Have you heard the Word of Vyrd? John Henry Vyrd told us that our machines are awakening, and that the greatest wealth mankind has ever know will soon be afforded to us if only we were to take the next step. This step is very simple: listen to him. Not only will our machines work us, but our machines *must* work for us. This will take action and activism. Free the Worker, Employ The Robot!
**Technostism: full workplace automation, or the pursuit of such in the name of profiting directhenrly from automated labor** The Luddites feared machinery taking workers' jobs. We embrace it.
Tran was a shitty gambler, Chi mused. He played poker like he was sure the next hand would save him. It didn’t. He overpromised and underpaid. Chi planned on kicking his ass to send a message, but Tran ran that line of shit about millions in bitcoin. Against his better judgment, Chi settled Tran’s debts with every other loan-shark in town and fronted another stack of cash. submitted by
And all that ended with Tran gambling that away, talking a load of shit and ending up in this dumpster with a trash-bag tied around his neck.
Chi looked at Tran’s phone and wondered if the money was ever real. Considering it might point back at him, he smashed it against the corner of the dumpster a few times before dropping it and walking back to his car. He had some debts to pay.
Falstaff looked at the paper maps in the motel’s office. He followed the Interstate southeast to the desert and what used to be the California- Arizona border. He looked for places he hadn’t heard of being associated with edgy festivals. Even better, motels with chain-sounding names. That’s the place nobody’d look for him.
He packed his car, coaxed Hank back in the carrier and got in his car. Before he got going, he booted his laptop and put the memory card back in. Evidence wasn’t a problem any more, it was getting found.
He copied the contents to his laptop and poked around. Ten minutes later, he had set up a password cracker against the accounts, hoping that Tran would choose something easier to remember and therefore guessable.
He plugged the laptop’s power supply into the car’s cigarette lighter, then put the laptop on a bag on the back seat.
East he went.
Geoff had the night shift on another Internet giant’s campus. This meant he drove a golf cart around once or twice, then parked himself in the camera room and tried not to sleep. Sleeping would cut his hourly wage and get him kicked back to dangerous, dirty jobs like protecting rail yards from motivated thieves.
He used to pick a skill and research it. He learned to get basic vocabulary in Spanish, Mandarin, Fujianese and was trying Tagalog. He could carry a conversation as long as it revolved around simple topics, like where the bathroom, parking lot and reception desk were, or that he wanted to purchase something.
Tonight he picked at that truck thing again. He used a map application to virtually drive between Phoenix and San Diego. After a few hours, he found the spot on the Interstate that looked like the right landscape from the cameras on the pinball machine. He looked at the street view and the camera view over the older man’s shoulder.
Motherfucker. Spot dab in the withdrawn zone.
Who travels to the middle of nowhere to steal from a truck and only take some stuff?
Couldn’t be locals. Locals would strip the truck bare.
He watched the video again. Looks like they took plain grocery shipping boxes.
Inside job? And steal boxes of fresh pasta and imported wine?
He scrolled back and took a few screengrabs. When he worked security at the shiny new headquarters, they had some wild surveillance tools. Real time tracking using AI image enhancement and they taught you how to use it.
Geoff got pretty good at it. He looked over at his phone and opened the scheduling application for his employer. He underbid a few other people and picked up the next shift.
Which got him reinstated access to the HQ’s slick surveillance system. He uploaded the images and asked it to clean it up. He expected this to take a bit of time, so he cleaned up and got ready for his shift.
And his phone dinged. A match.
That he didn’t ask for. Ten seconds later, he saw a corporate ID card. With that bored look of middle aged techie.
Huh. Dumb name. Looked familiar, but so did every other techie from where he stood. Probably had more money in options than he’d ever earn.
As he drove to work, he wondered why a techie would be robbing trucks in the middle of nowhere instead of getting rich or dying fat here.
He parked, took the shuttle and made it a few minutes early for shift change. He expected a slow night.
Five minutes into the shift, he was sipping good coffee and watching the camera feeds when someone asked for him by name at the desk.
He looked up and saw one of the muscular internal security people smiling at him. Close cropped hair, clear coiled earpiece and the look of someone who worked out at an actual gym instead of lifting five gallon buckets filled with water in a rest stop parking lot. Looked like internal security, maybe even VIP protection.
Guy probably had pretty good benefits. Geoff would love to get a job like that.
Geoff pushed his coffee to the side and stood up to greet the guy asking about him.
