Was “Trust and Safety” a CCP Trojan Horse?


Thanks to Darren Beattie, Elon Musk, and Gail Combs, I have been struck by lightning, and can now see the origins of the highly successful “trust and safety” censorship paradigm.

I survey the catastrophe that “Trust & Safety” has been for not only Twitter and Apple, but all of Big Tech, America, and the world, and I cry out “Well played, CCP! Well played!”

And you, my fellow coders who watched it all turn to crap, know I’m right. We did not object to the early assaults on Free Speech, as CHINA slyly moved into our tech businesses, and now we have paid the price.


Or if we really want to be complete…..

The part about “can’t code” welcoming in the Trojan Horse is important. In my opinion and experience, it was the non-coding “verbal world” of bureaucratic policy which welcomed “trust and safety”, then forcing it on the more mathematical geek world which had once been a bastion of honesty, truth, and freedom.

Free speech mattered to old tech. Not so much to the people who took control of tech.

This is relevant, in that WOMEN tend to show up as the cops, police chiefs and ambassadors of “trust and safety”. It’s a very female and “beta male” thing, even at the high levels.

BEFORE ELON:

After Elon:

Yeah, those pictures are a bit of an unfair comparison, because they’re different company functions as well, but in other ways, that in itself is exactly the problem.

Coders versus the people who tell them what to do. Twitter was filled with chiefs and not enough Indians.

ALTHOUGH perhaps one too many……

Yoel Roth’s problems don’t end with his refusal to “manspread” like a man, but the problems surely start there. Any “man” who is threatened by the Babylon Bee needs help, not power.

BUT BACK TO THE ACTUAL STORY…..


Trustina Applegate

Darren Beattie of Revolver News had one of the biggest stories yet on censorship in Big Tech.

LINK: https://www.revolver.news/2022/12/revealed-eric-holder-fingerprints-all-over-apple-trust-and-safety-department-during-2020-election/

Turns out that Eric Holder’s former chief of staff was the head of censorship at Apple for quite a while, including the 2020 election.

Here is the brief version of what happened. Please go to the original for the full story. I am only including a highly edited snippet of the middle of the story (and yet it’s VERY long).


FTA…..

The current head of Apple Trust and Safety is someone who is clearly aware of the value of having a low profile online. Look for details on Jessica Gimarc-Savini and you’ll find her sparse LinkedIn page, her (lesbian) wedding page, and not much else.

While we know little about Jessica Savini, we can learn much from a profile of her predecessor, former head of Trust and Safety at Apple Margaret Richardson.

Richardson served as Apple’s top trust and safety figure from August 2020 through May 2022.

As you read the following, keep in mind that Apple is the largest company in the world, with a market capitalization of $2.3 trillion dollars.  Its annual revenues exceed the GDP of most U.S. states. It’s annual net profits are worth more than the GDP of Bulgaria. Apple might as well be a country unto itself, and a powerful one at that. Of all of the people they could have chosen to be the key decision maker for content moderation and safety — that is, censorship — you’d think they’d at least choose someone with the appearance of moderation and lack of political bias.

Think again.

While Richardson wisely avoided tweeting during her tenure at Apple, at her previous job, first as “director of global policy” and then “director of trust” as Airbnb, Richardson was entirely unrestrained. Her still-extant tweets from August 2020 and before give a stark demonstration of her thinking, a perpetually-spinning hamster wheel of stock left-wing political tropes. For starters, Richardson’s Twitter banner screams “Black Lives Matter”!

But that’s only scratching the surface.

Dig back through 5+ years of tweets and retweets, and you see a type that is disturbingly common: A person’s whose public life consists almost wholly of mindlessly affirming, then reaffirming, and then re-reaffirming, far-left and liberal partisan orthodoxies.

It’s not that any one tweet from Richardson is particularly bad. It’s that that’s all there is. She never strays into talking about her family or her favorite books or even, say, her favorite vacation spots (she was working at a lodging company, after all!). It’s just the current partisan lib obsession du jour, every time, with ruthless tedium.

