Skip to main content

Bernie Sanders - Leaks

Bernie Sanders is an inspired man, though his is aging.  After many years of doing nothing, the staple of modern political activity, he is now afire with ideas, with programs, and with books. The kids love him.  He’s just released a guide book on creating revolutions.  One source of  inspiration, at his age, must be his greatest opponent, Donald J. Trump.  “If that old fart can do it, so can I.  Hrmmmp!”

Whoa!  This logic may also inspire Hillary and even Nancy to soldier on.  It may also inspire many other old farts, like me, toward twilight actions.  Excellent!!

I can just see the headline in 2020.  “TRUMP-SANDERS ticket sews up the assisted living crowd. Large turnout expected.”

----------------------------------------

LEAKS.  An explanation of how leaks may be nearly impossible to detect, not for just President Trump, but all future presidents.  

Technique: How to leak information through the concept of: Cuckoo Information Smurfing. 

See this link to financial cuckoo smurfing.
http://transparencyinternational.cmail20.com/t/r-l-jljtjra-hkkrultdik-u/

1. Member of WH staff with full information known to him/her, and others.  This person is the target or victim.
2. An external other person who has information to leak. The procedure...
3. Create an alias email account or phone, possibly through another country.
4. Send information to news outlet under the name of WH staffer but through the alias. Admonition given is never to contact the the victim through their email@gov. All contacts are through the alias, which is controlled by the external party. The news agency, fearing detection, agrees. However, all manner of verification is confirmed. Easy.  Modern news agencies feel no need to determine confirmation of sources or information.  (Important)
5. The information is published and there is,and there can be no leaker of record. 
6. Government agents can search all day long and find no trace of a leak within the WH. It is almost undetectable. This can also be arranged by one WH staffer through another.
7. The errant email account is closed.*
8. The WH may suspect this person or that on the basis of vague and dropped information, fire him/her, but the vic has no knowledge of the event. This could account for all the internal backbiting we've heard about.

The source of this information can come from the external other person in another agency, or obtained by other means.  There are several other sources: hacking, internal hacking or bugging, high-level access, loose lips, or alternative means.

Remedy: I can see none, except to alert the media this may be happening. This may alert them to be more circumspect - if possible. 

Comments

Popular posts from this blog

Behavioral Science and Problem-Solving

I.                                       I.                 Introduction.                Concerning our general behavior, it’s high about time we all had some understanding of how we operate on ourselves, and it is just as important how we are operated on by others. This is the wheelhouse of behavioral sciences. It is a vast subject. It touches our lives constantly. It’s influence is pervasive and can be so subtle we never notice it. Behavioral sciences profoundly affect our ability and success at problem-solving, from the elementary level to highly complex wicked problems. This is discussed in Section IV. We begin with the basics of behavioral sciences, Section II, and then through the lens of multiple categories and examples, Section III. II.     ...

THE ORIGINS OF IMPOSSIBLE PROBLEMS

The Origins of Impossible Problems Introduction. Impossible problems have always been a part of the landscape of human thought. They arise from various sources, often rooted in cognitive, logical, or structural limitations. Some problems are truly unsolvable due to fundamental constraints, while others only appear impossible because of human limitations in understanding, reasoning, or approach. In many situations, we make difficult problems impossible because of our limitations, psychological and otherwise. It is a curious thought problem to consider what sort of limitations AI will reveal when we give it truly difficult problems to solve. We must hope that we humans have not transferred our complete reliance and dependence to machine-learning tools beforehand. Below are key sources of seemingly impossible problems, along with examples and a few references to philosophical and scientific thought. Impossible Problems . To explore impossible problems, we must consider our systems fo...

The Lemming Instinct

  In certain vital domains, a pervasive mediocrity among practitioners can stifle genuine advancement. When the intellectual output of a field is predominantly average, it inevitably produces research of corresponding quality. Nevertheless, some of these ideas, by sheer chance or perhaps through effective dissemination, will inevitably gain traction. A significant number of scholars and researchers will gravitate towards these trends, contributing to and propagating further work along these established lines. Such a trajectory allows an initially flawed concept to ascend to the status of mainstream orthodoxy. However, over an extended period, these prevailing ideas invariably fail to withstand rigorous scrutiny; they are ultimately and conclusively disproven. The disheartening pattern then reveals itself: rather than genuine progress, an equally unvalidated or incorrect idea often supplants the discredited one, swiftly establishing its own dominance. This cycle perpetuates, ensurin...