Category Archives: History

Simple Hacks Kill Police Robots: Dumb Software Flaws Made Overpriced Hardware Useless

Unitree robots in the dog house
Urinary poor password hacked
Unmarking poo-lice territory

The news story today about a police robot is really a story about the economics of hardware safety, and why the lessons of WWII are so blindingly important to modern robotics.

Picture this: Police deploy a $16,000 Unitree robot into an armed siege (so they don’t have to risk sending any empathetic humans to deescalate instead). The robot’s tough titanium frame can withstand bullets, its sharp sensors can see through walls, and its AI can navigate complex obstacles like dead bodies autonomously. Then a teenager with a smartphone intervenes and takes complete control of it in a few minutes.

Cost of the zero day attack?

Zero dollars.

Are we still blowing a kid’s whistle into payphones for free calls or what?

This economic reality in asymmetric conflict reveals a fundamental dysfunction in how the robotics industry approaches risks. The embarrasing UniPwn exploit against Unitree robots has exposed authentication that’s literally the word “unitree,” hardcoded encryption keys identical across all devices, and complete absence of input validation.

I’ll say it again.

“Researchers” found the word unitree would bypass the Unitree robot security with minimal effort. We shouldn’t call that research. It’s like saying scientists have discovered the key you left in your front door opens it. Zero input validation means…

This is 1930s robot level bad.

For those unfamiliar with history, the design flaws of the Nazi V-1s are how we remember them. Yet even Hitler’s dumb robots had better security than Unitree in 2025 – at least the V-1s couldn’t be hijacked mid-flight by shouting “vergeltungswaffe” on radio frequencies.

WWII Spitfire “tipping” the flawed Nazi V1 in flight, because ironically Hitler’s robots couldn’t properly calculate their axis

WWII military technology had more sophisticated operational security than modern robots. Think about how genuinely damning that is for the current robotics industry. Imagine a 1930s jet engine with a fundamentally better design than one today.

It is a symptom of hardware companies treating their vulnerabilities in software as an afterthought, creating expensive physical systems that can be compromised for free. Imagine going to the gym and finding a powerlifter who lacks basic mental strength. “Hey, can someone tell me if the big and heavy 45 disc is more or less work than this small and light 20 one” a tanned muscular giant with perfect hair pleads, begging for help with his “Hegseth warrior ethos” workout routine.

The Onion reveals Pete’s tragicomedy status as the least capable or qualified military leader in history

French military planners spent billions pouring concrete for a man named Maginot, after he dreamed up what would have worked better for WWI. His foolish “impregnable” static defensive barrier was useless against coming radio-controlled planes and trucks and tanks using network effects to rapidly focus attacks somewhere else. The Germans needed only three days to prove the dynamic soft spots need as much attention or more than the expensive static hard ones. Robotics companies are making the identical strategic error, pouring millions into unnecessary physical hardening while leaving giant squishy digital backdoors wide open.

Unitree’s titanium chassis development costs over $50,000, military-grade sensors run $10,000 per unit, advanced motors cost $5,000 each, and rigorous testing burns through hundreds of thousands in R&D. So fancy. Meanwhile, authentication was literally fixed as “unitree,” while encryption was copy-pasted from Stack Overflow, and input validation… doesn’t exist.

This pattern of inverted priorities by safety engineering ignoring the past extends far beyond Unitree. Just weeks ago in September 2025, Tesla influencers attempting a coast-to-coast “Full Self-Driving” trip crashed their Model Y within the first 60 miles when the car completely ignored a metal girder lying in the road.

The Tesla robot stupidly barreled into disaster at 76 mph and bounced dramatically into the air, causing an estimated $22,000 in damage and cancelling the trip before they even left California. This is the same company that has promised coast-to-coast autonomous driving by 2017 yet still can’t detect the most obvious and basic road debris. It was NOT an edge case failure. It was proof of Tesla flaws still being overlooked, despite extensive documentation of more than 50 deaths since the first ones in 2016.

