Advertisements

Cyber-Defense For Democrats! Security Measures For Midterms.

#CyberDefenseForDemocrats

Hello, world!

We have received numerous requests for a focus piece regarding cyber-defense for Democrats, especially right now as we are going into the midterms. In it is an introduction to a number of the techniques we can use to defend ourselves going forward. Knowledge is power. Pass it on.

Regular readers of Millennial Democrats will not require a lot of explanation as to how and why the threat of Russian hacking is real. We have been up against it for years. The time has come to soberly and objectively assess Russia’s cyberwarfare capabilities, and examine how we plan to fight back.

In 2016, America was caught off guard and we got a bloody nose. Guys like Roger Stone’s buddy Guccifer 2.0, or the guys in Fancy Bear pulled a fast one, to be sure.

But it’s important not to overstate the case. It is not accurate to attribute cybernetic omniscience to the Russians and their zany bots and fake news.

They had the element of surprise back then. Most people had no idea what they were doing(and rolled their eyes at those who were trying to warn them, but that’s another subject). These days things are very different.

Regardless of the lies of the great orange malignance, America knows the Russians are out to get us. Trump is sticking his head in the sand on this and will do nothing to help us, so we’re going to have to learn to help ourselves, and each other.

It’s too bad we’ve got no national leadership on this, but it is what it is. We’ll get by on our own.

In starting out, the most important thing to keep in mind is this: Hackers rely on our mistakes, and mistakes are most often made when we don’t know we are making them. They need to catch us off guard, and their job is to find creative ways to use their tools to get us to slip up.

The first place a smart hacker will look is outside the box, so to speak. They’re always looking for ways to burrow in that you wouldn’t think to look for.

Employing a given system, be it a human being or a PC, for a purpose it wasn’t designed for is what hacking means. However, if you’re careful, neither you nor your computer will end up thus employed. It’s all about being careful.

Hackers are clever, be they Russian or from elsewhere, but they are far from invincible. We’ve already stopped a number of Russian cyber-assaults directed at Democrats this year, such as the ones aimed at our Claire McCaskill.

Without the element of surprise, hackers have many limitations. It’s not that easy to brute-force open a website. Just ask these guys:

This is the IP address of a hacker, purportedly from Beijing, who is always doing his best to get in here. Have at it, pal.
This is the IP address of a hacker, purportedly from Beijing, who is always doing his best to get in here. Have at it, pal.

Basic cyber-hygiene techniques would cut down on more than 80 percent of cyber attacks and cyber thefts, according to Herbert Lin, senior research scholar for cyber policy and security at Stanford University’s Hoover Institution. It will benefit us to learn a few.

There is a great deal of white-hat(ethical hacking) work that can be done to defend America in this realm, and most of it has to do with how careful we are.

We repeat- It’s all about being careful. This cannot be repeated too often.

Every technique that hackers use, be they DNS attacks against home routers, phishing emails, malware, botnets, or what have you, is ultimately something we can avoid.

In this piece, we’re going to talk about a few common mistakes made by end-users(that means us, the consumer) and how they are exploited by criminals. We’re also going to talk about some of these cyber-hygiene measures and assign them three rules of thumb.

  1. Don’t open strange emails.
  2. Don’t click on strange links.
  3. Don’t accept chat messages from people you don’t know, particularly on Facebook.

Before we get started, think for a second about all your other social media accounts. Are they just as secure as your Facebook or Twitter? Make sure they are! That’s the first place a hacker will go to collect more data about you. You’re particularly vulnerable to having your account on the ones you don’t often use pried open.

As an aside, this is also why you don’t want to use the same passwords for everything. Passwords are obviously critical, as somebody who’s got them has got all your information at his fingertips. Be careful!!

A great deal of a hacker’s job revolves around getting the passwords of their victims. Their most popular tools are all various ways to apply “spear-phishing” hacks, designed to steal passwords and personal data. The unlucky “phish” who opens one has become a victim and is now open to all kinds of trouble.

There are all kinds of ways to go spear-phishing. A brand new one showed up not long ago when U.S. government agencies recently received letters via snail mail.

They came with CDs inside, and they contained malware, according to cybersecurity researcher Krebs on Security. The infected discs were accompanied by a Chinese-postmarked envelope and a “confusingly-worded” letter.

That is just like what they do on Facebook. Hackers make links that look like YouTube videos and various other innocuous things, and they write you some goofy little messages. They look like some cute little harmless thing. Actually, they’re viruses. And you’re hit.

