It’s Called Fraud: Silicon Valley Billionaires Wearing Karl Marx Masks

The men who promise future “universal high income” from AI abundance won’t tolerate a one-time 5% levy to fund healthcare now.

The gap between rhetoric and revealed preference is the whole game. They’ll promise trickle down paradise tomorrow as long as they can hoard today, and tomorrow never comes.

It’s called fraud.

The “socialist” vocabulary they float serves a specific propaganda function: it preemptively neutralizes redistribution demands by positioning billionaires as already on board with sharing. No need to organize, regulate, or expropriate because you should just trust them to pay their share.

Then they don’t, and what are you or anyone else going to do about it?

As noted in an astute article by Noreena Hertz, the promises arrive after the accumulation phase, from people whose entire careers have been defined by aggressive tax avoidance, regulatory capture, and labor suppression. Their pledge of “universal high income” has exactly the credibility of a Victorian mill owner promising the welfare state, which is to say, absolutely none.

It’s called fraud.

They’re proposing that governments “socialize only the returns” – which means the public bears the risks (job displacement, social disruption, infrastructure costs) while private actors capture the productive capacity itself. That’s not a departure from trickle-down; it’s its perfected form.

Look at what they’re not proposing:

  • Not worker ownership of AI systems
  • Not public ownership of foundational models
  • Not democratic control over deployment decisions
  • Not binding redistribution mechanisms with enforcement

This is trickle-down economics rebranded into “socialist” vocabulary with no actual positive outcome. The structural logic is identical: concentrate ownership now, promise benefits will flow to others later, with no binding mechanism to enforce it. The only difference is rhetorical packaging – instead of “let us keep our wealth and jobs will materialize through market magic,” it’s “let us keep ownership of everything and checks will materialize through our future generosity.”

It’s called fraud.

Larry Page is protesting a one-time 5% tax on his hundreds of billions of accumulated wealth to protect his island-purchasing power. He’s relocating his wife’s marine conservation charity out of state to ensure not one dollar of his wealth contributes to California healthcare, even indirectly, even from the philanthropic arm that’s supposed to demonstrate he has a social conscience.

Meanwhile, Jensen Huang said he’s “perfectly fine” with staying and paying the tax, because why wouldn’t he? The flight is a choice, not an economic necessity, and it isolates the ones leaving as making an active ideological statement about who deserves what.

And remember who started this conversation: Elon Musk, promising “universal high income” along with flights to Mars by 2018, and driverless cars by 2017, while having already relocated Tesla’s headquarters to Texas in 2021 – after taking billions in California taxpayer subsidies.

It’s called fraud.

The man promising future abundance has already demonstrated he doesn’t deliver on predictions and won’t pay present obligations.

As Hertz puts it:

In their envisioned future, the “springs of cooperative wealth” will flow so abundantly that people will receive “according to their needs,” not according to the hours they clock in a factory. If that last sentence sounds familiar, that’s because it comes from Karl Marx.

Elon Musk attacked Black Americans by calling them “Hungry Santa” demanding handouts – using mock Black dialect in July 2020 to harm Black Lives Matter protesters. Now he wants us to believe he’s the Hungry Santa – promising if you give him everything he will give you what you need. Same costume, different marks. Source: Twitter

Billionaires quoting Marx while acting like Rockefeller.

If you think charity spend by billionaires today is controversial, just look back at the early 1900s during industrialization.

It’s called fraud.

“How Google Does It” for AI Security Agents… Doesn’t Tell You “How Google Does It”

Google published a guide to building AI agents for cybersecurity. It contains no architecture, no metrics, no failure analysis, and no adversarial threat modeling. Instead it contains the assertion that Google is doing AI security. It offers four recommendations indistinguishable from any enterprise software deployment checklist since, oh I don’t know, 2005.

This matters, because Google is claiming an authoritative voice, stepping up and then… whoops.

The danger isn’t that Google is wrong, per se. It’s more like they are having a wardrobe malfunction, that their advice is insufficient while dressed as comprehensive.

When Google says “here’s how we do it,” we’re all here waiting for Google’s actual methodology to keep us safe and warm. Then we’re left cold and exposed.

Examples?

