Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Primer: Your Algorithms Won’t Save You: Why We Need More Sociology and Psychology in The Fight Against Online Disinformation & Propaganda

leave a comment »

Well, it has been a few days since presenting to SOFWERX and having put up my slide deck on the blog and I got to thinking that without a video, you all kind of need a primer on what I was trying to say with this. Come to think of it, even with the video you might need some more clarification as I don’t know if I just came off as a raving loon on stage or not. Anyway, I have decided to put this post together as a primer for those who do not get to see the video.

SOFWERX Presentation Deck

My general premise with this presentation is as follows put simply: “Countering disinformation and propaganda operations is a people problem, not a technical one.”

While the others at SOFWERX were presenting technical means of tracking and perhaps countering disinformation campaigns online, I wanted to highlight the fact that the problem lies with the humans at the keyboards or in front of the screens are the issue that we should take up trying to counter this activity. It is the people who are being manipulated and their psyche’s which are allowing this to happen. There are social and psychological issues at play and no matter the attempts at countering, those people susceptible to the campaign will in the end, believe what is being sent to them. We need to understand why these people choose to accept these narratives and to perpetuate them before we can attempt to really fight this fight. There are so many issues here and even if we try to play whack a mole with adversaries pumping these false narratives into the system, we will lose in the end because the sticky meme or message will inevitably get out and repeated by those of a like mind.

I personally saw this activity play out early on with the Jihad online. Jihadi’s have been using social media since it’s inception and before that, they were using list servers and RSS groups to do the same thing. This activity is easy to carry out with access to the internet and there are a plethora of venues to get the message out with. In the case of the jihadi’s online we saw them use PHP sites, Twitter, Facebook, and now closed systems like Telegram and PalTalk to carry out recruitment and planning. The media outlets such as Twitter and Facebook’s attempts to whack them offline did not fully succeed, in fact they are still around and adapting to get their message out to the believers. In fact, you can see a direct line of progression from using channels (social media) to creating their own channels (Inspire and Dabiq) magazines that they can upload to various places to propagandize and disinform the jihadi’s as well as their adversaries.

Simply put, whack a mole does not work. In an effort that was more subtle and along the lines of thought I will give you in this presentation, the US government tried a program called “Think Again and Turn Away” which ostensibly was an effort to reason with and perhaps psychologically respond to those who might be tempted by jihad to consider the realities and talk them off the ledge so to speak. The program was not funded well and in the end kind of failed, but, it was an important footnote that needs to be given more attention as it dealt with the receivers of the message of jihad. We are faced with much the same problem today in that we have people in countries like the US who are targets of foreign influence operations that are not necessarily combatants in a war but are assets of influence and thus a danger to the larger whole.

The parallels can be seen today with regard to the influence operations that the Russians carried out on the US and the factions that have been created with the rise of Trumpism. Now we have the IRA (Internet Research Agency) and it’s second generation still carrying out operations online as well as the receivers of the narrative creating new platforms outside of Twitter and Facebook to repeat as well as generate new ones like the Qanon movement. While the social media companies finally caught on and started patrolling content and accounts, the IRA has created other sites to push their narratives both stealth and open in nature. The one commonality is that there are always minds willing to accept the content and to repeat it. This is the problem set that we need to approach and see if there are any countermeasures to this outside of trying to control the medium and the message. You see, by controlling the medium and the message, we become a part of the problem and likely add fuel to the fire by becoming Orwellian in the perception of the people.

Most of the talks at SOFWERX centered on using the technology of algorithms to control the narrative or stop the narrative and this is not in my opinion the best alternative. After all, the more you try and control all of this, the more you are going to be made into the latest conspiracy theory. If you try to insert counter narratives surreptitiously eventually you will be caught out and become a means to an end for the information operations teams sowing the discord. Alternatively, how do you fight things like meme’s and cognitive bias/dissonance in the people who are willing to believe in things like Flat Earth theory or that there are Lizard people secretly running the governments of the world? We need to understand the human animal better from psychological and sociological standpoints to counter these kinds of operations. Until we do more study and come up with countermeasures using this, we will just continue on playing whack a mole ad nauseum all the while the disinformation will flow and our fractions will increase.

