Kanye West Won a Grammy in 2006 With Anti-Semitism. Are You Really Surprised at Him Today?

Seems to me some obvious hate propaganda methods (even “fighting words“) were being overlooked as they came from an American artist.

I mean there’s art to shock or express distaste, and then there’s… targeted hate as intention.

“Out of political and historical responsibility, I would check whether something in this exhibition violates human rights, whether something offends Jews or other minorities,” [Wolfgang Benz, the former director of the Center for Research on Antisemitism (ZfA) at the Technical University of Berlin] told the Tagespiegel daily newspaper. “Artistic freedom ends,” he added, when an artwork violates those considerations.

Kanye seems more obvious to me, perhaps, than even controversial lines by the provocative Public Enemy song “Welcome to the Terrordome”.

Crucifixion ain’t no fiction
So called chosen frozen

My first exposure to that prose was actually from Pakistani and Egyptian kids in early 1990 gleefully chanting them as they blasted it from cheap boom boxes.

The related news of 1989 was how that music group’s “Professor Griff” (Richard Griffin) also gave newspaper interviews (since Twitter didn’t exist yet) to clarify that he believed Jews “were responsible for the majority of wickedness that goes on across the globe.”

Surely Kanye grew up watching such words come out of fame and fortune, yet somehow he missed the part about a music career ending due to hate speech.

Fast forward to today and all I know is that one of my least read posts ever on disinformation was back in 2006 about his art:

Kanye here tries to flip the story, like he’s making Kristallnacht into a song, to attack Jews for the crimes of these modern-day Nazis. The video goes even further than lyrics, using well-known propaganda imagery tactics to breed racial tension and anti-semitism.

Griff didn’t make it and yet somehow Kanye sailed along making profit from hate for so long.

Why Russian Hackers Fail: Ukraine Defense Lessons

There’s an old bogus saw in IT that goes something like attackers only need to be successful once yet defenders always have to succeed.

As you can probably tell I really dislike such thinking.

The reverse is actually well known and practiced often. Defenders benefit from efficiency that comes through “defense in depth”. It’s a pervasive practice that completely invalidates nonsense about attackers needing just one success.

History shows us many examples of building designs that had not just one wall, but many layers plus other measures. Attackers since the beginning of time have been forced to run expensive campaigns to have chances of success… given defenders are even a little bit thoughtful about threats.

Maginot’s line is the counter-example of great infamy that also proves this point.

The actual man Maginot (a French WWI veteran with literal tunnel vision) could not think of anything other than spending exorbitant sums of money on dumb walls with passages beneath them.

Meanwhile threat models of WWI worth noting were about rapid mobility, such as powerful engines of emerging airplanes and trucks/tractors that could go right around those walls. Had Maginot’s campaign been tempered against France (and Britain) leading the world in combustion engine innovations, Nazi General Rommel would have been more quickly exposed for his greed/incompetence.

Another way of expressing this is in basic economics, which is to say investing in inexpensive controls that increase cost of attacks tend to be highly effective prevention measures.

Investing in expensive controls that attackers can bypass easily… that’s the opposite of defense, that’s insider threat as demonstrated by America First’s Wall Fraud.

Seriously, America First (a continuous hate platform since it was started by the KKK 1915) campaigned to divert security funds away from sensible use at air and sea ports instead into stretches of empty desert where no real threats existed. And in reality the money went into pockets, leaving America less safe — ergo, insider threat.

With that background and context, lately I’ve been asked quite often why Russia’s big hacker threat failed to materialize.

The simple answer is that Russia did attempt to attack, but it’s overblown reputation for hacking ability was based on a history of petty crimes more than anything.

It’s a bit like saying why didn’t the pickpockets of Moscow’s buses manage to jump into a mostly automated tank and roll through Kiev streets victorious.

A lot of things stood in the way, not least of all repetition of history: simple and inexpensive defensive measures stood up in Ukraine to rushed and complex attacks of low integrity.

Russia since 2014 had been attempting rather loud sustained cyber warfare against Ukraine, leaving nothing to surprise. This created a heavily defended environment with critical data resilient through support of widespread (e.g. distributed) technology allies.

As a tangent, I don’t mean to throw any more water here on the popular tactic of security consultants lighting fires in critical infrastructure to win funding.

Honestly it’s not that expensive to increase the security levels in most environments. In fact, it’s downright shameful how inexpensive better security can be when experts get involved. This actually feeds into attacker motives as they tend to whine about “these lazy people deserve to be hacked” if you ever monitor such forums.

I dislike victim shaming and I dislike fear-based fundraising. Both unfortunately tend to mix into a debate about why bankers (accountants who tend to operate critical infrastructure risk management in market-based countries) starve defense budgets until they essentially transfer wealth to attackers or overly animated and expensive “saviors”.