  1. The piece recommends “quality agents” to verify other AI agents. If your verifier shares architectural assumptions with the system it’s checking, you’ve added complexity without adding assurance. You’ve built a system that fails confidently. I’ve written and spoken about this many times, including a recent IEEE article on integrity breaches. When multiple systems make the same error, it’s not redundancy because it’s correlated failure. That can be worse than no safety net, because you operate as if you have one. Flawed agents to cover for flawed agents is how Ariane 5 blew up.

    A 64-bit velocity calculation was converted to a 16-bit output, causing an error called overflow. The corrupted data triggered catastrophic course corrections that forced the US $370 million rocket to self-destruct.

  2. Their success metrics center on analyst trust and feature requests. Trust measures psychology, which is much broader and more interesting than narrow technical visions of control. A team can be enthusiastic about a tool that’s completely missing threats. The relevant question—what did the agent miss that humans would have caught—goes unasked.
  3. Most remarkably for a security-focused guide: no discussion of attacks on the agents themselves. Prompt injection. Adversarial inputs. Training data poisoning. Any autonomous system with security permissions is a high-value target. Treating AI agents as trusted infrastructure rather than attack surface is the foundational mistake I’ve spent years warning about at RSA. If you aren’t automatically asking whether your security agent is a double-agent, you aren’t ready to deploy agents.

The “how we do it” framing implies authority as well as a form of completeness. It suggests that you should be following Google to take the steps to go where they must be already. But that doesn’t make sense when you read the text. It gets you to where you either already know that’s not how things are done, or you aren’t getting it done.

Confidence, unearned, is the actual “intelligence” vulnerability. Google just demonstrated it.

From 2026 Berlin Power Outage to 2014 Sony Hack: Follow Russian Cables

While writing this week about the Russian “Vulkangruppe” attacking Berlin, I was reminded of the Sony hack attribution games we played a decade ago.

The isolationist narrative of DPRK was always wrong. It served people who wanted easy answers in both directions. The harder truth has been that North Korea leaked evidence of its Russian-enabled connectivity for nearly twenty years, as anyone willing to trace the rails and cables would know.

Source: CSIS 2019

I don’t take victory laps on attribution. But I’ll take one on the flyingpenguin blog methodology, because it might help set context for what’s happening in Germany today.

In January 2015, I published an investigation here that traced North Korea’s internet infrastructure to Russia.

Remember?

The security community was so busy arguing about whether DPRK was sophisticated enough to have hacked Sony, I doubt anyone noticed the more mundane proofs right in front of them. When the usual skeptics insisted the hermit kingdom lacked connectivity, while the FBI asked us to trust classified evidence, both seemed unnecessarily closed minded.

I took a different, rather classic, approach: follow the open rails, look for the exposed cables.

This is how I identified Russian TransTeleCom as the likely provider, which led to identification of even far greater Russian involvement. I traced their fiber network to the border, by following the railway. I found the Khasan-Tumangang crossing and located photographs showing cables running across the bridge into North Korea. And I noted this was a decade after the 2006 agreement between TTK and the DPRK Ministry of Communications.

In September 2017, 38 North and FireEye finally confirmed that TransTeleCom had gone live as North Korea’s second internet provider, using exactly the infrastructure I’d documented on this blog two and a half years earlier.

The connection runs through the Friendship Bridge at Khasan-Tumangang, precisely where I’d spotted the cables on a pole.

Fast forward to today and Trend Micro published research in 2025 on North Korean cyber operations, officially identifying Russian IP ranges in Khasan and Khabarovsk as key infrastructure for DPRK offensive activity. They note the railway station at Khasan facilitates operations across that exact same bridge I was showing photographs from Panoramio a decade ago.

…North Korea’s significant role in cybercrime – including campaigns attributed to Void Dokkaebi – is facilitated by extensive use of anonymization networks and the use of Russian IP ranges. …Ukraine, US, and Germany have been targeted in these campaigns…

The methodology holds. PR maps, rail schedules, flight routes, treaty boundaries, and even eye-level photography. None of it means classified access or insider sources. It is only following physical infrastructure through physical territory to find the copper or glass running through places controlled by states with interests.

