Category Archives: History

America’s Khmer Moment: How a Vengeful Apartheid South African Systematically Dismantled State Capacity to Block His Racism

When the Khmer Rouge entered Phnom Penh in 1975, they began their horrific “efficiency” campaign with a simple act: they emptied the cities. Within hours, professionals, intellectuals, and technical experts were marched out of their offices, given minutes to gather their belongings.

The forced evacuation of the Cambodian capital, sending 2 million people streaming into the countryside, was “an astonishing spectacle,” Schanberg acknowledged.

“A once-throbbing city became an echo chamber of silent streets lined with abandoned cars and gaping, empty shops,” he reported after making it out of Phnom Penh to Bangkok three weeks later. “Streetlights burned eerily for a population that was no longer there.”

The goal went far beyond political control – it was systematic destruction of technical and administrative capacity. History tells the rest. Over 2 million dead, many unaccounted for in the “killing fields” of mass genocide, labeled as “efficiency”.

…foreigners were later trucked to the Thai border and expelled. With their departure, Cambodia lost virtually the only outside witnesses to the horrors that were beginning in the country the Khmer Rouge would call “Democratic Kampuchea.”

Today’s events in Washington, with federal employees given 30 minutes to clear their desks, nuclear security experts terminated via Teams calls, and entire agencies effectively shuttered, bear disturbing parallels to these historical moments of state capacity destruction for racist aims.

This isn’t just another political purge of industrial-age planning – it’s something more technically sophisticated and potentially more devastating due to Elon Musk’s reckless applications of artificial intelligence operated by teenagers.

The Khmer Rouge were teenagers weilding the latest weapons technology to destroy a country from within

The targeting of nuclear security administration staff particularly echoes one of history’s most dangerous patterns in totalitarianism.

When the Khmer Rouge emptied Cambodia’s technical institutions, when Iran’s Cultural Revolution purged its universities, when Stalin’s “Engineers’ Affair” decimated Soviet technical expertise, the goal went far beyond the ideological cleansing rhetoric of “anti-woke” or “anti-DEI” – it was the destruction of the entire state’s ability to function at a technical level.

It was denial of state level protection of their populations, to enable targeted humanitarian crimes.

What makes the current American situation uniquely concerning is its precision in elimination of anyone capable of basic science and engineering (ethical professionals). The exemption of Defense and Homeland Security while gutting nuclear safety administration, health agencies, and oversight mechanisms suggests a peculiar understanding of how modern state capacity functions. This isn’t the blunt instrument of the Khmer Rouge pushing all the educated adults out of power into mass graves – it’s more akin to a targeted virus designed to destroy specific institutional capabilities of morality while leaving immoral others in position to enact harms.

The focus on probationary employees is particularly telling. In any technical institution, these newer employees represent not just current capacity but all future capability. They are the carriers of institutional knowledge to the next generation, the bridge between current expertise and future capability. By targeting them specifically, while maintaining more senior staff, a knowledge transfer gap is blasted into foundations that can take generations (or even foreign intervention and occupation) to repair.

Consider the nuclear security apparatus. When the Soviet Union collapsed, the sudden disruption of career pipelines and knowledge transfer systems created nuclear security vulnerabilities that persisted for decades. Today’s cuts to America’s nuclear security administration – 300 out of 1,800 staff – represent an eerily similar disruption of expertise continuity. It’s almost as if someone bitter about the Soviet collapse is ordering it to be done to America. This isn’t just about current capacity; it’s about ending future capability to maintain stability and order.

The use of modern technology to implement extremist war-like cuts adds the most disturbing dimension. Mass Teams calls, pre-recorded messages, 30-minute evacuation notices – these aren’t just methods of termination, they’re information warfare techniques of weaponized demoralization designed to break institutional cohesion.

When the Khmer Rouge marched people out of Phnom Penh, public humiliation was the point. Today’s digital equivalents by a vengeful apartheid South African serve the same purpose: to make American public service appear unstable, unreliable, and undesirable as a career.