One example that all readers of this blog will vividly recall took place on March 10, 2016, when the first volley of malicious e-mail messages hit the inboxes of thirty people who were closely associated with the Hillary Clinton campaign. Inside them were links that were actually viruses, like worms on a hook.

Nearly all of them were failures. All but one, actually. But one was enough.

Within nine days, a horrendous amount of critical data had been stolen and passed along to Wikileaks, to be strategically released in a way they figured would hurt us. It did.

Those leaked e-mails, in which Debbie Wasserman-Schultz was seen to be fussing over Bernie’s lack of ability to fill out campaign finance forms correctly, were spun up into a narrative that Bernie(who lost by four million popular votes) had been cheated.

Bernie or Bust bought it, there were riots in the streets of Philadelphia, and a rift was torn in the Democratic Party that still has yet to heal.

All of that was made possible, with just a few phished passwords.

To combat phishing is to make sure everyone knows how common and damaging these attacks can be. Everyone should keep their guard up when checking emails, and they should report any email they find suspicious.

It’s necessary to point out here that Facebook phishing in particular is horrendously easy. They can hack you right through your chat box. We recommend in the strongest possible terms that you put as little of your personal information as possible on Facebook.

They save everything. They’re like a gigantic data collection firm, and they’ll sell your personal information to companies like Cambridge Analytica who will use it to hurt us all.

Why risk it?

Facebook presents about a million added vulnerabilities to all of us that use it. When Edward Snowden was asked what to do to keep your data safe on that platform, his response was, “Delete your account.”

We can’t recommend that, as Facebook gives us access to 2 billion people, but we can recommend this much. If people you don’t know send you strange messages on Facebook, don’t accept them.

Facebook was made to brief congressional aides just last week Tuesday about the newest outbreak of anti-Democratic disinformation, which is already said to be evolving into something more sophisticated. Excerpts from that briefing are shown below.

“We are looking at just some of the malicious material that already may be circulating or will be released before the midterms. It also bears repeating that we know the campaign of Sen. Claire McCaskill (D-Mo.) was targeted.”

Cyber-intelligence experts see this as being major, and with clear reason.

Moving on, it isn’t only Facebook and social media you’ve got to be careful with. Websites too are vulnerable.

Anecdotally, the webmaster of this site has seen hackers from all over the world try to take us down, from Beijing, China to Lviv, Ukraine, from Adelaide, Australia to Beauharnois, Quebec. They use all kinds of tricks, but they’ve never gotten in and they never will.

This is not because I’m a cyber-genius who speaks binary code, but because WordPress is awesome. Sucuri, the plugin that keeps safe all of us Millennial Democrats, is likewise excellent. They care about their clients and they hold the same liberal values sacred that we do.

WordPress users should strongly consider using Sucuri, not least for the reverse IP trace it automatically performs. This has the benefit of letting you know a lot more about who’s trying to hack you. Sometimes it will tell you everything.

Once a flower store owner from Adelaide, Australia tried to hack us. By using a reverse IP trace, Sucuri let us know who she was as soon as she had done so. Then we went to a site called WhatismyIPaddress.com, put it in, and voila.

We were able to get the name of her business by looking at the name of her domain. We then used that to look her up, and jackpot. We found the store’s address, website, and owner. We also found far-right garbage smeared all over her life.

I could put her on blast right here with a screenshot like this one:

My (possibly) Chinese friend, saying hello to me again. Hi, buddy. Change your ways!
My (possibly) Chinese friend, saying hello to me again. Hi, buddy. Change your ways!

Then the hunter would rapidly become the hunted.

Luckily for her, I’m not that mean. But the next guy might be. It’s a dangerous game for newbies (noobs- learn your hacker-ese) to play. It’s easy to run into trouble.

Change your life, would-be hacker flower store owner! Mend your wicked ways, before it’s too late.

Speaking of WordPress, using the two-factor authentication feature they offer as part of their platform is another good idea. This is a highly effective security measure and is available for Facebook, Gmail, WordPress, and many other major platforms.

Using this feature means a second device’s input will be required to access email accounts or websites on new computers, usually by prompting you and sending an SMS code to your phone or whatever. This can prevent scammers from accessing compromised accounts.

In addition to good cyber-hygiene, which amounts to common sense, caution, and our three rules of thumb, there are some tools we can use to make our online experience safer still. You may find this necessary, from time to time.

