Monday, January 29, 2024

We Can't Ban Our Way To A Better World

  Who's talking about a better world? Covid-19 was just the appetizer!

Authored by Charles Krblich via The Brownstone Institute,

Il nous faut de l’audace, encore de l’audace, toujours de l’audace!

(We need audacity, more audacity, always audacity!)

Georges Jacques Danton

Just a short time ago, on a Saturday, before a flake of snow glistened in the air on the following Sunday, an imminent weather emergency caused New York Governor Kathy Hochul to “ban travel” and postpone the Steelers-Bills super Wild Card game until the following Monday.

Certainly, severe weather is a legitimate reason to cancel or postpone events, and to stridently warn against travel during white-out conditions in a blizzard, but a travel ban?

Banning isn’t limited to travel during white-out conditions in blizzards though.

It is truly a bipartisan pastime.

Ban gas stoves; Ban gas-powered generators; Ban books; Ban misinformation; Ban fake news; Ban gender affirming care; Ban parents from being notified of gender transitions; Ban abortions; Ban the banning of abortions; Ban gasoline powered cars and trucks; Ban the unvaccinated; Ban the unmasked; Ban DEI; Ban gas boilers; Ban coal; Ban nuclear; Ban high-capacity magazines; Ban guns; Ban incandescent lightbulbs...

Those bans are just to fix all of society’s important problems, but there are presumably less important things that need banning as well. What would really help is banning honors classes to produce equity, banning youth tackle football, and even banning sledding! In Canada!

If we pass just a few more laws that ban the things we don’t like and banish the people who support them, utopia will arrive and thou-shalt-not do anything.

Maybe you agree with some of these bans and maybe you disagree with others. Certainly if you have any political leanings at all, some of these bans will find your enthusiastic support and others your passionate fury. The most difficult position to hold is that none of these things should be banned, and people should largely be free to do as they please. That position infuriates everyone!

Yet it is clear beyond any doubt that bans simply don’t work. I was a child during the “Just Say No” anti-drug campaign. Drugs were banned, and yet always available. Chicago has banned guns for years and yet has incredibly high gun violence. We banned smiles, playgrounds, and normal personal interaction for years in order to ban Covid and we still catch Covid.

Ironically, it is the rebels who pay no attention to the bans that are often celebrated by history. This is true both in real life and in fictional epics familiar to everyone.

In real life, the Russian Samizdat reproduced, often by hand, great works of literature like Doctor Zhivago and The Gulag Archipelago. Much of their work was producing political texts and personal statements – editorials – that often criticized the Soviet Government and offered alternative solutions to the government’s handling of events. The members of the Samizdat faced severe punishment involving torture and death if they were caught, and we celebrate their courage today.

Fictionally, we celebrate the scrappy rebels in the Star Wars franchise, we root for Neo to win back humanity’s freedom from the scourge of the machines in the Matrix franchise, and we feel the passion and duty of Atticus Finch as he does the unthinkable in his society and defends a black man accused of raping a white woman because it’s the right thing to do.

There are so many more examples, but what is important is that in each example there are laws – either written or unwritten – that are being broken in service of true liberalism. In the Samizdat example, there are often steep personal costs paid, but the delusions of the Soviet state eventually faded and the members of the Samizdat became celebrated heroes rather than vicious criminals spreading misinformation.

In each of the stories there is inevitably a society, culture, or villain that is unbearably cruel and filled with hypocrisy and judgment. Whereas the villain wants complete control, abject anarchy, or the banishment of all non-conformers, the heroes always have the strength to follow their own conscience.

Isn’t this the world we live in? Both sides see themselves as the heroes resisting the unbearable cruelty and hypocrisy of the other. To quote Canadian Prime Minister Justin Trudeau:

They don’t believe in science/progress and are very often misogynistic and racist. It’s a very small group of people, but that doesn’t shy away from the fact that they take up some space.

This leads us, as a leader and as a country, to make a choice: Do we tolerate these people?

What are the means and methods for not tolerating someone? Banishment is, of course, one of them, and thus bank accounts were frozendisabled grandmothers assaulted, and rebel ringleaders jailed. The state does not need Gulags if on one hand they can approve of some riots but use unapproved protests to turn off your ability to bank, transact, work, and live with the flip of a switch.

The last few years have taught us how fast a person can be turned into swine and banished without remorse.

This moral dilemma is highlighted in one of the allegedly “banned” books. “Banned” because it has racist language, yet still freely available in every book store and on Amazon, there is a character who is a strict disciplinarian who often chastises the main character for his recklessness. She is on a mission to ban his audacity and wildness. She desires to “civilize” him.

That is ultimately what banning is trying to bring about: one’s idea of proper civilization.

Yet civilization thrives in the cracks and margins, in the collective behavior of individuals striving to live the lives they desire despite their circumstances. The Samizdat copied the great literature because it was worthwhile, and in our “banned” book, our main character discovers his friend has been betrayed and will be returned to slavery if our character stands by idly.

So Huck Finn, who values his own sense of freedom more than anything, does what we all should do in the face of the “civilizers:” drop our pretenses and say, “All right, then, I’ll go to hell.”

In doing so, he follows his gut instincts and makes one of the most important moral decisions of his life. Maybe, if we follow that example, we wouldn’t be so concerned with fixing society by banning things like sledding, and would in turn find the lost joy that lives in untamed audacity and recklessness.

Wednesday, January 24, 2024

Oh SH*T, Something BIG Is Happening With Trump, The Media Is Scared (Russell Brand Video - 23mn)

  A dose of Russell brand about Trump. 😀

  The fact is that people now understand that if you want to fight the Deep State, like him or not, Trump is the only path available and so they flock towards him creating a landslide! As simple as that.

  But can trump deliver? Hard to tell. Some people are talking of Douglas McGregor and Tucker Carlson joining him to govern. That could make a difference!

 


Toyota Chairman Says Electric Cars Will Never Dominate Global Market

  Isn't it obvious by now? 

  In the end EV are perfect second cars for urban families but unworkable outside large cities. More ominously, they pollute just as much as gas powered cars just differently. 


Toyota's chairman and former CEO, Akio Toyoda, is at it again: providing the public with a dose of reality that electric vehicles will never dominate the global car market.

Toyoda, grandson of the founder of the world's largest car manufacturer, expressed at a business event this month, as reported by The Telegraph, that EVs will never capture 30% of global market share. 

Toyota President Akio Toyoda gestures at a briefing on electric vehicle battery strategies at the company's showroom in Tokyo, on Dec. 14, 2021. (Behrouz Mehri/AFP via Getty Images)

He explained that petrol-burning vehicles and hybrids, along with hydrogen fuel cell vehicles, will dominate. 

Toyoda made the point: How can EVs be the future when a billion people on Earth have no electricity? 

Data from Statista shows nearly a billion people in the world are living without electricity.

He noted: "Customers — not regulations or politics — should make that decision." 

Over the years, Toyota has openly demonstrated defiance against governments and NGOs pushing for 100% EVs in just a few decades, if not earlier. 

In October, Toyoda told reporters at an auto show in Japan that EVs aren't the silver bullet against the supposed ills of carbon emissions they're often made out to be.

Toyota has a history of being at the forefront of adopting new technologies. However, its slow EV adoption is because of its mistrust of lithium-ion batteries, and it has positioned itself to be a leader in hybrid vehicles.  

Perhaps Toyoda has been vindicated to some extent as EV demand slumps. 

In recent days, Ford announced plans to slash production of its all-electric F-150 Lightning in April "to achieve the optimal balance of production, sales growth and profitability." 

For those who purchased EVs during the Covid mania, the average price of a used Tesla has collapsed

And used Tesla prices are likely to slide more as rental car company Hertz Global Holdings has decided to dump 20,000 EVs onto the already sliding used car market.  

BloombergNEF data shows prices of EVs that were part of rental car fleets have also crashed. 

Toyoda concluded: "Engines will surely remain."

Will Elon Musk respond to Toyoda's comments?