Richardson isn’t just deeply ideological, pro-BLM, and so forth. She’s also narrowly and almost pettily partisan.

If this was your barista at Starbucks, or a Congressional staffer, or heck, an ordinary Apple engineer, this would be rather lame but unremarkable. But this is the person Apple chose to lead its Trust and Safety division, the person chosen to be head censor at the most powerful company in the world. This is the person who was empowered to make crucial, politically-loaded decisions during one of the most hotly-contested elections in American history.

Five months after Richardson started at Apple, the company made one of the most ideologically aggressive cancellations ever when it banned Parler from its app store. While Apple works hard to obscure its decision-making process, Richardson was without a doubt central to that decision, and with her involved, it wasn’t a surprising one. In April 2022, shortly before she left, the company also committed itself to a ridiculous internal “racial equity audit.”

So, where did this person come from? Well, just looking at her tweets, one notices that Richardson doesn’t just have a habit of boosting left-wing causes. She has a noticeable preference for boosting senior figures from the Obama Administration itself — Valerie Jarrett, Arne Duncan, John Kerry, and so forth. Richardson was particularly active when President Trump dismissed acting attorney general Sally Yates for insubordination after she refused to enforce his executive order implementing a travel ban on several nations linked to Islamic terrorism.

This isn’t random.

After earning dual degrees in law from UC-Berkeley and in public policy from Harvard’s Kennedy School, Richardson spent three years working at a free legal clinic in the Bay Area. From there, she went to the Obama campaign, and after his election she joined the Justice Department as a top adviser to Eric Holder, eventually ascending to become his chief of staff.


Wolf again….

SO – I hope that is crystal clear.

The Obama-Holder DOJ directly controlled Apple’s view of “acceptable content” during the engineered fall of the Trump administration (a.k.a. “The Coup”) as well as first two years of the Biden administration.

This is exactly why I absolutely cannot stand Apple News, for it’s horrible, judgmental, left-wing slant.

If you read the rest of the Revolver article, it is VERY clear that the “Trust and Safety” racket is largely an infiltration of Big Tech by an ideology centered on Eric Holder and the DOJ.

In my opinion, Trust & Safety in Big Tech was ultimately a downstream effect of the disastrous Obamacare website, which was used to “lure in” Big Tech for what became an infection operation.

People who had no idea how to deal with criminals and communists were sheep led to the slaughter.


SO – back to Twittergate.

I didn’t really make the connection of Twitter’s “Trust and Safety” machine to DOJ, until Elon Musk revealed The Twitter Files to the world, via left-trusted journalist Matt Taibbi, in a massive act of transparency.

Somewhere in the middle of Matt Taibbi’s tweet-thread, I realized that Apple and Twitter were undoubtedly similar stories – and that Eric Holder likely had an insider at Twitter.

Allow me to interject with a meme here…..

Moving on…..


But THIS is where the DOJ comes back into things. The next tweet (28) is like discovering Eric Holder working at Twitter.


Jim Baker? You mean SPYGATE Jim Baker???

I had figured there was some Holder groupie analogous to Richardson at Apple, inside Twitter’s Trust & Safety apparatus. I had no idea that Holder’s henchman – THE Jim Baker, fired as part of Spygate – was there.

Let’s just look at that Jim Baker message more closely…..

This is an incredible stall tactic. Twitter can hold off the truth forever with this thinking.

Note how the “hacked materials” policy is already anti-journalism, but combine it with a DOJ Obama/Hillary toadie INSTALLED INSIDE TWITTER, and, it’s every bit like Apple. Complete DOJ commie control.

SO – it’s clear that “Trust and Safety” is a DOJ gig – right?

How could this possibly be worse?

The trick is understanding the “environmental push” for “Trust and Safety” over free speech, which overwhelmed both government and tech. It almost certainly had foreign help.