A VPN, or virtual proxy network service, will allow you to register as being somewhere that you’re nowhere physically near. It allows you to safeguard your IP address. You do not want hackers to have your IP address, as it can be used to hurt you in a bewildering multitude of ways. This is probably the biggest reason to use a VPN.

Guccifer 2.0 recently made a mistake and forgot to turn his VPN on, and we connected him to an IP address connected to Russian intelligence. Now his whole identity is blown because he didn’t use his VPN.

We strongly recommend getting one of these, specifically IVPN. They take protecting their customers super seriously and they are located on the Rock of Gibraltar. That fortress strikes me as a good place to keep anything valuable.

HotspotShield is another good one, and also NordVPN. There’s a lot of them; shop around and find one that’s right for you. We feel it’s worth repeating that they are a very good investment.

Additional tools include TOR(The Onion Router), which offers a former naval encryption system that we can now all use. Tor takes all your internet traffic and routes it through its own network, providing total anonymity.

The DuckDuckGo browser, which Tor employs, is good to know about also. It has a number of different features that keep you safe, including a “Flame” feature that burns up all your cookies in a second. Pretty cool.

We suggest you learn Linux, because it is more secure, and 99% of viruses are designed to attack Microsoft products. 

Russian hackers have been targeting home routers of individual people en masse, using what is called a DNS attack. We suggest you check your home router often, using the website Secure Router.

Secure Router is a great free feature that allows you to check if your router has been compromised with the click of a button. Doing this regularly cannot hurt and takes less than a second.

In closing, it’s important to emphasize that this is an introductory piece, and not meant to be totally comprehensive. These techniques will do a lot to keep you safe, but nothing is a substitute for doing your own research.

So far, this has not been the kind of cyber war imagined in the past, with nations taking out each other’s power grids before a mass invasion, although Russian malware continues to turn up in our power stations.

It’s more like a new type of proxy war. Like it or not, against our will, we have begun a new phase of the Cold War, on digital battlefields where you meet the enemy directly, but behind a screen.

Now, just as then, there is a need for deterrence, to defend the nation and hopefully prevent a further escalation of tensions. There is more at stake than we can even put into words. We need to be ready.

There are bigger dangers here than the usual America vs. Russia, liberal world order vs the new world order that the extremist crazies keep screaming that they want kind of thing. This is different completely.

One superpower actively destroying the democratic process of another is new and very dangerous, especially since Russian destability tactics rely heavily on disinformation and a systematic devaluing of the truth.

If nothing is true, everything is permissible. And then our entire species starts down the road to guns and roving mobs.

Disinformation and a post-truth reality are unacceptable, and so is Russian interference into our election, regardless of how many Fox News devotees will slobberingly say otherwise.

We have only got one party ready to defend our democracy from the foreign agitators’ who are trying to destroy it, and that is the Democratic Party. Accept no substitutes.

Due diligence is the key. Hackers will look for things you might be neglecting. Get in some good habits and keep yourself alert, because it all comes down to one thing.

If you are politically active as a Democrat, you are not paranoid. You are a target. Defend yourself.

Advertisements

Russia’s Zapad War Games- A Ukrainian Warning

Russian aggression is back on the front page.

The Russians have got tens of thousands of troops moving toward the Baltic as these words are placed on paper, under the legal pretext of “strategic command exercises”. They’re calling them the Zapad War Games. They shot some people with a rocket today, and inflicted three casualties, at these “games”. Image result for zapad war games

The whole project was totally unexpected, and done with no transparency. This met with worldwide condemnation, but as always, Putin just ignored it. 

This is all closely connected to what’s been going on over here since 2016. Donald Trump and his campaign connections with Russia have been carefully examined from the beginning of his presidency. From the Steele dossier to the confession of Donald Jr, evidence of collusion is ample between the Trump campaign and Russian operatives. Image result for steele dossier pee tape

Image result for tulsi gabbard
Tulsi Gabbard

Wikileaks managed to make a deal with a mole (most likely then-junior chairperson in the Democratic Party last year, Tulsi Gabbard) to attain leaked emails that caused the resignation of Debbie Wasserman-Schultz days before the convention. Then they used fake identities to disseminate propaganda to U.S. voters over social media sites like Facebook, which turned over all its advertising records on Russia to Robert Mueller’s team last week.