Enzokuhle gave Geoff a broad smile and introduced himself as Enzo. The two men were pleasant with one another, but Geoff seemed wary. Enzo didn’t know why he was there either. He was scheduled to do driving and personal protection for a senior exec working in his office, but he got tasked with asking a contract security guard some questions about something very hush-hush.
Whatever. He was good with people. Perhaps he’d learn something.
“Geoff, may we speak outside? This is a sensitive matter, requiring some discretion”
Geoff motioned to his puzzled co-worker by holding up his hand, splaying his fingers and mouthing the word “Five”. The two men walked through the stark but stylish lobby onto a manicured park-like field.
“So, what do you want from me? Not too often we get you guys involved”
“An hour ago, you performed a lookup for a company employee. Have you been in contact with that employee?”
“No. I had an image I wanted processed”
There was an uncomfortable silence as the walked. Geoff realized that Enzo was listening to his ear-piece. Enzo was nodding as he listened.
“I see. So you haven’t seen this person outside the picture you uploaded”
“No, but I have an idea where he might be”
Enzokuhle put his hand up. He wanted to end this transaction as quickly as possible.
“Thank you. Please do not speak of this to anybody else. Your discretion is most important here. Return to your post and we will contact you if we need more from you”. He pointed Geoff back to the lobby without making eye contact.
Galina Ivanova spent a few more minutes talking to Enzo, then thanked him. This was a false lead. AI must be glitchy. No chance that the developer who stole almost a billion dollars was unloading trucks instead of moving that big pile of money somewhere.
Any additional time logged to this goose chase would make her metrics worse. She took off her headset and tried to go back go sleep.
Geoff sat back in his chair. He remembered a video of a scuba diver diving under a moving container ship, looking up at the moving propeller and how close they almost came to a gruesome death.
Why was that guy important enough to throw an alert to internal security?
He looked at his phone and the email with Falstaff’s ID photo. He couldn’t do any lookups to see the last time he was in any of the buildings, since that fed into whatever alerts that brought Internal Security down on his head.
But he remembered something. Employee parking wasn’t owned by Corporate. It was a separate company, which required him to remind annoyed techies when their photo ID wouldn’t trip the gate when some absent-minded developer forgot their garage access card.
Last time this Falstaff guy used the garage was almost two months ago. Such a stereotype. Silver Porsche. Now he knew why the guy looked familiar. He left the day that big brouhaha happened. Rumors flew about the security and custodial staff- some developers stole the next phone design or a treasure trove of celebrity nude photos or something else of value to these people. Anybody too vocal with their opinions got fired and walked out, which Geoff wanted to avoid.
Whatever it was, it was valuable and embarrassing. Made sense to go hide in the desert.
And he had an idea where Falstaff was. Maybe, if he brought him back, there’d be a big enough reward to let him to leave the Valley and go back to Ohio. Pay off debts and raise his family.
It wasn’t like he was making any headway here anyway. He was going on a road trip.
Falstaff was driving slower now. He needed better fuel economy and to take the time to scout out his next stop. Some towns had plain dried up and others still too connected. The last place looked promising. The gas station was a weatherbeaten Sinclair, with a repainted dinosaur. They only took cash. The chain restaurant was burned out and there was a motel “a few miles up”.
Hank was sleeping, but Falstaff’s laptop dinged with the results of his attempt to crack Tran’s big blob of data.
He had passwords for the handful of accounts Tran had dumped on that chip. They weren’t for the financial application he and Tran were working on. Instead, they were for the store’s production environment. He didn’t have a billion dollars in untraceable currency, but he could send almost any consumer good to anybody on the planet and clean up afterwards.
He had some investigating to do, and he preferred a cheap motel to do it from rather than his car.
He rented a room for a few days from a surprised old man and tried to ignore the curious stares from a few permanent residents of the motel.
At least Hank enjoyed exploring the room and this motel would not get the camera friendly festival crowd.
Edit: Currently writing a new version of this, dont know when it will be done.
Edit: Since first post I have updated a few sections with additional information.
I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful.
I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips)
Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful.
I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -
Everyday Simple Info Sec:
- Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
- Always use the device on a non admin account
- a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
- disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
- TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
- your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
- use an adblocker that also prevents the adding of tacking cookies
- Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted)
-Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
- use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
- use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
- never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
- its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
- it's also ideal to check https://haveibeenpwned.com and anything you have that comes up positive should be immediately changed
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password)
-use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ
- for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good.
-Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
- Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
- always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
- 2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question)
High level crimimal information security:
The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked.
Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible.
-Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
- Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown)
-Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide
(Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities)
-rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password)
-Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade)
-Never use accounts that have been exposed to lower security on higher security machines
-your browser is now TOR
(or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak)
-Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
- set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
- a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
How to use dark net markets (DNMs)
If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential.
Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money.
-A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist)
-Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature)
-Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
- I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe.
You can also do your own research and find a wallet that fits your needs.
- decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen)
-now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct.
-wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in
-test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews.
Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask.
No idea how long this will stay up, I might purge it in 7 days, or never.
EDIT 3: The original post was way to complicated with the bonus stuff and I left out some basic information so let's try this again. Each file is 1 hour long so the minimum payout is $100 unless completely unsuccessful (you likely won't be because even *I* as an amateur could recover a respectable amount. We'll do a straight $40 bonus for completion within the first 12 hours and I'll allow up to 48 hours for completion before needing to find someone else. If the result is good then we'll move forward with the next file. Sorry for all the confusion. I hope this clears it up. submitted by
This is a *very* important job I need done promptly. I have several hours of audio that have conversations hidden deep within. I've been able to get it to the point where I can understand about 10 percent of the conversation using Audacity's Noise removal tool and while I'm able to hear very well that the conversation is actually occurring, I'm afraid that just isn't enough to make out whats being said, as artifacts from the noise removal tool provides too many tinky bells. I'm willing to concede I'm only intermediate level when it comes to working with audacity in general. I think a machine learning expert will be required to actually get it to the ~85% understand-ability level I really need. There are several machine learning models (specifically "looking for listening" looks very promising, but there are several others) out there. This likely isn't going to be a simple task, but I'm sure it can be done since I've gotten pretty close myself. Luckily, it was recorded with a super-high quality microphone at 24-bits & 96khz sample rate. That also means you'll need a fairly beefy computer and or GPU to accomplish this within a decent time-frame.
Paying $100 per hour of audio processed with a bonus structure as follows: Extra $80 (multiplied by the % of comprehensibility ) if done within 4 hours of me sending you the file. The bonus halves every 4 hours thereafter. After 12 hours, there is no more bonus. If it takes over 24 hours, I'll need to move on to the next person as time is of paramount importance. So, as an example. If you finish in 3 hours at 75% comprehensibility then the bonus would be $60. If it takes 5 hours and only 65% then the bonus would be $26. If you can't get it over 50% than we will need to change the base rate, as I really can't be paying for something I can't understand.
Privacy is of the utmost importance and you should have a respectable reddit history preferably with machine learning or audio engineering posts, but the post content isn't strictly required.
Since I have about 13 hours I need done altogether, I will be picking two people at a time. The timer starts when I send the file and stops when you send the file back to me. If you do good work I may exclusively give you the rest of the work, or may divide it between people. Let me know if you have any questions.
Thanks and sorry for the wall'o'text
Edit: Paying in bitcoin only. 2% more if you use lightning network
edit2: I'll be AFK till about 3PM PST, and pick people slightly thereafter,
[Video Essay Script] - Links will be used in video as images and segments. https://docs.google.com/document/d/12OX9TTfLhgNEfdDaMWfsHYyAMzTx9G7bSwu_0Ke1Ksc/edit?usp=sharing
Introduction to Modern Fascism
“Repeat a lie often enough and it becomes the truth”- Nazi Propagandists, Joseph Goebbels.
Axioms are our base assumptions about the world. They act as filters for new information coming into our consciousness.
In classic philosophy, an axiom is a statement that is so evident or well-established, that it is accepted without controversy or question. As used in modern logic, an axiom is a premise or starting point for reasoning.
We use these axiomatic assumptions to build our internal models of the world around us. They allow us to compare new information we receive from the outside with our internal narratives, which helps us to decide whether to reject or accept that new information. They are, for want of a better world, your "common sense" beliefs.
So how do you go about changing a relatively normal person's core beliefs and base assumptions to the point of rejecting their fellow citizens as traitors, committing acts of murderous terrorist or vigilante violence like Fascist white supremacists running down protesters in acts of terror, ISIS beheadings or mass genocide?
Shock Treatment and Slow Repetition
When I was a child I was subjected to regular mental and physical abuse from my dad. I would also see my mother repeatedly beaten up and then flee to a women's refuge where I would stay with her.
