbled onto this as a way to motivate people to engage in terrorism.  In these cases, the attackers used social media to turn their bloody attacks into both performance art and solemn ceremony.  It gave it meaning. We’ll see more of that in the future.
  • We are bombarded with Instant outrage.  We are more vulnerable to emotional manipulation than ever before.  Our use of social media has changed us.  We are constantly on the hunt for pics, news, stories, and videos that grab our attention and titillate us.  Once we find them, we are then quick to share them with others.  Few things provoke outrage faster than violence and injustice.   It is proving particularly effective when the videos arrive raw and unedited from an individual rather than from the media.  These personal broadcasts have an authenticity, a vulnerability, and an immediacy to them that greatly amplifies their emotional impact.  This makes them more effective at triggering violence than any sterile broadcast from a traditional media outlet.
  • Echo chambers.  Our virtual networks on Facebook, Twitter, etc. surrounded us with people who think like we do.  These networks can easily become echo chambers.  Echo chambers that radically amplify outrageous social media videos, spreading the outrage like a contagion.  More importantly, it appears that this amplification can trigger individuals on the fence to engage in violence.

Watch out.

This roiling dynamic for amplifying social violence is very, very dangerous.  It has the potential to rip the lid off of this country faster than we can respond.

The Return of Great Power War


After a brief post Cold War hiatus, great power conflict has returned and it is likely to intensify as the economic woes of China, Russia, and the US worsen.

During the Cold War, great power conflicts were fought through proxies using a variety of different means (my friend Frank Hoffman’s Hybrid Warfare). This method of indirect fighting was used to avoid situations and military casualties that could trigger a nuclear war.

In the near future, we are likely to see the great powers — China, Russia, and the US — fight it out in the same way they did historically, in intense set piece battles (see explanation below). 


What is a set piece battle? 

  • It’s optional. It only occurs when both opponents agree to fight (it’s not a siege).
  • It’s contained. It’s only fought in a finite battlespace that both opponents agree on (e.g. a specific field or river crossing or island).
  • It’s a showcase of capability. It allows both opponents to execute their plans simultaneously.

However, unlike historical set piece battles, these battles won’t be fought with people. That would be too dangerous since high numbers of Chinese, US, and Russian casualties could lead to a nuclear crisis.

Instead, these battles will be fought and won by autonomous robotic systems.

In the next dozen years, as robotic weapons become autonomous and capable of executing mission orders, we’re going to see a spike in the number of lethal (to the system) tactical engagements between robotic weapons fielded by peer competitors. These early engagements will condition the military and political leadership to fighting in this way without escalation.

However, it won’t be long before one of the great powers decides to test their capabilities in robotic weapons against a regional antagonist.

For example, China could deploy a fully robotic A2/AD (anti access, area denial) system of precision guided munitions, autonomous drones/UUVs/etc. across hundreds of the Spratly islands. A veritable hedgehog of lethal machines capable of destroying anything that entered the territory.

China could then provoke a set piece battle by activating the system and declaring that anything within a very specific territory is off limits to all traffic not specifically approved by the Chinese government.

At this point, the US has three options in response to this “pop-up A2AD” (I love that term). It could:

  • Ignore it. This would likely lead to more pop-ups all over the world from any power capable of fielding robotic A2AD.
  • Engage it with manned forces. There are two options here. First, the US could sail a carrier battle group into the area in a classic Cold War test of strength, challenging the Chinese to sink it, which would escalate the engagement to a nuclear war. Second, the US could choose to attack it with conventional forces augmented with robotics (teaming), however the battle would likely result in significant loss of US life (a waste of lives if the islands aren’t retaken or neutralized).
  • Engage it with autonomous robotics in a set piece battle. This option would test the relative strengths of the respective militaries in robotic systems and AGI (artificial general intelligence). It would be bloodless and contained to a specific battlespace.

These battles could be short and over in hours, fought with robotics and cyber combined arms. In some cases, they could go on for decades. An eternal contest until one side or the other runs out of money or the political need to distract an angry population.

How fast, frequent and FAKE terrorism could sink the EU

The ROI (return on investment) from making FAKE attacks against EU targets could exceed $1,000,000 to $1.  IF 10,000 FAKE attacks are made in the next year by self-activating, super-empowered individuals, the costs would be incalculable.  

The successful terrorist attacks on Brussels and Paris have left the EU vulnerable to tens of thousands of fast, frequent and fake attacks by self-activating terrorists.

Here’s how.

The recent attack on Brussels was big, bloody, and effective.

Fortunately, attacks on this scale don’t occur often. They take lots of time to prepare for and lots of support. Given these costs, it’s unlikely we’ll see an attack on this scale for a while.

Unfortunately, there is a way for terrorists to get around that limitation.  A way to continue to damage the EU without mounting a new, large-scale attack. This is accomplished by self-activating terrorists making small, frequent and fake attacks.  Fake attacks that have a disruptive impact similar to a real attack.  Attacks like:

  • threats to buildings, organizations and individuals
  • suspicious packages left on trains, airports, etc. or mailed bombs/biochem
  • reports of suspicious activity – building, organizations, and individuals

Why are fake attacks effective?

  • in the current environment, every threat/attempt is taken seriously by the government.  Police, fire, and the military responds.  Buildings are searched.  People are accosted.
  • it costs orders of magnitude more to respond to a fake attack than it takes to mount it.  Airports are closed.  Subways are suspended.  Traffic is stopped.
  • these attacks can be made frequently, with very little risk/cost to the attacker.  Simply, anybody can participate with 10 minutes of instruction.

Worse, at scale (tens of thousands), these attacks could deeply damage the socioeconomic fabric of the EU, by increasing distrust of minorities, generating hundreds of billions in security costs and sinking Schengen.

Deep Maneuver (Autonomous Robotic Weapons)

Many cyber weapons are designed for deep maneuver.  These virtual weapons drift across the Internet, jumping from computer to computer to computer, potentially travelling for years until they find the target they were designed to destroy.

Deep maneuver is also possible with autonomous robotic weapons in the real, physical world.  I’m not talking about the minimal performance improvements  achieved by removing the weight of a pilot or crew from a manned system.  Instead, I’m talking about autonomous robotic systems that can undertake missions that last for years and traverse tens of thousands of miles.

Let’s dig into this idea a bit.

The earliest example of robotic deep maneuver I’ve found is an operation from WW2 called Fu-Go. Fu-Go was the Japanese attempt to bomb the continental US using balloon bombs. Although Fu-Go was a complete failure, I find it useful as a way to think productively about how robotic intelligence can be used to surmount physical challenges (distance, time, etc.).

6a00d834515db069e200e55035d1368834-640wi

Where the Fu-Go balloons landed in the US

Here are some details about Fu-Go:

  • The operation began in late 1944 in November, as US B-29s began the bombing mainland Japan and a couple of months after the Germans began launching V2 rockets. Operation Fu-Go was commanded by Major General Sueyoshi Kusaba of the Imperial Japanese Army and carried out by 2,800 soldiers. These soldiers launched 9,300 balloons made with mulberry paper and held together with potato paste, by hand.
  • The balloons were built to carry hundreds of pounds of explosives across the Pacific in about three days, using the winter jet stream as propulsion. In order to access the jet stream the balloons were outfitted with systems (releasing ballast and venting gas) that kept them between 30,000 and 38,000 thousand feet. Some of the balloons were outfitted with radio transmitters, so their progress could be mapped by Japanese facilities on island bases across the Pacific.
  • The operation was a complete failure.  The level of robotic autonomy used by the Japanese wasn’t advanced enough to overcome the challenges of the task.  For example, the Japanese predicted that 10% of the balloons would reach the US (about 900 balloons), but only 300 balloons made it.  On top of that, no major damage was done by the balloons that completed the journey.

I find that this example provides me with some insight into how robotic weapons can make deep maneuvers like cyber weapons.   As we know, cyber weapons are already experts at using the environment for propulsion.  They use everything from open network connection to the stochastic motion of personal gadgets (cell phones, etc.) to maneuver themselves to their target.

Autonomous robots can do the same in the physical world by substituting intelligence for mechanical performance.  This intelligence would allow them to leverage a wide variety of environmental factors to extend mission duration and range, from using wind/ocean currents to hitchhiking on vehicles (ships, trucks, aircraft, etc.) to slow self-propulsion using solar energy (or buoyancy).  Deep maneuver makes it possible to:

  • Traverse an ocean.  Hide in the muck of an opponent’s harbor or in the coral reef near a disputed island. Engage kinetically with PGMs when required.
  • Infiltrate a remote region and set up a sensor network to monitor enemy activity and look for targets of opportunity.  Persist for a decade, permanently denying the area to opponents.
  • Fly by night.  Hide and/or recharge by day.   Tap into the opponent’s electrical grid or fuel systems.  Do so until target is found/neutralized.

Have fun

John Robb

I spent last year working for the Chairman of the Joint Chiefs of Staff on a vision for how advanced robots will transform warfare over the next twenty years.  This year I’ll share my thinking with you.  Tag along if you are interested.

Zero Day Warfare

The winner of the next big conflict will be the side with the best understanding of how to use bots in warfare. Bots aren’t just an iterative improvement in warfare, like stealth or PGMs, it’s a revolution in the making. The US military, to its credit, is working on this. So far, the US military has identified three (out of nearly a dozen) of the foundational ideas needed to successfully employ bots in warfare:

  • Teaming
  • Autonomy
  • Swarming

Learning from Nitro Zeus

However, these early ideas are a long way from the operational thinking required to win wars using bots. That type of thinking requires a synthesis of the foundational ideas into new operational concepts. Here’s a good example operational concept I’m calling zero day warfare. It builds off the thinking already demonstrated in recent US cyber operations:

  • The US recently leaked plans for Nitro Zeus, a sweeping cyber attack on Iran to be used only if the nuclear negotiations with the country broke down.
  • Nitro Zeus, building on the earlier success of the Stuxnet/”Olympic Games” (the earlier cyber attack that set back Iranian nuclear activities by destroying 1,000 centrifuges), was designed to seize control or knockout Iran’s air defense system, communications grid, transportation system, and energy grid on the first day of the conflict.
  • The rapid onset of chaos caused by Nitro Zeus would have then made it possible for immediate kinetic attacks on the real objective of the operation: the Iranian nuclear facility at Fordo.

