Nancy Altman, the president of the advocacy group Social Security Works, told CBS News they heard from SSA employees that officials from the Department of Government Efficiency, or DOGE, had been trying to get access to the Enterprise Data Warehouse — a centralized database that serves as the main hub for personal, sensitive information related to social security benefits such as beneficiary records and earnings data. Altman was told King had been resistant to giving DOGE officials access to the database.
“She was standing in the way and they moved her out of the way. They put someone in who presumably they thought would cooperate with them and give them the keys to all our personal data,” Altman said.
She was standing in the way? It’s literally her job to defend the Constitution. That’s not in the way, that is the way.
Paid content to the Washington Post was abruptly rejected without explanation.
[Asking about] anything they could do to alter the wrap to make it more suitable, they were simply told that the Post could not run it.
“When we asked questions, they said they couldn’t tell us…
Virginia Kase Solomón, Common Cause’s president and chief executive, told CNN the Post’s decision was “concerning,” saying the paper — which uses the slogan “Democracy dies in the darkness” — “seems to have forgotten that democracy also dies when a free press operates from a place of fear or compliance.”
[…]
The White House’s grievance with the AP… has also led to the publisher being indefinitely banned from the Oval Office and Air Force One, hindering its coverage.
When the group was instructed on how to submit new content, they said an ad supporting Trump was the suggestion.
“They gave us some sample art to show us what it would look like,” she said. “It was a thank-you Donald Trump piece of art.”
Clearly the Washington Post has positioned itself into a noticeable stance enabling Trump to kill democracy. Therefore, from a military intelligence history perspective, let me suggest this messaging campaign demonstrated some standard civilian influence operation principles: clear identification, an appeal to authority, and actionable solutions. Its effectiveness would vary significantly, which begs a question why Washington Post was so scared to print such basic ad material. Who did they really expect to be so affected by this it needed to be stopped?
The content that Washington Post abruptly refused to run, fits their earlier editorial decision to block election opposition to Trump
Look, we’ve got a textbook example here of defensive democracy messaging that deserves immediate deconstruction. The visual security stack is straight out of the propaganda playbook – blood-red emergency signaling combined with documentary-style monochrome. Classic appeal to authority with the White House imagery.
But here’s the real vulnerability assessment:
The psychological attack surface is multi-layered. They’re running parallel operations with emotional triggers + constitutional legitimacy claims + crisis framing. Smart move embedding that QR code – bridges legacy trust signals to digital activation paths. Basic NIST authentication principles applied to mass communication.
A critical security flaw though, maybe? They’re treating this like a typical partisan buffer overflow when it’s actually a privileged access management problem. We’re dealing with unauthorized escalation attempts against federal systems by both domestic and foreign threat actors. The messaging fails to address the core exploit: ethno-nationalist groups coordinating with external nation-state actors to compromise democratic institutions.
The platform censorship without transparency is a control plane failure that creates an exploitable trust gap. When WaPo goes dark on defending democracy, they’re essentially running an unpatched system during active attacks.
Basic incident response principles tell us that silence during critical security events automatically amplifies adversarial messaging.
Think Isfahan 1953 – when you leave security vulnerabilities in democratic systems unaddressed, you’re inviting exploitation. This isn’t about partisan messaging effectiveness anymore. This is about fundamental controls to protect constitutional processes from compromise.
Short version: They’re running outdated defensive patterns against evolving hybrid threats. Fix the trust architecture first, then worry about the messaging stack.
Voice of America shows the Russian government looking rather insecure and destabilized after falling victim to a simple propaganda campaign.
On Jan. 23, the Ukrainian-language Telegram channel BAZA, whose full name — BAZA, ce Hʼyuston (Base, This is Houston) — published a video of Trump addressing Putin. The video was marked with the logo and banners of the state television channel Rossia-1, which allegedly broadcast it with Russian dubbing.
In the video Trump appears as saying:
“I do think Putin is a strong leader, and I respect that, but he plays bad games. And that always ends badly. We all remember the story of Saddam, Ceausescu, and, of course, Qaddafi … terrible death. I tell you, but that’s how it ends. So, Vladimir, let’s not let it come to that.”
The video went viral by Jan. 24, spilling over to other social media platforms and even news outlets.
BAZA’s marketing team then announced in the comment to the original post that the video is a deepfake generated with the use of artificial intelligence.
The goal of the campaign, they said, was to “demoralize” the “most active Russians,” and “we did a good job.” The channel’s description even includes a link to its website, whose main page declares “We make cool deepfakes.”
a blog about the poetry of information security, since 1995