ISACA 2019 Presentation

Robots being marketed for special police use have been disappointing similarly for over a decade, as I’ve spoken and written about many times. In 2016, a 300-pound Knightscope K5 ran over a 16-month-old toddler at Stanford Shopping Center, hitting the child’s head and driving over his leg before continuing its patrol. The robot “did not stop and kept moving forward” according to the boy’s mother. A year later, another Knightscope robot achieved internet fame by rolling itself into a fountain at Georgetown Waterfront, prompting one cynical expert’s observation: “We were promised flying cars, instead we got suicidal robots.”

That’s being generous, of course, as the robot couldn’t even see the cliff it was throwing itself off.

These incidents illuminate a critical historical insight to economics of security: hardware companies systematically undervalue software engineering because their own mental models are flawed. Some engineers are so rooted in physical manufacturing they can’t see the threat models more appropriate to their work.

Traditional hardware development means you design a component once, manufacture it at scale, and ship it. Quality control means testing physical tolerances and materials science. If something breaks, you issue a recall. It’s bows and arrows or swords and shields. Edge cases thus can be waved off because probablity is discrete and calculated like saying don’t bring a knife to a gun fight (e.g. Tesla says don’t let any water touch your vehicle, not even humidity, because they consider weather an edge case).

Software is fundamentally different economics. We’re talking information systems of strategy, infiltration and alterations to command and control. It’s constantly attacked by adversaries who adapt faster than any recall process. It must handle infinite edge cases injected without warning, that no physical testing regime can anticipate. It requires ongoing maintenance, updates, and security patches throughout its operational lifetime. Most importantly, software failures can propagate instantaneously across entire fleets through network effects, turning isolated incidents into rapid systemic disasters.

A laptop without software has risks, and is also known as a paperweight. Low bar for success means it can scope itself towards low risk. A laptop running software however has exponentially more risks, as recorded and warned during the birth of robotic security over 60 years ago. Where engineering outcomes are meant to be more useful, they need more sophisticated threat models.

The UniPwn vulnerability exemplifies all of this and the network multiplication effect. The exploit is “wormable” because infected robots would automatically compromise others in Bluetooth range. One compromised robot in a factory doesn’t just affect that unit; it spreads to every robot within wireless reach, which spreads to every robot within their reach. A single breach becomes a factory-wide infection within hours, shutting down production and causing millions in losses. This is the digital equivalent of the German breakthrough at Sedan—once the line is broken, everything behind it collapses.

And I have to point out that this has been well known and discussed in computer security for decades. In the late 1990s I personally was able to compromise critical infrastructe across five US states with trivial tests. And likewise in the 90s, I sent a single malformed ping packet to help discover all the BSD-based printers used by a company in Asia… and we watched as their entire supply chain went offline. Oops. Those were the kind of days we were meant to learn from, to prevent happening again, not some kind of insider secret.

Hardware companies still miss this apparently because they don’t study history and then they think in terms of isolated failures rather than systemic vulnerabilities. A mechanical component fails gradually and affects only that specific unit. A software vulnerability fails catastrophically and affects every identical system simultaneously. The economic models that work for physical engineering through redundancy, gradual degradation, and localized failures become liabilities in software security.

Target values of the robots in this latest story range from $16,000 to $150,000. That’s crazy compared to an attack cost being zero: grab any Bluetooth device to send “unitree”. Damage potential reaches millions per incident through production shutdowns, data theft, and cascade failures.

Proper defense at the start of engineering would cost a few hundred dollars per robot for cryptographic hardware and secure development practices. Unitree could have prevented this vulnerability for less than an executive dinner. Now it’s going to be quite a bit more money to go back and clean up.