Zero Day Warfare

The goal of zero day warfare is to win the war before it starts (a very zen concept) by deeply penetrating the opponent’s territory years before the conflict begins. Like all maneuver warfare, it is focused on shattering the opponent’s physical and logical cohesiveness. Here’s a quick summary of the highlights:

  • Autonomous robots and software bots (collectively “bots”) deeply penetrate the opponent’s territory both physically (territory) and logically (their computer systems). Most would be hidden and remain dormant until activation. Some would actively or passively map opponent networks, analyze them for vulnerabilities, and take advantage of opportunities for stealthy exploitation.
  • When activated, these forward bots conduct a coordinated attack from inside the opponent’s territory and systems. Damaging, degrading, or taking control of computer systems and physical infrastructure. Advanced robots would emerge from stealth to kinetically engage with opponent forces or physically seize points (airports, ports, etc.) to enable the rapid entry of conventional forces.
  • External forces, both bots and conventional, would utilize the disruption of the Zero Day attack to rapidly enter the territory and seize control of key facilities and capture remaining leadership.

Have fun,

John Robb

PS: A zero day warfare that includes deeply deployed autonomous robots will be possible within the next decade. Almost all of the tech needed to pull it off is almost here.

A Robotic 9/11

The current revolution in robotics is due to rapid advances in the ability of robots to think  (enough to fly themselves).

This means that most of the big improvements we’ll see in the use of autonomous robots in warfare will be due to finding new uses of this attribute more than any other.  Let’s explore this a bit.

It’s now possible to turn a simple low performance drone into a weapon that is nearly as effective as a precision guided missile (PGM) that costs hundreds of thousands of dollars.  This is accomplished through the creative substitute inexpensive and sophisticated machine thinking for expensive mechanical performance.

In other words, the smarter the drone is, the better it can mimic the performance of the much more expensive PGM.

This is already possible today with inexpensive, commercially available drones.  Low cost drones are now smart enough to approximate the performance of an expensive surface to surface missile system with a little creativity.   Let’s dive into this a bit.

From a mechanical perspective, consumer drones aren’t that impressive:

  • ~1-2 pound payload
  • ~20 min flight time
  • 20-40 miles per hour flight speed

However, these drones are already very smart:

  • They can fly themselves.  They can take-off, fly enroute, and land autonomously.
  • They can precisely navigate a course based on the GPS waypoints you designate.
  • They can now (a recent development) use digital cameras to find, track, and follow objects.  Some can even land on objects they find based on a description of that object.

Even this basic capability is more than enough to turn a basic drone into an extremely dangerous first strike weapon. Here’s a scenario that pits ten drones against a major airport:

  1. Ten drones would take off autonomously in 1 minute intervals.
  2. Each would follow a GPS flightpath to a preselected portion of an airport.
  3. Upon arrival, a digital camera would identify the nearest wing of an aircraft.
  4. The drone would land itself in the middle of that wing.
  5. A pound of thermite in the payload would ignite upon landing.
  6. The thermite would burn through the wing, igniting the fuel inside…
  7. Most of the airport and nearly all of the planes on the tarmac are destroyed.

Here are the takeaways:

  • Even the simple robotic platforms of today can be extremely effective as weapons.  At current rates of improvement in machine intelligence, the situation will get much more interesting very, very soon.
  • It’s possible to creatively trade inexpensive machine smarts for expensive mechanical performance.
  • We need to figure this out before the bad guys do.  However, figuring this out requires a deep insight into the dynamics driving this forward.
By Capricorn4049 (Own work) [CC BY-SA 4.0 (http://creativecommons.org/licenses/by-sa/4.0)], via Wikimedia Commons

SPECIAL GUEST: John Robb (Global Guerrillas). We’re joined by JOHN ROBB, author/entrepreneur/inventor/former USAF pilot, for some futurist looks into drones and self-driving cars. How does the current situation with these technologies mirror the early days of the Internet, what possible ways they will transform society, and through it all, how is DEEP LEARNING reshaping our lives. With a side of social networking, including our favorite kicking target FACEBOOK. Recorded on 1/7/2016.

You can download the episode here, or an even higher quality copy here

 

Mike & Matt’s Recommended Reading:

John’s blog Global Guerrillas, about Networked tribes, system disruption and the emerging bazaar of violence, the future of conflict.

John on Twitter

Global Guerrillas on Facebook

John’s Wikipedia entry

Google Brain: “Can we build a centralized machine leaning platform?” Smarter Devices for our Connected Environments, suggested “find out more” link by our Twitter friend, Nicholas Perry

Culture is Everything

What is culture? In the broad sense, it’s a way of life.  More specifically, it’s a basket of shared behaviors that determine how we solve problems, define success, and treat each other.

Culture is important. It has been proven critical to socioeconomic success, at every level, from the extremely large group to the individual (although at the individual scale, we call it character). For example, in the corporate world, most successful CEOs will tell you the same thing: culture is everything.

So, if it’s so important, why don’t we talk about culture more?

It isn’t easy to quantify. It’s not easy for bureaucrats to dictate or markets to measure.

Fortunately, there is a way to understand it a bit better. Culture is important because it plays a critical role in personal and group decision making. More specifically, it drives the “orientation” step of John Boyd’s decision making model, the OODA (observe, orient, decide, act) loop.

Orientation is different than the other steps in decision making.  It’s a gut check.  A check of core values.  It is a synthesis of everything you’ve learned as it applies to the problem you face.  This makes it squishy and holistic.  It’s the step that Einstein so elegantly referred to in this quote:

If I had only one hour to save the world, I would spend fifty-five minutes defining the problem, and only five minutes finding the solution.

Unlike orientation, the other steps (observe, decide, act) used in decision making are largely mechanistic, analytic and quantitative. To improve these other steps, you speed them up (i.e. computers), increase their fidelity (accuracy without error), and widen their scope (more data).

In contrast, culture is how human beings have learned to speed up orientation in a dependable way.

Culture can provide any individual, organization, or country with the outlook needed to successfully orient problems repeatedly and without hesitation.

Here’s an example:

Some business cultures place a high value on treating the counterparty in a transaction with respect and dignity.  In those cultures, it’s important that every business transaction is a win-win, where both sides are better off for doing business together, regardless of the contractual details.

In other business cultures, business transactions are highly competitive.  In those cultures, it’s important to win every business transaction and contractual details are used as a weapon to bludgeon the counterparty into submission.

See the difference in approach due to culture?

What should also be obvious from this example is that cultures differ.  They can be wildly different.

They aren’t equally effective, the usually don’t mix well, and some can be toxic.

Sincerely

John Robb

PS: John Boyd developed the OODA loop to figure out how to win conflicts.  He postulated, correctly, that successful decision making is the most important factor in survival — from simple organisms surviving evolutionary pressures in primordial pools to winning wars on modern battlefields.   Therefore, success in any conflict was largely due to faster, better decision making.  The faster you can make good decisions, the faster you can iterate to success.

Supersoldiers and Autonomous Weapons

2015-11-20_10-17-16

Here’s some thinking on how warfare will change over the next twenty years.

Fast forward 20 years (about the age of the WWW).  An aging, schlerotic EU has become the destination for over a hundred million refugees and migrants fleeing the densely populated killing fields of Africa and SW Asia.

The rapidity of influx has led the EU to take extreme measures.   Tens of millions of these migrants/refugees are roughly housed in relocation camps all across Europe.

Violence within these camps has risen steadily, leading to an EU-wide Islamic insurgency.

The soldiers sent to counter this insurgency are outfitted with autonomous weapons.  These weapons combine deep learning (making them very smart) and cloud robotics (allowing the military to rapidly share advances in training and technique) to provide these soldiers with capabilities far beyond what we’ve seen in previous wars.

Here’s an idealized example so you can get the idea.  A human/robot team advances down a street in an urban environment.

  • Big Data:  The autonomous weapons used by the team continuously scans the street in all directions.  These weapons can visually ID everyone on the street from a database of 3.5 billion people in under a second.  It also continuously analyzes the people, windows, etc. down the street looking for the visual signatures of concealed weapons and IEDs.  i.e. A car at the end of the street is resting a bit too heavily on its springs, indicating there may be explosives in it.  These weapons learned to do this based on billions of hours of combat and police training images/footage (aka Big Data).
  • Customized Training:  The human members of the team have trained the weapons to alert the team when it sees any electric vehicles demonstrating even the slightest bit of irregular behavior — the rapid acceleration possible with autonomously driven electric vehicles can make them dangerous kinetic threats in three seconds.
  • Cloud training:  The autonomous weapons with the soldiers with connections to military’s cloud.  Fortunately, this connection to the cloud gave these weapons access to the certified methodologies for identifying and neutralizing a new DIED (drone IED) used by Islamic insurgents only yesterday.  This paid off.  The new DIED entered the street behind the team, and the systems new how to ID it, engage it, and neutralize its countermeasures flawlessly.  During the engagement, the human team member noticed a slight change in the behavior of the DIED — it released its homemade cluster bomblets earlier than anticipated.  The data/footage of the engagement is tagged with a note to this effect and it is uploaded to the cloud in order to add to the approved methods for countering it.

Of course, much of this capability might become open source and available to anyone smart enough to employ it.

How do you control Autonomous Weapons?

241890
How do you control an autonomous system?

This isn’t an academic question.  Some organizations already employ truly autonomous systems and these systems are getting very good very quickly.

Since these systems are already in use, I think this question is about as important as it gets.

Unfortunately, these systems are so new, very few people are working on the answer to this question.  Worse, this question is devilishly hard to answer, because a truly autonomous system…

  • will solve problems that only human beings can currently solve.
  • will write its own “code” and build its own models for solving problems and making decisions.
  • will continuously learn/change/improve its code and its models as it gains experience.

Here’s my early thinking on this.

You can’t control these systems using the methods we built for controlling the human built software and machines we already have.  If you attempt to control autonomous systems in the same way you control automation, you will fail (and fail badly).