This is the end game. Putin’s revenge for the Soviet collapse. Musk’s revenge for apartheid South Africa’s fall. Thiel’s dreams of Nazi Germany’s return. America’s enemies haven’t just gained insider access through Trump – they’ve purchased driving licenses for systematic revenge, achieving what John Birch only dreamed about.

The targeting of oversight mechanisms – inspectors general, ethics offices, regulatory agencies – mirrors another historical pattern. When authoritarian systems consolidate power, they often begin by dismantling the state’s self-monitoring capabilities.

But again, the American version shows a chilling understanding of the modern state function and how to make it the worst version. By targeting specific oversight mechanisms while leaving others intact, it creates an appearance of continuity while gutting actual oversight capacity.

The historical pattern of systematic attacks on state capacity says damage will persists long after any political changes. It is unlikely to lead to another free election, given overt comments by Musk that indicate the country is now run by him, as his personal bureaucracy that’s ending all opposition to racism.

When Cambodia finally emerged from the Khmer Rouge period, when Iran attempted to rebuild its technical institutions, when post-Soviet states tried to reconstitute their technical expertise, they discovered that some capabilities can’t be rebuilt easily. Knowledge gaps, broken career pipelines, destroyed institutional memory – these were vulnerabilities exploited to persist for generations.

Simple to see, this isn’t just another chapter in American political conflict – it’s a self-destructive campaign to fundamentally alter the state’s technical and administrative capacity. The combination of targeting critical technical expertise, disrupting knowledge transfer systems, and dismantling oversight mechanisms, all while maintaining an appearance of normal government function, represents a new AI-driven state capacity suicide.

When Musk destroys technical expertise, when Musk breaks knowledge transfer systems, when Musk dismantles oversight mechanisms, he create institutional vulnerabilities for Trump’s brand of failure to haunt him for decades. The sophistication of the current approach, combining historical techniques of state capacity destruction with modern technology and targeted precision, suggests we may be witnessing something unprecedented in the history of democratic governance – the systematic dismantling of state capacity from within by it’s most avowed enemies.

And so, today in 2025, as federal workers are given 30 minutes to clear their desks and nuclear security experts are terminated via Teams calls, the intellectual giant Walter Benjamin’s warning about fascism echoes with eerie precision. His analysis of how a Trump-like regime operates reads like a prophecy written for this moment:

Benjamin insisted that in their “mysticism of war” “what developed here, first in the guise of the World War volunteer and then in the mercenary of the postwar era, is in fact the dependable fascist class warrior. And what these authors mean by nation is a ruling class supported by this caste, a ruling class—accountable to no one, and least of all to itself, enthroned on high.

The parallel is useful to today’s federal workers caught between forces of fraudulent “efficiency” and ideological purge. Unlike Benjamin, who saw no escape at an obscure Spanish border surrounded by fascists, today’s experts must find ways to preserve and protect their knowledge and expertise even when driven from institutions and persecuted for disloyalty to a dictator.

The question isn’t whether to fight tyranny but how to ensure that technical knowledge and ethical expertise survive Musk’s fail-faster assault on state capacity. History shows that while fascists can swiftly seize institutions and undermine democracy, they cannot destroy knowledge itself unless its bearers surrender it. Benjamin correctly diagnosed the causes, while incorrectly choosing a tragic surrender to his despair. Let his fatal mistake in judging the moment to quit (he killed himself when blocked, yet would have been fine and survived 24 hours earlier or later) be an inspiration to fight, and fight, and fight for another day.

Remember also that by December 1978 the Vietnamese military had been given orders to roll into Phnom Penh and put an end to deadly and destructive “efficiency” of the Khmer Rouge.

Cambodia was an unpopular war for Vietnam, said Carlyle Thayer, an expert on Vietnam and emeritus professor at the University of New South Wales at the Australian Defence Force Academy in Canberra. “The Vietnamese military had been trained and experienced in overthrowing an occupying power and all of a sudden, the shoe was on the other foot. They had to invade Cambodia and occupy it, and succeed in setting up a government and engineer a withdrawal.”