The problems we’ve been having with Russian hackers are not as new to other areas as they are to us. In fact, they’ve been going on for more than ten years. The trouble got started over an old war soldier, just like in Charlottesville. The Bronze Soldier attacks may be the first suspected state-backed cyber-assault on another nation, in this case Estonia

Image result for bronze soldier of tallinn
Bronze Soldier of Tallinn

The Bronze Soldier of Tallinn was a statue of a Red Army soldier in Estonia’s capital, Tallinn. It was viewed by Russians as a symbol of Soviet deliverance from Nazism. To many Estonians, however, it was an eyesore of Communist oppression, a miserable period that lasted more than fifty years. They decided to remove it from the center of town, and move it to a military cemetary on the outskirts. The Kremlin threatened trouble immediately, and they meant it. 

Little Estonia, for all it lacks in acreage, is a world leader in the field of internet freedoms. They are one of the most heavily wired nations in the world. For this reason, one can only imagine how disruptive and traumatic it was, when the website of Estonia’s largest newspaper was brought crashing to its knees, with unprecedented speed, under the weight of a wave of Internet traffic it couldn’t support. As with America’s 2016 election, there was no way to legally prove Russia was responsible, but everybody knew. Image result for digital security

One Estonian government official told the BBC that evidence suggested the attack “was orchestrated by the Kremlin, and malicious gangs then seized the opportunity to join in and do their own bit to attack Estonia”.

Image result for ukraine russia conflict
Russian-Ukrainian Conflict

2007 marked the beginning of a new and troublesome tactic. For the hostility of nations to find its mode of expression virtually is new. It is a developing situation worldwide, but the bulk of it until last year had always taken place in Eastern Europe. In order to understand the context of this struggle, it is necessary first to examine Russia’s strained relationships with most of its satellite states, particularly Ukraine.

The Kremlin has always considered Ukraine to be both a rightful part of Russia’s empire, and an important territorial asset. It presents a strategic buffer zone between Russia and the powers of NATO. It allows them a highly profitable pipeline route to Europe, and it is home to one of Russia’s few warm-water ports. For all those reasons, Moscow has worked for generations to keep Ukraine in the position of a submissive smaller sibling. It was the largest of their satellite states, and the one it took most effort to control. A great deal of bad blood on both sides remains.

Oleksii Yasinsky is the head of a company called Information Systems Security Partners, the occupant of an unassuming building in Kiev. Under his leadership, they have been able to chronicle a timeline of intrusions by a whole galaxy of hacker groups, with names like Guccifer 2.0, Petya, and the most feared of all, Sandworm

Image result for sandworm hackers
Sandworm

This organization,  which uses the nomenclature of Frank Herbert’s Dune as code names, has been the focus of Yasinsky’s interest since the first cyber- attack on Ukraine, a country that has been used as a test lab for new types of ways to wreak virtual havoc. In December of 2016, Yasinsky was watching the movie Snowden when his building lost power- along with the rest of town.

Image result for first cyber attack on ukraine
Ukraine Cyber Command

The lights went out in areas all over Ukraine that night. The Russians managed to shut off huge sections of their power grids, using the Stuxnet virus- the world’s first cyber weapon. It was announced in early September that more than a hundred United States power grids have been infected in exactly the same way.

Image result for us cyber command
United States Cyber Command

Ukraine, however, is not alone. Numerous cyber attacks in Europe, particularly among former Soviet satellites, have been blamed on Russian-linked groups, many of an extremely astonishing nature. The lines between physical and virtual reality have blurred. Our own United States Cyber Command must be equal to the task of managing this. The consequences of their failure would be catastrophic. 

The Syrian Civil War is another place where we have had to fight the Russians time and again. Contrary to the party line, we were not all over there to fight ISIS together. But everyone thought we were, for years, because of Russian disinformation. Most Americans just didn’t seem to care enough.

Russia has proven its ability to use automated systems to inflict real harm in the world, as in their attacks on the Estonian and Ukrainian power grids. They could hurt us very badly if they wanted to.  

In 2008, Georgia too found itself at war with Russia, and suffered similar abuse.

In 2015 France’s TV5Monde broadcaster was taken off air in the middle of a broadcast. Its systems were all but annihilated.

Later the same year, another Russian hacking group calling itself APT28 perpetuated a massive data hack, in Germany’s lower house of Parliament. 16 gigabytes of data were stolen. After that, Germany’s head of domestic intelligence began speaking of a “hybrid” Russian threat” to the September 2017 elections in which Angela Merkel is seeking a fourth term in office.