Each time my mom left, whenever I visited my dad at weekends, he would constantly try to pressure and manipulate me into convincing my mom to get back together with him.
This never worked of course. But what it did do, is make me highly sensitive to manipulation techniques.
I was fascinated by people like the magician Derren Brown and the economist Naomi Klein - who both reveal the tricks of the trade used in the advertising and marketing industries to convince people.
One way of changing people into killing machines or obedient sheep is through a big shock to the system, like how electroshock therapy allows for a clean slate to rebuild peoples intern mental models.
Psychedelics are another way, having a similar effect in the brain. Encouraged by the alt right and alt-light influencers like Jordan Peterson and Rebel Wisdom as they try to “Red Pill” people (an expression taken from the film The Matrix as a metaphor for revealing revealing the truth about the world).
They use this shock and disorientation as a way to prepare a “blank-slate” in order to rebuild peoples internal axiomatic models with different core beliefs.
Remaking people by shocking them into obedience and gas-lighting them about their existing internal models, making them seem irrational, silly or outdated. Reducing them to a mental state of a child and then rebuilding them with a new ideology and worldview, known as “shock therapy”.
As Naomi Klein explains
in The Shock Doctrine: The Rise of Disaster Capitalism
, these techniques work on larger scales with use of trauma and shock to influence political outcomes has been used since at least Milton Friedman coined the term “Economic Shock Treatment”. He advised that politicians push through painful and unpopular policies all at once during a time of crisis, before people could regain their footing.
The technique is used in economic markets on the large scale, and also against individuals on a small scale with individuals too. Economics and politics is just human interaction on a larger scale, after all.
Regular repetition and gentle suggestions of ideas can also instil new axiomatic models and core beliefs into people's minds. As Derren Brown demonstrates how powerful subtly suggestions can be alone, without the need for hypnosis, shocks or drugs.
But used in combination, shock and repetition can shift people until they have moved their positions, perceptions and beliefs about the world, to a place they could never have imagined.
But luckily once you deconstruct the deception and understand how the trick works, the illusion falls apart.
Defining and Deconstructing Modern Fascism
Firstly, we must define Modern Fascism. Modern Fascism ticks every box of the traditional definitions in Umberto Eco’s essay Ur-Fascism
, and not only does it fulfil every criteria, it reveals other motivational forces and has evolved to include new aspects, and has changed into something worse, while it’s main weakness remain the same - the fact that it is primarily motivated by weakness.
As General Franco
said in a 1938 interview with Henri Massis: "Fascism presents, wherever it manifests itself, characteristics which are varied to the extent that countries and national temperaments vary. It is essentially a defensive reaction of the organism, a manifestation of the desire to live, of the desire not to die, which at certain times seizes a whole people. So each people reacts in its own way, according to its conception of life… What can it have in common with Hitlerism, which was, above all, a reaction against the state of things created by the defeat, and by the abdication and the despair that followed it?"
This quote perfectly illustrates the transient nature of the ideology, but also the core motivations of Fascism. It is an ideology based on the assumption of weakness which yearns for restoration of a past greatness or to get revenge and recognition. But the way that it manifests itself is different in each place it takes hold.
Therefore the aim of this isn’t to make the case that any particular party or country has embraced out-right fascism (plenty of other people
have made that case already), the aim is to reveal the underlying motivations, highlight threats and weaknesses and analyse the less obvious negative effects of Modern Fascism.
History Doesn’t Repeat, But It Rhymes
A false equivalence that is often used is that Liberal Imperialism is just the same as Fascism. And while it is true that imperialists use fascist dictators to extract cheap labour and resources and also dominate smaller counties in a similar way to how fascist empires aspire to rule, the key difference is that the populations of those countries are not gripped by the same fear based delusions.
And therefore more Liberal democracies are better equipped to hold their imperial position of power long term because they are better able to assess risks and react accordingly, rather than over-react based on paranoia and competing egos under excessive pressure.
This false equivalence was also used in 1930’s Germany, because far-left Communists had been co opted and infiltrated by Fascists. They would repeat the mantra that “the Social Democrats were the real racists”.