In Early 2020, A Chinese Source Trusted By FBI Said COVID Leaked From Wuhan Lab, Sources Say

  Another conspiracy theory confirmed?

  In fact, it looks more and more that almost every story is true to some degree, except of course when it concern flat earth, space and UFOs, or when they are disinformation planted to misled or to discredit. The rest is unfortunately all true.

Authored by Michael Shellenberger and Alex Gutentag via Public subsatck,

FBI’s entire 25-person Chinese intelligence squad knew of reliable human intelligence that SARS-CoV-2 Covid leaked from a lab...

Over the last several months, Public has reported on a growing body of evidence that the SARS-CoV-2 virus that caused the Covid pandemic escaped from a lab in Wuhan, China. Last year, Public and Racket were the first to report that US government officials had identified that the first patients to become sick with Covid worked at the Wuhan Institute of Virology (WIV).

Now, Public has learned from multiple sources that the FBI knew since at least March 2020 that Covid was the result of a lab leak. A Chinese national from Wuhan, working as a confidential human source (CHS) for the FBI, told their handler at the FBI’s Chinese Intelligence Squad. The sources said it was probable that the whole squad of 25 people knew.

“A person working at the Virology Institute lab in Wuhan, China was infected, left the building, and spread the virus outside the lab in Wuhan,” the CHS told the FBI, according to a source.

“It didn’t have anything to do with the wet market or the bat soup story they were going with.”

The sources asked Public to protect their identities and those of their colleagues. The sources say they are speaking up now out of concern over abuses of power within the FBI. They reached out to Public after seeing our story yesterday about how scientists, who Anthony Fauci’s National Institute of Allergy and Infectious Diseases (NIAID) had in the past funded, sought to insert a furin cleavage site right where it exists on SARS-CoV-2.

The sources added that the FBI trusted the CHS because the person’s information had been corroborated at least three times previously.

“The CHS was from Wuhan, had been vetted, and the person had provided information on three prior occasions that they were able to corroborate as true and reliable.”

Another source said the FBI had considered the information “good intel.”

...

Two sources said that the CIA may have been conflicted in investigating its origins because it didn’t want to compromise investigations of the Wuhan lab that predated the outbreak of Covid-19.

There was a clear lack of interest in a robust analysis of Chinese military connections to WIV research, connections between Chinese military and civilian research, and connections that could be drawn between US research and WIV activity,” the whistleblower said.

Former Director of National Intelligence John Ratcliffe suggested that there could be additional reasons behind the CIA’s lack of disclosure about COVID’s origins. 

...

Fauci may have also tried to influence the FBI.

Conspiracy Theorists Were Right About Climate Lockdowns

   In the 21 Century, a new idea can easily be tested in one place, amended, improved then broadened across the planet as we have seen during the Covid crisis.

Authored by Bobbie Anne Flower Cox via The Brownstone Institute,

Well folks, I really hate to say this, but it’s another win for the conspiracy theorists. They can take off their tinfoil hats and take a deep bow. Yet another one of their outrageous “predictions” is coming true. For anyone keeping score, sadly the score card is rather one-sided. I think the count is something like Conspiracy Theorists = 1,000,000 wins vs. Logic & Normalcy = 0 wins. Boy how I wish we could win some on the “Logic & Normalcy” scale!

So, I acknowledge that I do have a rather dry sense of humor. I throw sarcasm in there a bunch. A couple of my friends tell me they cannot always tell when I’m being serious or if I’m joking. This makes me think that quite a few of you will be wondering, “Is she serious or is she joking with the title to her article?” To that I answer, I will tell you what I know, and then you decide. (You know how I love to promote critical thinking)…

Last week, our unfortunate Governor of New York, Kathy Hochul, issued a TRAVEL BAN for an entire county. You read that correctly. No, not a travel advisory, but a full on travel ban! Meaning, New Yorkers in Erie County were forbidden from going anywhere. What’s another name for that? Well, if you live in a rural or very suburban area (which most of New York State is), where driving on a road is the way you get from point A to point B, then I would say a synonym would be “lockdown.”

And what was Dictator Hochul’s, I mean Governor Hochul’s, reason for this lockdown of close to one million New Yorkers that live in Erie County? Wait for it. Ready? It was going to SNOW! For anyone who does not live in New York, or who has never been to Western New York in the winter, that area of our state gets a lot of snow. Often. And yet, the governor thinks (all of a sudden, out of nowhere) everyone living there is so ignorant, they must be confined to their homes until she says it’s safe for them to rejoin the world again. Either that, or she’s just testing you to see how far she can take her totalitarian desires. Or both.

For all the keyboard critics who love to jump in and twist my words, I’ll cut you off at the pass and say that I am not admonishing a governor’s desire to keep people safe in the wake of a storm. That’s not at all what I am saying. If a natural disaster is approaching, people should be warned, emergency services ready to roll, and help made readily available. Encourage people to stock up, stay home, and hunker down? For sure! Forbid people from leaving their homes? NO.

There is a big difference between caring about New Yorkers’ safety, and wanting to control people. Huge.

And in fact, Hochul was banning people from leaving their homes even if it was NOT snowing! Sound unbelievable? It sure does. But remember in my article last week, I cited an ancient Greek philosopher, Heraclitus, who fittingly said, The truth often evades being recognized due to its utter incredibility.” 

Put another way, when something is so outrageous, it is often cast aside as untrue. Well, here’s what comrade Kathy posted on her Twitter:

She went on to post several other times about the snow and her travel ban. I was actually encouraged to read that most of the comments she received were negative, logical rebuttals to her power grab.

Here are a few…

Ok, so digging a bit into travel bans, you’ll recognize that there have been travel bans based on big storms in the past here in New York. However, those are issued by the local government (i.e. County Executive), after a state of emergency is declared. They are not issued by the Governor, nor are they issued without an emergency declaration.

Does anyone see the correlation here between government overreach, their quest for “centralized” power, and their fear-mongering? It’s the same thing the Governor and her DOH have been doing with their hideous “quarantine camp” regulation that I have been fighting in court for nearly two years now! The name of that case is Borrello v. Hochul, and you can read the details and case history here. Connecting the dots to the analysis at hand, you will note that the quarantine camp regulation tried to take the power from (elected) judges (in keeping with our law) who have the authority to temporarily quarantine sick, dangerous people, and shift that power to unelected, statewide, DOH employees and appointees who have zero accountability to We the People.

Under their quarantine camp reg, the Governor and her DOH would have centralized control over 19 million New Yorkers, to force you to lock down in your home, or they could force you (with the use of police) to go to a quarantine center/ facility/ camp (pick your noun), without any proof you are sick, indefinitely, with no procedure by which you can regain your freedom, and with no declared state of emergency! The fear factor used to try to justify the authoritarian power grab here is the threat of death…If we don’t lock people up who are possibly exposed to a disease, then you might die. Swap out “possibly exposed to a disease” and put in its stead “unclean.” What does that make you think of?

My next question: do you see any similarities here to Hochul’s probably illegal climate lockdown? 

I say “probably illegal” because I couldn’t find the supposed legal authority that she’s relying upon to prohibit people from driving. If you know what she is relying upon, feel free to post it in the Substack comment section below.

Before you draw your own final conclusion about all this, I will add one last thing for you to consider.

In December, a month before Hochul issued this Erie County travel ban, the (Democrat) County Executive, Mark Poloncarz, set up an online portal so residents could check and see if they would be deemed “essential workers” and thus exempt from any futuristic travel bans. Oh, and he coordinated with their “partners” in the federal government to come up with the list!

Sound familiar, folks?!

Remember Governor Cuomo’s C19 lockdown (“Just 2 weeks to flatten the curve”), which lasted for months, and all the “essential workers” that he exempted? Here’s an article about Erie’s coincidentally-just-in-time-for-a-travel-ban portal, “Erie County’s new online portal will identify essential workers exempt from travel bans.”

So… after taking in all that, is it 1,000,000 to 1… or is it 1,000,001 to 0?