I guess overall I would just like the technical and the more soft sciences to get together and work the problem instead of just believing that technical means are the answer to everything.

They aren’t.

*mic drop*

K.

Written by Krypt3ia

2018/12/09 at 13:53

Posted in Disinformation

THE 2018 INFOSEC KRAMPUS LIST

leave a comment »

THE GREAT AND TERRIBLE KRAMPUS PROCLAIMS!

On this night the following INFOSEC girls and boys are in need of his utmost sadistic attention for their transgressions!

 

Threat Intelligence Threatleaders:

Sweet Jesus stop with all your “I KNOW EVERYTHING ABOUT INTEL” because you fucking don’t! A majority of you that I have run into have no real IC background and couldn’t red team your ideas out of a wet paper bag never mind be able to determine what is and is not a nation state operation! Lemme give you a hint. The one’s who really know shit DON’T FUCKING TALK ABOUT IT ALL THE TIME TO  ANYONE WHO WILL LISTEN OK?

PLEASE take your artisanal hand crafted BULLSHIT threat intelligence elsewhere and shove it up your collective chimneys!

 

Nord VPN: Masters of MILITARY GRADE ENCRYPTION!

Dear Nord, Krampus has seen your useless ad’s on CNN too much lately and wants to tell you here and now that; THERE IS NO SUCH THING AS MILITARY GRADE ENCRYPTION WITHOUT A HARDWARE LAYER SPECIFICALLY FOR THAT PURPOSE AND EVEN THEN IT MEANS FUCK ALL!

YOU, Nord, are on my list FOREVER now. Stop trying to scare the grandparents into paying for your shitty VPN!

 

The Hacking Community Writ Large:

Krampus has a lot to say about the hacking community. Most of what he has to say cannot be translated into human language but understand that ALL of it is not good.

What the fuck is it with you people that you need to be the center of fucking attention all the time?

What the fuck is it with you people that you always think you are the fucking smartest people in the room ever?

What the fuck is it with you people to even THINK you have so many problems including, and Krampus cannot even fathom mouthing the words, PTSD from working in INFOSEC?

Get over yourselves and maybe go outside once and a while and talk to people outside your personal bubbles would ya?

Oh, and GROW THE FUCK UP!

Krampus say’s this every year and still you keep on keepin on being asshats!

EDIT! Krampus just also remembered the hubris of you all complaining about security and privacy in hotel rooms in Vegas. WHAT the FUCK were you people thinking? Were you thinking at all? There is no 4th Amendment right here. Sure, coming in on you naked and all is bad and scary but THINK THE FUCK AHEAD! YOU ARE SECURITY PROFESSIONALS RIGHT?

STOP WHINING.

 

NATSEC and INFOSEC Talking Heads:

Krampus watches a fair bit of news in his off hours between Krampusnachts and FUCK does he really hate all you fame whores seeking attention talking about shit you really have no idea about. If you are out there just to be on TV talking about shit ad nauseum to pimp your service or your new book…

Fuck you.

The people who do the things are off doing them and you are just masturbating on air.

 

The Gugq:

Speaking of people out of their lanes.

Just fucking stop man. The IC giggles and points when you talk about shit.

Stop.

Every time you say anything about OPSEC google that photo from the magazine of yourself with the pile of money and the drink.

There’s some OPSEC.

 

Blockchain Fuckwits:

NO BLOCKCHAIN IS NOT MY SAVIOR! NOR IS IT YOURS! DUDEBRO’S IT’S ALL FAKE MONEY!

STAHHHHHP!

 

Cyber War Salesman:

If Krampus get’s another pitch with the words cyber and war or cyberwar in it he will personally donkey punch you all.

There is no such thing. Stop trying to use it as a sales pitch for your shitty shitty products.

