Category Archives: Security

Garbage In, Treasure Out: America Finds Strategic Rare Earth Elements in Coal Waste

The recent study “Coal Ash Resources and Potential for Rare Earth Element Production in the United States” reveals a novel approach to reduce foreign dependence on critical mineral supply. The source? Burned coal, its ash waste.

Coal ash, the byproduct of coal combustion in power plants, contains concentrated levels of rare earth elements (REEs), the critical components for renewable energy technologies, electric vehicles, and defense systems. The study says approximately 1.87 billion tons of potentially accessible coal ash have been dumped into U.S. landfills and storage facilities, with an estimated REE value of $8.4 billion.

This finding has interesting national security implications. The U.S. depends heavily on imports from China for REEs (e.g. from the DRC), creating an obvious vulnerability in supply chains for advanced technologies. The Department of Energy estimates that while conventional U.S. REE reserves are just 1.4 million tons, unconventional sources like coal could deliver another 11 million tons.

The study found REE concentrations vary significantly by source:

  • Appalachian Basin coal ash contains the highest REE levels (median 431 mg/kg)
  • Illinois Basin coal ash contains moderate levels (282 mg/kg)
  • Powder River Basin coal ash has lower concentrations (264 mg/kg) but higher extraction efficiency (70% vs. 30%)

Beyond securing critical minerals, developing coal ash as an REE resource offers environmental benefits to these regions.

Coal ash contains contaminants like mercury, cadmium, and arsenic that threaten local water sources. REE extraction could be sold as a way to offset remediation costs for environmentally vulnerable ash impoundments. Finally a reason to have clean water!

As the U.S. transitions towards more modern ethical energy sources, the strategic development of its massive waste sites full of toxic coal ash resources presents a dual opportunity: strengthening national security through domestic REE production while addressing obvious environmental and health dangers from coal power generation.

This research highlights how garbage in can mean treasure out. A little more health regulation might have helped make the discovery sooner. Innovative approaches, forced by necessity, can transform “garbage” into strategic resources, enhancing health, economic and national security.

Constitutional Crisis: Rushed White House Deportation Uses False Pretext to Evade Accountability

As security professionals, we’re tasked with balancing urgent operational needs against fundamental legal and ethical frameworks. The recent deportation case involving the Trump administration’s invocation of the 1789 Alien Enemies Act represents a textbook example of security operations deliberately structured to evade accountability mechanisms. Please recognize a dangerous precedent that directly threatens the rule of law.

Accountability Evasion Game

The administration’s approach appears to have been meticulously designed to circumvent judicial review:

  • Strategic Start: Signing the executive order on Friday night and deliberately not advertising it
  • Rushed Execution: Creating a “mad scramble” to get planes airborne once word leaked
  • Explicit Intent: Officials openly admitting “We wanted them on the ground first, before a judge could get the case”
  • Planned Loopholes: Claiming international waters provided immunity from judicial orders

This operational structure mirrors tactics used in some of the most controversial security programs in recent history, where operations are deliberately moved outside normal accountability structures, then justified retroactively through technical legal arguments. It signals the White House was planning from the start to ignore laws it knew would deem its planning illegal.

False Security Dilemma

National security routinely is invoked to justify exceptional measures, but this is a false dilemma. The core question isn’t whether dangerous individuals should be removed from the country, it’s whether executive power can operate beyond judicial review simply by exploiting a race condition — moving quickly and invoking rarely-used wartime authorities.

The “ticking time bomb” scenario (or alternatively, the “boy who cried wolf” dynamic) is frequently invoked as justification for extraordinary measures. Yet it rarely holds up to scrutiny. Here, there was no imminent threat that required bypassing normal legal procedures. None. The rush was based on no justification at all. Rather, this was a calculated test case designed to show how ignoring judges very simply can be achieved, with the goal of expanded executive authority. Whether the deportations happened or not was never the White House concern as much as whether they could undermine rule of law somehow, somewhere. After that, no balance of power exists anymore, opening the flood gates to dictatorship.

Constitutional Ratchet

When security operations deliberately evade judicial oversight, they create what some might call a “ratchet effect.” Executive power expands during perceived emergencies and then rarely contracts afterward. Instead, new precedents normalize previously exceptional powers, in one direction (towards extreme control, away from balance).