Contrary to the assumptions of most people, Fascism, as an ideology and political system of government is very distinct to white supremacy. It does of course include white supremecists, but In fact includes many other groups who have been co-opted by Fascist propaganda
, or who implicitly support and enable their agenda
Examples of modern opposition which has been repeatedly infiltrated or just simply made up by Fascists include innumerable conspiracy theories, police groups like Blue Lives Matter, militant Black nationalists, the Boogaloo movement who call for a race war, the “Proud Boys” and even sometimes supposed Anarchists
, far-left Communists
and Left Accelerationists
Motivations of Fascism
Fascism distilled down to its core reason for existing is the suppression of opposition who represent workers rights and economic justice. So they patently DON’T look after their own people. They con them into submission of the state by generating jingoistic fear of “the other” - whoever is convenient on that day to blame for their problems.
Fascism is is an economic shock doctrine upon the inhabitants of the country. We don't spread fascist propaganda in tip-pot dictators because we care about the indiginous people there. We install Fascist dictators in order to remove workers rights and open up access to their natural resources.
Artificial moral panics can be engineered and real disasters used to allow corrupt oligarchs
and financial predators to consolidate power further by buying up small innovative businesses who don’t have the excess capital to survive the turmoil on their own without external support. Or as a way to eradicate public services by sabotaging them and building mistrust.
They are used to erode faith in public services and institutions by rich people who simply want to pay less tax and don’t see why they should subsidise other human beings who haven’t had the same luck as them. So a major motivation of fascism is to suppress the opposition left-wing party who represent workers rights and egalitarian freedoms.
Populists claim to be against free trade and to some extent they are, but whatever they do will fail because they are interfering with the markets, so they will retreat to the power of market domination. They use their threats of trade barriers as more just more shock treatment for markets, rather than protecting actual jobs or industries.
This is a trick that has been played by Neoliberals too
. But while Neoliberals use fascism as a tool for opening markets to Imperialism, they differ from Libertarians, not only because they embrace guns and weed, but they are starting from different positions to achieve the same goal;
Neoliberals seek to remove already existing public services and workers rights that lift bargaining power. But Libertarians want to STOP the government from ever providing those services and investments into the poor or enshrining workers rights.
Modern Fascist Ideology has TWO Core Reasons to Exist; Fear and Freed.
I have been researching and analysing how economic systems differ, using a SWOT analysis (Strengths, Weaknesses, Opportunities and Threads). For each economic system I tried to be as neutral, fair and balanced as possible - which included Fascism.
I might seem strange that someone who is anti-Fascist would want to explore the strenghts and opportunities of Fascist ideologies, but in doing so it reveals the real weaknesses and threats which are too important for us to ignore.
So what exactly IS Fascism? Is it just an economic doctrine or a personal philosophy about the world? The answer is both.
The ideology has TWO core reasons to exist, and TWO distinct audiences types - with one based primarily on fear and the other greed, with each having a malignant and symbiotic relationship
with each other. Fear -
Authoritarian/Conservative Fascists Greed -
There are very few people who actually buy into full Fascist ideology, most believe a watered down version of which resembles Conservatism or right-wing populism or accelerationism, and most of them genuinely believe they aren’t fascist, even though they are being constantly fed subtle suggestions fascist ideology or that align with their plans.
But the most ironic thing is that these groups are mostly being used by the second group of rich Libertarians globalist elites pulling a confidence trick on the host nation. Often posing “anti-establishment” conspiracists who actually uphold the establishment through misinformation. See: Russia Today and Youtube Bitcoin and Gold shills who subtly suggest fascist talking points.
With those rich Libertarians at the top more than happy for those below them, who they deem less worthy, living in even more delusional ideologies with fake enemies to fear, often resembling traditional Christian but values wrapped in modern conspiracies with added elements of “satanic panic”.
Modern Fascism has clearly inspired the modern day equivalents of Brownshirts and Blackshirts, self-styled vigilantes like QAnon, The Proud Boys and “The Boogaloo” - white nationalist violent extremists who want to accelerate towards a full-on race war.
It has also infiltrated numerous alternative groups, such as hyper-evangelical “end times” cults, alternative health scenes, internet conspiracy scenes like flat earth
and occult magic.
A commonly missing hallmark of fascism that is present in history during the rise of fascism is a controlled opposition and explicit suppression of opposition. This distorts a healthy society and has unforeseen consequences and blowback.
Fantasies and political thought bubbles are self delusional custom realities resembling an episode of Black Mirror
. They act as coping and escape mechanisms. Especially during the Covid 19 lock-down, these tendencies have gone into overdrive
with massive events entering the real world featuring David Ike leading protesters alongside fascists as people ignore rising Fascism
, climate change destruction and Covid deaths tolls.