 

To All The Reporters I Have Loved Before:

Krampus still loathes you. You all will pay for your shitty deeds.

 

The “Cyber” Warriors:

See “cyber war salesman sic: it doesn’t exist”

 

Well, that’s it kids. Krampus is old and tired of all your fuckery but these were the winners this year. Of course damning a WHOLE “Community” is pretty epic and you guys never fail in letting ol’ Krampus down.

Till next year!

Krampus

Written by Krypt3ia

2018/12/05 at 21:46

Posted in Uncategorized

SOFWERX Presentation: Your Algorithms Won’t Save You: Why We Need More Sociology and Psychology in The Fight Against Online Disinformation & Propaganda

leave a comment »

Here is the deck from yesterday’s presentation at the SOFWERX Radial Speakers Series on Information Warfare:

 

Your Algorithms Won’t Save You

Video will be available from SOFWERX

 

Written by Krypt3ia

2018/12/05 at 12:56

MAGABOMBER: Some Armchair Thoughts

As the day progressed yesterday with the news on Sirius XM on throughout, I listened as the details came in. A serial bomber had begun a terror campaign with pipe bombs that may or may not be inert but still serving the desire of creating terror. As the day progressed it became clearer that the targets (now 8 of them with DeNiro) all were people who had crossed paths with Donald Trump and had been attacked by him in rhetoric and name calling. While on the face of it the terror plot seems pretty clear per the narrative of the bomber (e.g. sending Trumps self pronounced enemies bombs) it may be too early to really say for sure what the motivation is, if there is any, politically or socially from the UNSUB here and this is a point everyone needs to understand. As the days progress and more details are given by the FBI we will get a better picture once the investigation becomes clearer. Until then though, here are some thoughts on the UNSUB and the plot given the details we have.

UNSUB Profile:

  • UNSUB is male (I don’t believe we have seen a female serial bomber yet)
  • UNSUB age likely to be in their 20’s to early 30’s
  • UNSUB in this plot is likely alone in this but more than one in a Folie A Deux cannot be discounted.
  • UNSUB is new to bomb making but has a history with fireworks and black powder uses
    • Crude PVC bombs
    • Materials were easy to get and work with (basic)
    • Trigger mechanism is still TBD but all bombs failed to trigger and detonate (by design or by mistake? As devices were live I am leaning towards mistake)
    • Bombs, while crude seem to try to emulate sophistication with timer device (trigger) but in the end are basic
  • Packages had excessive postage and have all the hallmarks of classic signs of parcel bombs (easily visually discernible as bombs)
  • Misspellings on labels show lack of attention to detail and likely flow into design flaw that led to bomb failures
  • Device construction (TBD) will determine the level of detail orientation of UNSUB and as time will tell may yield forensic evidence that could lead right to them (DNA/Prints)
  • UNSUB seems to be from the Tri-Sate area of NY given posting of packages and access to Soros home.

Motive Profile:

  • Victimology suggests political motives (Democrats and those who have angered Trump)
  • UNSUB use of Wasserman Shultz address fits profile of narrative by Qanon/MAGA accolytes of false flag operation by the Democrats (this had already been spun up but the use of the address leads to a higher probability of this being a motive)
  • UNSUB may be trying in their own way to intimidate Democrats and people who would vote for them in the midterms upcoming
    • IF we start seeing packages to polling places this will cement this line of thought.
  • UNSUB is doing this to feel some power that they lack in their lives
    • Target choices and political motivations on the face of this indicate that they idolize Trump
    • Imagery and target choices also indicate that they are conspiracy oriented individuals
    • Placement of the fist bomb in Soros mailbox indicates they see Soros as the head of the snake (this is a common Qanon/MAGA conspiracy plotline that Trump espouses)
    • UNSUB motivations other than political (personal) are to revel in the “spectacle by destruction” or in this case, with the failure of detonation, to cause chaos and sow conspiracy
      • Motive may become clearer if there are any communications from the UNSUB
      • UNSUB may feel compelled to speak online about motivation and or to cause more fear since detonation failures did not finish the plot as anticipated
    • UNSUB’s connection to Trump and feelings of loss of status, power, place lead to emulation of Trump and or feelings of outrage against those Trump attacks
      • This attention seeking may in fact lead to direct communication attempts with Trump in the past