A new method of command and control is needed.  Here are some ideas for how to pull this off:

  • Human beings must be paired with these systems.  These people must act as coaches, trainers, teachers to these systems.  They must take responsibility for failures in their training.
  • These systems must be continually certified for use in way (largely qualitative vs. quantitative) that are similar to how we certify human beings.  Put them through a series of real world exercises.  If they can handle them and explain why they made the decisions they made (optimally, using natural language), they are certified for use.
  • We need to develop and deploy something I’m calling BIG SIM.  This is a compliment to the BIG DATA that’s used to bootstrap these systems to minimum capability.  BIG SIM provides a massive real world sandbox that will allow autonomous systems to undergo extensive training and testing to suss out problems.  BIG SIM can be completely virtual.  It can also be accomplished through decentralized real-world testing as we are seeing with Tesla’s crowdsourced “autopilot” or via a corporate solution like Amazon’s Mechanical Turk.

Beyond Automation

There’s been a big change in the wind for a decade.  Many of us have heard and felt it rumbling in the background, shaking the foundations of an already decrepit global socioeconomic system.

Depending on how you view the world, you see it differently.  I see it as as technological transformation.  A technological transformation that will upend everything.

Here’s a taste of what is driving this change forward.  It’s real and it’s coming.

>>

Up until three hundred years ago, the world relied on the work being done by people, largely by hand.  The skills and methods required to do this work were largely inside the minds of the people doing that work.  We created organizations to aggregate the people needed for doing work on a large scale and guilds to protect this knowledge.

To overcome the limits of a world made by hand, we developed something new:  automation.  We’ve transformed the world by building machines (in both hardware and software) that do work for us. Automation is based on a scientific process that figures out how things work and an engineering process that turns these scientific ideas into machines that actually do work.

However, we’ve now reached the limits of automation.  How so?  Automation is limited by the ability of human beings to construct the cognitive models (both scientific and engineering) needed to build the machines that provide it.

To overcome these limits, we’re now building cognitive machines that can build their own models for how things work and how to accomplish tasks. Unlike the machines that provide us with automation, these machines aren’t built in the traditional way and they can tackle problems far more complex than anything done by automation.

The big change is that these machines build themselves.  They bootstrap their abilities in the same way human beings do: through learning, training, and experience.   However, they can learn it MUCH faster (deep learning) than we do and once they do, they can share their new abilities with other machines all over the world instantly (cloud robotics).

If you don’t think this is a big deal, you are wrong.  It’s the biggest shift in technology we’ve seen since the rise of automation over three hundred years ago and it’s going to change everything.  In particular, it’s going to upend the rules of economics, warfare, and politics we thought were immutable.

It’s Open Season on the Tech Elite

Crosshairstwitter

Battles between the corporate allies of hollow nation-states and the gangs and tribes of black globalization are at the center of this century’s epochal war.  That war will eventually put the senior executives of US tech and financial companies in the crosshairs.  Here’s a good example.  Over the weekend, ISIS threatened the life of Jack Dorsey, a co-founder and Chairman of Twitter.  Why?  Twitter, at the urging of the US government, has been shutting down the accounts of ISIS supporters for months.  So, ISIS supporters responded by making a threat with a nifty graphic:

We told you from the beginning it’s not your war, but you didn’t get it and kept closing our accounts on Twitter, but we always come back. But when our lions come and take your breath, you will never come back to life

The CEO as an Objective of War

Unfortunately for the suits in Silicon Valley, ISIS isn’t as much of a pushover as al Qaeda was. They have mass and momentum and they are smart enough to understand the role of the Internet in this struggle.  Additionally, they have lots of experience coercing CEOs and other senior executives.  They did it quite a bit of it during the war in Iraq (and it worked).

Regardless, the targeted killing of a well known tech executive in sunny California by ISIS jihadis does appear impossible to imagine. Few places are more remote from each other, and not just geographically. Silicon Valley is a hyperconnected, financially mainlined zone striving for a tech nirvana. ISIS is a disconnected autonomous zone striving to return to the 7th Century. However, that’s probably a bad assumption.   Charlie Hebdo showed the world that terrorism is evolving and corporate targeting on global scale is now on the agenda. This means an attack on a tech CEO isn’t just possible, but probable. Worse, once an attack on a senior tech executive happens, future threats will be instantly credible and highly coercive.

If that occurs, we are going to find out very quickly that the corporation, and particularly tech companies, are particularly bad organizations for warfare.  One reason is that they are too centralized.  In particular, the institution of the CEO is a grave weakness (a systempunkt in global guerrilla lingo).  The CEO’s centrality to the corporate network makes him/her a single point of failure for the entire organization.  Another is that executives in most of the western world are very soft targets.  Easy to find (Google and Google maps), easy to isolate, and easy to kill…

The Middle East doesn’t Matter Anymore

Back in 2003, the US was headed towards complete dependence on foreign oil.  Additionally, the demand for energy (particularly from China) was growing far faster than production, which meant an energy price spike was inevitable.

Oilimp

Of course, this could be avoided if another big source of oil was found and exploited.  However, based on existing production technology, the only big fields left untapped were in Iraq, but due to sanctions (limiting production to 2m barrels a day, far less than the 8 m bpd projected to be possible).

The result was inevitable.  The US invaded Iraq to free up production (that’s largely why the fields were secured in the first couple of days of the invasion), but it screwed up.  The national security “brain-trust”  didn’t anticipate that the Iraqi guerrillas would disrupt this production so effectively (I covered this in detail on this blog and in my book).  The result?  Iraq produced less oil, for years after the invasion, than it did under sanctions.

That loss of production in combination with disruption caused by Nigerian guerrillas (who copied the success of the Iraqis), produced an energy crunch that drove the global economy into a massive recession.  Worse, this recession became a decade long depression due to the disruption caused by the banks and hedge funds we allow to hack the global financial system.

One of the benefits of this oil crunch was that high prices spurred technological innovation that led to an upheaval in the US energy system over the last decade.  New technology has enabled US oil and natural gas production to boom. Not only that, this tech enables energy production to scale industrially — that’s a big change if you understand the implications.

The most immediate benefit of a return to US energy autonomy has been lower natural gas, oil, and gasoline prices (autonomy that will only grow as solar zooms). However, there’s other benefits that should be obvious too.  Since the US isn’t dependent on Middle Eastern energy anymore, US national security policy will be decoupled from Middle Eastern conflicts.  Like it or not, this is inevitable.

What does this mean?

  • If the US does get involved in Middle East conflicts it’s due to outdated policy and doctrine.
  • Nobody in the West will do anything to stop the spread of ISIS (as a humanitarian crisis it rates well below Rwanda).
  • Saudi Arabia is going to get desperate to get the US to intervene.  It sees ISIS as an existential threat.  How will it do that?  I’ve got some ideas…

ISIS isn’t the long term problem, Saudi Arabia is

Here’s a new way to think about something that should be obvious…

To the politicians in DC and financiers in New York, Saudi Arabia is an island of stability in a sea of chaos.  A reliable ally, willing to keep the oil flowing, year in and year out.  A place that’s not vulnerable to the instability that routinely guts the countries around it.

Of course, that line of thinking is utterly misguided.  The opposite is true.

In reality, Saudi Arabia is extremely fragile and much of the chaos we see in the Middle East is due to the way Saudi Arabia avoids falling to pieces.  Worse, we are largely to blame for this.  We go along with this charade, and our willingness to play along is doing much of the damage.

To understand why this illusion Saudi stability is so toxic, let’s dig into a very smart idea from thermodynamics called dissipative structures.  In fact, the idea was so good that won Ilya Prigogine the Nobel prize in Chemistry.  Prigogine’s idea provides us with insight into how everything from how biological structures (e.g. bacteria, apes…) to natural phenomena (e.g. tornadoes) to social systems (e.g. nation-states) build order and prevent collapse.

The important part of this idea for us, is that all dissipative structures grow by exporting or expelling waste products into an external environment.  In other words, they achieve “order” by getting rid of the disorder produced by building it.

Here it is in very simple terms.  Within biological structures, eating produces the energy needed to build and maintain an organism.  In turn, consuming food produces disorder in the form of feces.  Organisms expel feces into the outside world because holding onto it is dangerous.  The same process is true with almost all complex structures. With automobiles, it’s exhaust fumes. With complex social systems, it is everything from warfare to pollution.

We could spend all day on this idea, but let’s cut to the chase and apply this framework to Saudi Arabia.  Saudi Arabia is a particularly expensive dissipative structure because it is extremely rigid, anachronistic, and unchanging.   To maintain this archaic structure despite the titanic forces of globalization trying to pull it apart, it must export an incredible amount of disorder (entropy) into the surrounding region.  Disorder such as:

  • A corrosive fundamentalist ideology.  The KSA’s Wahhabism fuels both ISIS and al Qaeda and it’s spent billions spreading it around the world.
  • Thousands of violent zealots.  The vast majority of the hijackers during 9/11 were Saudi as well as thousands of ISIS members.  People it can’t control are sent abroad.
  • Billions in destabilizing financing.  Saudi Arabia provided the start-up funding for both al Qaeda and ISIS.  It even “invested” $10 billion in the current Egyptian military dictatorship.

Obviously, this Saudi entropy has damaged everyone in the world.  It spreads violent instability throughout the world, from the terrorism of 9/11 to the violent ascent of ISIS in Syria, Iraq, Libya, Egypt, Pakistan…

Worse, the damage being done by Saudi Arabia is increasing with each passing year, as it attempts to defy the inexorable gravitational attraction of a fluid, dynamic, and tightly integrated global system.

This means that even if ISIS is defeated in the next couple of years, Saudi Arabia’s dysfunctional system will produce something worse soon thereafter.

Make room for Violence Capital

The jihadi entrepreneurs of ISIS don’t just accumulate wealth and territory.

They are also accumulating violence capital.

What is violence capital?   

In traditional businesses, money is the primary form of capital.  In on-line businesses, network capital (the size of the network it controls or influences) is often more valuable than the financial capital it has.  In the fluid world of jihadi entrepreneurship, violence capital is often most important form of capital.

Groups and individuals accumulate violence capital through the calculated application of violence.  It’s expended on the following:

  • Credibility and Reputation.
  • Coercive Influence.
  • Instant FUD (fear, uncertainty, and doubt).

Violence capital comes in lots of different forms and is expended in lots of different ways — from the neighborhood bully to the petty mobster to petty tyrants to global superpowers to the Mongols (the unmatched, epic purveyors of violence capital).

Hopefully, you can see that it’s a useful tool for thinking about the use and value of violence.

In the case of ISIS, the violence capital they are accumulating is of a special type.  They are building their capital by:

  • killing,
  • enslaving, or
  • routing

any and all apostates, unbelievers, moderates, etc.