Monday, January 22, 2024

Journalist Who Attacked Top Tennis Player For Refusing COVID Vaccine Dies Suddenly

  Remember the Covid crisis of 2020? 4 years ago already. Soon to be followed by the vaccine circus. Excess mortality is still with us in almost all Western countries and still almost no accusation against the vaccines. Talk about the power of money!

  Never mind, eventually the truth will come out. (There is no guaranty that this particular death is related to the vaccine. But statistically the effect is clear and unmistakable. There can be no doubt left!) 

Events have been so frenetic over the past few years that it may be difficult for some to remember, but at the height of the covid panic there was a massive media campaign to destroy the image of any celebrity that publicly refused to take the vaccine.  They could be TV or film celebrities, famous scientists, politicians or even sports figures; it didn't matter.  Anyone with a “platform” and an audience was expected to toe the line on the government covid narrative, or suffer the consequences.

One could argue that the mandates and vaccines were more a loyalty test than an effort to save lives:  Those who complied were considered devout collectivists or at least people who could be controllable, and those who refused to comply immediately stood out as a potential threat.  This is how a world-class tennis player from Serbia, Novak Djokovic, was treated when it was revealed that he was not vaccinated when he entered the Australian Open in early 2022

Djokovic was subsequently removed from the tournament and had his travel visa revoked.  Keep in mind the player had a clean bill of health at the time, but his example of defiance of the jab was considered unacceptable by Australian authorities.  What would follow was an endless attack on his character and intelligence on social media, which a number of corporate journalists joined in on.

One of the lead instigators of this attempt at cancellation was Mike Dickson, a prominent British sports journalist working for the Daily Mail.  Dickson is noted as being relentless in his criticism of Djokovic, calling the player "arrogant and deplorable" for refusing to submit. 

This week, Mike Dickson is reported to have collapsed and “died suddenly” at the age of 59 while covering the Australian Open.  The cause of death has been kept confidential.

Despite Dickson's attempts to paint Novak Djokovic as a global villain, the player had only kind words for the journalist upon news of his passing, offering his condolences.  Contrary to all the accusations, very often it's the covid cultists that act like villains while the people they criticize display character and honor.    

Australia proved to be an exceptionally submissive country when it came to the mandates, and some may blame the lack of complete info available that debunked frantic mainstream claims.  However, even in 2022, there was considerable evidence contrary to government assertions on covid and the vaccines.  

For example, it was well known that the vaccines do not necessarily prevent transmission or infection of the virus, as was originally argued when they were distributed.  And the proof is in the fact that there are endless breakthrough cases (people who are vaccinated but who still get infected).  The FDA doesn't even require evidence that a vaccine can prevent transmission or infection for the product to be approved.

It is was also a fact that covid infections and fatalities from the original strain dropped dramatically well before the vaccines were widely distributed.  

Then there was the Infection Fatality rate, which dozens of studies show to be around 0.23% regardless of how many vaccinated or unvaccinated people there are in a particular region, and the vast majority of deaths were among people with multiple preexisting conditions.  Why take an experimental vaccine for a virus with a 99.8% survival rate, especially if you are a top athlete?

All of this information and more was available to journalists from 2021 onward, but they ignored it in favor of creating artificial panic.

The chaos of covid hysteria has faded and cooler heads have prevailed, but the event still offers a lesson on the fragility of civil liberties and how vulnerable they are to mob mentality and mass fear. 

Those that championed the destruction of the lives and careers of the unvaccinated are discovering that nothing guarantees longevity, and taking other people's freedoms is not the path to safety.

China Stocks Crash Through 'Snowball Derivatives' Trigger Levels Overnight

  China is currently experiencing a bubble bursting exactly like Japan in the 1990s. 

  The difference? China is not Japan. The economy is 10 times bigger and so is the real estate bubble. We may soon get a huge deflationary wave made in China if the government does nothing. Or an inflationary wave if they inflate the bubble further. It will be a very difficult call for China. Let's hope they do not decide to do "something else" and invade China. That too would solve the problem!

Who could have seen this coming?

Last week we exposed the ugly reality sitting just below the headlines of the Chinese stock market - the massive liquidation threat from so-called 'snowball derivatives'.

Specifically, we warned that for those looking for the tipping point, pay especially close attention to the CSI 1000 Index dropping below the 5,300 level, where a wave of knock-ins triggers could accelerate exponentially.

According to Guotai Junan Futures, there are about 30 billion yuan ($4.2 billion) of snowball derivatives products tied to the CSI 1000 Index are near levels that trigger losses at maturity, according to Guotai Junan Futures Co, as the stock rout in #China's stock market pushes the derivatives to near knock-in levels. 

Another 60 billion yuan of the derivatives are 5%-10% away from their knock-in thresholds!

Finally, as Sino Market points out, most Snowball derivatives were opened from Feb to April 2023.

Since the downside knock-in put barriers are set to 75% or 80% of the spot price, dealers estimate that most of those are set at 5,180 points on the CSI 1000 index. 

Additionally, we highlighted Beijing's series of desperation moves to support the flailing stock market, from The National Team (plunge-protectors) stepping in to the idiocy of short-selling bans (that have always worked so well in the past).

Sure enough, after the short-selling ban, we saw - as we always do - heavy selling pressure (long-selling) hit overnight since such trading prohibitions impede investors from determining accurate prices of assets and reduce market liquidity.

Research has consistently shown that banning short selling during stretches of particularly volatile equity market activity intensifies the volatility.

But, again, as Chinese stocks began freefalling, Bloomberg reports a sudden and sizable bidder emerged. Turnover on a handful of ETFs tracking the CSI 300 Index and the SSE 50 Index jump in afternoon trading, a sign that state-led buying continues.

But The National Team could not hold back the waterfall of liquidations from the snowball derivatives that smashed through trigger levels in both the CSI 500 and CSI 1000...

In other words, we are this close to a Chinese market crash... and with it the collapse of yet another wealth source for the 'average jao'... and the potential threat that the CCP fears most - revolution.

Everything that Chinese authorities have tried has failed to convince money managers that the worst is behind us.

“China is a waiting game and we continue to be waiting,” said Mark Matthews, head of Asia research at Bank Julius Baer & Co., which is mostly avoiding Chinese equities.

How much longer can Beijing wait?

While no one really knows what Xi and his pals are thinking, some are wondering if the knock-in liquidation cascade will be the trigger that crashes the market and finally wakes up Chinese officials, forcing it to trigger the stimulus bazooka?

Saturday, January 20, 2024

Digital Kill Switches: How Tyrannical Governments Stifle Political Dissent

  What fundamentally has changed in the 21C is that governments and globalist entities such as the WEF can test ideas in different countries to understand what works without raising concerns, what is unacceptable and how the roadblocks can be lifted. 

  The caveat is that these techniques work one at a time. In case of a major crisis, the incompetence and bureaucracy would probably create a mess out of any strategy. Well, we'll know soon enough.


Authored by John and Nisha Whitehead via The Rutherford Institute,

“No president from either party should have the sole power to shut down or take control of the internet or any other of our communication channels during an emergency.”

 - Senator Rand Paul

What’s to stop the U.S. government from throwing the kill switch and shutting down phone and internet communications in a time of so-called crisis?

After all, it’s happening all over the world.

Communications kill switches have become tyrannical tools of domination and oppression to stifle political dissent, shut down resistance, forestall election losses, reinforce military coups, and keep the populace isolated, disconnected and in the dark, literally and figuratively.

As the Guardian reports, “From Ukraine to Myanmar, government-run internet outages are picking up pace around the world. In 2021, there were 182 shutdowns in 34 countries... Countries across Africa and Asia have turned to shutdowns in a bid to control behaviour, while India, largely in the conflict-ridden region of Jammu and Kashmir, plunged into digital darkness more times than any other last year… Civil unrest in Ethiopia and Kazakhstan has triggered internet shutdowns as governments try to prevent political mobilisation and stop news about military suppression from emerging.”