As we get more information I guess we will see where my armchair profiling hits the mark or is way off. I personally do not buy that this is a “false flag” like so many with cognitive dissonance out there seem to be spewing. I can afford the following ideas however on that line of thinking:

  • IF this individual was groomed by someone to carry out these acts it may well have been a nation state actor doing so.
  • Use of these bombings will in fact be made by the RU and other actors as we have already seen on social media with the cacophony of narratives and meme’s to date.

I do not believe that this is a plot by a foreign nation though. No, this seems more your run of the mill unbalanced individual with issues who aligns themselves with Trump and MAGA and is acting out for their own desires. The actions so far show an individual without nuance and experience and I suspect they will be caught soon by the FBI/USSS because they were inattentive to details that will in the end lead investigators right to him

“Be safe out there kids”

K.

Written by Krypt3ia

2018/10/25 at 12:52

Posted in Profiling, UNSUB

What The Elena Alekseevna Khusayanova Complaint Doesn’t Say Is Important Too

leave a comment »

While the news cycles have been pundit filled bated breath hot takes on the complaint that was released this last week it is important to take some time and consider what was said as well as not said in this document filed on September 28th in the Eastern District of Virginia.  Project Lakhta ( Ла́хта проект ) was what the Russian’s code named the active measures campaign against the USA using social media that was based in St. Petersburg and basically the complaint takes direct aim at the bag woman of the project as a means to an end. Elena Alekseevna Khusayanova was the ostensible target of the charges but one has to ask themselves do we actually ever hope to see this accountant in a US court anytime? I am pretty sure the answer to this is no, so why did the government file these charges and now release them to the public?

My take away’s from this document are as follows:

  1. These charges are just a means to a greater end and may set up a line of argument or charges in the Mueller probe to come
  2. It is also a shot across the bow that the US knows that the project under a new name is still active as of April/May of 2018 of affecting the midterms
  3. That the US and or Five Eyes (FVEY) have compromised their operations and continue to have access
  4. Because access has been achieved we have ALL your documentation from 2014 on to today and we see you!
  5. We have been following the money and we know where you keep it!

So there you have some simple bullet points that I think boil it down for you simplistically. Of course the document also cites company names and they likely have a lot more data that they can you to interrupt the ongoing operations by the Russians but this is all implied for those who play these games in a simple charging document. Of course this seems to have to come from the courts and perhaps the Mueller probe from behind the scenes because the Trump admin is really not going to do anything to rock the boat right? This was a smart move on the part of the US government no matter how impotent it may look on the surface of things given that it is likely now that Elena will not travel to a country with extradition deals with the US if she is smart.

This document as well sets the stage for more to come later that will show in documented form (either intercepts or a cache of documents stolen or bought from their operations) that outline the money trails and company ties between Putin’s chef and all of this. In the future they can use the information for charges, or, to perhaps seize funds later on from the chef? That is an interesting notion as well, after all, it seems the primary way to get to Putin or his oligarchs is through their money right? I look forward to seeing future documents come out and or when Mueller drops his report after the midterms find all of this tied into the final documentation showing a connection between Putin, the chef, Elena, and the Lakhta Project all the way to the overtures to Trump.

…and of course Trump’s actively participating and then covering it up with obstruction of justice.

Keep your eye’s peeled.

K.

