5 min read 0

Breaking the Chains of Co-Dependence: China’s Threats and America’s Path to Sovereignty

The narrative around U.S. tariffs on China often casts America as the instigator, with some—particularly on the right—labeling China’s retaliatory measures as near acts of war. This view misses the core issue: our reliance on China is a self-inflicted wound, a toxic co-dependence that has eroded America’s sovereignty. Beyond trade, China’s aggressive acquisition of U.S. farmland, its growing influence through BRICS, and its systemic theft of intellectual property (IP) and personal information threaten our national security and independence. Rather than leaning on global orders to counter these threats, the U.S. must resolve its dependence through self-reliance, prioritizing principles over associations to avoid entanglement in a flawed global system. China’s strategy has never been about mutual benefit. Drawing from Sun Tzu’s The Art of War, it seeks to weaken…
7 min read 0

X’s Progress in Countering Fake Accounts and Astroturfing: Addressing an Inherited Challenge

Introduction The social media platform X, formerly Twitter, has long grappled with the pervasive issues of fake accounts and astroturfing—coordinated efforts to manipulate public opinion by mimicking grassroots support. These challenges, deeply rooted in Twitter’s pre-2022 era, have drawn scrutiny for undermining authentic discourse. Since Elon Musk’s acquisition of the platform in October 2022, X has implemented measures to address these problems, with mixed results. This article explores the progress X has made in countering fake accounts and astroturfing as of April 2025, provides background on the inherited issues from Twitter, and examines allegations of collusion involving Twitter’s former staff and owners. Background: The Inherited Problem of Fake Accounts and Astroturfing When Twitter operated under its original ownership, fake accounts and astroturfing were significant concerns, driven by the…
6 min read 0

How Online Scammers Are Eroding Dating App Profits—and What Can Be Done About It

Online dating has become a cultural cornerstone, connecting millions in search of love, companionship or just a spark. Yet, beneath this digital romance lies a growing threat: scammers who exploit these platforms for profit, leaving both users and dating app companies reeling. The financial toll of these fraudulent activities is staggering, and it’s hitting dating apps where it hurts most—their bottom line. This article explores how scammers are undermining the dating industry, backed by recent statistics, and proposes robust solutions involving identity verification, anti-fraud measures, and streamlined reporting to protect users and restore trust. The Financial Fallout of Scams on Dating Apps Romance scams have surged in recent years, with scammers crafting fake profiles to prey on unsuspecting users. According to the Federal Trade Commission (FTC), consumers reported…
10 min read 0

Positive influence, my story in return…

I have reached out in gratitude and gotten a response back from someone I looked up to during my struggles in my early 20s-30s, after my father had disappeared intentionally. In this letter back to their response “Good to Hear from You Jason” and their wish to read more as I offered, I wrote about my story after their influence seeded in me and continues to take shape and form. I share this here as I never been prompted to take the time and write about my young adult life and the recent challenges that got me to where I am today. And I think it important to share to others, if not for inspiration, to seed a curiosity  for a deeper understanding: Hi [name omitted], Shortly after…
3 min read 0

The Dangers of Joining the CIA: A Legacy of Misplaced Power & Selfish Ambition

The Central Intelligence Agency (CIA) has a long and complex history, dating back to the post-World War II era. Established in 1947, the CIA was created in response to the emerging threats of the Cold War, including the arms and space races. However, from its inception, the agency has been plagued by a culture of misplaced power and selfish ambition, which has led to a legacy of danger and deception. One of the earliest and most influential operations in the CIA’s history was Operation Paperclip, a secret program that recruited former Nazi scientists and engineers to work for the United States government. This operation set a precedent for the CIA’s willingness to compromise its values and morals in pursuit of power and knowledge. By recruiting individuals with questionable…
4 min read 0

Got Swedish Fish, Godzilla? Social Media Scams at Large …

[Edit: Fake Legal Front Section, Victims Accounts Used to Advertise Their Legal Scam to those Already Scammed: 2025-03-10] In recent months, a surge of online scams has been targeting Facebook users, with scammers posing as representatives of the social media platform itself. These scams aim to phish users’ account credentials and in some cases, even impersonate lawyers from legal firms to extract more money from victims. My recent investigation has shed light on the tactics used by these scammers including their approximate operation locations, and the alarming rate at which they are operating.   The Scam: A Closer Look The scam typically begins with a fake profile claiming to be from Facebook, reporting user violations and threatening to suspend or terminate the victim’s account. The scammer then contacts…
2 min read 0

What is Man In The Middle Shadow Banning?

Man-in-the-Middle (MITM) Shadow Banning Man-in-the-middle (MITM) shadow banning is a theoretical or advanced form of shadow banning where a third party—such as an internet service provider (ISP), a network administrator, or even a government entity—intercepts and manipulates data between a user and an online platform without the platform itself being aware. How It Works: Interception: The attacker or intermediary intercepts a user’s requests before they reach the intended website or social media platform. Modification or Filtering: The attacker selectively blocks, modifies, or delays the user’s posts, interactions, or visibility while making it appear to the user that everything is functioning normally. Stealthy Execution: Unlike traditional shadow banning, where a platform itself hides a user’s content, MITM shadow banning is external. The platform may have no direct involvement or…
4 min read 0

The Case for Competency in Public Speaking: A New Standard for American Politicians?

In the landscape of American politics, the authenticity and conviction of public figures are increasingly under scrutiny. There’s a growing sentiment among the public that politicians, often seen as scripted “mobots,” lack the genuine ability to convey their true beliefs or engage in unscripted dialogue. This situation has sparked a debate on whether public office holders should be required to demonstrate their competence through a public speaking exam, specifically one that assesses their ability to communicate without reliance on scripts or teleprompters.   The Current State of Political Discourse Contemporary political speeches are often meticulously crafted by speechwriters or, more recently, supplemented by AI tools like GPT. While these practices ensure a polished delivery, they also allow powerful special interest groups to exert significant control over political messaging.…
4 min read 0

The Erosion of Critical Thought in the Age of Overtime: How Work Hours Shape Our Cognitive Landscape

In today’s fast-paced world, where the demands of work often extend beyond traditional hours, the implications for family life, media consumption and societal discourse are profound. As work hours increase, the time and energy available for critical thinking diminish, transforming the way families engage with news and information, leading to a landscape where entertainment overshadows education, and where news can morph into what we traditionally recognize as yellow journalism. The Impact of Extended Work Hours Extended work hours have a direct correlation with decreased engagement in family activities that foster critical thinking. Research by Greenhaus and Beutell (1985) highlights how work-family conflict can result in reduced family interaction, where family members are too exhausted or preoccupied to engage in meaningful discussions or educational pursuits (Greenhaus & Beutell, 1985).…
6 min read 0

The Good, The Bad[ass] and the Ugly of Flabby Hoffman’s “Colony Collapse Disorder Vol 1”

Flabby Hoffman’s book “Colony Collapse Disorder, Volume I” published on November 24th, 2024 [Three Volumes published concurrently around then.] presents a satirical and highly critical perspective on American politics, culture and society. The central thesis revolves around the idea that a cabal of wealthy elites, referred to as “Ameri-Nazis,” has been secretly manipulating events since the end of World War II to establish a crypto-fascist government in the United States, culminating in the potential rise of a totalitarian Fourth Reich. The author, Flabby Hoffman uses a sarcastic, irreverent and often vulgar tone to deconstruct historical events, political figures, cultural trends and media narratives. The Good (The Thought Provoking Premises): The Fourth Reich: The book posits that the collapse of Nazi Germany wasn’t a defeat but a strategic retreat.…