The perverse market incentive in security is that it remains invisible until it spectacularly fails. Hardware metrics will dominate purchasing decisions by focusing management on speed, strength, battery life, etc. while software quality is dumped onto customers who lack technical expertise to evaluate it in downscoped/compressed sales cycles. Competition then rewards shipping fast crap over shipping secure quality because defects manifest only after contracts are signed, under adversarial conditions kept out of product demonstrations.

The real economic damage of this loophole extends beyond immediate exposure of the vendor. When the police robot gets compromised mid-operation, the costs cascade through blown operations, leaked intelligence, destroyed public trust, legal liability, and potential cancellation of entire robotics programs, not to mention potential fatalities. The explosive damage could slow robotics adoption across law enforcement, creating industry-wide consequences from a single preventable vulnerability. Imagine also if the flaws had been sold secretly, instead of disclosed to the public.

It’s Stanley Kubrick’s HAL 9000 story all over again: sure it could read lips but the most advanced artificial intelligence in cinema was defeated by a guy pulling out its circuit boards with a… screwdriver. The simplest attacks threaten the most sophisticated robots.

2011 a cloud odyssey
My BSidesLV 2011 presentation on cloud security concepts for “big data” foundational to safe intelligence gathering and processing

Hardware companies need to internalize that in networked systems the security of the communications logic isn’t a feature. It’s the foundation of the networking. Does any bridge’s hardware matter if a chicken can’t safely cross to the other side?

All other engineering rests upon the soft logic working without catastrophic soft failure that renders hardware useless. The most sophisticated mechanical engineering becomes worthless where attackers can take control via trivial thoughtless exploits.

The robotics revolution is being built by companies that aren’t being intelligent enough to predict their own future by studying their obvious past. Until the market properly prices security risk through insurance requirements, procurement standards, liability frameworks, and certification programs, customers will continue paying premium prices for robots that will be defeated for free. The choice is stark: fix the software economics now, or watch billion-dollar robot deployments self-destruct.

And now this…

  • 2014-2017: Multiple researchers document ROS (Robot Operating System) vulnerabilities affecting thousands of industrial and research robots
  • 2017: IOActive discovers critical vulnerabilities in SoftBank Pepper robots – authentication bypass, hardcoded credentials, remote code execution
  • 2017: Same vulnerabilities found in Aldebaran NAO humanoid robots used in education and research
  • 2018: IOActive demonstrates first ransomware attack on humanoid robots at Kaspersky Security Summit
  • 2018: Academic researchers publish authentication bypass vulnerabilities (CVSS 8.8) for Pepper/NAO platforms
  • 2018: Alias Robotics begins cataloging robot vulnerabilities (RVD) – over 280 documented by 2025
  • 2019-2021: Multiple disclosure attempts for Pepper/NAO vulnerabilities ignored by SoftBank
  • 2020: Alias Robotics becomes CVE Numbering Authority for robot vulnerabilities
  • 2021: SoftBank discontinues Pepper production with vulnerabilities still unpatched
  • 2022: DarkNavy team reports undisclosed Unitree vulnerabilities at GeekPwn conference
  • 2025: CVE-2025-2894 backdoor discovered in Unitree Go1 series robots
  • 2025: UniPwn exploit targets current Unitree G1/H1 humanoids with wormable BLE vulnerability
  • 2025: CVE-2025-60250 and CVE-2025-60251 assigned to UniPwn vulnerabilities
  • 2025: UniPwn claims to be *cough* “first major public exploit of commercial humanoid platform” *cough* *cough*
  • 2025: Academic paper “Cybersecurity AI: Humanoid Robots as Attack Vectors” documents UniPwn findings

Shout out to all those hackers who haven’t disclosed dumb software flaws in modern robots because… fear of police deploying robots on the wrong party (them).

Trump Turkey Talk: Abrupt Summons of Military Like Stalin

This week Trump openly praised Erdoğan’s expertise in “rigged elections” while simultaneously ordering all U.S. military leadership to gather at Quantico with no stated purpose.