Written by Krypt3ia

2018/10/21 at 11:39

Posted in Active Measures

Ryan S. Lin: Cyber Stalking, VPN’s and Digital Forensics

leave a comment »

          October 6, 2017 Sketch by Jane Flavell Collins

 

A minion of mine was tasked with choosing a new story about INFOSEC this week to talk about in our weekly threat intel calls and chose a story about a cyber stalker who was in the news this month. Ryan S. Lin, a graduate of RPI, has been charged with numerous counts that involve everything from cyber stalking, to child pornography, to wire fraud. Lin plead guilty on October 6th and the story featured the affidavit by the FBI special agent who worked the case. This is a long and twisted tale of stalking a former roommate online that spiraled out to numerous people around that target individual as well. The psychological damage to the parties involved must be pretty bad and the whole affair is quite messed up, but, I wanted to share this all with you in the INFOSEC field because of the work the FBI and local PD in Waltham, Newton, and other areas that these events took place in. I also wanted to cover some of the OPSEC and psychology as well concerning this case and the old school detective work done by the FBI.

Full Story:

Ryan Lin, the stalker in this case, seems to have been a mentally disturbed individual showing signs of that instability going all the way back to his high school years in Connecticut. His abuse of people online and off seems to stem mostly from his inability to form real relationships with people and likely has some sort of personality disorder. However, this is no excuse for his actions and as yet I have yet to hear that in his intake into prison has there been any kind of psychological evaluation of him. If indeed he does not have some mental disorders, then we can just chalk his actions from his teens on in this regard as just a malignant personality with a bent on what seems to border on “incel” behavior.

In the case that brought him to court he was charged with cyber stalking and what that consisted of is the following;

  • He accessed his female roommates Macbook and her Google drive
  • He began a campaign of abuse online that included
    • Impersonation of the roommate sending lewd and threatening texts to family, friends, and coworkers
    • Creating multiple persona’s online to directly harass the roommate
    • Sending child pornography
    • Sending threatening texts (rape, gangbang, death threats)
    • Sending threatening texts (bomb threats) as the target roommate)
    • Sending messages alleging as the roommate that she killed people’s pets
    • Wire fraud accessing the roommate’s bank accounts and transferring funds

Lin used the usual means to try to cover his trail online in that he used TOR, VPN services, and anonymous text services as well as cutout accounts online created using all these tools. All of these efforts though only delayed his discovery as the assailant because in the end, his actions directly led the FBI to him outside of the technological means of covering up his tracks. It is quite clear when you read the affidavit by the special agent involved in the case, that Lin, for all his security measures, was incapable of being sagacious enough to leave real doubt that he was in fact the attacker.

  • Lin used the roommates diary, which was on the google drive accessible from her unsecured laptop to send direct commentary AS HIMSELF citing the diary which she had not shared with anyone
  • Lin was incapable of acting out about this roommate and seemed fixated on her while in the house they shared
  • Lin’s actions started once she refused to sell him pot after the first time she did ended up with him accosting her in her room at 3am out of his mind from drugs
  • Lin was incapable of separating his dual lives/actions online where he had dialog about the very same VPN services he used to carry out the attacks as well as taunt slyly about the ongoing spate of bomb threats ongoing in Waltham and Newton where he lived

It is my belief that Lin, a student of RPI and a computer programmer was mentally impaired enough to be unable to separate these activities from the rest of his online and offline life in a manner that befits what is called in criminal profiling as “A disorganized personality” which led to his downfall. Overall, the problems of OPSEC today that we in the community often talk about with regard to online actors can be clearly seen failing in this case. I have said many times in my blog and elsewhere that OPSEC always will fail because of human nature and in some cases that human nature (or un-diagnosed mental illness) will eventually give you up to the dogged investigator.

 

 

In the Lin case, it is important to note that it wasn’t JUST the evidence collection of IP addresses that led to Lin in the end but instead it was good old fashioned gumshoe interviews and forensics that did. When the FBI went to Lin’s employer after it became clear just from circumstantial evidence that he was a prime suspect they learned that he had just been let go. It seems that Lin had been acting strangely at work as well and when he was let go, he asked if he could log out of “personal accounts” on the laptop. The company declined that and then turned over the laptop to IT for re-image.

Now I know what you are thinking… It got re-imaged and game over right?

Nope.