Back to the point, Russian hackers have now been indisputably proven a paper bear as they couldn’t put up a fight. I tend to explain this in three related ways.

1) Russian hackers (and those they trained) like domestic abusers actually tend to be very risk-adverse predators who exploit known and easy weakness for quick personal gains. That equation tends to be trivial to change by security professionals.

2) The first point is compounded by organization. Even a petty thief becomes highly dangerous when acting in a mule role under coordinated criminal syndicates. That equation is non-trivial to change. Yet security professionals as well as political scientists have much history success to draw upon here. NYC Mayor LaGuardia didn’t have an airport named after him for nothing.

3) In both points above we’re still talking financial motivations more than social or even cultural let alone religious or racial. As I’ve spoken and written here for many years, disrupting financially-motivated hackers is the least difficult level of defense given a law enforcement paradigm for MEECES (or MICE).

In conclusion, post-2015 efforts and certainly late 2021 basic defense measures in Ukraine (VERY inexpensive measures) made Russian hackers fail and run.

It’s been such a non-issue headlines went from “America isn’t prepared for what’s coming” to… crickets.

Russia’s biggest mistake in 2022, similar to Putin’s KGB job to breed Nazi terror cells in 1980s Germany, therefore seems to be a plan to roll into fights on an assumption everyone and everything in their path would be just a coin-operated fraud (like themselves).

Higher orders of defense (efficient ones especially) tend to toss such looming threats off the day of actual battle, even despite spending just a little time and money instead of a lot.

At Least 1/3 of North Korean Missile Program Funded by Crypto

A decade ago or so people seemed surprised when I warned about links between Crypto and North Korea (or even Russia) military funds.

Now the U.S. Deputy National Cyber Adviser, Anne Neuberger, is very publicly stating one-third of North Korea’s missile program is funded by Crypto.

Neuberger analysis seems based on the fact that $1bn in Crypto was stolen in the first nine months of 2022 alone — it’s a total mess of insecurity and societal harms.

This reminds me of a consulting engagement on Crypto risks many years ago, which I’ve written about before.

I was parachuted into a bank to help their executive teams navigate Crypto. They asked whether a giant power generation plant pushing them to invest in bitcoin mining on massive scale (energy sector generally is run/owned by for-profit bankers in America) should be given the green light.

“That’s all we need to know” I remember a roundtable of executives saying after I asked if they really wanted the blood of North Korean missile launches to be on their hands.

The hungry power company was given a giant negatory.

This idea of “blood Crypto” that I presented back then wasn’t meant to be new, but something more like the latest chapter in an old tragic story.

Having long studied anonymity games for weapons proliferation among global hate groups (e.g. “blood diamond” money laundering to fund mercenaries and coups in Africa — “fascist pig” glorification) it seemed somewhat obvious to me where Crypto was and would sit for some time — organized international crime.

People often told me they didn’t see a dark Crypto future, until I explained the past reality of blood diamonds.

I guess more to the point, many people STILL wear diamond assets around publicly like they just don’t see “it”, and many people STILL boast about owning Crypto assets.

The evolution from diamond crimes to Crypto crimes shouldn’t seem abrupt to anyone observing particularly onerous billionaires in the news.

If you remember, websites were setup by white South Africans specifically to allow unregulated international movement of racist mining wealth (PayPal was a “fast and easy” money transfer service intended to escape humanitarian regulations).

“Fascist Pig” glory like a Tatra T87 story right out of 1938: Peter Thiel and Elon Musk moved from South Africa to America and nearly killed themselves in a sports car because Musk couldn’t figure out how to drive.

From there Crypto really became a minor change to expand global risk. This also probably explains why white South Africans STILL so brazenly promote toxic odious Crypto mines today even though it should bring to mind their parent’s washing of blood diamonds.

The bottom line is that for the last two years Crypto (crime) has funded modernization of North Korean long-range missiles, which soon pose direct nuclear threat to all of America.

Pentagon Announces Mission in Germany to Streamline Aid to Ukraine

This past September European Command (EUCOM) head Gen. Christopher Cavoli presented a new plan for EU defense to Defense Secretary Lloyd Austin. A dedicated Ukraine mission would be run in Germany, to solidify progress made since 2015 to protect Europe against unprovoked Russian aggression.

The NYT described the plan soon after as “streamlining an assistance system…created on the fly” with several hundred dedicated personnel. Results have been nothing but impressive since then, including supply-chain security measures to reduce integrity risks (fraud, graft) and ensure intended outcomes.

In retrospect, before Russia invaded earlier this year, the US, Canada, Lithuania, Denmark, Poland, Sweden and UK (Joint Multinational Training Group-Ukraine) had been operational inside Ukraine near Lviv. Thus the September Pentagon announcement continues to be notable for Europe (or even Africa), not least of all because of its role in fighting corruption, yet it hasn’t restored official staffing levels that once were inside Ukraine.