Who will roll into DC and put an end to the pain of Elon Musk? The historical pattern of systematic state capacity destruction has shown consistent elements across different contexts, all which make it harder to recover the longer we delay:

  • Technical expertise elimination through targeted removal of professionals and experts
  • Systematic disruption of institutional knowledge transfer between generations
  • Dismantling of oversight mechanisms while maintaining facade of functionality
  • Deployment of public humiliation tactics to demoralize and deter future public service

These patterns serve as clear reminders that the destruction of state capacity often follows recognizable templates, even as the specific technologies and methods evolve. History demonstrates that while such expertise can be swiftly dismantled, its reconstruction requires sustained effort and institutional memory – resources that become scarcer with each wave of technical brain drain driven by men like Elon Musk.

His Cybertruck turned out 17X more dangerous than a Ford Pinto for a very simple reason. Expect America to become less and less safe with him anywhere near the wheel, as I’ve warned here since at least 2016.

This is obviously some of the worst engineering in history if not the absolute worst. A car designed to fail.

Don’t say I didn’t warn everyone that Tesla is dangerous fraud, an unaccountable death trap

When Vodka Cracked the Code: Hegseth-Like Fallibility in Early Soviet Cryptography

In the peculiar annals of interwar intelligence, few episodes better illustrate the intersection of human frailty and state security than the evolution of Soviet encryption between the world wars. The story involves poetry, vodka, and one of cryptography’s most colorful characters – Ernst Fetterlein, the former Czarist chief cryptanalyst who walked across the Finnish border during the Revolution to join British intelligence.

The Soviets’ cryptographic journey from 1920-1928 showcases a remarkable evolution. They began with surprisingly basic columnar transposition[1] of Russian plaintext, moved to dinomic substitution[2] before transposition[3] in late 1920, then progressed through increasingly complex systems. One of these systems fell to British cryptanalysts from a simple literary connection. When Fetterlein couldn’t figure out the keys using Russian letters, Tiltman discovered they were actually from an obscure out-of-print pocket edition of poems by George Wither, a prolific 17th-century English poet. Tiltman noted:

I do not remember the method of indicating keys, but I know it was simple and that, after finding the source book, we were in a position to decrypt DELEGAT messages as soon as the intercepts reached us.

By 1928, the Soviets finally adopted one-time pads (OTP), using two specific formats where messages over 1100 figures had to be split into parts. The pads were used “boustrophedon” style (from ancient Greek, meaning like an ox turning while plowing), and critically, operators were officially permitted to use each pad twice but no more. This policy had been built into their procedures from the beginning in 1928, not as a wartime compromise as long believed:

275-figure pad (11 lines × 5 groups of 5 figures) for messages up to 550 figures:

12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345  →

550-figure pad (11 lines × 10 groups of 5 figures) for longer messages:

12345 12345 12345 12345 12345 12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321 54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345 12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321 54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345 12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321 54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345 12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321 54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345 12345 12345 12345 12345 12345  →
54321 54321 54321 54321 54321 54321 54321 54321 54321 54321  ←
12345 12345 12345 12345 12345 12345 12345 12345 12345 12345  →

This brings us to the rather spectacular case of cipher clerks Kotlov and Serafimowich in 1926 Kabul. Serafimowich’s frequent hangovers led to so many encryption errors that Moscow mandated all messages be signed by the encrypting clerk. This well-intentioned administrative solution spectacularly backfired – the signatures provided British analysts with precisely the known-plaintext material they needed. When Serafimowich himself later decrypted orders for his own recall to Moscow over questionable papers, he fled to the British Embassy but was turned away. As Brigadier Tiltman notes in his recently declassified papers, he was “never heard of again.”

Yet even with these procedural vulnerabilities, Tiltman’s documents reveal something surprising – British cryptanalysts “were hardly able to read anything at all except in the case of one or two very stereotyped proforma messages.” The theoretical strength of the one-time pad still made decryption extremely difficult, even when used twice.