Why are they doing this?  To become credible as an expansionist jihad within the fundamentalist Wahhabi tradition.  A credibility can only be built with lots of violence capital.

The FAA, Drones, and Caltrops

Here’s one of the reasons that the FAA has seized control of all drones (including toys) and is slowing the development of automated aviation to a crawl.  It’s a dumb move, since it won’t work, but they are doing it anyway.

The reason is that drones make disruption easy.

For example.  Let’s take a simple $1,350 drone like the X8 from 3D robotics.  It’s a good product, with solid duration (15m) and payload (.8 kg) numbers.

That’s more than enough capability for significant disruption with a little innovation.

BB7A0968

How so?  With GPS auto-navigation and a container that auto-releases its payload over GPS coordinates (an easy mod), it can become the perfect delivery vehicle.

What could it deliver?  Caltrops for example.  A handful of caltrops can shut down automobile traffic on major highways for hours.

Images

Combined with a drone, caltrops can shut down most ground transportation in a big city in less than an hour.

For example:

  • Flight 3 mi.  Fly to target. Drop payload.  Fly back. – 13 minutes.
  • Replace battery and refill cargo container – 5 minutes.
  • Flight 2 mi.  Fly to target. Drop payload.  Fly back.  – 9 minutes.
  • Replace battery and refill cargo container – 5 minutes.

Iterate.

Recover vehicle and depart area.  Potential for capture: very low.

Disruption potential?  High.

The big question:  Will the FAA effort to control drones protect against this type of disruption?  No.  It won’t.

It actually makes the situation worse.  It prevents the development of the safeguards an economically viable drone delivery network would produce.

Perversely, limiting drone use to big corps (that make political contributions) and government agencies, won’t create the economic progress that will turn this technology into a beneficial innovation.  It will do just the opposite.   It will simply increase the level of economic corruption/stagnation we are already experiencing in the US.

Caltrops and Systems Disruption

Some of the recent protests over Furguson have attempted to block traffic (LA and Boston) to cause delays.  Here’s an example (note the barricades on the left).  Of course, this method isn’t much of a danger.

B3WEVNnCQAA8AWH

A more troublesome method?

Disruption that uses a very old technology: the caltrop (see below).

Caltrops were originally designed to damage the hooves of horses (or impale the foot of a soldier).  They work equally well against tires.

2014-11-26_20-37-14

A handful of these tossed onto a highway at periodic intervals and in different locations can achieve very high levels of disruption.

Not only that, they are actually very easy to make.  Just clip a section from a chain fence.  Clip the ends to a point and bend them into shape.

2014-11-26_20-25-19

PS:  Years ago, I pointed to a study by the Federal Reserve that showed that disruption like this can act as a “tax” on a urban target that can cause a severe economic contraction.  The trick is keeping it going long enough to happen.

PPS:  Here a vehicle (with a false bottom) that was used to disrupt the main N-S highway in China last year.  Was it the cause of the 120 mile/week long traffic jam?

A19108929af44d22a9d7eb7dbd27d3a0

OODA Loops and Innovation

John Boyd is famous in large part for showing how decision making is critical to victory.

To do this he built the OODA loop.  The OODA describes how we make decisions:

  1. Observe.
  2. Orient.
  3. Decide.
  4. Act.

The OODA, when repeated quickly and accurately, allows any organism to quickly adapt to new and evolving circumstance.

As you can guess, making great decisions are particularly critical in warfare.

Although Boyd doesn’t spend much time on it, it’s also critical in economic activity.

Better decisions yield economic success for both individuals and the global economy as a whole (when many people make them).

The trick to doing it repeatedly is by getting the orientation right.

Orientation is the most critical step (by far) in the OODA.

Orientation is the step that combines everything in an instant — cultural tradition, morals, training, education, personal experience, emotional intelligence — in a way that provides a decision with direction, scope, and scale.

Orientation provides us with the cross connections necessary for high quality innovation.

Here’s an example.

I just saw this pic online.  It’s from Spotify, the online music service, about how they develop products.   It was meant to clever .  It wasn’t.

B2AwZWoCQAAZo00

I know from decades of developing innovative products (or being near to those who are) that real product innovation doesn’t work this way.

The depicted method is simply a description of incremental improvement.

Real innovation requires orientation.

Here’s Boyd’s example: the snowmobile.  It’s unlikely that iteration will yield a snowmobile.  It’s a strange device.

A mix of skis, tank treads, bike handlebars and outboard motor.

032 Snowmobile

 

It’s a product derived from connections drawn from numerous sources to combine an innovative whole.

Simply, it’s a product of good orientation.

Hacking the US with only a Sound

What happens when a terrorist network (ISIS) finds a way to activate terrorists using social media (neatly piercing the security defenses that we pay hundreds of billions of $$ for every year) to randomly attack civilians (like the  knife attack in Roanoke VA last week)?

You get a society at a tipping point.  A society at this tipping point is reactive and labile. It is EASILY sent into a frenzied retreat.

Shooter

How is this different?

Unlike the classic example of yelling “fire” in a crowded movie theater, this panic can be induced by anything that sounds/looks/feels like a threat rather than the claim of a specific threat (like “fire”).  Nearly anything can set them off.

Here’s three examples of that over the last two weeks (there have been many more):

  • JFK Airport.  Unfounded reports of gunfire led to an evacuation of terminals.  Police march passengers out of the terminal with their hands up.  Police speculate that it was started by load fans of the Rio Olympics.
  • CrabTree Valley Mall (NC):  Unfounded reports of an active shooter leads to a panicked evacuation of the mall.
  • LAX Airport.  Unfounded reports of a shooter led to people storming the jetway doors and spilling out onto the tarmac, people barricading themselves into bathrooms in multiple terminals, and more.

Shooter jfk 3

This public reactiveness may become the new normal both here and in Europe.  If so, we can expect people take advantage of it.

Here’s how.

All it takes is a single audio clip.  Like this or this either near a public space or done remotely on a timed playback device is all it would take to ignite the FUD (fear, uncertainty and doubt) that leads to a large scale evacuation.  In fact, people are so reactive now, I suspect it wouldn’t even take a sound that is explicit, only something that sounds similar.

Think about this for a moment.  The ability to shut down a public space for hours:

  • anytime (just walk in and play the sounds),
  • remotely (low cost playback device on timer/remote activation), or
  • on a large scale (thousands of people playing the sounds on their smart phones in public spaces simultaneously)

is a substantial capability.

How so? Take this fall’s election for example.

It is a far easier to close a voting location with a sound than hack a voting machine.

The Terrorism Tax hits Europe

This is big news.  This is the first large scale demonstration that the “Terrorism Tax” I speculated about back in 2004, actually works.

______________

Liz Alderman at the NYTimes reported that terrorism is squashing Europe’s first glimmer of recovery since the financial crash.  EU economic growth has been halved since spring, with France now at zero.  Here are some details:

  • Tourism is sinking.  For example:  “In France, growth in nightly hotel room bookings after the Paris attacks fell to single digits from 20 percent. After the Brussels bombings, bookings went negative, and after Nice, bookings fell by double digits.”
  • Daily security costs are spiking.  Here’s an example from a single venue, “the Paris Plage, a makeshift beach erected along the Seine, a dozen armed police officers guarded an entry checkpoint on a recent day. Army troops marched past families playing in the sand and half-empty activity points along the river. The patrols, cost taxpayers about 1 million euros, or $1.1 million, a day.”
  • Broad spectrum economic damage.  For example:  retail sales are slumping due to low traffic in stores and large numbers of entertainment events are being cancelled.

The Terrorism Tax

Although Europe has suffered terrorism before, this time it’s different.  Instead of big and relatively infrequent terrorist attacks, these new attacks are small, numerous and geographically dispersed.  This change is a big deal, because it makes it possible for terrorists to turn attacks into “a tax” that depresses economic activity by imposing new costs and changing economic behavior.  Here’s some of the theory from my 2004 article on it:

A terrorism tax is an accumulation of excess costs inflicted on a city’s stakeholders by acts of terrorism.  These include direct costs inflicted on the city by terrorists (systems sabotage) and indirect costs due to the security/insurance/policy/etc. changes needed to protect against attacks.  A terrorism tax above a certain level will force the city to transition to a lower market equilibrium (aka shrink).  So, what is that level?  Here’s what they concluded:

  • Singular terrorist events (black swans), like 9/11, do not impact city viability.  The costs of a singular event dissipate quickly.  In contrast, frequent attacks (even small ones) on a specific city can create a terrorism tax of a level necessary to shift equilibriums.
  • In the labor pooling model of city formation, a terrorism tax of 7% will cause a city to collapse to a lower equilibrium.  Labor pooling equilibrium reflects the benefits of aggregating workers in a single location.  Workers get higher wages and more choices.  Firms get stable wages (no one firm can deplete the market) and more candidates.
  • In the core-periphery model of city formation, a terrorism tax of 6.3% will push a city to a lower equilibrium.  The core-periphery model is based on transportation costs.  Firms generate transportation savings by concentrating in a single location next to suppliers and customers.  Customers and workers glean the benefit of lower transportation costs by locating near jobs and goods.

________

The terrorism tax is even more effective when it is combined with systems disruption (the intentional disruption of infrastructure).  That combo puts in play hidden dynamics – both economic and societal – that can turn a functional society into a violent insurgency within months.

The Race to Weaponize Empathy

There’s a war for the future being waged online. It’s being fought across the world’s online social networks, and the outcomes of these online battles increasingly dictate the outcome of what happens later in the real world.

One of the most successful tactics used in this war is the manipulation of language in order to confuse, scare, nullify or outrage targeted audiences with the objective of making money, aggregating political power, and disrupting opponents.

While this manipulation has ALWAYs been true of human conflict, it’s being done on a scale and to a degree that we’ve never seen before due social networking, globalization, and social/media fragmentation.

A great example of tactical manipulation is called the the Russell Conjugation (or the “emotive conjugation” championed by the philosopher Bertrand Russell , the pollster Frank Luntz and recently Thiel Capital’s Eric Weinstein).

The Russell conjugation exploits the gap in the emotional content of a word or phrase and the factual content.  Here are a few of Russell’s examples:

“I am firm; you are obstinate; he is a pig-headed fool.”

“I am righteously indignant; you are annoyed; he is making a fuss over nothing.”