The FBI was able to get the laptop either by warrant, or I think more likely, was just handed over after being asked by the employer. The laptop had indeed been re-imaged but FBI forensics was able to pull incriminating evidence from the slack space even afterwards. What they found was a number of data points that showed Lin had been using the corporate asset for his attacks on the roommate.

  • VPN software and traffic
  • Browser cache data
  • Logins/software for the anonymous texting service used in the threats (bomb threats too)

It was this evidence that was key that led the FBI to marry up this information along with his online posts on Twitter and Facebook as well as the VPN logs that led to his arrest. See kids, if you use a VPN there is a high chance that your raw IP is going to be logged to your VPN pool address for the times you were online and used as evidence. Many Anon’s seemed to have learned that lesson but I guess everyone has yet to catch up. Lin, a computer science grad from RPI thought he could hide his traces but even he was wrong.

Take heed those who want to do bad things because eventually you will screw up and you will be caught.

I suggest you all read the affidavit for more detail.

Lin affidavit

In closing I just wanted to share this with you all as a lessons learned and as an appreciation of the world of digital forensics. As someone who does forensics as part of my daily job, I have to tell you all it is one of the more interesting parts of my day. I do love uncovering evidence and creating narratives that lead to wrongdoers getting their come-uppins as they say. I also wanted to once again point out that there are many avenues to investigation that even someone as a digital forensics practitioner, can employ in their day to day. Consider the psychology of the actor and their patterns of behavior. Often times I have a portion of my mind that is working that angle as I work on a forensic image in cases.

What actions would this person take given what I have seen so far?

What are the motives?

How would I do things were I them?

All questions that should be asked when performing work like this. It may lead you to some answers that you can back up with forensic evidence. All of this plays out as well with Threat Intelligence as well and intelligence analysis. Look at the larger picture kids, just don’t get buried in the bits and bytes.

K.

Written by Krypt3ia

2018/10/13 at 14:16

The Widening Gyre: Putin’s Asset Sets Multinational Norms On Fire and Begets Global Negative Actions

leave a comment »

We are beginning to reap the whirlwind in the news cycle from the election of Trump and his breaking of norms that this country and the world have come to rely on. This is exactly what Putin wanted, a country in the midst of a political and social rift that takes our eye off the global ball and allows for negative actions to be carried out without sanction. We have seen Trump set the constitution on fire, the Judicial body of the United States, the Economic norms, and generally break up the balance of power in the world. This has allowed Putin to have greater freedom to act and in turn now others feel empowered.  China, North Korea, Syria, and most recently Saudi Arabia have taken actions that would in normal times, possibly not been acted on were the nations not at odds generally due to America’s abdication of its role.

Let’s cover some of the things going on…

RUSSIA:

Putin is still working the levers of power and in so doing he is still making moves on Ukraine all the while leveraging the problems in Syria as well. His actions are two fold, first to annex Ukraine altogether if he can. If he can’t then he will continue to fight with disinformation and active measures campaigns until he has more control over the area even if he cannot all out annex them back into Russia proper. Meanwhile, in Syria, Putin is leveraging Erdrogan and the battle there with da’esh to gain a foothold in the region and have a friendly dictator he can someday use as a proxy against others in the world.

Meanwhile, Putin keeps having his enemies killed off in interesting ways. The list has been topped off as of yesterday with an oligarch who ran afoul of him being found in a park choked to death by a dog leash.

…. A dog leash….

Now that is a metaphor huh? Putin will continue on liquidating his problems with impunity because the norms have all been broken because of Trump. The U.N. NATO, all of the normative bodies have been rebuffed by Trump and weakened. All that is lacking now is an assassination of a Putin enemy on American soil for his win to be complete. Putin pulled a master stroke in helping Trump win. Even so, don’t believe for a second that Putin isn’t also waiting to not only use Trump more, but if Trump begins to fail him he will continue to perform flyovers in our air space like he has been with the BEAR FOXTROTS over Alaska and likely will become more aggressive. I have yet to hear anything about SSN activity but be assured they are there… Waiting.