The ramifications would echo through cryptographic history. Operation Venona’s later success in breaking these reused pads became one of cryptanalysis’s first major computer applications, ultimately exposing Soviet agents like Blunt and Cairncross.

Over 100 Security Service (MI5) files are being released today [14 January 2025] covering a wide range of subjects and individuals. Most notably, the files offer fresh perspectives on notorious members of the Cambridge Five spy ring, namely Anthony Blunt, Kim Philby and John Cairncross.

The “two-time pad” problem may have helped shape modern information theory itself. Claude Shannon’s groundbreaking post-war papers establishing the mathematical foundations of cryptography likely drew inspiration from the practical challenge of quantifying exactly why a one-time pad was secure but a two-time pad catastrophically weak.

The serious implications for modern national security systems remain stark: mathematical perfection means little without robust operational security. The Soviets’ experience shows how administrative decisions and human reliability issues can compromise even theoretically unbreakable systems. Their requirement for cipher clerks to sign their work, like artists initialing a canvas, transformed a personnel management solution into a critical cryptographic vulnerability.

As we consider contemporary challenges in vetting national security roles, this history serves as a pointed reminder: institutional failures to properly handle personnel reliability issues can cascade into catastrophic failures. Though the specific technologies have changed, the fundamental challenge remains: a security system is only as strong as its human operators and the procedures governing them.


The Soviet Union’s cryptographic evolution through the 1920s demonstrates a typical progression from basic to multi-layered:

[1] Columnar Transposition
A message is written in rows of fixed length to form columns, which are then rearranged using a numeric key. For example, with key “3142” the message “SEND SUPPLIES” becomes:

  3 1 4 2
  S E N D
  S U P P
  L I E S

Reading columns by key order (1,2,3,4) produces: “EUI DPS SSL NPE”

[2] Dinomic Substitution
Plaintext letters are first paired (e.g., SE ND SU PP LI ES) and each pair is then substituted as a unit using a conversion table. This approach conceals single-letter frequency patterns that plague simple substitution. For instance:

- SE → KR
- ND → MY
- etc.

[3] Combined Method
This advanced technique applies both methods sequentially:

  1. Applying dinomic substitution
  2. Performing columnar transposition

The combination strengthens the encryption in two ways:

  • Substitution masks letter frequencies
  • Transposition scrambles positional patterns

This progression through increasingly sophisticated encryption methods reveals how deeply British signals intelligence had penetrated Soviet-Afghan diplomatic communications. The radio intercept stations at Cherat (above Peshawar) and Pishin in Baluchistan were particularly focused on monitoring traffic between Moscow-Kabul and Moscow-Tashkent, providing significant advantages in managing regional power dynamics and potentially influencing events covertly (e.g. King Amanullah Khan’s overthrow).

In the fall of 1925 the Government of India sent a column (known as the WANA column) to the northwest frontier to occupy Waziristan to deal with unrest among the northwest tribes, a more stormy situation than usual. Stark, the Russian Ambassador in Afghanistan, sent a cipher telegram to Moscow in which he inquired what joint action was proposed between the Russian and Afghan Governments “in view of the occupation of Waziristan (W Widu Okkupacii Waziristana).” Our interpreter, who was quadriligual in Russian, English, French and German, but not outstandingly literate in any one of them, translated this—”with a view to the occupation of Waziristan.” The intelligence branch of Army Headquarters was in Delhi, and we were in Simla, and there was a day of near crisis in Delhi before someone, realizing that it would take something like six months for Russians and Afghans to join forces over the Hindu Kush, queried the translation back to us.

The WANA column incident perfectly illustrates how signals intelligence capabilities needed to be balanced with practical regional knowledge. While the British intercept stations could successfully capture and decrypt Soviet diplomatic traffic, the true value of this intelligence depended on accurate translation and interpretation by cooler heads. In this case, a simple preposition mistranslation nearly triggered a crisis until those familiar with the Hindu Kush’s geography could provide crucial context about the practical impossibility of rapid Soviet-Afghan military coordination.