In an internet-connected age, killing the internet is tantamount to bringing everything—communications, commerce, travel, the power grid—to a standstill.

Tyrants and would-be tyrants rely on this “cloak of darkness” to advance their agendas.

In Myanmar, for example, the internet shutdown came on the day a newly elected government was to have been sworn in. That’s when the military staged a digital coup and seized power. Under cover of a communications blackout that cut off the populace from the outside world and each other, the junta “carried out nightly raids, smashing down doors to drag out high-profile politicians, activists and celebrities.”

These government-imposed communications shutdowns serve to not only isolate, terrorize and control the populace, but also underscore the citizenry’s lack of freedom in the face of the government’s limitless power.

Yet as University of California Irvine law professor David Kaye explains, these kill switches are no longer exclusive to despotic regimes. They have “migrated into a toolbox for governments that actually do have the rule of law.”

This is what digital authoritarianism looks like in a technological age.

Digital authoritarianism, as the Center for Strategic and International Studies cautions, involves the use of information technology to surveil, repress, and manipulate the populace, endangering human rights and civil liberties, and co-opting and corrupting the foundational principles of democratic and open societies, “including freedom of movement, the right to speak freely and express political dissent, and the right to personal privacy, online and off.”

For those who insist that it can’t happen here, it can and it has.

In 2005, cell service was disabled in four major New York tunnels, reportedly to avert potential bomb detonations via cell phone.

In 2009, those attending President Obama’s inauguration had their cell signals blocked—again, same rationale.

And in 2011, San Francisco commuters had their cell phone signals shut down, this time, to thwart any possible protests over a police shooting of a homeless man.

With shutdowns becoming harder to detect, who’s to say it’s not still happening?

Although an internet kill switch is broadly understood to be a complete internet shutdown, it can also include a broad range of restrictions such as content blocking, throttling, filtering, complete shutdowns, and cable cutting.

As Global Risk Intel explains:

“Content blocking is a relatively moderate method that blocks access to a list of selected websites or applications. When users access these sites and apps, they receive notifications that the server could not be found or that access was denied by the network administrator. A more subtle method is throttling. Authorities decrease the bandwidth to slow down the speed at which specific websites can be accessed. A slow internet connection discourages users to connect to certain websites and does not arouse immediate suspicion. Users may assume that connection service is slow but may not conclude that this circumstance was authorized by the government. Filtering is another tool to censor targeted content and erases specific messages and terms that the government does not approve of.”

How often do most people, experiencing server errors and slow internet speeds, chalk it up to poor service? Who would suspect the government of being behind server errors and slow internet speeds?

Then again, this is the same government that has subjected us to all manner of encroachments on our freedoms (lockdowns, mandates, restrictions, contact tracing programs, heightened surveillance, censorship, overcriminalization, shadow banning, etc.) in order to fight the COVID-19 pandemic, preserve the integrity of elections, and combat disinformation.

These tactics have become the tools of domination and oppression in an internet-dependent age.

It really doesn’t matter what the justifications are for such lockdowns. No matter the rationale, the end result is the same: an expansion of government power in direct proportion to the government’s oppression of the citizenry.

According to Global Risk Intel, there are many motives behind such restrictions:

“For instance, the kill switch serves to censor content and constrain the spread of news. This particularly concerns news reports that cover police brutality, human rights abuses, or educational information. Governments may also utilize the kill switch to prevent government-critical protestors from communicating through message applications like WhatsApp, Facebook, or Twitter and organizing mass demonstrations. Therefore, internet restrictions can provide a way of regulating the flow of information and hindering dissent. Governments reason that internet limitations help stop the spread of fake news and strengthen national security and public safety in times of unrest.”

In this age of manufactured crises, emergency powers and technofascism, the government already has the know-how, the technology and the authority.

Now all it needs is the “right” crisis to flip the kill switch.

This particular kill switch can be traced back to the Communications Act of 1934. Signed into law by President Franklin D. Roosevelt, the Act empowers the president to suspend wireless radio and phone services “if he deems it necessary in the interest of national security or defense” during a time of “war or a threat of war, or a state of public peril or disaster or other national emergency, or in order to preserve the neutrality of the United States.”

In the event of a national crisis, the president has a veritable arsenal of emergency powers that override the Constitution and can be activated at a moment’s notice. These range from imposing martial law and suspending habeas corpus to shutting down all forms of communications, restricting travel and implementing a communications kill switch.

That national emergency can take any form, can be manipulated for any purpose and can be used to justify any end goal—all on the say so of the president.

The seeds of this ongoing madness were sown several decades ago when George W. Bush stealthily issued two presidential directives that granted the president the power to unilaterally declare a national emergency, which is loosely defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government functions.

Comprising the country’s Continuity of Government (COG) plan, these directives (National Security Presidential Directive 51 and Homeland Security Presidential Directive 20), which do not need congressional approval, provide a skeletal outline of the actions the president will take in the event of a “national emergency.”

Just what sort of actions the president will take once he declares a national emergency can barely be discerned from the barebones directives. However, one thing is clear: in the event of a perceived national emergency, the COG directives give unchecked executive, legislative and judicial power to the president.

The country would then be subjected to martial law by default, and the Constitution and the Bill of Rights would be suspended.

The internet kill switch is just one piece of the government’s blueprint for locking down the nation and instituting martial law.

There may be many more secret powers that presidents may institute in times of so-called crisis without oversight from Congress, the courts, or the public. These powers do not expire at the end of a president’s term. They remain on the books, just waiting to be used or abused by the next political demagogue.

Given the government’s penchant for weaponizing one national crisis after another in order to expand its powers and justify all manner of government tyranny in the so-called name of national security, it’s only a matter of time before this particular emergency power to shut down the internet is activated.

Then again, an all-out communications blackout is just a more extreme version of the technocensorship that we’ve already been experiencing at the hands of the government and its corporate allies.

Packaged as an effort to control the spread of speculative or false information in the name of national security, restricting access to social media has become a popular means of internet censorship.

In fact, these tactics are at the heart of several critical cases before the U.S. Supreme Court over who gets to control, regulate or remove what content is shared on the internet: the individual, corporate censors or the police state.

Nothing good can come from techno-censorship.

As Glenn Greenwald writes for The Intercept:

"The glaring fallacy that always lies at the heart of pro-censorship sentiments is the gullible, delusional belief that censorship powers will be deployed only to suppress views one dislikes, but never one’s own views… Facebook is not some benevolent, kind, compassionate parent or a subversive, radical actor who is going to police our discourse in order to protect the weak and marginalized or serve as a noble check on mischief by the powerful. They are almost always going to do exactly the opposite: protect the powerful from those who seek to undermine elite institutions and reject their orthodoxies. Tech giants, like all corporations, are required by law to have one overriding objective: maximizing shareholder value. They are always going to use their power to appease those they perceive wield the greatest political and economic power."

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, these censors are laying the groundwork to preempt any “dangerous” ideas that might challenge the power elite’s stranglehold over our lives.

Whatever powers you allow the government and its corporate operatives to claim now, whatever the reason might be, will at some point in the future be abused and used against you by tyrants of your own making.

By the time you add AI technologies, social credit systems, and wall-to-wall surveillance into the mix, you don’t even have to be a critic of the government to get snared in the web of digital censorship.

Eventually, as George Orwell predicted, telling the truth will become a revolutionary act.

Thursday, January 18, 2024

EU President Calls For Globalist Control Over All Information

  You didn't think that pesky things like "freedom" (of information for now, but the rest will follow soon enough) would last much longer right? 

  Either we get their skin or they gets ours but the status quo is finished!

Via: Modernity:

President of the European Commission, Ursula von der Leyen addressed elites at the World Economic Forum in Davos Tuesday, calling for overarching globalist control over the flow of all information in the digital age.

“The top concern for the next two years is not conflict, or climate, it is disinformation and misinformation,” von der Leyen proclaimed, adding “The boundary between online and offline is getting thinner and thinner, and this is even more important in the era of generative AI.”