Notice how the factual content remains unchanged. In each case, the person referenced is factually described as “a person who is reluctant to accept new information.” However, the words used change the emotional content drastically, from a positive to neutral-negative to negative-opprobrium.

The ability to change the emotional spin on a fact is critical. As all great marketing pros already know, the emotional content of a message is much more important than the factual content when it comes to selling anything. All brands are simply emotion (a commercial brand is monetized emotion).

However, this gets more complicated when an emotional spin is applied to facts presented as news.  As Weinstein correctly points out, people don’t just care about the factual content since they don’t view a fact as a bit of disconnected information.  They see all facts within a social context and that context is identified by the emotional context attached to that fact.

In fact, if historical behavior is a guide, people care more about the social consequences of the facts than the fact itself.

We’ve seen this before.  Context seeking is also the basis of consumerism as Thorstein Veblen pointed out in his classic book on modern economics The Theory of the Leisure Class.   Simply, the entire modern economy is based on people buying products and services in an attempt to mimic the choices and habits of people they consider cooler, wealthier or more successful than they are.

This is also true with news in a fragmented society.  Most people go to news sources they trust to find out more than the facts.  They want to find out how they should feel about a fact (or whether they should reject that fact) from people they consider to be leaders of their social network.

This context seeking used to be limited to the news presented by reporters/editors of the big papers like the New York Times and the TV network news organizations like CBS.  That’s not true anymore.  Control over the emotional content of news has fragmented due to the rise of social media and social networking.  People don’t just look for the “correct” emotional spin on a fact from a big media company, they seek it from alt news orgs and personalities on social networks they identify with.

This suggests that the current debate over “fake news” isn’t due to the use of fabricated information.  Instead, it’s really a negative way of describing news that has an emotional context that is at odds/war with the emotions approved by the major media, academia, or government.

Sincerely,

John Robb

PS:  Here’s a good book from Frank Luntz on how this manipulation works in practice.   Example:  how the Estate Tax was redeemed by calling it the Death Tax and Illegal Immigrants were redeemed by calling them Undocumented Immigrants.

Luntz

Political Networking (how social networking is changing politics forever)

Social networking is changing politics, that fact should be clear by now.  A simple proof:  Trump wouldn’t be in the White House without it.

But where is political networking taking us?  That’s the BIG question. I’ve been doing lots of thinking about this (it’s going into my book). Here’s my shorthand for where our political system is headed. We have three political networks to choose from:

  1. Insurgency
  2. Orthodoxy
  3. Participatory

Insurgency

Trump used an open source insurgency (I first wrote about this back in 2004) to become president. This insurgency didn’t just with the election, it:

  • blew up both the Republican and Democrat parties
  • did it without much organization or advertisement spending
  • accomplished it despite vocal and strident opposition from the entire media establishment (from NY to Hollywood), all of academia, and most of Silicon Valley

Trump’s insurgency worked like open source insurgencies in the past (from the Iraq war to Egypt/Tunisia).

  • An open source insurgency is a loose network (meshed) that is composed of many individuals and small groups working independently, but united by a single purpose (in this case: electing Trump).
  • Open source insurgencies are much more innovative than their bureaucratic counterparts. They constantly coming up with and trying out new ideas. For example: the seventy to one hundred groups in the Iraqi insurgency rolled out new innovations (tactics to weapons) in days, while it took months for the US military to counter them.
  • Trump accelerated and directed this insurgency by interacting with it.  For example, he accelerate the innovation of the insurgency by paying attention to it (read Gustavo’s essay for more). Tweets and media mentions incentivised innovation and spread new ideas across the insurgency in minutes (not days/weeks).   Trump also selected targets for the insurgency. In many, many instances, Trump directed the insurgency to silence individuals in the opposition through a torrent of online/offline abuse.

Trump’s currently trying to adapt this insurgency to govern.  Where will it take us? Early results suggest that Trump’s insurgency is better suited for dismantling a large, bureaucratic government and international order than running it. It’s also the type of network that will erode the rule of law over time.

Orthodoxy

The second form of political social networking I’m seeing is found in the opposition to Trump’s presidency.  Right now, it’s known as the #resistance   The orthodoxy wasn’t planned, it:

  • arose out of the ashes of the political parties and it is growing without any formal leadership
  • is ALREADY firmly in control of nearly all public forums
  • enforces opposition to Trump

The orthodoxy is an open source insurgency in reverse.  It uses social networking to crack down on deviation and dissent.

  • The orthodoxy is tightly interconnected network that uses social networking to exert pressure on people to accept the orthodox position (in this case: #resistance to Trump).
  • Online orthodoxies grow through peer pressure and disconnecting deviants from the network.  It doesn’t innovate.  It rejects, cajoles, and pillories.
  • This online orthodoxy is growing at an accelerated pace because Trump feeds the outrage that fuels it.

How will an orthodox network govern?  It will eventually formalize compliance with the orthodoxy. Compliance, evidenced by a long social networking history, will qualify people for positions of authority and power. Any deviation will result in bans, loss of income, etc. until the target repents.  This orthodoxy will work in parallel to the rule of law and likely exceed its coercive power over time.

Participatory

This form of social networking doesn’t have an example in the US yet.

  • The Movement 5 Star in Italy is a political party run as a social network.  It is running number one in the polls, has mayor in Rome and Turin, and recently deposed the Prime Minister.
  • The political representatives the M5S sends to Rome must vote the way the party tells them to vote.  They aren’t independent.
  • The M5S is a participatory political party.  The people in the party debate the issues and vote on how their representatives should vote in Rome.

The participatory party is still young, but it combines the fluidity of the “insurgency” with the solidarity of “orthodoxy.”

  • A participatory party could be run as a cell phone app.  This would allow it to scale… to 70 plus million members is possible.
  • Unlike current political parties, this party wouldn’t just vote every 2 years to elect candidates.  It would operate continuously.  Voting on all major issues.
  • A participatory party could arise independently, growing virally, or it could coopt an existing political party from the inside out.

How would a participatory network govern?  Unlike the other systems, it has the best chance of working within the confines of the current US Constitution.  It also has the strength to tame political distortions caused by globalization without resorting to the extremes of either the orthodoxy or the insurgency.

ExpressPass1My bet is on a participatory political system made possible by social networking.  It’s the best chance for a better future.  A system where we put social networking to work for us instead of against us.

Of course, the reality is probably something different: we’re prepping for a civil war.

Using Drones to Rapidly Set up Networks

Here’s a new drone (warning, acronym creep) called the CICADA, or Close-In Covert Autonomous Disposable Aircraft.

P1651266

It’s tiny and weighs only 65 grams.  It is meant to be dropped by an aircraft in a swarm (dozens at a time).  Once released, each drone flies/glides to its target location and takes up residence.

What are they good for?  Not much right now, but they could evolve into a way to rapidly deploy large, geographically dispersed networks of sensors and/or mesh communication nodes.

Why use them?  They have the potential to provide P2P communications and real time intel to human units and autonomous weapons operating in a contested environment.  In other words, a relatively simple mesh comms/sensor network like this would  allow units in the field to connect with each other and sources of intel sideways.

Longer term?  We will likely see vast networks of drone sensor/comms nodes that provide resilient over the horizon services that surpass (both in survivability and usability) those provided by satellites and other traditional means.

Idea: The Automation of Terrorism

I figured out what I’m going to talk about at the Prime Minister’s conference in Singapore next month:  the automation of terrorism.  Here’s the outline of what I’m going to discuss (I already have most of the thinking on this topic already done and the trend is already in motion).

____________

New technologies have put us on the brink of a significant upgrade to extremist violence.  Specifically, it may now be possible to fully automate a terrorist attack or worse, a terrorist network.  Here’s how:

Social networking already connects billions of people worldwide and it is rewiring us psychosocially.  We can already see the disruptive effects of this, creating an environment conducive to extremism:

  • It made it possible to topple governments across the Middle East.
  • It enabled ISIS to recruit 30,000 people from across the world.
  • It made the very rapid shift to self-activated terrorism (over the last year) possible.

Bots (software) build make it possible to automate extremist activities on and across social networks (as seen in the recent US election).

  • Bots have demonstrated the spread and amplification of extremist disinfo.
  • Bots can shape public discourse online.
  • AI fueled bots will make it possible to completely automate the recruitment, grooming and activation of extremists.

Drones (hardware bots) make it possible to automate physical attacks.  With relatively simple DIY modifications, drones can already:

  • Carry a payload large enough to cause significant damage.
  • Fly and navigate to a target w/o human support.
  • Visually identify targets and take action autonomously.

Sincerely,

John Robb

Written on a cool summer morning near “the shot heard around the world”

PS:  Automation of this type has the potential to leverage (on a grand scale) the breakdown of masculinity in the West to disruptive effect.

 

New generation of drones set to revolutionize warfare

Autonomous drones are being called the biggest thing in military technology since the nuclear bomb. David Martin reports.

One of the biggest revolutions over the past 15 years of war has been the rise of drones — remotely piloted vehicles that do everything from conduct air strikes to dismantle roadside bombs.  Now a new generation of drones is coming.  Only this time they are autonomous — able to operate on their own without humans controlling them from somewhere with a joy stick.  Some autonomous machines are run by artificial intelligence which allows them to learn, getting better each time.  It’s early in the revolution but the potential exists for all missions considered too dangerous or complex for humans to be turned over to autonomous machines that can make decisions faster and go in harm’s way without any fear. Think of it as the coming swarm, and if that sounds like the title of a sci-fi mini-series, well, as we first reported earlier this year, it’s already a military reality. We saw it with our own eyes and captured it on camera.

This swarm over the California desert is like nothing the U.S. military has ever fielded before. Each of those tiny drones is flying itself. Humans on the ground have given them a mission to patrol a three-square mile area, but the drones are figuring out for themselves how to do it. They are operating autonomously and the Pentagon’s Dr. Will Roper says what you’re seeing is a glimpse into the future of combat.

Will Roper: It opens up a completely different level of warfare, a completely different level of maneuver.

perdixonlaunch.jpg

A Perdix drone

CBS News

The drone is called Perdix. An unlikely name for an unlikely engine of revolution. Roper, head of a once-secret Pentagon organization called the Strategic Capabilities Office, remembers the first time he saw Perdix, which is named after a bird found in Greek mythology.