Gail Combs Exposes Trust-and-Safetygate

Today, Gail posted a series of deep dives into the subject of where much of the “trust and safety” censorship has appeared and festered in both government and Big Tech – spilling over into everything, including elections, journalism, STEM, and even White House policymaking.

The big picture blew me away, as I saw how successful this movement was, in transforming our own government and national security complex away from freedom and toward CCP-style totalitarianism, without even being fully understood by the victims.

Some of the CCP infiltration is obvious – some of it is not.

I present it to you now, largely unedited except by Gail herself, in preparing it for this post. I have also taken the liberty of embedding the videos by hand, rather than just leaving links. I have further included some comments that Gail left out, because I feel they are still important, even though she did not.

LINKS TO SELECTED ORIGINAL COMMENTS:

LINK: https://www.theqtree.com/2022/12/05/dear-kmag-20221205-joe-biden-didnt-win-%e2%9d%80-open-topic/comment-page-1/#comment-1004332

LINK: https://www.theqtree.com/2022/12/05/dear-kmag-20221205-joe-biden-didnt-win-%e2%9d%80-open-topic/comment-page-1/#comment-1004307


Gail Combs

Gail Combs

Online

Coyote

 Reply to  WSB

 December 5, 2022 07:14

From BadKitty’s Thread — The KEY INFO showing GOVERNMENT CENSORSHIP IMPACTING ELECTIONS!!!

They also submit reported tweets to CISA at DHS. Boom!

DHS puts on its CISA website for election misinformation, disinformation, and malinformation to be reported to Misinformation@Cisecurity. (NGO Katie Hobbs used for reporting.)

CISA

RUMOR CONTROL PAGE START-UP GUIDE Misinformation, disinformation, and malinformation (MDM) can present risks to the election infrastructure community, its owners and operators, and the public. MDM can spread quickly, causing rumors to undermine facts. 

The risks of MDM range from undermining confidence in institutions to activating and inspiring dangerous behaviors and violence. This Rumor Control Page Start-Up Guide is for organizations seeking to dispel specific MDM narratives through transparent and authoritative information. Designed for use by state, local, tribal, and territorial (SLTT) government officials and private sector partners, this guide cites the Cybersecurity and Infrastructure Security Agency’s (CISA) Rumor Control page as a model for debunking inaccurate narratives. The recommendations in this guide are not intended to be one-size-fits-all and should be adapted to the capabilities and resources available, as well as the MDM risks facing the community. Organizations should only set up a rumor control webpage related to issues for which they have access to information and expertise necessary to properly dispel MDM narratives and articulate facts. Each organization that plans to set up a rumor control page may want to consult with the appropriate organization legal counsel, if possible, prior to beginning operations. What is a rumor control page? A rumor control page is a web page that offers the public accurate and authoritative sources of information which will help address common MDM narratives. It is provided by a trusted voice to either preempt or respond to developing narratives. Credible messengers are most effective at disproving falsehoods. A rumor control page should not be considered the sole source of truth, rather it should drive people to seek more information about a complex subject by directing them to other trustworthy sources.

With a rumor control page, election officials and stakeholders can dispel rumors about the systems and assets they manage and have unique insight into. Some election offices may already have public information websites, which commonly include a “Frequently Asked Questions” page and/or press releases that seek to clarify information. In this sense, a rumor control page can be viewed as an extension of existing efforts….

  :wpds_arrow:  It is important to note that a rumor control page is only one element of a successful MDM response strategy. Improving resilience of elections to MDM also requires reporting MDM narratives. The Center for Internet Security (CIS) was established to support the cybersecurity needs of the election subsector. The CIS can be leveraged to report real-time MDM via email at misinformation@cisecurity.org

Be sure to include links and screenshots as well as details on the misinformation and your jurisdiction.

7

 Reply

Gail Combs

Gail Combs

Online

Coyote

 Reply to  Gail Combs

 December 5, 2022 07:44

Don’t miss Bad Kitty’s other thread.