Addressing the elite as “Excellencies,” and personally naming “dear” Klaus Schwabb in her introduction, von der Leyen further called for the development of “a new global framework for AI risks,” and a vow to “drive global collaboration” to prevent the spread of ‘misinformation’ (information they don’t want you to know about).

Monday, January 15, 2024

"It's All Over": Powell's WSJ Mouthpiece And JPMorgan Confirm Imminent End Of QT

 

  When do people realize they painted themselves into a corner? 

  In a square room, it should be before you start but with money it is not so easy. It always looks like there will be a way to get out of the trap. A new miraculous source of "money" which will solve temporarily the problem. And if you look at the recent past, that is indeed the lesson you can draw... unless you look deeper and the picture changes drastically. In the long term, every single currency has gone to zero. No exception. This is why King Croesus of Lydia is no more and you do not have Roman denarius in your pocket. 

  "So what happens in the end?" you may ask. Well, we're about to find out!


On December 13 the financial world was stunned when, just two weeks after Jerome Powell had said he it was "premature" to speculate on rate cuts, the Federal Reserve did a shocking U-turn and pivoted dovishly, ending the Fed's hiking cycle with inflation still running at double the Fed's target of 2%, and said that it had in fact discussed the start of rate cuts, contrary to what Powell said just two weeks earlier.

Or rather, we should say "the financial world that had not read Zero Hedge was stunned" because just one week ahead of the Fed's December FOMC meeting, we correctly predicted the Fed's pivot due to one simple reason: as we laid out in "The Canary Just Died: Sudden Spike In SOFR Hints At Mounting Reserve Shortage, Early Restart Of QE", the Fed no longer had a choice and was forced to pursue a dovish pivot because the liquidity in the all-important systemic and interbank plumbing had hit dangerously low levels, resulting in the highest SOFR print on record, and the biggest spike since the last time there was a repo market crisis in March 2020.

As we said at the time, "the spike caught almost everyone by surprise, even such Fed-watching luminaries as BofA's Marc Cabana because it was with "no new UST settlements, lower repo volumes, and lower sponsored bi-lateral volumes."  And yet, the spike was clearly there and ominously it was consistent "with the slow theme of less cash & more collateral in the system" - i.e., growing reserve scarcityand "may have been exacerbated by elevated dealer inventories, bi-lateral borrowing need, and limited excess cash to backstop repo."

And the punchline: "If funding pressure persists, it risks Fed re-assessment of ample banking system reserves & potential early end to QT", and depending on how bad the funding shortage gets, an early restart of QE.

One week later, the Fed capitulated on tight monetary policy and ushered in the era of rate cuts, just as we said it would. But more importantly, one month later it was Dallas Fed president (and former head of the NY Fed's plunge protection team) Lorie Logan who said the quiet part out loud when she confirmed our "canary in the coalmine" note, namely that the Fed's QT is effectively over due to the sudden, unexpected slide in systemic liquidity, primarily due to the rapid drain in the reverse repo facility which now has just $600 million left and is set to be fully drained some time in March...

... and that by extension, another round of QE may be on deck.

Of course, it's one thing for a regional Fed president to opine on such things, it's something entirely different for Powell's preferred media leak conduit to confirm it, and yet this morning that's precisely what happened when Nick Timiraos, aka Nikileaks, aka Powell's favorite media mouthpiece confirmed that QT's days are now numbered writing that "Fed officials are to start deliberations on slowing, though not ending, that so-called quantitative tightening as soon as their policy meeting this month. It could have important implications for financial markets."

If that wasn't enough, Nikileaks also confirms our suspicion about the driver behind said QT runoff: the financial plumbing is starting to clog up:

But whereas the Fed expects to cut short-term interest rates this year because inflation has fallen, its rationale for tapering bond runoff is different: to prevent disruption to an obscure yet critical corner of the financial markets.

Five years ago, balance-sheet runoff sparked upheaval in those markets, forcing a messy U-turn. Officials are determined not to do that again.

Several officials at the Fed’s policy meeting last month suggested beginning formal conversations soon, so as to communicate their plans to the public well before any changes take effect, according to minutes of the meeting. Officials have indicated that changes aren’t imminent and that they are focusing on slowing—not ending—the program.

As we first explained almost two months ago, the reason for the Fed's panic is that the central bank wants to avoid the same repo market cataclysm that market both the liquidity drain in Sept 2019 and the violent eruption in basis trades that sparked bond market contagion in March 2020; here is Timiraos confirming as much:

... in September 2019, a sharp, unexpected spike in a key overnight lending rate suggested reserves had windled to the point they were either too scarce or difficult to redistribute across the financial system. The Fed began buying Treasury bills to add reserves back to the system and avoid further instability.

In 2020, the Covid-19 pandemic created a huge dash for dollars. To prevent markets from seizing up, the Fed resumed buying huge quantities of securities. It stopped buying in March 2022 and three months later set the process into reverse, once again shrinking the portfolio.

... which brings us to today, when the Fed did the math and realized that doing $60BN in QT per month once the reverse repo is fully drained will crash the market:

Policymakers have several reasons to consider slowing runoff. First, the Fed is shrinking its Treasury holdings by $60 billion a month—twice as fast it did five years ago. Continuing to run at this rate raises the risk that the Fed drains reserves so quickly that money-market rates jump as banks struggle to redistribute a dwindling supply of reserves.

Slowing the pace of the runoff later this year might allow the Fed to continue the program for longer than otherwise by “reducing the likelihood that we’d have to stop prematurely,” Dallas Fed President Lorie Logan said in a recent speech.

And by "stop prematurely" she of course means suffering a market crash in an election year, one which would drag the economy into a recession in days. And we all know by now (thanks to former NY president Bill Dudley) that is unacceptable, especially when the alternative is a Trump presidency.

Timiraos also confirms that we were right in cautioning that it's all about the accelerating rate of decline in the reverse repo facility (see "How Treasury Averted A Bond Market "Earthquake" In The Last Second: What Everyone Missed In The TBAC's Remarkable Refunding Presentation"):

there are signs that the cash surplus in money markets is rapidly diminishing. The Fed allows money-market firms and others to park extra cash that would otherwise end up in reserves in an overnight reverse repurchase facility. The facility has shrunk by around $1 trillion since late August to around $680 billion. Logan endorsed slowing runoff once that facility is nearly drained of cash because, after that, forecasting demand for bank reserves will be more uncertain.

This "faster-than-expected decline" in the overnight reverse repurchase facility’s balances is spurring the Fed’s movement toward contingency planning around how to slow runoff:

“It has been a surprise to everyone that overnight reverse repurchase balances have fallen this quickly and that reserves have actually increased over this period,” said Brian Sack, who managed the Fed's Plunge Protection Team at the New York Fed from 2009 to 2012.

Actually Brian, you and others may have been surprised, but it certainly wasn't "everyone": we've been warning this would happen since the start of the year, and most recently one week before the Fed's pivot.

There is another reason why the December SOFR spike freaked out the Fed: whereas previously the central bank was wrong repeatedly in estimating what level of reserves would be seen as "ample" by the market, this time around, officials told TImiraos they are going to rely more on market signals in identifying the right level of reserves.

“Last time, we had lots of estimates of where we thought that terminal level of reserves was, and our estimates were too low,” Philadelphia Fed President Patrick Harker said in an October interview. “At the end of the day, the market will dictate where we are.”

Indeed it will, and that's precisely why our premium subscribers were fully aware that the "canary in the liquidity coalmine" died at the start of December, and the Fed's dovish pivot, the end of QT, and the coming QE are now logically following just as we said they would.

And just in case Timiraos' conveying Powell's message that QT is effectively done wasn't enough, here is JPM's head of fixed income strategy with a note overnight admitting the same

This is how JPM sees the wind down of QT: "We now expect that the FOMC will have the outline of a timeline at the January meeting, communicated mid-February minutes to that meeting. We expect that this plan will be formally agreed to at the mid-March meeting and will be implemented beginning in April" at which point the monthly cap on the runoff of Treasury securities to be reduced to $30bn/mo, from $60bn/mo (full note available to professional subscribers in the usual place).