The same methodology applies today when we are tracing who’s really attacking critical infrastructure. Find and follow the burned cables in Berlin or San Francisco, and watch how you end up looking at a heat source from Russia. Protip: look wherever AfD shows interest.

Federal ICE Agents Use MN Checkpoint to Kill Innocent Citizen

Over a decade ago on this blog, and in a presentation at the RSA Conference with a U.S. Army JAG, I discussed how the Clegg court had long ago distinguished between three shots fired while an approaching vehicle posed a threat, versus the fourth shot fired after the threat had passed.

The situation involved soldiers on patrol who ordered a car to stop. When the car failed to follow orders it was fired upon. The soldiers’ claims were evaluated against scientific proof that a fourth shot hit the threatening vehicle after it had passed (entered it from the rear) and was more than 50 feet away. This contradicted Clegg’s testimony that he fired three shots through the front and the fourth shot through the side door as the car passed nearby. The judge thus ruled a fourth bullet was fired “with the intention of causing death or serious bodily harm” and Clegg was found guilty of murder.

In Minnesota news today we have a case directly relevant.

A federal officer shot and killed a woman in Minneapolis on Wednesday, shortly after the Trump administration deployed thousands of immigration agents to the city.

An ICE agent named Jonathan Ross appears to have created his own separation from a woman and then fired when she fled, killing her. Quick review of the video circulating online easily reveals Ross manufactured his own safety position and used it to murder, meaning kill someone who clearly posed no threat to him.

…former senior law enforcement official with knowledge of DHS found Ross’s actions deeply concerning. “I would have been livid if one of my folks were doing that,” the former official, who requested to speak anonymously, told CNN. “… Clearly they didn’t feel threatened.”

I expect formal reviews also could confirm all the intimidation strikes on the car by agents constituted provocation, followed by lateral movement to get clear before firing from a safe position. If that’s what is found, it means premeditation measured in seconds—but nonetheless premeditation of murder.

Renee Nicole Good wasn’t even the target of whatever operation the agents were supposedly running. MPD Chief O’Hara stated “There is nothing to indicate that she was the target of law enforcement activity.” She was a bystander, an observer, someone ICE could avoid and work around. She was a Christian who did youth mission trips and studied vocal performance and creative writing. She was a mother of little kids, a wife, who got trapped at a deadly militarized checkpoint.

The self-defense framework I presented back in 2012 explains how this tragedy isn’t a failure of training that led to a bad heat-of-the-moment decision. This is a sequence of deliberate choices, each of which moved agents toward killing rather than away from it. Any “heat of the moment” defense requires a lack of time to think. The video shows, in direct contrast, an aggressive escalation over many seconds, then a planned step-to-the-side, draw and fire from a stable position. It shows time to reposition. That time was used to aim, and shoot to kill.

Notably, approaching the vehicle to trap, yell and repeatedly bang on it is an aggressive act, not a defensive one (as defined by police themselves, given harsh charges dispensed on pedestrians who dare to obstruct or touch a vehicle).

Two agents approached. KSTP reported audio of agents shouting “Get the fuck out of the car” while violently and repeatedly yanking the door handle for over three seconds—accomplishing nothing except terrorizing the driver into fight or flight. The other positioned himself at the front left of the vehicle, indicating a trap blocking flight, to force a fight. When the panicked driver refused to fight and turned hard right to flee, the blocking agent pivoted left and fired into the departing vehicle from a safe position to the side and behind it as it drove away, as the BBC clearly proved.

He then kept walking toward the car he had just shot into—no stumble, no hesitation, no physiological response of someone who had just escaped a threat. Just forward motion toward his target.

A de-escalation-trained officer would step back, create space, communicate calmly. These agents did the exact opposite, moved in to escalate and push hard for a fight.

Their efforts were not a response to any threat. Stepping in front and then quickly to the side for a clear shot, before firing, is the evidence that an agent had planned and created clearance for himself, not for safety but for a provocation and pivot to achieve a deadly firing angle.

You cannot create a threatening situation through your own aggressive conduct, premeditate lethal force, and then claim self-defense against the response you provoked.