…he quipped during a White House meeting that his counterpart, Recep Tayyip Erdoğan, “knows about rigged elections better than anybody.”

“Are we taking every general and flag officer out of the Pacific right now?” a U.S. official told the Post. “All of it is weird.”

Complimenting Turkey’s President while planning a sudden “weird” military gathering could be:

  • Assessment: Who shows reluctance or concern?
  • Warning: Demonstrate consequences of disloyalty to this man who wants to be king
  • Preparation: Ready to move against officers if they remain loyal to the constitution

This has the hallmarks of telegraphed intentions, as Trump is known for being unable to hide his thoughts. The open praise for Erdoğan’s election manipulation expertise is especially relevant to any highly unusual military consolidation. Such a particular combination of events suggests we may be witness to the late steps of American military dictatorship through a massive power consolidation effort.

When Turkey “summoned” it’s military in 2016 over 45,000 officials, police, judges, governors and civil servants were arrested or suspended, including 163 generals and admirals (45% of the military leadership): 1,524 out of 1,886 staff officers were purged (81%), and one-third of the entire officer corps.

Some experts who read these signals, such as retired U.S. Army Commanding General Ben Hodges, have called attention to examples much further back in history.

July 1935 German generals were called to a surprise assembly in Berlin and informed that their previous oath to the Weimar constitution was void and that they would be required to swear a personal oath to the Führer. Most generals took the new oath to keep their positions.

Of course what really comes to mind is just two years later in the 1937-38 purges by Stalin, the textbook case of authoritarian consolidation.

Stalin used meetings and conferences to systematically eliminate military leadership, removing three of five marshals, 13 of 15 army commanders, eight of nine admirals, 50 of 57 army corps commanders, and 154 out of 186 division commanders.

The most competent leaders were especially targeted. Marshal “Soviet Bonaparte” Tukhachevsky, for example, found his usual parade spot blocked by security guards on May Day, was demoted 10 days later, then arrested and thrown into Lubyanka Prison. Stalin called an emergency meeting to justify eliminating his best leaders, branding the strongest and most intelligent military officers as mere “puppets” to be executed. The entire military leadership was forced to participate in prosecuting and then murdering their own colleagues.

What’s particularly notable about Stalin’s method is how he used gatherings to identify targets, conduct secret trials where defendants were tortured into confessions, immediately sentenced to death, and shot within an hour. Within two years, over 30,000 military officers had been executed, shipped to the gulag, or dismissed from service.

Perhaps a more direct parallel comes from the 1979 Baath Party purge in Iraq. Saddam Hussein convened an emergency party meeting on July 22 where he calmly read names from a prepared list while armed guards escorted each named official out of the hall. The remaining members were forced to applaud each arrest, creating complicity through participation.

Within days, 68 high-ranking officials had been executed, including five Revolutionary Command Council members and 21 cabinet ministers. What made this purge especially effective was how Hussein used the meeting itself as both assessment and trap by observing who hesitated to applaud, who showed concern, who might harbor divided loyalties.

The gathering that promised party unity became the mechanism for its complete subjugation. Hussein’s method demonstrates how a single well-orchestrated meeting can identify, isolate, and eliminate institutional opposition while forcing survivors to become active participants in their colleagues’ destruction.

Trump’s actions thus suggest potential elimination of constitutional military leadership in favor of personal loyalty to a dictator. Once military leadership is replaced with his loyalists, other institutions fall rapidly in sequence. The venerable Posse Comitatus guardrail, theoretically preventing the military from extrajudicial killing of domestic civilians, could become meaningless in a month.

In related news, Trump’s sudden expansion of ICE mirrors Mussolini’s transformation of the “Blackshirts” from an irregular mob into legitimate state apparatus of violence.