Bottom line: after several years of tightening, 2024 is when the liquidity floodgate reopen and not only does the Fed start to cut rates aggressively, but with QT tapering, we fully expect the next QE to be launched in the near future, sending the dollar into its next, and possibly final, reserve currency death spiral as printer goes BRRRR.

Col. Douglas Mcgregor about the dexline of the West (Video - 1h31)

  This is a long but extremely intelligent and interesting interview. Almost the exact opposite of what you can hear these days on the MSM. Does it offer any hope? I am afraid too few people among the elites think this way.

Note: Amazing! A day later, the video is already gone! And sure enough Douglas Mcgregor did talk about a lot of things in the video, one must have been taboo somehow. But I cannot find a better example of a crumbling society than this endless censorship especially when it concerns the most competent people around. So who are we supposed to listen too? The Davos crowd?


 

Sunday, January 14, 2024

The EU Wants To Spy On Europeans' Internet Use

  This is a complicated and technical post so most people will yawn and may move to something else. It would be a mistake because it is important. 

  There is a clear effort in Europe to take back control of the narrative. The first wave concerned platforms and their ability to remove posts. It would have been difficult 10 years ago but has become over time an easy shot. But likewise, people have become more sophisticated and the information is now becoming more diffuse and distributed to the great dismay of most Eurocrats. 

 The only way to fight this is to insert a "man-in-the-middle" in the Internet so that you can actually identify nodes of information such as this blog and suppress them before the erroneous, extremist, misinformation (pick your choice) spreads. Never mind that you made "one" mistake among hundreds of articles, the mere fact that you contradict the official version will eventually get you cancelled. Imagine such a system monitored in real time by AI and lo, the Chinese system is here. So much for democratic principles. In the end the goal of any bureaucracy is total control. No exception. We are getting closer.

Authored by Robert Blumen via The Brownstone Institute,

The European Commission is an EU legislative body with regulatory authority over digital technology. The EC’s eIDAS Article 45, a proposed regulation, would deliberately weaken areas of internet security that the industry has carefully evolved and hardened for over 25 years. The Article would effectively grant the 27 EU governments vastly expanded surveillance powers over internet use. 

The rule would require all internet browsers to trust an additional root certificate from an agency (or a regulated entity) from each of the national governments of each one of the EU member states. For the non-technical readers, I will explain what a root certificate is, how internet trust has evolved, and what Article 45 does to this. And then I will highlight some of the commentary from the tech community on this matter. 

The next section of this article will explain how the trust infrastructure of the internet works. This background is necessary in order to understand how radical the proposed Article is. The explanation is intended to be accessible to a non-technical reader.

The regulation in question addresses internet security. Here, “internet” means, largely, browsers visiting websites. Internet security consists of many distinct aspects. Article 45 intends to modify public key infrastructure (PKI), a part of internet security since the mid-90s. PKI has been at first adopted, and then improved over a 25-year period, to give users and publishers the following assurances: 

  • Privacy of the conversation between the browser and the website: Browsers and websites converse over the internet, a network of networks operated by Internet Service Providers, and Tier 1 carriers; or cellular carriers if the device is mobile. The network itself is not inherently safe nor trustworthy. Your nosy home ISPa traveler in the airport lounge where you are waiting for your flight, or a data vendor looking to sell leads to advertisers might want to spy on you. Without any protection, a bad actor could view confidential data such as a password, credit card balance, or health information. 

  • Guarantee that you view the page exactly the way the website sent it to you: When you view a web page, could it have been tampered with between the publisher and your browser? A censor might want to remove content that they don’t want you to see. Content labeled as “misinformation” was widely suppressed during covid hysteria. A hacker who had stolen your credit card might want to remove evidence of their fraudulent charges. 

  • Guarantee that the website you see is really the one in the browser’s location bar: When you connect to a bank how do you know that you are seeing the website of that bank, not a fake version that looks identical? You check the location bar in your browser. Could your browser be tricked into showing you a fake website that appears identical to the real one? How does your browser know – for sure – that it is connected to the correct site? 

In the early days of the internet, none of these assurances existed. In 2010, a browser plugin available in the add-on store enabled the user to participate in someone else’s Facebook group chat in a cafe hotspot. Now – thanks to PKI, you can be pretty sure of these things. 

These security features are protected with a system based on digital certificates. Digital certificates are a form of ID – the internet version of a drivers’ license. When a browser connects to a site, the site presents a certificate to the browser. The certificate contains a cryptographic key. The browser and the website work together with a series of cryptographic calculations to set up secure communication.

Together, the browser and the website provide the three security guarantees:

  • privacy: by encrypting the conversation.

  • cryptographic digital signatures: to ensure that the content is not modified in flight

  • verification of the publisher: through the chain of trust provided by PKI, that I will explain in more detail below. 

A good identity should be difficult to counterfeit. In the ancient world, a wax casting of a seal served this purpose. Identities for humans have relied on biometrics. Your face is one of the oldest forms. In the non-digital world, when you need to access an age-restricted setting, such as ordering an alcoholic beverage, you will be asked for a photo ID.

Another biometric from before the digital era was to match your fresh pen-and-ink signature against your original signature on the back of your ID. As these older types of biometrics become easier to counterfeit, human identity verification has adapted. Now, it is common for a bank to send you a validation code on your mobile. The app requires you to pass a biometric identity check on your mobile phone to view the code such as face recognition or your fingerprint. 

In addition to a biometric, the second factor that makes an ID trustworthy is the issuer. IDs that are widely accepted depend on the ability of the issuer to verify that the person applying for an ID is who they say they are. Most of the more widely accepted forms of ID are issued by government agencies, such as the Department of Motor Vehicles. If the issuing agency has reliable means to track who and where its subjects are, such as tax payments, employment records, or the use of water utility services, then there is a good chance the agency can verify that the person named on the ID is that person.

In the online world, governments have, for the most part, not involved themselves in identity verification. Certificates are issued by private sector firms known as certificate authorities (CAs). While certificates used to be quite expensive, fees have come down considerably to the point where some are free. The best known CAs are Verisign, DigiCert and GoDaddy. Ryan Hurst shows the seven major CAs (ISRG, DigiCert, Sectigo, Google, GoDaddy, Microsoft, and IdenTrust) issue 99% of all certificates.

The browser will accept a certificate as proof of identity only if the name field on the certificate matches the domain name, which the browser shows in the location bar. Even if the names match, does that provide that a certificate saying “apple.com” belongs to the consumer electronics business known as Apple, Inc.? Identity systems are not bulletproof. Underage drinkers can get fake IDs. Like human IDs, digital certificates can also be fake, or invalid for other reasons. A software engineer using free open source tools can create a digital certificate named “apple.com” with a few Linux commands

The PKI system relies on CAs to issue any certificate only to the owner of the website. The workflow to acquire a certificate goes like this:

  1. The publisher of a website applies to their preferred CA for a certificate, for a domain. 

  2. The CA verifies that the certificate request comes from the actual owner of that site. How does the CA establish this? The CA demands that the entity making the request publish a specific piece of content on a specific URL. The ability to do this proves that the entity has control over the website.

  3. Once the website has proven ownership of the domain, the CA appends a cryptographic digital signature to the certificate usings its own private cryptographic key. The signature identifies the CA as the issuer. 

  4. The signed certificate is conveyed to the person or entity making the request. 

  5. The publisher installs their certificate on their website, so it may be presented to browsers. 

Cryptographic digital signatures are “a mathematical scheme for verifying the authenticity of digital messages or documents.” They are not the same thing as the online document signing provided by DocuSign and similar vendors. If the signature could be forged, then the certificates would not be trustworthy. Over time the size of the cryptographic keys has increased with the aim of making forgery more difficult. Cryptography researchers believe that current signatures, in practical terms, are impossible to forge. Another vulnerability is when the CA has its secret keys stolen. The thief could then produce valid signatures of that CA. 