When I first looked at the video, given that I’ve studied defense ethics for over three decades and hold two degrees in it, my impression was that this has all the hallmarks of an execution sequence. ICE agents appear to have setup the exact plan seen around the world in military dictatorships. It is especially reminiscent of the 1989 checkpoint killing of Marine Lieutenant Robert Paz, which was used as a casus belli for American invasion of Panama to remove their leader.

In 1989, America said a checkpoint killing was an act of war requiring head of state removal. What is it in 2026?

Is this checkpoint killing by ICE considered an act of war against Americans, just like it would have been in 1989? Are officials convinced Trump is out of control and putting Americans in danger? And if so, who is going to invade America now to remove the head of state like America demanded for Panama in 1989?

The federal checkpoint in a US city trapped, provoked and killed an innocent citizen. She was simply trying to leave a checkpoint, which paints a structural parallel to Panama regime change that is damning.

Renee Nicole Good is a modern day Lieutenant Robert Paz.

Let me explain how we can see the injustice, in more detail.

Look at the agent movement frame-by-frame. Around 16.5 seconds into the video that I have, the agent who had been positioned at the front of the vehicle pivots to his left and fires into the car from a safe distance to the side. The vehicle already turned HARD RIGHT and is moving safely AWAY from all the agents to flee them. At the moment of discharge, the shooter positioned himself clear and to the LEFT SIDE and then rear of the vehicle—completely opposite its path.

Click to enlarge. Source: YouTube

A further analysis of 701 extracted frames at 30fps offers several provable conclusions:

  1. Direction of travel: Vehicle turned right, agents all stood to the left. No agent was in danger on the right or in the vehicle’s path at the moment shots were fired at the vehicle leaving them.
  2. Temporal gap: Approximately 1-2 seconds elapsed between vehicle movement initiation and shooting—enough time for the agent to assess threats (if any existed) had passed.
  3. Agent mobility post-shooting: All agents standing and walking normally in aftermath frames. The supposed agent at risk is the most able and active, appearing to still be in aggression mode walking towards the vehicle. No agent showed any indication of any harm. Noem’s claim that the officer was struck is contradicted by the video that shows the officer positioned himself to strike the vehicle (not the other way around) and then shot the driver in violent aggression and escalation when the driver was leaving.
  4. The pivot-to-the-side: The shooter had been at the front left of the vehicle. As the vehicle began moving, he pivoted left and fired from a position completely to the side—safe, clear, and facing a departing vehicle. He manufactured his own clearance, then used it to shoot.

This checkpoint killing is far worse than the foundational Clegg findings.

In that case, the court had to reconstruct bullet trajectories to prove the fourth shot entered from the rear. Here, you can watch the geometry in real time as an officer steps back and murders a woman who poses no threat to anyone. The agents’ high aggression and vehicle’s rotation away from the agents is visible by frame.

The Clegg forensics have been disputed in subsequent decades. But in Minneapolis, there’s no trajectory reconstruction needed as you can watch an agent step to the side and fire at a vehicle driving away from him. Even extremist gun advocates accept that shooting at a fleeing vehicle would be murder if proven. They just dispute whether it was proven in Clegg. In Minneapolis, it’s on video.

The video also shows a doctor identifying himself and attempting to provide aid, only to be told “I don’t care” by an agent who directed him to back away. That’s obstruction of emergency medical care to someone they just shot. It compounds the accountability question.

Related:

The Babbitt family sued after she joined a violent protest and was shot dead by federal officers.

Babbitt’s estate filed the $30 million lawsuit after her death, alleging that she was wrongfully killed by a Capitol Police lieutenant as she tried to climb through a broken window near the Speaker’s Lobby inside the U.S. Capitol.

President Trump sided with the family, and sent a clear message to law enforcement not to shoot.

The Trump administration has agreed to pay a $5m (£3.7m) settlement to the family of Ashli Babbitt, a US Air Force veteran who was shot and killed by a Capitol police officer while breaching the US Congress on 6 January 2021. […] Trump in March told conservative news outlet Newsmax that he’s “a big fan of Ashli Babbitt”…. “And a man did something unthinkable to her when he shot her, and I think it’s a disgrace,” he said, promising to “look into” the lawsuit brought by her family.

Presumably now Trump will offer the Good family millions as well.