Will Roper: I held it up in my hands, it’s about as big as my hand.  And I looked at it and said, “Really? This is, this is what you want me to, to get excited about?” You know, it looks like a toy.

Perdix flies too fast and too high to follow, so 60 Minutes brought specialized high-speed cameras to the China Lake Weapons Station in California to capture it in flight.

perdixswarm.jpg

A Perdix swarm captured by high-speed cameras at Naval Air Weapons Station China Lake, California.

CBS News

Developed by 20 and 30-somethings from MIT’s Lincoln Labs, Perdix, is designed to operate as a team, which you can see when you follow this group of eight on a computer screen.

Will Roper: We’ve given them a mission at this point, and that mission is as a team go fly down the road and so they allocate that amongst all the individual Perdix.

David Martin: And they’re talking to each other.

Will Roper: They are.

David Martin: By what?

Will Roper:  So they’ve got radios on and they’re each telling each other not just what they’re doing but where they are in space.

David Martin: How frequently are they talking back and forth to each other?

Will Roper: Many, many times a second when they’re first sorting out.

David Martin: I mean, it looks helter skelter.

swarm-main.jpg

Dr. Will Roper, left, and correspondent David Martin

CBS News

Will Roper: You want them to converge to a good enough solution and go ahead and get on with it. . . It’s faster than a human would sort it out.

Cheap and expendable, Perdix tries to make a soft landing but it’s no great loss if it crashes into the ground.

Perdix can be used as decoys to confuse enemy air defenses or equipped with electronic transmitters to jam their radars.

David Martin: This one looks like it has a camera.

As a swarm of miniature spy planes fitted with cellphone cameras they could hunt down fleeing terrorists.

Will Roper: There’s several different roads they could have gone down. And you don’t know which one to search. You can tell them, “Go search all the roads,” and tell them what to search for and let them sort out the best way to do it.

The Pentagon is spending $3 billion a year on autonomous systems, many of them much more sophisticated than a swarm of Perdix.

This pair of air and ground robots runs on artificial intelligence.

Jim Pineiro: I’m going to say “start the reconnaissance.”

They are searching a mock village for a suspected terrorist, reporting back to Marine Captain Jim Pineiro and his tablet.

Jim Pineiro: The ground robot’s continuing on its mission while the air robot is searching on its own.

The robots are slow and cumbersome but they’re just test beds for cutting edge computer software which could power more agile machines — ones that could act as advance scouts for a foot patrol.

Jim Pineiro: I would want to use a system like this to move maybe in front of me or in advance of me to give me early warning of, of enemy in the area.

David Martin (standup): This time I’m the target. The computer already knows what I look like, so now we’ll see if it can match what’s stored in its memory with the real thing as I move around this make-believe village.

david-photos.jpg

Compiled photos of correspondent David Martin

CBS News

The robots’ artificial intelligence had done its homework the night before, Tim Faltemier says, learning what I look like.

Tim Faltemier: We were able to get every picture of every story that you’ve ever been in.

David Martin: How many pictures of me are there out there?

Tim Faltemier: When we ran this through, we have about 50,000 different pictures of you that we were able to get. Had we had more time we probably could’ve done a better job.

David Martin: So because you’ve got 50,000 pictures of me, how certain would you be?

Tim Faltemier: Very.

David Martin: Now it’s looking at me.

Tim Faltemier: It recognized you instantly.

Tim Faltemier: So, what we reported today on our scores we’re about a one in 10,000 chance of being wrong.

While the robot was searching for me inside an auditorium at the Marine Corps base in Quantico, Virginia, Lt. Cdr. Rollie Wicks was watching from a missile boat in the Potomac River.

Rollie Wicks: What I was doing was, I was turning over control of the weapon system to the autonomous systems that you’ve seen on the floor today.

pov-computer-martin.jpg

Computer’s point-of-view of target

CBS News

Had Wicks given permission to shoot, the missile would have struck my location using a set of coordinates given to it by the robots.

Rollie Wicks: They were controlling a remote weapons system.  They were controlling where that weapons system was pointing, with me supervising.

It will be about three years before these robots will be ready for the battlefield.  By then, Captain Pineiro says, they will look considerably different.

David Martin: Will those robots when they reach the battlefield will they be able to defend themselves?

Jim Pineiro: We are looking into that.  We are looking into defensive capability for a robot – armed robots.

David Martin: Shoot back?

Jim Pineiro: Correct.

This Pentagon directive states “autonomous . . . Systems shall be designed to allow commanders and operators to exercise appropriate levels of human judgment over the use of force.”

What that means, says General Paul Selva, vice chairman of the Joint Chiefs of Staff, and the military’s man in charge of autonomy, is that life or death decisions will be made only by humans — even though machines can do it faster and, in some cases, better.

David Martin: Are machines better at facial recognition than humans?

Paul Selva: All the research I’ve seen says about five years ago machines actually got better at image recognition than humans.

David Martin: Can a disguise defeat machine recognition?

Paul Selva: If you think about the proportions of the human body there are several that are discrete and difficult to hide.  The example that I will use, as I look at you, is the distance between your pupils.  It is very likely unique to you and a handful of other humans.  A disguise cannot move your eyes.

David Martin: So if I have a ski mask on that doesn’t help?

Paul Selva: Not if your eyes are visible. If you have to see, you can’t change that proportion.

David Martin: So, if the machine’s better, why not let it make the decision?

Paul Selva: This goes to the ethics of the question of whether or not you allow a machine to take a human life without the intervention of a human.

David Martin: Do you know where this is headed?

Paul Selva: I don’t.

Virtually any military vehicle has the potential to become autonomous. The Navy has begun testing Sea Hunter, an autonomous ship to track submarines. Program manager Scott Littlefield says that when you no longer have to make room for a crew, you can afford to buy a lot of them.

Scott Littlefield: You could buy somewhere between 50 and 100 of these for the price of one warship.

David Martin: I’ve heard somebody describe this ship as looking like an overgrown Polynesian war canoe. Why does it look like it does?

Scott Littlefield: To be able to go across the Pacific Ocean without refueling, this hull form, the, the trimaran, was, was the best thing we could come up with.

David Martin: What is its range?

Scott Littlefield: We can go about 10,000 nautical miles on, on, on a tank of gas – 14,000 gallons.

Sea hunter is at least two years away from being ready to steam across the Pacific on its own.  Among other things, it has to learn how to follow the rules of the road to avoid collisions with other ships.  When we went aboard it had only been operating autonomously for a few weeks and there was still a human crew – just in case.

When testing is done, this pilot house will come off and the crew will be standing on the pier waving goodbye.  From then on this will be a ghost ship commanded by 36 computers running 50 million lines of software code.  And, these life lines will have to come off too since there’s no need for them with no humans on board.

It has a top speed of 26 knots and a tight turning radius which should enable it to use its sonar to track diesel-powered submarines for weeks at a time.

Scott Littlefield: Many countries have diesel submarines.  That’s the most common kind of submarine that’s out there.

David Martin: China?

Scott Littlefield: China has them.

David Martin: Russia?

Scott Littlefield: Russia has them.

David Martin: Iran?

Scott Littlefield: Iran has them.

David Martin: North Korea?

Scott Littlefield: Yes.

David Martin: I think I get the picture.

Scott Littlefield: Yes.

But of everything we saw, tiny Perdix is closest to being ready to go operational – if it passes its final exam.  Will Roper and his team of desert rats are about to attempt to fly the largest autonomous swarm ever: 100 Perdix drones.

Will Roper: This is one of the riskiest, most exciting things that’s going on right now in the Pentagon.

Risky not only because the swarm would be more than three times larger than anything Roper’s ever done before but also because 60 Minutes is here to record the outcome for all to see.

David Martin: Why are you letting us watch?

Will Roper: Couple of reasons, David, I, I, when this first came up, I have, I have to be honest with you, my first response was, “That sound, sounds like a horrible idea.”  Right? I mean, it’s just human nature.  I, I don’t want this to fail on camera. But I did not like the fear of failure being my only reason for not letting you be here. And we also wanted the world to see that we’re doing some new things.

This time, the Perdix will be launched from three F-18 jet fighters, just as they would on a real battlefield.

Will Roper: There they are.

David Martin: Yup.

Will Roper: All right. A little piece, a little piece of the future.

The F-18s are traveling at almost the speed of sound, so the first test for Perdix is whether they will survive their violent ejection into the atmosphere.

[Radio: Complete…104 alive.]

Will Roper: That’s 104 in the swarm, David.

David Martin: 104 alive.

Will Roper: That’s 100 swarm. There they are.  You see them?

David Martin: Yeah, yeah.

Will Roper: Look at them, Look at them.

Will Roper: They flash in the sun as the come into view.

David Martin: There’s a – oh yeah.

As the Perdix descend in front of our cameras, they organize themselves into a tighter swarm. Imagine the split-second calculations a human would have to make to keep them from crashing into each other.

Will Roper: Look at that!  It’s just everywhere you look it’s coming into view.  It does feel like a plague of locusts.

Will Roper: So they’re running out of battery.

There are reams of data that still have to be analyzed but roper is confident Perdix passed its final exam.

[Radio: One vehicle down.]

And could become operational as early as this year.

David Martin: I’ve heard people say that autonomy is the biggest thing in military technology since nuclear weapons. Really?

Will Roper: I think I might agree with that, David. I mean, if what we mean is biggest thing is something that’s going to change everything, I think autonomy is going to change everything.

White Christian Couple Adopts Eight African Children At One Time – More CUCKERY

Virtue Signaling Much?

by Roosh Valizadeh

Daryush “Roosh” Valizadeh created ROK in October 2012. You can visit his blog at RooshV.com or follow him on Twitter and Facebook.

In a case of virtue signalling on steroids, an American Christian couple have adopted eight children from Sierra Leone in one go, adding to their existing biological family of two children. They made sure to broadcast their charity far and wide, even publishing a book, so that the entire world knows how superior they are to people who do not dedicate their lives to helping non-whites.

A couple have done an extreme ‘Brangelina’ by adopting eight siblings from an African orphanage in one go – the biggest single adoption in history.

Hayley and Mike Jones instantly increased the size of their family from two to ten by adopting the children from Sierra Leone.

The pair wanted a bigger family but were put off having children after both of Hayley’s pregnancies ended with emergency C-sections.