The list just kept on growing.

Nigel Farage, the United Kingdom Independence Party leader responsible for the Brexit agitation, was intimitely connected to both Putin and Julian Assange, the driving force of the Russian propaganda outlet Wikileaks. Brexit represented the greatest coup ever scored on the United States by Russia, until Donald Trump’s victory in November later that same year.

The month prior, another cyber attack, this time on Bulgaria in October 2016, was described by the country’s president as the “heaviest” and most “intense” to be conducted in south-eastern Europe.

Image result for russian cyber attacks on europe
Macron blows whistle on Russian election hack

And shortly after Trump’s inauguration, the French presidential election between now-President Emmanuel Macron was hacked and tampered with as well, on behalf of the virulently anti- Semitic Marine Le Pen, whose entire campaign was financed openly by Putin.  

Cyber operations constitute a new situation for the nature and future of war. It is reflective of a growing worldwide trend among military strategists to consider cyberspace through the lens of the Clausewitzian spectrum of war, which is to consider it “the continuation of politics by other means.”

That newness is also why cyberspace constitutes so many new strategic difficulties, particularly as it is being deliberately used as a weapon of war by aggressive and imperialistic powers such as Russia. This state of affairs exerts a destabilizing effect on international security, and complicates attempts to work together.

Cyberspace has become a new sphere for great powers to carry out conflicts directly among each other (and any other power for that matter). Previously, their behavior was frozen at a certain level due to the strategic nuclear stalemate. There was a clear limit to how far great powers could go. Great care was always taken, to remain below the threshold of an armed attack and use of force. Instead, conflicts were carried out indirectly, through proxy wars in distant lands. 

However, virtual reality and the revival of the Cold War has given us a new type of proxy, one that brings us much closer to direct conflict with one another. Moscow believes there is a constant and unending  struggle within “information space”.

The manner in which they keep on pushing our buttons and getting away with is has empowered Putin tremendously. One is reminded of the way Hitler was ignored at first. In any case all this suggests that the Kremlin will continue to employ cyber in ways that U.S. decision makers are likely to view as offensive and escalatory in nature.

Moving forward, it’s likely this will have to get worse before it gets better. Our chance to catch it early passed us quietly by long ago.

Image result for russian cyber attacks on europe
Merkel Concerned About Russian Cyber Attacks

2017 is almost over, but we’re not out of the water yet. German Chancellor Angela Merkel is up for reelection on the 24 of this month. In the age of Trump and his slovenly brand of incompetence, Merkel is the de facto leader of NATO, and therefore the most powerful leader in the world. Her reelection is all but guaranteed on a level field of play. It is the opinion of Millennial Democrats that we can expect to see a great disruption next week, as Russia tries knocking her off her perch. 

Moving forward, it is necessary for millennial and all voters to understand that trying to make meaningful changes with Donald Trump in office and the Russians eroding our base all they can, will require fifty times the effort before we can even begin to hope they might succeed. We’re vulnerable right now.

Therefore, the first step is for us, the tech-savvy information generation, to start applying our skills toward finding ways to defend ourselves from these invasive and violating virtual infiltration techniques. We have got to protect ourselves, and we have got to learn to fight back. We need all the help we can get. Our futures depend on it.

Antisocial Media- Fake News, Facebook, and Russia.

The hounds of Robert Mueller are hot on the heels of Donald Trump. Headlines today read things like “Mueller Goes For The Kill” and “Mueller Closes In“, as the announcement came in that the focus of the investigation has honed in on Russian use of social media as a way to spread fake news against Hillary Clinton.

Russia’s effort to influence U.S. voters through Facebook and other social media is a “red-hot” focus of special counsel Robert Mueller’s investigation into the 2016 election and possible links to Donald Trump’s campaign ties to Russia, according to U.S. officials familiar with the matter.

The Russian Facebook campaign also seems to include the first evidence of Russian operatives attempting to organize actual political events on American soil, as opposed to just spreading fake news and memes around social media.

But Facebook was not alone. Twitter also allows for many ways to pay for your following. For example, comedian Joe Mande has just over a million followers. It sounds pretty good, until you read the bio on his site.

“twitter is trash, facebook’s the devil, i bought a million followers for like $400“. Wow.

The way that social media keeps score, is with Likes, Shares, and Followers. The most famous people have millions of them. However, not all of these accounts are real. Some of them are “bots”, artificial accounts created for the purpose of making a person look more popular and important than they really are.