CCP involved with Carnegie…

comment image

Multiple former Chinese gov employees and at least 20 CCP members worked at Carnegie Endowment while CIA DIR William Burns was pres 2015-21

They are closely associated with CUSEF (reg under the Foreign Agents Registration Act as a Chinese foreign gov org)

Last edited 12 hours ago by Gail Combs

7

 Reply

Gail Combs

Gail Combs

Online

Coyote

 Reply to  Gail Combs

 December 5, 2022 07:52

EXCLUSIVE: GOP Rep Calls On CIA Director To Address His ‘Strong Ties’ To CCP While At Helm Of Elite DC Think Tank

  • Texas Republican Rep. Lance Gooden called on CIA Director William Burns to address his “strong ties” to the Chinese Communist Party (CCP) while formerly heading an elite Washington, D.C., think tank, according to a letter obtained by the Daily Caller News Foundation.
  • At least 20 undisclosed CCP members worked at Carnegie Endowment for International Peace during Burns’ presidency of the think tank, the DCNF recently reported.
  • “Evidence would suggest Director Burns lied under oath during his confirmation hearing,” Gooden told the DCNF, referring to Burns’ February 2021 CIA confirmation hearing.

Texas Republican Rep. Lance Gooden called on CIA Director William Burns to address his “strong ties” to the Chinese Communist Party while formerly heading an elite Washington, D.C., think tank, according to a letter shared with the Daily Caller News Foundation Monday….

“The vast influence the CCP had at Carnegie during your tenure as president and the continued influence they have today — despite claims you made at your confirmation hearing that you had ended the CCP’s influence — presents a significant lapse in judgment and brings into question your ability to identify and mitigate national security risks,” Gooden’s letter said. (RELATED: Biden’s New Green Energy Adviser Has Ties To Chinese Communist Party Front Group)


There is a lot of information coming out and We want to capture it before it disappears.

First a Youtube from August 25, 2020 just before early voting started.

Are We Ready? Foreign Interference, Disinformation and the 2020 election
Streamed live on Aug 25, 2020
Public and private sector leaders join the Digital Forensic Research Lab of the Atlantic Council to discuss what steps they have taken to secure the information space around the 2020 presidential election. For further information, please visit: https://www.atlanticcouncil.org/event…

——————————————————————————————– Subscribe for more! https://www.youtube.com/user/Atlantic…

Driven by our mission of “shaping the global future together,” the Atlantic Council is a nonpartisan organization that galvanizes US leadership and engagement in the world, in partnership with allies and partners, to shape solutions to global challenges.

LINK: https://www.youtube.com/watch?v=rUDHdwSwQFQ

After looking at part of this video I decided to investigate the people named. This is my research.

March 26, 2018
DHS hires new cybsersecurity adviser ahead of 2018 midterm elections – Washington Examiner

The Department of Homeland Security has hired the former chairman of the Election Assistance Commission, Matt Masterson, to help federal, state, and local authorities coordinate cybersecurity efforts ahead of the 2018 midterm elections, the department announced Monday.
Masterson will serve as senior cybersecurity adviser within the National Protection and Programs Directorate’s Office of Cybersecurity and Communications.
“There are few who have Matt’s experience working with all levels of government and the private sector to protect our nation’s election systems. His wealth of experience and depth of knowledge make him highly respected on both sides of the aisle,” Chris Krebs, NPPD senior official performing the duties of the undersecretary, said in a statement.
Krebs added that Masterson’s previous work as chief information officer in the Ohio secretary of state’s office and at the EAC “significantly advanced” the country’s cybersecurity efforts.

Matthew Masterson Joins DHS as Senior Cybersecurity Adviser

Matthew Masterson, former chairman of the U.S. Election Assistance Commission, has been named senior adviser for the Department of Homeland Security‘s cybersecurity unit, Washington Examiner reported Monday.

DHS expects Masterson to continue working with federal, state and local officials to protect election systems against cyber threats.

He served as EAC commissioner for nearly four years, following his nomination by then President Barack Obama and subsequent confirmation by the Senate in late 2014.