I would also be concerned for my wife’s health if she had two difficult births, but I would look to alternatives such as using a surrogate mother if I desired more children. The first thing on my mind would not be flying to Africa to adopt eight African children without considering how such an addition would affect my two existing children.

When the couple originally looked into adopting they were adamant it would just be one or two children.

But after hearing the names of a number of children who were still waiting to be adopted they decided they should take more.

They were then told about Michael, 16, Samuel, 15, Gabrielle, 12, Levi, 11, Malachi, nine, Judah, eight, Isaiah, seven and Zion, five, and decided they would be the perfect addition.

Mr Jones said: ‘We thought it was about two or three children we’d be adopting when we initially met the orphanage.

‘But God was telling us both separately to keep going for more and more – it was just brought up that there was a sibling group of six and eight.

Did God also tell them to run to the Daily Mail to share the tale? We’ll never know, but at risk of projecting my hyper-sexual worldview onto the couple, I can’t help but notice that the oldest “child” is more athletic, virile, and masculine than the husband.

“Child”

Is it possible that his mother adopted an alpha male to compensate for her beta male husband? We’ve seen this before with Western European women who cuck their boyfriends by eagerly adopting masculine refugees into their homes.

Honey, I’m not happy. Let’s adopt an African refugee!

Sweetie, can Roosh Junior move into the bedroom with us? I want him to be comfortable.

Since the article mentioned that the wife had an interest in Africa, it’s safe to say that it was her idea to adopt. While we should all be thankful that the African children have a second-chance at life, and I hope they do thrive in America by attending prestigious Ivy League colleges, we can’t avoid the couple’s political intent, which Matthew 6 of the Bible specifically shames.

1 “Be careful not to practice your righteousness in front of others to be seen by them. If you do, you will have no reward from your Father in heaven.

2 “So when you give to the needy, do not announce it with trumpets, as the hypocrites do in the synagogues and on the streets, to be honored by others. Truly I tell you, they have received their reward in full. 3 But when you give to the needy, do not let your left hand know what your right hand is doing, 4 so that your giving may be in secret. Then your Father, who sees what is done in secret, will reward you.”

Forum member Ocelot explains further

All telescopic philanthropy is virtue signalling: no exceptions. They could have adopted 8 American orphans of any ethnicity of their choosing, and used the resources saved on other charitable ventures.

There’s a reason they chose not to dedicate their resources to helping those closer to home. There’s also a reason they chose not to adopt some passably-white-looking kids orphaned by Islamic militants killing their parents in the middle-East.

It was important that the children both resembled them as little as possible, and were from an area firmly associated in most people’s minds with crushing poverty. Because the act is about them, not about the children. Hell, if you care about the kids so much, why not use your resources to pay someone in their own country to adopt and raise them instead of transplanting them into a foreign land.

It’s also a possibility that the intention is to groom these kids to be sent back to their home country as evangelists of whatever fake-ass McChurchian sect they belong to.

As the West continues to collapse, we may see no limit to how white Americans race to have themselves replaced by foreigners. It’s almost as if they longer want to exist.

6 Signs That A Man Is A Cuckold

by John Carver

Wikipedia defines cuckold as…

A husband of an adulterous wife. In evolutionary biology, the term is also applied to males who are unwittingly investing parental effort in offspring that are not genetically their own.

In short, being a cuckold is not a desirable position for any self-respecting masculine man to find himself in. Also in recent years, the term has been broadened in use to describe men who are perceived to be weak, effeminate, seemingly derive pleasure from being laughed at or humiliated, or are supportive of policies which are counter-productive to Western civilization and the traditional family unit.

People on the alt-left hate how right-wing masculine men denigrate people as cucks, because they usually exhibit several of the follow behaviors and traits.

1. He Marries An Older Woman

“LE CUCK”: Barely 40-year-old French President Emmanuel Macron (right) with his nearly senior citizen wife Brigitte (age 64).

A woman’s value significantly depends on her fertility and beauty, which are directly associated with youth. A man’s value significantly depends on his resources, intellect, and character. All things which are forged through trial-and-error and years of experience. In short, it is utterly ridiculous as to why men would want to firmly cement a relationship with an older woman via marriage.

To be fair, men who marry suitable partners that are only barely older than themselves, like Prince William marrying Kate Middleton, are exemptions from being branded as cucks. It’s perfectly acceptable if people met via serendipity or mutual friends during their same year of school or university etc, and the youth gap between the man and his wife is barely six months to a year.

A true King Of Cucks on the current world stage is French President Emmanuel Macron, whose wife is almost 25 years older than him. Either the marriage is a total sham, Emmanuel is mentally ill, or he’s just an uber-bitch boy masochist who enjoys the thought of men around the world laughing hysterically at his complete and utter lack of self-respect.

Have no self-respect? Then go marry your own ‘Brigitte’. Bingo nights are probably a good place to find a single (or widowed) woman about her age.

2. He Wears Another Man’s Sportsball Jersey

cuck sports fans

Wooooooo! Sportsball YEAH!!!

This is probably the easiest way for a man to cuck himself, since absolutely no association or contact with the opposite sex is required, and beta and omega males tend to not be particularly choosy in how (and whom with) they spend their valuable time.

Nonetheless, going out and spending probably over $100 on some alpha male multi-millionaire’s sports jersey, and wearing it in public, is one of the most cucky things a grown man can do. The man behind the number and the name doesn’t give two shits about you, but he is more than happy to continue his alpha playboy lifestyle (and embrace the free marketing) at your continued beta chump expense.

Shout out “Cuck!” to the jumbotron, and go get yourself a three figure sportsball jersey today!

3. He Lets His Wife Be Queen Of The Castle

There was once an old saying which went something like this, “a man’s home is his castle”. His home was supposed to be his fortress and citadel. A sanctuary of family respect and authority after enduring at least 40 hours a week of acquiescing to the authority of someone else (his boss or corporate overlords). It was his well deserved compensation for earning the money to pay for that said ‘castle’, not to mention all that food on the table to satisfy the stomachs of his wife and children.

Nowadays, such thinking is so ‘patriarchal’ and passe. A true cuck will let his wife scold, berate, and verbally humiliate him in his home. He knows he probably deserved it, because he was either acting “out of line” or was “not attentive to her needs”. More than likely, he knows his wife is understandably angry at all men because of the ‘gender wage gap’ or something like that. It’s perfectly acceptable for her to emasculate him in his very own home, until such patriarchal oppression in the workplace is stopped.

4. He Adopts A Child From A Polar Opposite Race

country cuck

Cuck Country star Thomas ‘Rhett’ Akins and wife Lauren’s little adopted bundle of joy! The Deep South is finally becoming ‘Progressive’! 😀

Adopting a child, or consciously choosing to take full personal and financial responsibility for raising a tiny human being which shares absolutely no blood relations with yourself, and for up to eighteen years I might add, is kind of cucky behavior in it’s own right, don’t you think?

Well, that all depends. “It’s the current year!”, and adopting a child who is at least from your own race or ethnic group simply isn’t cucky enough I’m afraid. You’ve got to show your true “love is love” attitude and progressive colors (pun intended) and adopt a black baby! Or at least a Cambodian or a Laotian or something!

Forget all the evidence which shows that transracial adoptions often lead to those children growing up with serious identity issues (Colin Kaepernick is no exception), because it’s what all the Hollywood stars have been doing for years. After all, everyone knows that the leftist elite of Los Angeles are valid role models for showing what’s best for the rest of the country. Especially when it comes to the modern family unit…

5. He Marries A Single Mother

DO NOT MARRY HER. JUST FUCK HER.

“OMG I luv being a mom!!”

Ah, a true cuck classic! A man who risks half of his lifelong financial portfolio with a woman (often based upon a short term attraction), while also mentoring and economically supporting her children which were the end result of another man’s orgasm, is a truly special kind of beta.

For up to the greater part of two decades, he will find himself repeatedly emasculated with cries of “you’re not my real father!” following heated arguments with “his children”, the perplexed look of other parents at social events who say things like “I don’t see the resemblance“, and best of all, those awkward unannounced appearances of the kids’ biological father with his newer, thinner, hotter, and younger wife or girlfriend in tow.

In the event he does not (slightly) uncuck himself by having his own offspring with said single mother, her genes will still potentially weather all storms and carry on through the ages via her biological children, while his will simply wither and die in an instant on the day of reckoning. All the burdens of fatherhood, yet with no small part of him which will carry on past the grave. No future legacy to pass on.

So “man up” and marry a single mother. It will help economically empower her!

6. He Lets Another Man Sleep With His Wife Or Girlfriend

cuckold

Yup, that’s you on the right!

Why let an otherwise happy and stable relationship go to waste? Let yourself get cucked and embrace a “poly” relationship, one where your wife or girlfriend is allowed to date and have sexual relations with other men. Or at least let her get on Tinder and have a fling with one of those gym junkies with washboard abs and massive pecs once in awhile.

Better yet, the Jewish-dominated pornography industry has the best idea of all! Let your (presumably white) wife fornicate with a well-built black man in your own bedroom, while you sit back in your sportsball jersey and listen to your spouse constantly belittle you. She will love it.

In fact, the only thing that can make this scenario even better is if she gets pregnant from the encounter, and you wind up raising the mixed-race child as your own offspring while baby-daddy goes off on his merry way. Also if your wife just happens to be a few years older than you, and she has at least one child from a previous relationship, then you’ll get a bit of all six points rolled into one. How sweet is that!

Conclusion

NOT A CUCK: The Commander-In-Chief of the United States has always enjoyed the company of young, beautiful, and fertile women. He does not marry older women or single mothers, and has raised 5 attractive biological children.

Left leaning men don’t want to be like Donald Trump right? Because that man is a monster! Our advice for such men is to do the exact opposite of what “number 45” does as a means of legitimate protest, and this article is a perfect starting point for that. Wife up an older woman with dried up ovaries, go parade around in a Colin Kaepernick’s jersey, let your spouse be the Queen, adopt a black baby, and make sure you pay your stepsons annual $30,000 college tuition bill on time.

We sincerely hope we were able to be of service. Happy cucking.