Sean “Leaking Behavior” Cairncross Appointed to Lead U.S. Cyber

A man with absolutely no experience in cyber let alone security, yet a well-known reputation for government confidentiality breaches, has been given a White House appointment.

Cairncross, who served alongside Priebus in the senior-most levels of the RNC, has been systemically leaking information designed to help Priebus and hurt Priebus’s rivals inside the White House, a senior official tells Breitbart News. Senior administration officials have been aware of Cairncross’ leaking behavior, too, and have been watching him closely.”

TheReg puts the developing National Cyber Director situation mildly.

GOP lawyer Sean Cairncross will be learning on the fly, as we also say hi to new intelligence boss Tulsi Gabbard. […] Like Trump’s pick for White House Chief Information Officer, Cairncross’ professional history lacks direct professional experience for the role…

Tulsi who?

Tulsi Gabbard’s history with Russia is even more concerning than you think. One expert says her views are ‘so wildly fringe that her potential appointment as DNI is genuinely alarming’.

Oh, THAT Tulsi.

British security chiefs alarmed by Trump’s ‘Russia apologist’ spy boss: Tulsi Gabbard under intense scrutiny over perceived support for the Kremlin

So, following a pattern, we see now a staunch loyalist with no qualifications has been put in charge of the cybers?

Other than the obvious loyalty pattern, is there more here? He’s best known for his leaking behavior, sure enough, so maybe that means Trump confused him with the well-known Cairncross of Bletchley Park, a man famous in Moscow?

Following Philby’s defection to the Soviet Union in 1964, Cairncross was again interrogated by MI5 and he confessed to being a Soviet spy. In exchange for providing information about Soviet personnel and other matters, he was not prosecuted and his involvement was kept silent. In the 1990s, Cairncross was identified as the “fifth man” in the Cambridge spy ring by former Soviet intelligence officers.

Wonder what Putin said when Tulsi Gabbard told him that a “leaking behavior” Cairncross would be put in charge of cyber. Or maybe leaks meant Putin was actually the first to find out and told Tulsi. Historians can’t wait to expose the corruption.

Brother at the top helped Fifth Man John Cairncross to escape justice

Related: Dangerous Leaks Reported From Elon Musk’s Big Balls

Levitsky and Way’s “Foreign Affairs” Dictatorship Analysis: A Critical Response

The recent Foreign Affairs piece on American authoritarianism fundamentally misses how AI will supercharge authoritarian power in unprecedented ways.

The Path to American Authoritarianism
What Comes After Democratic Breakdown
Steven Levitsky and Lucan A. Way
February 11, 2025

While the authors correctly identify the risk of democratic breakdown, their analysis is unfortunately trapped in an outdated framework that fails to grasp two critical accelerants.

First, they underestimate how AI already weaponizes America’s buried atrocities. Unlike human narratives that often gloss over historical trauma, AI can instantaneously surface and connect centuries of state violence by normalizing it – from President Jackson’s genocidal Trail of Tears to President Wilson’s Red Summer of 1919 leading to Tulsa Massacre of 1921. AI doesn’t miss the subtext of racist deception in the Missouri Compromise or the brutally racist and illegal conquest of Texas and Florida to expand slavery. It can relentlessly illuminate how “America First” movements always consistently and repeatedly enabled American race-based authoritarianism since the late 1800s.

The authors vaguely suggest institutional guardrails could contain authoritarian power. But they fail to recognize how AI can weave foundational historical threads into devastating narratives that undermine faith in those very institutions. When AI connects the dots between a past of systemic state violence and the present institutional power of non-governmental “efficiency” (totalitarian) mercenaries called DOGE, it becomes much harder to believe in the protective power of courts or federalism.