The administration’s explicit stated strategy to rush this case to a Supreme Court they expect to rule in their favor reveals the true nature of the operation: never an urgent security matter, but an urgent power grab using deportees as pawns in a larger legal strategy to end the constitution.

Ethical Failure of Process Subversion

From an ethics perspective in National Security, this deliberate design of operations to evade accountability represents a fundamental breach of professional responsibility. Security and law enforcement professionals are bound by both legal and ethical constraints that go beyond mere operational objectives.

The administration’s approach reflects a troubling subversive mindset: that accountability structures are objections to be escaped or ignored rather than essential safeguards and guardrails. This isn’t merely a legal technicality, it’s a direct challenge to constitutional governance and the very concept of authority.

International Water Fallacy

Take the claim that planes in international airspace are beyond the reach of US courts, for example. This represents a clearly flawed theory of authority and boundaries. As with kidnapping or hostage situations, the location of victims doesn’t negate the originating jurisdiction’s authority. The entire operation—from detention to transport to deportation—constitutes a single continuous action that began on US soil under US authority. Imagine the US saying it can’t possibly look for a POW abroad to bring home because they aren’t presently on US soil. It’s nonsensical.

The US routinely asserts jurisdiction over its citizens and assets abroad when it suits government interests, showing the selective nature of this jurisdictional argument.

If this new flawed logic were widely accepted, it would create perverse incentives to rush people across borders, any borders anywhere, specifically to avoid judicial scrutiny. And if you really think about it this is how “America First” falls down most often. They pretend the border is absolute as a barrier to any interest or action, yet they immediately argue they can roll themselves into foreign countries with absolute freedom because anyone back in America can’t go through the wall they say now exists. A wall for thee not for me.

Supreme Court as Rubber Stamp

Perhaps most concerning is the explicit strategy to use these deportations as a Supreme Court softball for appointments setup to expand executive power. The administration welcomed the fight, with officials stating “This is headed to the Supreme Court. And we’re going to win.”

This instrumentalizes both the judiciary and the deportees themselves in a constitutional crisis. Rather than respecting the coordinate branches of government, it treats the courts as obstacles until reaching a favorable judicial forum to undermine the balance of power, strip the judiciary of its role by corrupting the top judges.

Another Way Forward

Security professionals must reject operations deliberately structured to evade accountability. True security requires:

  1. Process Integrity: Following established baselines like legal procedures by planning to be more efficient or convenient
  2. Judicial Respect: Recognizing legal teams and court orders as binding rather than advisory
  3. Transparency: Building operations to invite scrutiny rather than avoid it
  4. Constitutional Balance: Respecting separation of powers as a feature, a benefit from depth, not a bug

When security operations are deliberately designed to escape scrutiny until they can reach a sympathetic authority such as a corrupted judicial forum, we’ve moved from rule OF law to rule BY law, using captured and controlled legal mechanisms to legitimize actions after the fact rather than constrain them beforehand.

Those are the dictates of a dictatorship.

The security community must stand firm against this dangerous and poorly hidden precedent to end democracy. Our ultimate security comes not from unaccountable unilateral executive abuses, but from the constitutional guardrails that prevent any branch from accumulating so much unchecked power.

Data-lordism: Tesla appears to profiting from breaches that harm customers

We are apparently set to enter the brutal “Tesla age” of data-lordism
This case shows how connected vehicle manufacturers can potentially weaponize data and connectivity against their own customers. According to TorqueNews, Tesla appears to be profiting directly from what could be described as integrity breaches in their data management, which is arguably more problematic than privacy breaches.

We sold a customer a Tesla, but when he took it to Tesla for a simple battery fix, they told him it was marked as salvage. Even though the title is clean, Tesla wouldn’t share details, wouldn’t restore supercharging, and wanted a crazy amount of money to fix it.

Why would anyone buy a Tesla given these risks? Yet people do, only to find their troubles with the brand unfolding immediately upon becoming owners.