 

Jews are Playing the “Antisemitism” Card to Defend Weinstein

Diversity Macht Frei
October 17, 2017

Jews are actually trying to play the “Antisemitism” card to defend Weinstein. Hard to believe. I think this is what they call “Chutzpah”. So far, only Jewish individuals, I think. Let’s see if any Jewish ethno-activist organisations join in.

w1w3w2w5w4

​What a new U.S. civil war might look like

By Chris Arkenberg

Following an earlier 2017 survey, Foreign Policy’s Best Defense blog opened a poll about the likelihood of a second U.S. Civil War. However, framing it as a second civil war embeds numerous assumptions about warfare on U.S. soil that are based more on history than the current reality of how power acts in the world. The distinction is critical to effectively counter the emergence of networked violence in America.

It’s easy to imagine that a second civil war might proceed like the first: two institutionalized factions wielding state militaries against each other along prescribed strategic fronts. Generals would choose a side, those with the most troops and firepower at their disposal would claim victory. The outcome, we imagine, would likely be a winner-take-all restructuring of the United States.

But that’s not really how wars are fought in the 21st century. Indeed, much of the last century was about deconstructing the habits of large-scale, state-driven conventional warfare. As networks distribute power to the edges, warfighting shifts further away from a handful of monolithic forces and towards a diverse web of small actors. Warfare now often proceeds from ideologically and economically marginalized communities whose suffering and fear is wielded by cunning global actors. They become guerrillas, rebel factions, proxies, and insurgencies. Sometimes they look more like tribal conflicts composed along racial, religious, familial or economic lines, often on top of resource crises that push violence to become a necessary solution. But they are rarely simple two-sided conflicts.

To neglect this distinction risks missing the signs of coordinated disruption and violence. If we keep thinking in terms of opposed armies, we’ll fail to develop effective strategies for recognizing and containing networked, hybrid warfare.

For the United States, the shape of future homeland conflicts will be asymmetrical, distributed, and heterogeneous. A contemporary homeland conflict would likely self-compose with numerous dynamic factions organized by digital tools around ideological and affinity networks. It would likely be a patchwork of affiliated insurgency groups and their counterparts engaging in light skirmishes along the overlapping edges of their networks, mixed with occasional high-value terror attacks against soft and hard targets. Such groups are much smaller than conventional militaries and where they lack in firepower, they wield transgression. As in Charlottesville and Berkeley, the fronts are less territorial than ideological.

Furthermore, digital networks erode the boundaries of the state. Like the Islamic State and al Qaeda, any cell can browse the literature, claim allegiance in some far-flung burb, and start whipping up violence against their targets. Antifa and the Alt-Right are a hodge-podge of varying affinities loosely coupled under their respective brand names with local chapters coordinated across global networks. These are not top-down hierarchies. They’re agile and shapeless with the capacity to grow quickly then disappear.

“One simply cannot explain the speed and scale at which the Islamic State formed without that network effect,” Emile Simpson commented in another Foreign Policy article trying to augur the tremors of a new world war.

Just as we risk missing the signs of networked violence, thinking in terms of a classic civil war can blind us to the many actors working to disrupt the U.S. from within and beyond our borders.

Behind the extremists are often additional layers of benefactors and provocateurs: oligarchs, plutocrats, transnational criminal networks, and foreign powers wielding them on both sides towards their strategic goals. We’ve seen this with Russian-backed Facebook groups organizing right wing protests in the U.S., and in the increasing regularity of information warfare originating from Macedonian server farms, reclusive billionaires, and adversarial governments.

With these characteristics in mind we can envision what a modern U.S. civil war might look like. More sporadic and unexpected conflicts but with fewer deaths. Factions sprouting like mushrooms, taking different forms but coordinated across invisible networks. Waves of information warfare. Chaos and an accelerated bazaar of violence with a healthy immune response from the local and national authorities. The outcome (and probable goal) would likely be a fragmentation of the republic into smaller, more manageable alliances, though it may just as easily harden an increasingly authoritarian federal government. This is essentially how Russia waged its non-linear war against Ukraine.

To counter this emerging threat in America it’s critical to establish more formal practices for identifying and tracking domestic extremism — with an honest recognition that young, white males on both ends of the political spectrum are the most likely to commit violence. Likewise, we must formalize robust network analysis to map and track these distributed groups across their digital territories and to identify their backers, funders, and agitators. Finally, there needs to be a very serious conversation about how to regulate Facebook, YouTube, and Twitter as platforms for influence, instigation, propaganda, and recruiting.

For now, America is held in line by a strong rule of law and a good-enough economy that most people still have something to lose by choosing violence. But as our government and corporate leaders continue to deconstruct rule of law and economic opportunity, the norms degrade and the space for transgression becomes bigger. To FP’s poll, my gut says the likelihood of a second U.S. civil war in the next five years is between 20 and 40 percent but trending upward significantly.

Chris Arkenberg studies the interaction of disruptive technologies and complex systems. He is a technology analyst and strategist for Fortune 500, non-profit, and government clients. Among other roles, he’s been an advisor to the CTO of the Nature Conservancy, a visiting futurist with the Chicago Museum of Science and Industry, a senior lecturer at the California College of the Arts, and a visiting researcher at Institute for the Future.

Pro-Russian insurgents occupy the Sloviansk city administration building on April, 14 2017. (Wikimedia Commons)


Some thoughts on how we might get from where we’re at now to a Second Civil War



You persuade your base that there is no other way but violence.

By Lt. Col. Robert F. McTague, U.S. Army (Ret.)

Best Defense office of Second Civil War affairs

If we have a second Civil War, trying to understand what is happening will feel more like Ukraine in 2014 than Virginia in 1861.

Our first Civil War was primarily about slavery, but that was in the context of social and economic models in the South that were ripe for extinction. The South’s reaction was to launch a last-ditch effort to maintain and prop up its way of life at all costs, so it was visceral and violent. 

Likewise, Trump’s election was an angry, defiant death throe, a angry cry against demographic and economic changes that are in fact irreversible. So, if you are a New Right strategist today — call them the Great Disruptors — the question is, how do you confront those inevitabilities?
First, you continue at the low level, with some really advanced, effective gerrymandering, as in Wisconsin. You continue to enflame working class whites, who have been ignored by the Democrats for decades. You also try to limit immigration and free trade as much as possible.

Even so, even as they do this, the New Right’s Disruptors know they can slow down changes to the nation, but they can’t stop them. So what’s the next step? You up the ante. You make it holy war. You persuade your base that there is no other way but violence. I believe many, perhaps most, of the members of Trump’s base will sign up for that.

Why? Because they will believe they are on the side of good, of right, of Americanism.

Many people in the South and heartland in general often think of themselves as patriotic, loyal Americans, more so than “liberals,” “Yankees,” “elites” and people from the North and urban areas. I know this well from two decades in the Army. Southerners nowadays, including Texans, often see themselves as the “realer Americans,” the people who really stand up for the country, who have a better feel for what it stands for.

How do you translate those feelings into tactics? Well, first, you don’t secede. Rather, you set the stage for yourself to be the big winner, the good guy. You make yourself “America” and make the “other guys” the troublemakers and secessionists. All you really are doing, you insist, is trying to make this country great again. Sound familiar?

You set out to marginalize your opposition. You declare that your enemies are the anti-American “elites,” concentrated in “Sanctuary Cities” that are economically thriving — and thumbing their noses are the rest of the country. They’re looking at you, Seattle, Portland, San Francisco, Los Angeles, Austin, Miami, Atlanta, Charlotte, Philadelphia, New York and Boston.


The bad news for Disruptors is, these elitist cities are also many of the US’s largest ports and financial centers. The good news: they are easy to isolate and disenfranchise.
If I were a truly Machiavellian New Right strategist, I’d focus my fire on the state of California. Make it The Other. Attack it relentlessly. Threaten its culture and power. Cut off water that flows into it from outside the state, essential to its people and agriculture. Ignore those nettlesome decisions from the 9th Circuit.
Think of how it would benefit the base if California somehow withdrew from the next presidential election, sat it out in protest. Sound crazy? It is, but it’s also exactly the kind of audacious reshaping of the American electorate these strategists need.

The Disruptors would accept violence as part of the equation. I don’t foresee set-piece battles between great armies, but I think they understand the strategy would involve persistent conflict that kills hundreds or even thousands on the way to achieving its aims. If they can get away with it with minimal bloodshed, great; if not, “so be it.”

In March, my totally unscientific hunch was a second civil war had less than a 20% chance of happening.  Now I’m guessing it’s closer to 40%. The revision is less a reaction to the current president or perceived deterioration of the political environment as it is a revision of my own understanding of “where we are.” I’ve lately become persuaded that our current leaders are nearly incapable of mediation, reconciliation, or compromise in much of anything, regardless of the stakes; nor do I expect that to improve. If anything, I expect it to worsen.

I now think that something akin to the scenario I’ve presented here is only a matter of time. Why? Because for the New Right, it is the only alternative to political extinction.  Soon, they will have no choice but to be bold, drastic and ruthless. We’d be foolish not to expect something real and violent as a result.

Robert F. McTague retired in 2016 as a Lieutenant Colonel in the United States Army.  He did two tours in Iraq, and also served in Kuwait, Qatar, Korea, Croatia, Romania, and Turkey.  He completed two NATO tours as well.  He now makes his home in Bucharest, Romania.

Rumblings of a second Civil War: Some links

More information on a second Civil War.

“Roger Stone Predicts a Civil War if Donald Trump is Impeached,” Salon

“Georgia Governor Expects Lawmakers to Plunge into Civil War Debate Next Year,” AJC

“Alex Jones and Other Conservatives Call For Civil War Against Liberals,” Newsweek

“Savage: Civil War if Trump Taken Down,” Infowars

“Is America Headed for a New Kind of Civil War?” the New Yorker

“Our House Divided,” the New York Times

“Pro-Confederate Activists Held ‘Secession Day’ Event at Roy Moore’s Foundation Two Years in a Row,” CNN

The Cuck of the day – Bob Corker

behold the face of a man who would allow another man to penetrate his wife’s vagina, the face of a cuck, sen. Bob Corker. A cuck who begged Trump to endorse him for re-election in Tennessee, stating without which he would lose. Why you ask? This beta cuck publicly criticized Trumps handling of the Charlottesville protest and resulting car accident. A traitor to his own people, there is only one punishment for treason. 
These people have no place in our nation, and they know it. Attacking honorable white men defending their own people is and always will be treasonous and punishable by death. The time is coming when we will remove the threat to our people, especially the enemy within.