Masterson previously held various positions within the Ohio secretary of state’s office, where he managed voting system certification procedures and led the development of online voter registry and ballot delivery platforms for military and overseas voters.

WIKI: Christopher Krebs

Christopher Cox Krebs (born 1977) is an American attorney who served as Director of the Cybersecurity and Infrastructure Security Agency in the United States Department of Homeland Security from November 2018 until November 17, 2020 when President Donald Trump fired Krebs for contradicting Trump’s claims of election fraud in the 2020 presidential election.[1]

ATLANTIC COUNCIL

Clara Tsao

Clara Tsao is a nonresident fellow with the Atlantic Council’s Digital Forensic Research Lab. Clara is a national security and disinformation expert and technology entrepreneur currently serving as the co-founder and on the board of the Trust & Safety Professional Association and the Trust & Safety Foundation. Clara previously was the Senior Advisor for Emerging Technology at the Department of Homeland Security and the Chief Technology Officer of two U.S. Government task forces focused on countering foreign influence, election security, and homegrown extremism. Clara also serves as a nonresident expert at the German Marshall Fund, a senior advisor for the UN-backed initiative, Tech Against Terrorism, and the President/Chair of the White House Presidential Innovation Fellows Foundation. Clara has also held fellowships focused on national security and technology policy with the Mozilla Foundation and Google.

June 26, 2020

The Brief: Clara Tsao’s newly-launched Trust & Safety Professionals Association

Clara Tsao is Cofounder of the Trust & Safety Professionals Association (“TSPA”), a new, nonprofit, member-based organization for trust & safety professionals that launched in June 2020. The TSPA will support the global community of professionals who develop and enforce principles & policies that define acceptable behavior online.

Clara was inspired to build an association for trust & safety professionals due to her background as a national security/disinformation expert and technology entrepreneur. She is President of the White House Presidential Innovation Fellows Foundation and a Senior Advisor at the UN-CTED-backed Tech Against Terrorism.

Clara has held various national security and tech policy roles for the U.S. Government, Google, and Mozilla.

Clara Tsao (dot) Com

most of the page is just icons with very few words. I wondered if she was a non-native English speaker while Hubby suggested it was a method to prevent word searches.

Her Awards/honors/networks section shows:

Fulbright Canada
Clinton Global Initiative
Hesslbein Global Academy
Pembroke College Cambidge
Univ California
United Nations: Many Cultures One Humanity – Linked to spam
Alliance of Civilizations – Linked to spam
GES Malaysia 2013 – Linked to spam
Global Startup Youth Malaysia – Linked to spam
Yale School of Management [Emerging Leaders Seminar Entrepreneurship & Innovation] – Access denied
TITLE – Global Network for Advanced Management

Clara Tsao | Presidential Innovation Fellows

Clara Tsao is an entrepreneur and a White House Presidential Innovation Fellow. Prior to government, she led global strategic partnerships in education for Microsoft. In addition to corporate roles with Google, Apple, Sony, Playstation, HP, and AT&T, Clara is also the co-founder and former Executive Director of the Congressional App Challenge.

Clara Tsao – Guidance on building better digital services in government
Through the Presidential Innovation Fellows program, Clara has worked across various national security roles in US Government, serving as a senior advisor and Chief Technology Officer focused on emerging technology policy, countering terrorist use of the internet, and foreign influence operations online. News and Events

ALLIANCE For SECURING DEMOCRACY:

About Clara Tsao
Clara Tsao was a non-resident fellow at the Alliance for Securing Democracy. She is an online disinformation expert and a civic tech entrepreneur, who recently co-founded the Trust & Safety Professional Association and the Trust & Safety Foundation to support the global community of professionals who develop and enforce principles and policies that define acceptable behavior and content online. Clara is also a non-resident senior fellow at the Atlantic Council’s Digital Forensic Research Lab. Her previous roles include CTO at the U.S. Department of Homeland Security’s Countering Foreign Influence Task Force and the interagency U.S. Countering Violent Extremism Task Force and Senior Advisor for Emerging Technology at the Cybersecurity Infrastructure Security Agency. She has spent a decade working in the technology industry across global teams at Microsoft, Apple, Sony PlayStation, AT&T, and also as a Google and Mozilla Technology Policy Fellow. Clara is also the Board Chair and President of the White House Presidential Innovation Fellows Foundation and a Senior Advisor at Tech Against Terrorism.