Beyond Privacy: The Integrity Breach Crisis

In a privacy breach, customer data is exposed or misused—certainly harmful, but the financial damage often comes indirectly and is difficult to quantify. What we’re witnessing with Tesla is far more direct: arguably predatory and self-serving attacks on customers:

  • Tesla claims their internal systems detected an accident that has no external verification
  • They refuse to provide any details about this alleged incident
  • They use this opaque determination to demand $12,000+ in repairs
  • They’ve disabled features the customer paid for (supercharging)
  • They’ve invalidated warranties despite legal documentation showing a clean title

Tesla’s Unjust Immoral Authority

Tesla has established itself as a unitary authority, potentially able to demand unlimited money from any owner without disclosing reasons. This system creates several concerning dynamics:

  • Self-defined reality: Tesla’s internal systems effectively override legal documentation and physical evidence, creating their own version of the vehicle’s history that can’t be contested.
  • Financial extraction mechanism: The opaque flagging system creates a direct pathway to extract additional revenue from customers who have little recourse.
  • Closed ecosystem of control: Tesla positions itself as both the entity that identifies problems and the exclusive solution provider, with no independent verification.
  • Circumvention of consumer protections: Traditional automotive consumer safeguards like state title systems, independent inspections, and lemon laws are effectively bypassed.
  • Post-purchase control: Features the customer already paid for can be unilaterally disabled based on non-transparent determinations.

This creates a direct financial pipeline from data integrity issues to Tesla’s bottom line. If their systems fraudulently flag cars (or are designed to flag cars with minimal evidence), Tesla directly profits from imposed “repairs” and inspections by them and them alone.

Toxic Power of Tyrants

The power imbalance is toxic and abusive. The customer has no way to contest real-world determinations, verify real-world data, or even understand what triggered the flag. The real world gets replaced with Tesla “truther-ism,” as the company unjustly positions itself as both the detector of problems and the only authorized problem solver.

This business model resembles other controversial tech platforms where companies create problems they alone can solve—essentially manufacturing the demand for their own services. In other words, I’ve noticed several high-profile tech entrepreneurs with apartheid South African roots who were involved with PayPal have gone on to create dubious business models that prioritize abusive profit extraction over customer interests and fairness.

Data-Lordism Beatings Will Continue Until…

We’ve known since at least the 1970s that manufacturers should not be allowed to build closed ecosystems where they control data they don’t actually own (the experiences of people and their lives), let alone control the very definition of private asset condition and status. When you investigate the economics of a brand overriding real-world data and legal documentation with fabricated, proprietary, and unverifiable determinations… you see why the right-to-repair movement is decades old already.

Tesla ignores all the lessons learned and instead raises serious questions about consumer protection in an era where everything has become a miniaturized data center with a manufacturer maintaining control long after purchase. The automotive industry has historically had consumer protections like lemon laws, independent mechanics, and state-regulated titling processes. Tesla seems to have invented a way to circumvent these protections by implementing systems they won’t allow to be independently verified.

The story presents perhaps the worst form of digital data-lordism, where technology ownership becomes merely nominal where a manufacturer forcefully imposes their de facto control over a person’s life through an immoral data architecture.

Urgent Need to Dethrone a False Prophet

In this age of connected technology, we stand at a crossroads where the very concept of ownership is being redefined without consumer consent. The Tesla case illustrates how quickly traditional consumer protections can be eroded when digital systems are weaponized against their owners. Without immediate regulatory intervention and consumer awareness, this nihilist dystopian model of “pay more, own nothing” could spread like fascism in the 1930s. True ownership demands transparency, accountability, and the right to independent verification, principles that are fundamental to consumer rights based in sovereignty for both digital and physical realms.

TSLA Investors Attacking Journalist Accidentally Reveal Autopilot Fraud

Here’s a truly sad conclusion to a story about Tesla Autopilot running over child mannequins, even behind a wall, failing a simple safety test that LiDAR-enabled cars pass with ease.

March 2025 a Tesla autopilot still blind to objects and humans in the road. Arguably it has only gotten worse as the company intentionally removed critical safety equipment, slashing costs despite known risks to life and property.

An Electrek journalist had clearly reported what we’ve all seen. Then the TSLA attack dogs started coming for him to argue that Autopilot wasn’t enabled. So, as any journalist would, he looked more carefully and realized… Autopilot had fraudulently disengaged itself. Ooops.

The funny thing is that I missed that Autopilot disengaged at the last second, but the attacks from Tesla investors pointed it out and actually exposed video evidence of a shady practice from Tesla that has been reported in the past.

In NHTSA’s investigation of Tesla vehicles on Autopilot crashing into emergency vehicles on the highway, the safety agency found that Autopilot would disengage within less than one second prior to impact on average in the crashes that it was investigating…

This would suggest that the ADAS system detected the collision but too late and disengaged the system instead of applying the brakes. Now, it looks like the Rober video has caught this behavior on camera.

Busted.