Mussolini rapidly expanded his paramilitary forces with state funding while demanding personal loyalty over institutional oaths. Similarly, Trump has allocated $175 billion to hire 10,000 new ICE agents who California’s governor warns appear to have “sworn an oath to Donald Trump, not the Constitution.”

Trump has conscripted FBI and DEA agents into ICE operations while granting them “Total Authorization” to use “whatever means necessary”, the exact extralegal authority Mussolini gave his Blackshirts.

And last, but not least, Trump’s appointment to lead the military was himself barred from serving on duty at the inauguration of Joe Biden after a guardsman flagged Pete Hegseth as an “insider threat”, due to hate group tattoos such as the words deus vult. Hegseth quit the Individual Ready Reserve in January 2024, publishing his grievance in a book he called The War on Warriors.

Rapid assembly of a Blackshirt-like ICE, combined with the simultaneous military assembly by Hegseth at Quantico, means the news reads like a classic authoritarian playbook: build loyal militant enforcement apparatus while rapidly neutralizing potential opposition within existing security institutions, in a war on warriors.

History shows clearly, from multiple angles, that once military leadership is replaced with personal loyalists and a parallel enforcement apparatus is established, representative government dies. The fact that Trump repeatedly and openly admires dictators for their authoritarian tactics, and has telegraphed a Turkey/Iraq-like summons to the military, suggests we are watching his implementation of a well-established playbook to destroy freedom.

Irish Book of Kells is Not From Kells: How Scotland Lost Its History

Here is an interesting look at authenticity of provenance.

Whitworth argued that while the Kells monastery was founded in AD807, it did not become important until the later ninth century. “This is too late for the Book of Kells to have been made at Kells. The Iona hypothesis, while worth testing, has no more intrinsic value than any other,” she said.

Dr. Victoria Whitworth is proposing the Book of Kells is misnamed and was actually created at Portmahomack in Pictish eastern Scotland, rather than at the traditionally accepted location of Iona.

We need to start calling it a Book of Portmahomack, in other words, or at least a Book of Picts.

Picts were asymmetric warfare experts who effectively defeated Rome for centuries. Source: John White’s depiction around 1585-1593, The British Museum

How many other “Irish” and “English” achievements are actually Scottish, Pictish, Welsh, or Cornish masterpieces culturally laundered through the extractive imperial narrative machine?

Let’s dig deep here into the significance of a British empire assigning sophistication of the Scots to the Irish instead. Irish monasticism gets celebrated as preserving Classical learning during the “Dark Ages,” while the Picts get dismissed as primitive. The suggestion that Picts actually created Kells completely flips the script on who were the “real” scholars and artists of early medieval Britain. It brings new light to centuries of English/British historical narratives that harshly marginalized Celtic cultures and undermined Scottish intelligence and study.

To be more precise, the Romans used scapegoating methods to assert unjust control. Like claims against the “woke” people today, they cooked a “barbarian conspiracy” as early information warfare. The term “Picti” itself was essentially propaganda for Romans to dismiss an indigenous civilization as “heathens” and justify psychological campaigns of erasure.

Therefore, attributing a masterpiece back to the Picts removes the British oppressive narrative of “no evidence of civilization” and directly challenges modern assumptions about the cultural sophistication of medieval Scotland.

In related news, Neal.fun has posted a fascinating game and (spoiler alert) now I’m not sure I’m not a robot.

This game is as unsettling as the 1980s movie Blade Runner (based on a 1960s book about AI) because it forces you to question your own humanity through increasingly absurd tests. Much like how imperial historians forced Celtic cultures to “prove” their sophistication through increasingly impossible standards, while simultaneously stealing their best evidence. The Picts couldn’t prove their sophistication because their manuscripts had been stolen to be boldly flaunted as Irish.

BladeRunner’s Deckard on the hunt with his special weapon that kills replicants who try to live independent of their master’s design.

In the movie, replicants are given false memories to make them compliant. Imperial Britain gave Celtic peoples false cultural memories – teaching them they were empty vessels while celebrating their stolen achievements as someone else’s genius.