Once the certificate has been installed, then it is used during the setup of a web conversation. The Register explains how that goes:

If the certificate was issued by a known good CA, and all the details are correct, then the site is trusted, and the browser will try to establish a secure, encrypted connection with the website so that your activity with the site isn’t visible to an eavesdropper on the network. If the cert was issued by a non-trusted CA, or the certificate doesn’t match the website’s address, or some details are wrong, the browser will reject the website out of a concern that it’s not connecting to the actual website the user wants, and may be talking to an impersonator.

We can trust the browser because the browser trusts the website. The browser trusts the website because the certificate was issued by a “known good” CA. But what is a “known good CA?” Most browsers rely on the CAs provided by the operating system. The list of trustworthy CAs is decided by device and software vendors. The major computer and device vendors – Microsoft, Apple, Android phone manufacturers, and the open source Linux distributors – preload the operating system on their devices with a set of root certificates.

These certificates identify the CAs they have vetted and consider to be reliable. This collection of root certificates is called the “trust store.” To take an example close to me, the Windows PC that I am using to write this piece has 70 root certificates in its Trusted Root Certificate Store. Apple’s support site lists all of the roots trusted by the Sierra version of MacOS

How do the computer and phone vendors decide which CAs are trustworthy? They have audit and compliance programs to evaluate the quality of CAs. Only the ones that pass are included. See for example, the Chrome browser (which provides its own trust store rather than using the one on the device). The EFF (which describes itself as “the leading nonprofit organization defending civil liberties in the digital world”explains:

Browsers operate “root programs” to monitor the security and trustworthiness of CAs they trust. Those root programs impose a number of requirements varying from “how must key material be secured” to “how must validation of domain name control be performed” to “what algorithms must be used for certificate signing.”

After a CA has been accepted by a vendor, the vendor continues to monitor it. Vendors will remove CAs from the trust store should the CA fail to uphold the necessary security standards. Certificate authorities can, and do, go rogue, or fail for other reasons. The Register reports:

Certificates and the CAs that issue them are not always trustworthy and browser makers over the years have removed CA root certificates from CAs based in Turkey, France, China, Kazakhstan, and elsewhere when the issuing entity or an associated party was found to be intercepting web traffic. 

In 2022, researcher Ian Carroll reported Security concerns with the e-Tugra certificate authority. Carroll “found a number of alarming issues that worry me as to the security practices inside their company,” such as weak credentials. Carroll’s reports were verified by the major software vendors. As a result, e-Tugra was removed from their trusted certificate stores

The Timeline of Certificate Authority Failures tells of other such incidents. 

There are still some known holes in PKI as it currently exists. Because one particular issue is important to an understanding of eIDAS Article 45, I will explain that next. A CA’s trust is not scoped to those websites that conduct their business with that CA. A browser will accept a certificate from any trusted CA for any website. There is nothing preventing the CA from issuing a website to a bad actor that was not requested by the owner of the site. Such a certificate would be fraudulent in the legal sense because of who it was issued to. But the contents of the certificate would be technically valid from the browser’s viewpoint. 

If there was a way to associate each website with its preferred CA, then any certificate for that site from any other CA would be immediately recognized as fraudulent. Certificate pinning is another standard that takes a step in this direction. But how would that association be published and how would that publisher be trusted? 

At each layer of this process, the technical solution relies on an external source of trust. But how is that trust established? By relying on an even more trusted source on the next higher plane? This question illustrates the “turtles, all the way down” nature of the problem. PKI does have a turtle at the bottom: the reputation, visibility, and transparency of the security industry and its customers. Trust is built at this level through constant monitoring, open standards, the software developers, and the CAs. 

Fraudulent certificates have been issued. In 2013, ArsTechnica reported French agency caught minting SSL certificates impersonating Google:

In 2011…security researchers spotted a bogus certificate for Google.com that gave attackers the ability to impersonate the website’s mail service and other offerings. The counterfeit certificate was minted after attackers pierced the security of Netherlands-based DigiNotar and gained control of its certificate-issuing systems.

The secure sockets layer (SSL) credentials were digitally signed by a valid certificate authority…In fact, the certificates were unauthorized duplicates that were issued in violation of rules established by browser manufacturers and certificate authority services.

Fraudulent certificate issuance can happen. A rogue CA can issue one, but they won’t get far. The bad certificate will be detected. The bad CA will fail compliance programs and be removed from trust stores. Without acceptance, the CA will go out of business. Certificate Transparency, a more recent standard, enables more rapid detection of fraudulent certificates. 

Why would a CA go rogue? What advantage can the bad guy gain from an unauthorized certificate? With the certificate alone, not much, even when signed by a trusted CA. But if the bad guy can team up with an ISP, or otherwise access the network that the browser uses, the certificate gives the bad actor the ability to break all of PKI’s security guarantees. 

The hacker could mount a man-in-the-middle attack (MITM) on the conversation. The attacker could insert himself in between the browser and the real website. In this scenario, the user would be talking directly to the attacker, and the attacker would relay the contents back and forth with the real website. The attacker would present the fraudulent certificate to the browser. Because it was signed by a trusted CA, the browser would accept it. The attacker could view and even modify what either party sent before the other side received it.

Now we come to the EU’s sinister eIDAS, Article 45. This proposed regulation requires all browsers to trust a basket of certificates from CAs designated by the EU. Twenty-seven to be exact: one for each member nation. These certificates are to be called Qualified Website Authentication Certificates. The acronym “QWAC” has an unfortunate homophone to quackery – or perhaps the EC is trolling us.

The QWACs would be issued either by either government agencies, or what Michael Rectenwald calls governmentalities: “corporations and companies and other adjuncts of the state who are otherwise called ‘private,’ but really are operating as state apparatuses, in that they’re enforcing state narratives and dictates.” 

This scheme would bring EU member governments one step closer to the point where they could man-in-the-middle attack against their own citizens. They would also need to access the networks. Governments are in a position to do that. If the ISP is run as a state-owned enterprise, then they would already have it. If ISPs are private firms, then local authorities could use police powers to gain access. 

One point which has not been emphasized in the public conversation is that a browser in any of the 27 EU member nations would be required to accept every single QWAC, one from each EU member. This means that a browser in, for example, Spain, would have to trust a QWAC from entities in Croatia, Finland, and Austria. The Spanish user visiting an Austrian website would have to transit over Austrian portions of the internet. The issues raised above would all apply across countries within the EU. 

The Register, in a piece titled Bad eIDAS: Europe ready to intercept, spy on your encrypted HTTPS connections explains one way this might work:

[T]hat government can ask its friendly CA for a copy of [the QWAC] certificate so that the government can impersonate the website – or ask for some other certificate browsers will trust and accept for the site. Thus, using a man-in-the-middle attack, that government can intercept and decrypt the encrypted HTTPS traffic between the website and its users, allowing the regime to monitor exactly what people are doing with that site at any time.

Having penetrated the shield of encryption, monitoring could include saving users’ passwords, and then using them at another time to access citizens’ email accounts. In addition to monitoring, governments could modify content inline. For example, they could remove the narratives they want to censor. They could attach annoying nanny state fact checks and content warnings to dissenting opinions.

As things currently stand, CAs must maintain the trust of the browser community. Browsers currently warn the user if a site presents an expired or otherwise untrusted certificate. Under Article 45, warnings or the ejection of trust abusers would be forbidden. Not only are browsers mandated to trust the QWACs, but Article 45 prohibits browsers from showing a warning that a certificate signed by a QWAC. 

Last Chance for eIDAS (a website displaying the Mozilla logo) advocates against Article 45: 

Any EU member state has the ability to designate cryptographic keys for distribution in web browsers and browsers are forbidden from revoking trust in these keys without government permission. 

…There is no independent check or balance on the decisions made by member states with respect to the keys they authorize and the use they put them to. This is particularly troubling given that adherence to the rule of law has not been uniform across all member states, with documented instances of coercion by secret police for political purposes.