Second, they dramatically underestimate the velocity of AI-powered narrative control. Their analysis feels like watching someone explain how decades of prior print media will hold the line on public opinion in 1933, while completely missing how the Nazi regime flooded radio waves and totally rewrote reality in just three months. 2025 AI is far more powerful than 1933 radio – it can generate, target, and amplify hateful messages at a scale that makes Hitler’s genocidal machines look primitive.

The authors worry about gradual institutional capture through bureaucratic maneuvering. But they miss how AI can simply flatten institutional resistance through overwhelming narrative force.

Why bother carefully pressuring judges and abiding by them when AI can flood every platform with unaccountable sock puppet messages demanding targeting judges to be eliminated if “woke” or opposed to “efficiency”? Already the White House has announced they will be “looking into” any judge who disagrees with “efficiency”. The speed and scale of AI-powered propaganda makes the old ways of careful institutional analysis feel quaint, like marching troops with slow-firing inaccurate muskets into a machine gun. Domain shifts are devastating to analysis that doesn’t account for what’s changed.

Therefore the Foreign Affairs assessment is not just wrong, it’s dangerously overconfident in the way that reduces opposition to mass unjust incarceration and death. By suggesting American institutions can weather authoritarian pressure through quaint concepts of traditional resistance, they underestimate how AI already fundamentally changes the game.

Quantum threats are basically here and some people still don’t know how to change their passwords.

Does anyone really think executive orders pumped out by the hundreds aren’t being written with software? Does anyone really not understand why a few college-aged kids who barely write software are being called “auditors” of “efficiency” on a highly complex financial system they can’t possibly understand?

They are feeding all, and I mean all, American citizen data into Elon Musk’s private unsafe AI infrastructure and asking it “what would Hitler do, in the voice of Goebbels?”

This won’t be a slow erosion of democracy through bureaucratic weaponization, waters creeping up on those who don’t have boats. It already is a tsunami-level warning of AI-powered narrative control that will catastrophically sweep away democratic institutions faster than any previous authoritarian transition.

The authors claim America won’t face “classic dictatorship.” But by failing to grasp how AI supercharges authoritarian power, they miss that we’re facing something potentially worse – a form of technologically-enhanced authoritarianism that could exceed anything in history. And this “Technocracy” disaster has been many decades in the making, a Musk family obsession since the 1930s as proven out in South African apartheid, not something political scientists today should be unfamiliar with.

Elon Musk’s grandfather making national security news with racist totalitarian “Technocracy”. Source: The Leader-Post, Regina, Saskatchewan, Canada, Tue, Oct 8, 1940, Page 16
Elon Musk repeatedly promoted fascism on social media such as polling followers whether he should bring his Grandfather’s racist totalitarian Technocracy back by “colonizing Mars” and ignoring all laws. Source: Twitter

In case Elon Musk’s encoded speech pattern is unclear, planet “Mars” is used (incorrectly) to promote open violation of the law and disobeying law enforcement, like saying America will finally be as good as Mars when the white men who occupy it can’t be regulated: Occupy Mars = Aryan Nation.

We all know the children’s tale about what comes next if we don’t understand the threat. The institutional safeguards appear as straw huts against a coming huff-a-puff wolf. We need to wake up to the true scale and speed of the threat before it’s too late.

The simple reality is this: AI-powered authoritarianism won’t respect and carefully navigate around slow democratic institutions – it will overwhelm them in raw narrative force at unprecedented speeds causing disasters to force surrender and complacency.

To put it another way, Nazi generals carelessly sped full speed into France to overwhelm their targets while leaving themselves dangerously exposed. The French capitulated and resolved themselves to occupation instead of rapid counter attack that would have destroyed the Nazis. General Grant understood this in the 1860s yet the French didn’t grasp adequately the domain shift tactics of radios, planes and trucks.

The Foreign Affairs authors are analyzing how to defend against 20th century authoritarianism while missing that an AI invasion force already has landed and is expanding. They’re not just wrong about defenses, they’re complacent and leaving America dangerously unguarded.