CHINA:

China has upped it’s espionage games since Trump started his little trade war with them. Recent events have shown a rise in hacking and phishing campaigns that had slowed down since the Xi and Obama agreement. That’s over now though and with the trade war heating things up, and rankles the core ideal of China to be an economic superpower, we are going to see not only more hacking and phishing with a side of theft of IP but also now classical espionage tradecraft to carry out the same goals. All of this will only escalate against the US as we move forward and likely set more things on fire by Trumps economic disaster plan.

MEANWHILE…. China feels empowered too because of all the fractiousness in the world’s governing bodies and has made the ex INTERPOL chief disappear while in China. Gee, China is now feeling like they can just disappear the head of an international investigative body.

Nice.

As all of this is going on we also have coincidentally, the arrest of an MSS asset in Belgium for economic espionage against the US aerospace community. Hmmmm gee, what a coincidence that this happens as the INTERPOL chief is disappeared. As you can see, and perhaps make the connections yourselves, it may be that the MSS is reacting to the impending arrest and or extradition of their asset by grabbing another as a warning?

Hmmm….

Yes, expect more to come out of China with the worsening of the trade wars as well as the eroding of the worlds norms on illegality.

Thanks Putin and Trump!

Oh yeah, and I forgot to mention the whole South China sea thing too…

 

SAUDI ARABIA:

Next up, Saudi Arabia seems to have lured a Washington Post reporter to Saudi only to kill and perhaps dismember him in an embassy there. Saudi has never before been as bold and I directly point toward the breaking of all the norms and groups for this action too. It’s been pretty blatant and I suspect there will be no sanction over this. I mean, look, it’s Saudi right? OPEC, oil? Not to mention that Trump was basically setting himself up to be their stooge since the beginning. Nope, nothing will come of this and now the Saudi’s have killed an Saudi journalist working for an American news org.

I also want to mention the whole glossy magazine that was put out by Trump’s friend David Pecker back last summer. What was this all about? Well, it seems that that was a PR move to make the house of Saud more accessible to the US consumer? Put another way, the new crown prince wanted to look progressive and hip and with the help of Pecker they tried real hard. It’s just that this mark was missed with this publication. In fact it only made an already wary populace start asking questions as to why this happened and what kind of conspiracy was afoot. Expect more to come out of this Saudi reporters death and it will likely not be pretty. If they get away with this, and I think they will, then expect Saudi to pull some more stunts in the future as the crown prince get’s more bold.

TRUMP REPUBLICANS:

Finally, the TRUMP party, I really don’t consider them Republicans anymore, will continue to push the limits of the nations norms and laws until they are just removed from power. The events around the recent SCOTUS nomination and confirmation of Kavanaugh are a clear example of how the Trump party is abusing their control over the house and senate to get whatever they want over what the governed wants. The Kavanaugh thing is just the most naked misuse of their power though to date and I am sure more will be coming once Trump replaces Sessions with a minion under his control. This will set the trifecta into play; DOJ under his control, SCOTUS under his control, and Mueller with a new target painted on his back.

I fully expect that when this happens the Russia investigation will be liquidated and the Trump party will lock arms and say that this is not a constitutional crisis. Of course then the DOJ will agree and SCOTUS will concur. It will all disappear at least legally right? This is Trump’s greatest desire and it seems more and more likely that this can happen because of the Kavanaugh ascension. An alternate timeline to this would be that Trump allows the investigation to finish but then has Kavanaugh in his pocket to be the deciding vote on whether or not a sitting president can be indicted.

Either way, it seems that if Trump can replace Sessions with a partisan minion, we are all doomed.

Even more worrying is the upcoming mid term elections. If the Trump party continues to be in contol, expect to look fondly at the times of outrage over Trump’s mild bad actions because he will feel empowered to do even more bad things if he has total control.

Once again, thanks Putin.

We are at a tipping point here and not just with regard to climate change kids.

K.

Written by Krypt3ia

2018/10/11 at 13:38