In an open letter signed by several hundred security researchers and computer scientists:

Article 45 also bans security checks on EU web certificates unless expressly permitted by regulation when establishing encrypted web traffic connections. Instead of specifying a set of minimum security measures which must be enforced as a baseline, it effectively specifies an upper bound on the security measures which cannot be improved upon without the permission of ETSI. This runs counter to well established global norms where new cybersecurity technologies are developed and deployed in response to fast moving developments in technology. 

Most of us rely on our vendors to curate the list of trusted CAs. However, as a user, you may add or remove certificates as you please on your own devices. Microsoft Windows has a tool to do this. On Linux, the root certificates are files located in a single directory. A CA may be untrusted simply by deleting the file. Will this also be forbidden? Steve Gibson, noted security pundit, columnist, and host of the long-running Security Now podcast asks:

But the EU is stating that browsers will be required to honor these new, unproven and untested certificate authorities and thus any certificates they issue, without exception and without recourse. Does that mean that my instance of Firefox will be legally bound to refuse my attempt to remove those certificates?

Gibson notes that some corporations implement similar surveillance of their employees within their own private network. Whatever your opinion about those working conditions, some industries have legitimate audit and compliance reasons to track and record what their employees are doing with company resources. But, as Gibson continues,

The trouble is that the EU and its member nations are very different from the employees of a private organization. Any time an employee doesn’t want to be spied upon, they can use their own smartphone to circumvent their employer’s network. And of course an employer’s private network is just that, a private network. The EU wants to do this for the entire public Internet from which there would be no escape.

Now we have established the radical nature of this proposal. It is time to ask, what reasons does the EC offer to motivate this change? The EC says that identity verification under PKI is not adequate. And that these changes are needed to improve it. 

Is there any truth to the EC’s claims? Current PKI in most cases only requires the request to prove control of the website. While that is something, it does not guarantee, for example, that the web property “apple.com” is owned by the consumer electronics company known as Apple Inc, headquartered in Cupertino, California. A malicious user might obtain a valid certificate for a domain similar name to that of a well-known business. The valid certificate could be used in an attack that relied on some users not looking hard enough to notice that the name does not quite match. This happened to payment processor Stripe.

For publishers who would like to prove to the world that they are truly the same corporate entity, some CAs have offered Extended Validation (EV) Certificates. The “extended” part consists of additional validations against the business itself, such as the business address, a working phone number, a business license or incorporation, and other attributes typical of a going concern. EVs are listed at a higher price point because they require more work by the CA. 

Browsers used to show highlighted visual feedback for an EV, such as a different color or a more sturdy lock icon. In recent years, EVs have not been particularly popular in the marketplace. They have mostly died off. Many browsers no longer show the differential feedback. 

In spite of the weaknesses that still exist, PKI has improved markedly over time. As flaws have become understood, they have been addressed. Cryptographic algorithms have been strengthened, governance has improved, and vulnerabilities have been blocked. Governance by a consensus of industry players has worked quite well. The system will continue to evolve, both technologically and institutionally. Other than meddling by regulators, there is no reason to expect otherwise.

We have learned from the lackluster history of EVs that the marketplace does not care so much about corporate identity verification. However, if internet users did want that, it would not require breaking existing PKI to give it to them. Some small tweaks to existing workflows would suffice. Some commenters have proposed modifying the TLS handshake; the website would present one additional certificate. The primary certificate would work as it does now. The secondary certificate, signed by a QWAC, would implement the additional identity standards that the EC says it wants.

The EC’s purported reasons for eIDAS are simply not credible. Not only are the reasons given implausible, the EC does not even bother with the usual sanctimonious whining about how we must sacrifice important freedoms in the name of safety because we face the grave threat of [pick one] human trafficking, child safety, money laundering, tax evasion, or (my personal favorite) climate change. There is no denying that the EU is gaslighting us.

If the EC is not honest about their true motives, then what are they after?

Gibson sees a nefarious intent:

And there’s only one possible reason for them wanting [to enforce browsers to trust QWACs], which is to allow for on-the-fly Internet web traffic interception, exactly as happens inside of corporations. And that’s acknowledged. 

(What Gibson means by “web traffic interception” is the MITM attack described above.)Other commentary has highlighted the sinister implications for free speech and political protest. Hurst in a long-form essay makes a slippery slope argument:

When a liberal democracy establishes this kind of control over technology on the web, despite its consequences, it lays the groundwork for more authoritarian governments to follow suit with impunity.

Mozilla quoted in techdirt (with no link to the original) says more or less the same:

[F]orcing browsers to automatically trust government-backed certificate authorities is a key tactic used by authoritarian regimes, and these actors would be emboldened by the legitimising effect of the EU’s actions…

Gibson makes a similar observation:

And then there’s the very real specter of what other doors this opens: If the EU shows the rest of the world that it can successfully dictate the terms of trust for the independent web browsers used by its citizens, what other countries will follow with similar laws? Now everyone gets to simply require that their own country’s certificates get added. This takes us in exactly the wrong direction.

This proposed Article 45 is an attack on user privacy in the EU nations. If adopted, it would be a massive setback not only in internet security, but in the evolved system of governance. I agree with Steve Gibson that:

What’s completely unclear, and what I haven’t encountered anywhere, is an explanation of the authority by which the EU imagines it’s able to dictate the design of other organization’s software. Because that’s what this comes down to.

Response to the proposed Article 45 has been massively negative. The EFF in Article 45 Will Roll Back Web Security by 12 Years writes, “This is a catastrophe for the privacy of everyone who uses the internet, but particularly for those who use the internet in the EU.” 

The eIDAS effort is a four-alarm fire for the security community. Mozilla – maker of the open source Firefox web browser – posted an Industry Joint Statement opposing it. The statement is signed by an all-star roster of internet infrastructure companies including Mozilla itself, Cloudflare, Fastly, and the Linux Foundation. 

From the the open letter mentioned above: 

After reading the near-final text, we are deeply concerned by the proposed text for Article 45. The current proposal radically expands the ability of governments to surveil both their own citizens and residents across the EU by providing them with the technical means to intercept encrypted web traffic, as well as undermining the existing oversight mechanisms relied on by European citizens. 

Where does this go? The regulation has been proposed for some time. A final decision was scheduled for November of 2023. Web searches show no new information on this topic since that time. 

In these past few years, outright censorship in all its forms has increased. During the covid lunacy, government and industry partnered to create a censorship-industrial complex to more efficiently promote false narratives and suppress dissidents. In these past few years, skeptics and independent voices have fought back, in courts, and by creating viewpoint-neutral platforms. 

While censorship of speech continues to be a great danger, the rights of writers and journalists are better protected than many other rights. In the US, the First Amendment has an explicit protection of speech and the freedom to criticize the government. Courts may be of the opinion that any rights or freedoms not protected by highly specific statutory language is fair game. This may be the reason that the resistance has had more success on speech than other efforts to stop other abuses of power such as quarantines and population lockdowns. 

Rather than a well-defended foe, governments are shifting their attacks to other layers of the internet infrastructure. These services, such as domain registration, DNS, certificates, payment processors, hosting, and app stores, consist largely of private marketplace transactions. These services are much less well protected than speech because there is, for the most part, no right for anyone to purchase a specific service from a particular business. And the more technical services such as DNS and PKI are less well understood by the public than web publishing.

The PKI system is particularly vulnerable to attack because it works by reputation and consensus. There is no single authority that rules the entire system. The players must earn a reputation through transparency, compliance, and honest reporting of failures. And that makes it vulnerable to this type of disruptive attack. If EU PKI falls to the regulators, I expect other countries to follow. Not only is PKI at risk. Once proven that other layers of the stack can be attacked by regulators, they will be targeted as well.

BOMBSHELL! Putin Tells NATO Prepare for War as Top General Slain, Turkey INVADES Syria by Ben Norton (Video - 2h24)

   This interview of Ben Norton is quite a broad and knowledgeable analysis of the whole world situation right now. Quite long but very info...