The Picts were essentially turned into cultural replicants – people with no “real” past, no authentic achievements, just vague “mysterious” origins. It’s like saying “these people never created anything beautiful” while hanging their greatest masterpieces in their neighbor’s house for them to see from afar, to cynically undermine their sense of self.

Whitworth’s archaeological evidence from Portmahomack reveals a form of cultural warfare, using information suppression and strategic blindness in a “master” plan. The evidence she has delivered is sound: vellum workshop, stone carving, matching artistic styles. But it has taken so long because anyone acknowledging it would have undermined the imperial story used to destroy authentic Scottish arts and aptitude; challenged false English narratives of brutality and barbarism. Her work has much wider implications.

“Irish” achievements probably Scottish:

  • High crosses with distinctive knotwork patterns
  • Illuminated manuscript techniques using local materials and motifs
  • Advanced metalwork styles
  • Stone circle Christian adaptations
  • Scribal traditions and Latin scholarship methods

“English” innovations probably Celtic:

  • Architectural elements in early English churches
  • Legal concepts found in early Welsh and Irish law codes
  • Agricultural techniques
  • Poetic forms and literary devices
  • Monastic organizational structures

The Book of Portmahomack being displayed as Irish achievement while the Pictish history was erased is simply a cruel British psychological operation. Imagine the point of generational trauma in Scots: your ancestors create Europe’s greatest manuscript, yet you’re raised in British schools to believe your people are helpless savages deserving only constant suppression and punishment.

The ultimate insult was propagandized by Hollywood’s Braveheart. Mel Gibson, infamous for his antisemitism, turned cultural genocide into entertainment, depicting Scots as mad face-painted fools with sticks fighting against civilized English armed troops in polished boots.

The movie’s disgustingly pejorative and inaccurate portrayal of the wrong time period, wrong clothing, and wrong everything perfectly served the toxic narratives of Gibson’s upbringing: Scots as angry backward savages who needed punishment under cruel English “civilization” to cure them of creativity and innovations.

Mel Gibson’s father Hutton was known for Holocaust denial. Their ideological content went beyond being historically inaccurate entertainment into modern propaganda to portray themselves as “civilized” versus “savages” they wanted oppressed. Source: NYT

The same dehumanizing logic that the Empire used against the Picts continues today through people like Gibson, who perpetuate both antisemitic and anti-Celtic stereotypes.

Let me be clear, I am not talking about slow or accidental normalization. Gibson’s modern products rest upon centuries of excusing calculated extremism. Imperial Britain enacted highly explicit policies of oppression like the Highland Clearances, The Acts of Union, the Dress Act of 1746 banning Highland dress, and the Education Act of 1872 requiring English-only instruction. Don’t even get me started on the resource destruction of widespread deforestation during WWII. These weren’t just “accumulated biases” but harsh and abrupt deliberate actions by British elites with documented intent to eliminate Scottish cultural identity.

Therefore, Mel Gibson’s blue-faced buffoonery of his fathers’ liking was an intergenerational ideological transmission of hateful propaganda, cementing toxic lies about Scots as simplistic angry underdogs rather than admitting the thoughtful and sophisticated artists (analytic and wise military strategists), whose masterpieces were stolen.

It’s like Gibson falsely telling stories of the lost worshipers of Ares, when in fact they were successful adherents to Athena.

Meanwhile, back in the world of science, archaeologists are proving how “primitive” Scots were in fact so far ahead of the English they created Europe’s most sophisticated manuscript 500 years before William Wallace was even born.

Kudos to Dr. Whitworth.