This may be her (Her resume has been erased)
https://www.claratsao-design.com/about
(UI/UX Designer From Taiwan)

There is NOTHING about her early history and where she was born. CHINESE maybe?? Does she actually work for the CCP?

Changemakers → Clara Tsao

MUST READ about her views on ‘Disinformation’ Interesting tidbit”…we need to encourage more technologists to lend their expertise to support better policy-making, through incubators like Aspen’s Tech Policy Hub….”

…..Much of your current work lies at the intersection of tech and policy, focusing on issues like disinformation and online safety. How did you first become interested in these issues?

JFK once said, “We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win.” In a similar way to how JFK committed the nation to the ambitious goal of landing on the moon,I believe the field of “trust and safety” (including online safety / disinformation), is the most difficult challenge of this decade that technology companies, governments, civil society, and internet users must stand united behind.

This is a challenge we need to win. From live-streamed mass shootings, terrorist content, online sexual exploitation and conspiracy theories, to election interference, there are endless problems that require collaboration, starting with strengthened dialogue. I have always been fascinated with how people behave online, and I spend my free time evaluating how people behave on social media. I especially love testing and exploring new technology platforms to understand the new ways in which people interact and connect with one another.

However, I was first exposed to the offline consequences of fake news and misinformation while I was at Microsoft in early 2014. At Microsoft I was managing a partnership program focused on growing the capacity of libraries in Myanmar to serve as trustworthy information hubs. We piloted new platforms and approaches to tackle digital and information challenges in the lead-up to the country’s critical 2015 general elections, the first time the nation could participate in a democratic vote after nearly 50 years of military rule. Over the span of months,I saw firsthand the impact of rampant disinformation as Facebook unintentionally introduced the country to a new digital era that causing offline chaos, violence, and eventually, ethnic genocide.

Years later, I joined the US Government as an Entrepreneur-in-Residence’ where I served as the CTO of two teams within the Department of Homeland Security focused on online safety issues, ranging from terrorist use of the internet, to foreign influence operations and election security. Most recently, I worked with human rights defenders, civil society groups, and policy professionals at Mozilla, evaluating regulatory policies and tools around harmful content online. My Passion for problem solving in this space was cultivated by these experiences.

What particular questions/challenges have you been tackling recently, and why is now the right time to address these?

Over the last year, I have been building a new organization to support and advance the trust and safety profession through a shared community of practice. Today the biggest challenge in trust and safety is the lack of formalized training and support for the professionals that determine and enforce acceptable content policies and behavior online.Professionals working in trust and safety teams at technology companies are tasked with adjudicating what is acceptable behavior or content, while also protecting free speech, user safety, and society. Trust and safety teams are also asked to make difficult decisions to protect users, while also having limited support from product and engineering teams to carry out and enforce these policies at scale.

There has never been a better time to support trust and safety professionals and to do their best work. Due to recent media coverage of content moderation, there has been more awareness of the psychological and mental health risks associated with content review that impact employee wellness.

As fake news and misinformation has gone rampant in election processes, governments around the world have threatened regulation or fines for the inability of timely content review and removal. Some countries, like Germany, have introduced and are enforcing such regulations. Hate speech that stays online in Germany for more than 24 hours can accrue a fine of €50 million under Netzwerkdurchsetzungsgesetz. Examples like these have led companies to invest more resources in their trust and safety operations and have more transparency in their decision-making practices.

Furthermore, technology companies are increasingly realizing the impact that toxic users and behavior have on “user churn” and bottom line.