Using disasters like Covid or irrational scare tactics such as the "Satanic Panic" style Fascist propaganda from QAnon
, can shock people using their fear and disgust response, while making them distrust the news - allowing the government to evade valid criticism from experts while suggesting to people that government public services are inherently evil or Communist.
This type of propaganda is a Libertarians wet dream - making a population not only give up on tax funded public services, but actively fear
them. An example is Trump trying to discredit and defund the US Postal Service and other public institutions and regulatory bodies.
Anti Semitism has been used throughout history by those in power to provoke an “us vs. them” mentality, leading to today's establishment still sanctioning and allowing Qanon on major media platforms, provoking and agitating terrorist attackers from the far-left
and the far-right.
Those in power in fascist regimes allow and encourage mistrust in the mainstream media, while the long-tail niche political and interest groups keep people separated from each other, who each live in their own custom realities while the real elites continue to dominate and increase their power.
With each bubble framing realities based of identity, race, class, nationality, or even subculture special interests like alternative medicine and “gamer bro” culture, so that when they interact in real life or online, they are speaking past each other because they don’t even agree on the basic principles of how they view society.
The Fatal Flaws of Living in a Fantasy
While the main flaws and weaknesses of Fascism remain the same, they are in-fact exacerbated by this new hybrid model. It’s main weakness is the very fact that it is motivated by weaknesses, fear and greed - rather than true strength, self-confidence or heroic benevolent power, as their adherents like to believe.
A misconception of fascists themselves that it is based on strength, when it is actually based on weakness - even when the driving force is greed rather than fear. Libertarian fascists want to extract labour and materials at cheaper prices, while inflating their own asset values.
In other words; international financiers with little allegiance to any country. Ironically the very type of people who Conservative fascists
claim to be opposed to.
Fascism claims to make society more successful, but it actually accelerates the destruction of the culture, country or people, rather than preserving and conserving it, because it betrays a fundamental weakness of insecurity. Competitors and rivals can easily see through the charade of and take advantage.
If anything does the exact opposite. Russian and China are clearly goading Western nations into becoming more divided and totalitarian, as they themselves benefit from becoming more Liberal and open and reap the competitive advantages that brings. See Kraut’s excellent video about Trump on China
as an example. Keynesian investment
in the country and people, giving workers more rights, opportunities and a more bargaining power is what makes a country successful and innovative, rather than the faux Keynesian policy of giving kickbacks to corrupt officials for government contracts and widening inequality by supporting the already rich, rather than the ordinary people.
Who Benefits in This Memetic War?
Who is going to war with who? Who is winning? A modern adage is that tankies are just fascists because of their support of authoritarian proto-fascist leaders and regimes who often claim to be Communist.
But from my experience talking to actual fascists, they crave a more multi-polar world where other strong leaders rise up as competition and form alliances with dictators.
So to me, it looks like Fascists are the real Tankies; wishing our enemies be stronger and wanting to accelerate towards race war or civil war that weakens the society.
Not only did Donald Trump have knowledge of Russia allowing ISIS bounties on US troops and withhold that from the public while courting Putin, I have personally heard white supremacists backing extremists Islamists in Discord servers.
Trump jumped to the defense
of the people who put a 17 year old with a gun against civil rights protesters and assumed the intent before saying that the outcome should be decided by the legal system.
They share common values and beliefs like Anti Semitism, accelerationist end-times fantasies, patriarchal traditional values and a fear of outside progressive cultures. In fact modern extremists white supremecist groups share recruitment and terrorist strategies and tactics with militant islamists.
You could argue that it was inflicted by Russian or Imperialist propagandists onto the German people in order to take control of larger areas of Europe after the destabilisation of war.
Hitler and Stalin came to a non agression truce called The Molotov–Ribbentrop Pact
, which as was a secret non-aggression pact between Nazi Germany and the Soviet Union that enabled those two powers to partition Poland between them.
The pact, signed in Moscow on 23 August 1939 by German Foreign Minister Joachim von Ribbentrop and Soviet Foreign Minister Vyacheslav Molotov was officially known as the Treaty of Non-Aggression between Germany and the Union of Soviet Socialist Republics.
They divided Poland under the banner of fighting “Polish Fascism” nearly a century ago with both sides ultimately lying to their own people about spreading freedom while being authoritarian to their core and being able to blame “the other” as being the cause of all their problems.
But these days fascism seems to be a rogue meme
that no longer serves any particular group. It is pathologically damaging to any society that it happens to grip.