And now this…

Tactic Period Evidence
Othering 297 CE onwards Romans label northern tribes as “Picti” (painted barbarians); Eumenius describes “savage tribes and half-naked barbarians”
Achievement Theft ~800 CE Book of Kells/Portmahomack created by Picts, later attributed to Irish monasteries; vellum workshops and artistic techniques misattributed
Narrative Inversion Medieval period onwards Irish monasticism celebrated for preserving learning while Pictish scholarship erased; “barbarian conspiracy” becomes accepted history
Targeting Through Naming 4th-10th centuries “Picti” becomes catch-all term for any unconquered peoples; enables systematic cultural erasure and justifies continued oppression

Trump Can’t Get It Up At The UN

People often say Trump has a hard on for the UN, yet recent events show just how flaccid the dictator is when faced with a massive challenge like simply walking up stairs.

President Donald Trump broke from his prepared remarks at the United Nations on Tuesday to bemoan an inoperable escalator and a defective teleprompter…

But it turns out the cause was…a videographer from the U.S. delegation who ran ahead of him triggered the stop mechanism at the top of the escalator.

The visual of him sending someone ahead to make himself stuck halfway up an escalator, gesticulating about dysfunction while his own team caused his problems, really does make for the perfect political comedy moment.

It’s the kind of symbolic moment of self-sabotage that political satirists dream of – the would-be strongman literally unable to get up the stairs, standing in a puddle of his own legendary incontience.

Doubling down by blaming the UN for equipment his own team was operating just adds another layer to the whole farce, twice.

He joked that whoever was running the teleprompter “is in big trouble.” …the White House was operating the teleprompter for the president.

The reality of such dictatorship diction clearly writes far better comedy than attempts at satire ever could. Simply speaking the truth about Trump is like unlocking comedy gold.

The self-proclaimed strongman is literally stuck halfway up the stairs, too weak to take a step up, ranting like a toddler about others’ incompetence while his own team was sent ahead to sabotage him.

It’s the obvious metaphor for his entire life, going nowhere himself while sending people ahead so he can blame them for all his problems.

Not only does his own team stop him, but then he threatens whoever is “running” the teleprompter… which is his team again, trapped in a cycle of creating his problems and then being angrily blamed by him for his failures to lead them.

In short, Trump believes America will continue promoting him the more he demands someone else be held accountable for his own failures. Blacks? Jews? Hispanics? Asians? Who will he target next?

This tiny tinpot of a man literally cannot move forward under his own power, needs others to clear the path, but then he uses those same people to blame as obstacles to his progress. Rather than adapt as a true leader should, his swollen ankles are frozen while he gesticulates and demands accountability from everyone except himself.

Even Kafka would never make the symbolism of institutional physical and mental decline so obvious. Trump acts like a ship’s barnacle, entirely dependent on the people he is simultaneously undermining, while claiming to hold everything together.

The escalator and prompter weren’t just broken by team Trump, they were delivered as perfect examples of America’s new military dictatorship being in constant malfunction by design. Without Trump, there wouldn’t be Trump problems for Trump to demand more control and create more Trump problems.

Here’s supposedly sitting in the most powerful position in the world, yet a historic failure in property management who is unable to operate basic building infrastructure. It becomes easy to see why he rages at everyone around him while his own apparatus falls down. It’s like watching a mentally ill man try to project strength while pissing himself in fear.

Historian protip: Mussolini, who was killed by his own people, never actually made the trains run on time.

Italians hanged their dictator Mussolini (with his mistress) before he could be tried by international tribunals for his war crimes.
Mussolini was credited in 1932 for an essay “La dottrina del fascismo” written by Giovanni Gentile. Trump’s emotional outbursts sound almost the same. Source: Twitter

Authoritarians are inherently incompetent at leading and eventually run out of people to murder. The apparatus they’ve spent years violently undermining ultimately fails them when they need it most. Just ask Paul Manafort, Trump’s manager, what happened to his prior client Siad Barre.

Historian protip: Barre was the Somali dictator who ruled through manufactured crises and scapegoating before being overthrown and dying in exile, his country left in ruins.

Siad Barre, the Trump of Somalia