“Advertisers like Unilever have threatened to take their marketing budgets elsewhere if platforms don’t mitigate the spread of toxic content or toxic users.”

Are certain types of misinformation more dangerous than others? What criteria should companies use to evaluate whether a piece of content should be removed from their platform as misinformation?

The perceived danger of misleading content is a key element that influences the way many companies prioritize and investigate removal. Misinformation can include false or misleading information, ranging from rumors, gossip, errors, propaganda. While misinformation can be harmless (i.e married celebrity having an affair), information can become dangerous when the content has offline or behavioral consequences for users and goes viral (i.e. drinking diluted bleach will prevent you from COVID-19 infections).

When evaluating misinformation, companies can evaluate the actor behind the campaign, the behavior of the post (is it a bot network?), and the context of the content to determine how to prioritize removal. Other times, misinformation is automatically detected by AI/machine learning or flagged manually by users reporting the post 

One challenging part of misinformation is when content is further bolstered by recommendation engines and algorithms, originally designed to heighten user engagement but now leaving users in partisan and polarized filter bubbles.

When Someone searches for content reinforcing fake science such as the flat earth theory, they become stuck in a “rabbit hole”of other conspiracy theories unknowingly, of which many include content from the anti vaccine movement. To Counteract this, AI researchers like Guillaume Chaslot have advocated internet platforms to have increased algorithmic transparency.


>

ALICIA WANLESS

Australian Strategic Policy Institutes

Alicia Wanless is the director of the Partnership for Countering Influence Operations at the Carnegie Endowment for International Peace.

Alicia researches how people shape — and are shaped — by a changing information space. With over a decade of experience in researching and analyzing the information environment, focusing on propaganda and information warfare, Wanless applies this learning to support government, military, and major tech companies to develop policies and integrate information activities into training programs that better reflect how the information environment is manipulated.
Wanless is currently a PhD Researcher at King’s College London exploring alternative frameworks for understanding the information environment.

In 1836, King’s became one of the two founding colleges of the University of London…

Kings College – Biography

Biography
Alicia researches how we shape — and are shaped — by a changing information space. With more than a decade of experience in researching and analysing the information environment, focusing on propaganda and information warfare, Alicia conducts content and network analysis, and has developed original models for identifying and analysing digital propaganda campaigns. Alicia applies this learning to support government, military and major tech companies to develop policies and integrate information activities into training programs that better reflect how the information environment is manipulated.  She has shared her work and insights with senior government, military, industry leaders and academic experts at Wilton Park, the Munich Security Conference, the Hedayah Centre, NATO’s ARRC and the Lawrence Livermore National Laboratory. Alicia’s work has been featured in the CBC, Forbes, and The Strategy Bridge

LAWFARE: Alicia Wanless – Contributors – Lawfare

Jan 20, 2022

Alicia Wanless is the director of the Partnership for Countering Influence Operations at the Carnegie Endowment for International Peace. Wanless is a PhD Researcher at King’s College London exploring how the information environment can be studied in similar ways to the physical environment.

Her twitter account is PRIVATE….
https://twitter.com/lageneralista

This interest led me to research things like nationalism, propaganda, and language engineering in my undergrad, and later in the 2010s, to start analyzing how influence operations were changing in a Digital Age. That research, which covered political campaigns and alternative media outlets, led me to work with militaries, major tech platforms, and civil society organizations—and ultimately to pursue a Ph.D. in War Studies at King’s College London….