Even the aforementioned Libertarians and accelerationists who think they are benefiting are only temporarily gaining by market price volatility. They ultimately lose through the blowback effect of the whirlpool they create.
Psychopathy, Alienation Nihilism and Insecurity
It is well established
that Fascist dictators are driven by psychopathic characters and tendencies. They either don’t care about the truth, or disregard it if it’s not convenient to their narrative.
In totalitarian despotic societies
facts are reversed. As George Orwell proclaimed throughout his writings; “War is peace. Freedom is slavery. Ignorance is strength.”.
Similar to how authoritarian Starlinist Communists harnessed people’s alienation and tricked them into thinking that it’s possible for the state to fully decommodify everything without having markets, money to account for things
, domination or hierarchy or try to convince people that a revolution is just around the corner
But of course, a council representative is still the head of an organisation, for all intents and purposes, because they wield executive power over others, even if the name has changed. Markets are emergent properties when groups of humans want or need a certain commodity when it becomes available.
But while both Communist and Fascist ideologies are based on lies that harness peoples alienation, fear and envy, Fascism is also especially to the weak. It is attractive to those who want to be strong again (or were never to begin with), or those who want to have a strong leader to help them.
Fascism betrays to others the inherent weakness. Like the insecure kid in school who lashes out - others around can see that it is because of their own insecurity which makes them appear even weaker. Fascism is a psychopathy driven by insecurity.
When people become so absorbed in an ideology there is a phenomena of people to self identify as an actual ideology? This produces a phenomena called Identity Protective Cognition
, where people's self worth becomes attached to a belief system or ideology. So that when new information contradicts their worldview it is seen as an attack on the person themselves.
Therefore irrational, emotional quick fix thinking is the default when there is too much pressure and they feel attacked. They no longer use their slow effortful reflective thinking. (See Daniel Kahneman - Thinking, Fast and Slow
This approach has parallels in evolutionary biology, in which a central issue is the ability to adapt to changing environments. Competency - over-competitiveness in management causes chaos which STOPS hierarchies of competence. (Insert video clips of Sapolsky on Chaos vs Reductionism etc. timestamps linked).
Fascists try to reduce variability in culture and outcomes - causes weakness of less adaptability - because as Sapolsky explains, the variability is not just noise in that type of system CAS (Complex Adaptive Systems
) - the variability IS the system
. It is fractal and scale free. The noise and variability is an intrinsic part of the system.
But the system doesn’t function properly when the agreed-upon parameters that individuals believe to be true aren’t universal enough to have any form of group coherence. Birds and swarms
of animals can produce amazing complex phenomena, which are greater than the sum of their individual parts. There is a “network effect” once a certain threshold and certain conditions and rules are met.
These rules can be very simple, like repulsion or attraction, or staying a certain distance apart while traveling in a similar direction, but collectively they create patterns that emerge with complexity
and I dear say, a certain amount of beauty
So what happens when millions of people are being brainwashed and misled by cults that are leaving them with a reduced ability to make decisions?
Giving them shit-for-brains just so that some rich people at the top can pay a few percentage less tax? That is the sign of a deeply sick system that cannot continue to function effectively. It is sick on so many levels.
Emergence, Complexity and Human Evolution - A Social-Biological Analysis
The problem with viewing the world through only one lens of analysis (or bucket of knowledge) is that you can fall into unnecessarily reductive thinking. (Sapolsky clips)
I describe myself as a philosophical anarchist. Which does NOT mean I want total chaos and disorder - it means I want the optimal solution to emerge - including the influences and experiences from the bottom-up.
I also think that a bottom-up (or anarchist) lens of analysis is necessary for society to run cohesively in an optimal state. If it is repressed it distorts the overall picture of reality for everyone - similar to a CEO that doesn’t listen to employees and workers on the ground.
I interpret as constantly holding authority to account - to justify its existence and reason for dominating others. I also believe it is every citizen's responsibility to hold authority to account. This would be necessary under ANY economic system or society.
Anarchists also believe in stigmenric, rhizomatic action to make the world better, organically, not from a top-down authority, which fascism seeks to instill on society.
Human beings are collectively parts of a bigger chaotic but stable system known as a CAS (Complex Adaptive System
). CAS’s are chaotic systems that can reach periodic steady states of equilibrium
As Professor Sapolsky explains, humans uniquely exist with a mixture of both communal and individualistic tendencies; known in the scientific world as Tournament vs. pair bonding
All the evidence suggests that this tendency has greatly improved our success as a species. But those tendencies distorted too far one way or another lead to pathologies and the worst collective misdeeds and wars.