Twitter Audit, a service that allows you to test the authenticity of your followers, was used in January by journalist Yashar Ali on Trump’s Twitter account. He found that 68 percent of his then-20 million followers were real. He’s at 37 million followers now but only 45% percent are real. Likewise, Bernie Sanders has an even worse score, at 39%.

A personal anecdote. The editor of Millennial Democrats was online alongside legions of others, out there for HRC from 2015 onward, every day, for many hours. Anyone who was there back then can tell you. It can be stated categorically that there was a tangible, palpable disinformation campaign going on. You would go into groups and talk to people, who were steadfast in their refusal to listen far beyond the bounds of reason or even fanaticism. These guys were professionals.

It was like they were getting paid per response. They all seemed to be equipped with the same list of hit points about Hillary Clinton. This became clear after a while because the very same slanders would be laid out every time, in sequential order. In many cases the wording was actually identical, although most took the time to switch about at least a thing or two.

It got especially bad during the last month of the Democratic primary, which was a very horrible time filled with chaos and division. During this time, we were savagely attacked. Anything we posted would be Reported as Spam/Abuse by political adversaries from both the far right and left. We were barraged with nasty messages and threats. One particularly rabid group of Bernie Sanders supporters told one of our contributors that they hoped she was gang-raped. The list is very long, and very sordid.

It was just like in Ukraine or Syria. We were actively being targeted, by foreign agents, for participating in our own electoral process. It was scary, and it was violating.

We had wanted to make our voices heard, and to make a difference in our own futures. Instead, we found ourselves on the front lines of a virtual battlefield, fighting the first skirmishes in this new kind of proxy war we were to be fighting with the Russians.

Facebook and Twitter and other social media sites have increasingly come to be viewed as our most vulnerable area for national security. The United States does not have a ready defense to prevent such attacks.

At the time, nobody wanted to listen, but it became clear before long that we were not paranoid, although it was difficult not to come off that way in real life conversations. We expected a certain amount of eye-rolling, and we got it.

People can hardly be blamed. The whole thing was pretty implausible. Even our intelligence agencies were not fully aware of what was going on. This kind of thing has never happened here before. This sort of attack has in the past been used only by superpowers against small, Third World countries. We were never considered so vulnerable.

The anger and despair caused by the 2016 election opened a door. The smear job on Hillary Clinton represented a quarter- century’s work and God only knows how many millions of dollars on the part of the GOP. They had long ago ensured there was no end of mud to sling. And trusty Wikileaks was always around to make sure there was no shortage of new indecencies.

This, combined with the rabidity and overzealousness of a dangerously high percentage of far-left supporters of Bernie Sanders made for an extremely nasty cocktail of filth for the Russians to fling about on social media, amplifying their messages through a mixture of robot armies and highly targeted advertising.

Regular folks who go to work and don’t have time to study these things for twelve hours a day cannot be fully blamed if they fell for it. We were targeted specifically by a brand new strategy developed by a cunning and ruthless man, bent on world domination. What is most important now is that we all wake up to it.

Millennial Democrats did a series of interviews for this piece from the people most intimately involved. The administrators and moderators of Facebook groups and pages that supported Hillary Clinton in 2016 remain dedicated to the Democratic Party, its platform, and its ideals. We are out here even now, still fighting the good fight.

One source, who has screened new member requests for several dozen pro- Democratic Party Facebook groups since before the election began, made the following statement under the conditions of anonymity.

“From mid May 2017 to the end of July 2017, roughly 80% of the new member request were rabidly pro- Bernie Sanders supporters with profiles that appeared to be hijacked from the real owners or that were simply fake accounts. They seemed to have been created for the purpose of loading them up with pro Sanders, anti Democratic Party fake news to be spread by computer generation across Facebook.”

Even now, it remains far from over. Ordinarily, the months after such a chaotic election would be the slow season for politics. Spring and summer tend to be when people are out having fun. Unfortunately, both the stakes and the polarity of our atmosphere have become too high to allow for this.

Too high a level of polarity will destroy a culture. It causes a communication breakdown which leads to fighting. This polarity was not created by the Russians, but it was systematically financed, and worsened by them, using techniques so ugly they can only be referred to as antisocial media. It is now time for Facebook to answer to Congress and to the Special Counsel, Robert Mueller, for what they allowed.

 

%d bloggers like this:
Skip to toolbar