Skip to main content

Bernie Sanders - Leaks

Bernie Sanders is an inspired man, though his is aging.  After many years of doing nothing, the staple of modern political activity, he is now afire with ideas, with programs, and with books. The kids love him.  He’s just released a guide book on creating revolutions.  One source of  inspiration, at his age, must be his greatest opponent, Donald J. Trump.  “If that old fart can do it, so can I.  Hrmmmp!”

Whoa!  This logic may also inspire Hillary and even Nancy to soldier on.  It may also inspire many other old farts, like me, toward twilight actions.  Excellent!!

I can just see the headline in 2020.  “TRUMP-SANDERS ticket sews up the assisted living crowd. Large turnout expected.”

----------------------------------------

LEAKS.  An explanation of how leaks may be nearly impossible to detect, not for just President Trump, but all future presidents.  

Technique: How to leak information through the concept of: Cuckoo Information Smurfing. 

See this link to financial cuckoo smurfing.
http://transparencyinternational.cmail20.com/t/r-l-jljtjra-hkkrultdik-u/

1. Member of WH staff with full information known to him/her, and others.  This person is the target or victim.
2. An external other person who has information to leak. The procedure...
3. Create an alias email account or phone, possibly through another country.
4. Send information to news outlet under the name of WH staffer but through the alias. Admonition given is never to contact the the victim through their email@gov. All contacts are through the alias, which is controlled by the external party. The news agency, fearing detection, agrees. However, all manner of verification is confirmed. Easy.  Modern news agencies feel no need to determine confirmation of sources or information.  (Important)
5. The information is published and there is,and there can be no leaker of record. 
6. Government agents can search all day long and find no trace of a leak within the WH. It is almost undetectable. This can also be arranged by one WH staffer through another.
7. The errant email account is closed.*
8. The WH may suspect this person or that on the basis of vague and dropped information, fire him/her, but the vic has no knowledge of the event. This could account for all the internal backbiting we've heard about.

The source of this information can come from the external other person in another agency, or obtained by other means.  There are several other sources: hacking, internal hacking or bugging, high-level access, loose lips, or alternative means.

Remedy: I can see none, except to alert the media this may be happening. This may alert them to be more circumspect - if possible. 

Comments

Popular posts from this blog

Behavioral Science and Problem-Solving

I.                                       I.                 Introduction.                Concerning our general behavior, it’s high about time we all had some understanding of how we operate on ourselves, and it is just as important how we are operated on by others. This is the wheelhouse of behavioral sciences. It is a vast subject. It touches our lives constantly. It’s influence is pervasive and can be so subtle we never notice it. Behavioral sciences profoundly affect our ability and success at problem-solving, from the elementary level to highly complex wicked problems. This is discussed in Section IV. We begin with the basics of behavioral sciences, Section II, and then through the lens of multiple categories and examples, Section III. II.     ...

The Lemming Instinct

  In certain vital domains, a pervasive mediocrity among practitioners can stifle genuine advancement. When the intellectual output of a field is predominantly average, it inevitably produces research of corresponding quality. Nevertheless, some of these ideas, by sheer chance or perhaps through effective dissemination, will inevitably gain traction. A significant number of scholars and researchers will gravitate towards these trends, contributing to and propagating further work along these established lines. Such a trajectory allows an initially flawed concept to ascend to the status of mainstream orthodoxy. However, over an extended period, these prevailing ideas invariably fail to withstand rigorous scrutiny; they are ultimately and conclusively disproven. The disheartening pattern then reveals itself: rather than genuine progress, an equally unvalidated or incorrect idea often supplants the discredited one, swiftly establishing its own dominance. This cycle perpetuates, ensurin...

Principles of Insufficiency and Sufficiency

   The principles we use but don't know it.  1.      Introduction . Every field, scientific or otherwise, rests on foundational principles—think buoyancy, behavior, or democracy. Here, we explore a unique subset: principles modified by "insufficiency" and "sufficiency." While you may never have heard of them, you use them often. These terms frame principles that blend theory, practicality, and aspiration, by offering distinct perspectives. Insufficiency often implies inaction unless justified, while sufficiency suggests something exists or must be done. We’ll examine key examples and introduce a new principle with potential significance. As a principle of principles of these is that something or some action is not done enough while others may be done too much. The first six (§2-6) of our principles are in the literature, and you can easily search them online. The others are relatively new, but fit the concepts in the real world. At times, these pri...