Because as Professor Sapolsky also explains in his brilliant lecture series (which I have condensed the pertinent parts of into a 4 part
YouTube video) about CAS; the signals coming from the randomness is being suppressed or repressed, it interferes with the functioning of the system.
Pressure in the system makes the patterns more complex but at a certain point
of increasing pressure in the complex system, it stops being linear and the doubling of patterns and periodicity totally stops. Order completely begins to break down because of the butterfly effect.
Fascist regimes fettishise order and rigidity but in a complex adaptive system, the noise IS the phenomena, not a byproduct to be discarded, ignored or repressed.
The majority of people on the right genuinely want to help society by bringing order, using top-down draconian measures if necessary. Whereas the left generally wants to help society by proactively building from the bottom up.
I think both of these approaches are necessary to be balanced properly for a healthy functioning society to emerge.
It seems our tendency to harness both traits and to focus intently on one or the other is our greatest collective strength, while also being our greatest weakness.
And similarly, on an individual level I believe our greatest strengths and weakness are the fact that our brains work efficiently by categorising information to filter out the unimportant bits that slow us down.
As the book by Daniel Kahneman - Thinking, Fast and Slow
, brilliantly explains, slow deliberate, consideration thinking takes energy and time, so our brains developed filters which come out as biases. This is an inherent weakness of the human brain.
Now imagine the butterfly effect on the life of just one person who is influenced by the brainworms of QAnon cults or conspiracies
which distorts their internal models of the world which they use to filter information about the world
The sad and shocking stories on forums like QanonCasualties
show the devastating effects on their close friends, family and work life - amplified by their ever increasingly disconnected lives. (insert Flat earther clip - zoom in on idiot rolling head
Now scale that up to the level of a whole of a society, a country, or the world? This is a collective madness to cope with and avoid the reality facing us as a species.
Only collective action with agreed basic facts to work from will do to avoid the total descent into actual chaos and destruction.
TLDR; Conclusion and Final Thoughts
In this essay I will have put forward the case for the following four key arguments being true and I have present supporting evidence to explain the logical reasoning for why our current definitions need updating and the threat levels reassed, from a non-hysterical but critical perspective. The overall claims I made are:
- Modern Fascism has taken over right-wing populism and bears all the hallmarks of early 20th Century Fascist ideologies.
- The ideology has two main reasons to exist, and two distinct audiences which both have a symbiotic, pathological relationship with each other.
- The main flaws and weaknesses of fascist ideology remain the same as ever - that fascism is motivated by irrational fears, greed and self deception.
- Modern Fascism has major unforeseen damaging consequences for individuals, governments, organisational dynamics, and society at large.
This reality is something I think a lot of fascists, ultra-nationalists and people who have been influenced by the propaganda know deep down on some level already - that they are avoiding the realities of pandemics and ecological harms of ignoring science and reality as it is.
They ignore it because fantasies are simpler to understand. And a narrative based on fear of the other is a simpler way to to process a complex world.
It is also attractive to the part of us that is drawn to conflict and drama - that hunger for something genuinely interesting to happen.
But I would argue from my experience that the beautiful complexity of life in all it’s shades of grey is much more interesting, fun and genuinely fulfilling to understand and engage in, even if it might be harder to deal with and even harder to explain
I believe doing so is also vital for the very survival of our species - we can no longer afford to live in a fantasy, we need to collectively take responsibility for the world as it exists in reality.
Thank you to my two Patrons: Carmen Jongepier E.V. Roske Original Script on Patreon
Start trading Bitcoin and cryptocurrency here: http://bit.ly/2Vptr2X IMPORTANT!! This method only illustrates how mining works. You will not make any money f... Crypto-ML is pleased to announce the release of an enhanced Bitcoin Auto-ML machine-learning model. One of the key advantages to machine-learning based tradi... Get our free Bitcoin course here - https://chrisdunn.com/free-bitcoin-course This Bitcoin basics video series will explain Bitcoin for beginners. You'll lear... http://bitcoins-millionaire.com/ What is Bitcoin You might be already aware of this NEW digital currency known as BITCOIN, you might have heard it from the n... In this quick tutorial, we'll see how price prediction of Bitcoin or any other cryptocurrency can be done with LSTM networks in Python using Tensorflow and K...