The disinformation landscape surrounding the 2020 elections was so different than what we saw in 2016, with domestic, verified users supplanting bots and fake accounts, and new narratives focusing on both Covid and electoral fraud.  The actors, behaviors, and content keep changing. How do you see the disinformation landscape evolving in the future?
I’m not sure it’s the information environment changing quickly so much as our focus on what happens within it shifting. In researching the U.S. primary election in 2016, it was apparent that domestic actors were likely far more active and prevalent than any foreign actors, and this was later confirmed in Benkler, Faris, and Roberts’ Network Propaganda. The disclosure that Russian actors were actively running influence operations made for more shocking news, whereas disentangling the complex web of domestic actors can be difficult and highly politicized. The role of domestic actors engaging in influence operations has certainly come to the fore in the wake of the attack on Congress on 6 January.
One major challenge in understanding the information environment is that research tends to focus on threat actors, tactics, and the content they produce, often in the form of case studies— interesting and informative, but fairly narrow in scope. Unless it is all brought together in bigger meta studies, it leaves us focused on the last bad thing that happened, which is not great for being strategic about addressing the problem. To that end, I think we need to move towards a more systemic understanding about disinformation and influence operations, looking at the wider information environment in which these things occur to find patterns that might offer a warning where the next problem is emerging. That would allow us to intervene sooner.

Some of the information from the BadKitty Thread:

LINK: https://threadreaderapp.com/thread/1599609708574543873.html

Breaking thread! I found the directions for submitting tweets to El-ISAC (CiSecurity) like Katie Hobbs did. They land at Stanford for determination

There is also a hidden Twitter Portal and a gov Twitter email address.😹

https://pbs.twimg.com/media/FjLxKJWWIAAnyc0.jpg (see below)

The Stanford Partnership site that fact checks submitted tweets etc:

1. It’s home page changed dramatically in months.
2. They lied and said Trump supporters went to J6 Armed.
3. They work with the Zinc Network/Integrity Initiatives Graphika and DFRLAB.


LINK: https://archive.ph/GdkGR

I missed putting the biggest part in the top tweet because I was eating ham salad crackers. And ran outta edit time.

They also submit reported tweets to CISA at DHS. Boom! 💥 

DHS puts on its CISA website for election misinformation, disinformation, and malinformation to be reported to Misinformation@Cisecurity. (NGO Katie Hobbs used for reporting.)

https://www.cisa.gov/sites/default/files/publications/rumor-control-startup-guide_508.pdf

It is important to note that a rumor control page is only one element of a successful MDM response strategy. Improving resilience of elections to MDM also requires reporting MDM narratives. The Center for Internet Security (CIS) was established to support the cybersecurity needs of the election subsector. The CIS can be leveraged to report real-time MDM via email at misinformation@cisecurity.org
Be sure to include links and screenshots as well as details on the misinformation and your jurisdiction.

RUMOR CONTROL PAGE START-UP GUIDE Misinformation, disinformation, and malinformation (MDM) can present risks to the election infrastructure community, its owners and operators, and the public. MDM can spread quickly, causing rumors to undermine facts. >> The risks of MDM range from undermining confidence in institutions to activating and inspiring dangerous behaviors and violence. This Rumor Control Page Start-Up Guide is for organizations seeking to dispel specific MDM narratives through transparent and authoritative information. Designed for use by state, local, tribal, and territorial (SLTT) government officials and private sector partners, this guide cites the Cybersecurity and Infrastructure Security Agency’s (CISA) Rumor Control page as a model for debunking inaccurate narratives. The recommendations in this guide are not intended to be one-size-fits-all and should be adapted to the capabilities and resources available, as well as the MDM risks facing the community. Organizations should only set up a rumor control webpage related to issues for which they have access to information and expertise necessary to properly dispel MDM narratives and articulate facts. Each organization that plans to set up a rumor control page may want to consult with the appropriate organization legal counsel, if possible, prior to beginning operations. What is a rumor control page? A rumor control page is a web page that offers the public accurate and authoritative sources of information which will help address common MDM narratives. It is provided by a trusted voice to either preempt or respond to developing narratives. Credible messengers are most effective at disproving falsehoods. A rumor control page should not be considered the sole source of truth, rather it should drive people to seek more information about a complex subject by directing them to other trustworthy sources. >>With a rumor control page, election officials and stakeholders can dispel rumors about the systems and assets they manage and have unique insight into. Some election offices may already have public information websites, which commonly include a “Frequently Asked Questions” page and/or press releases that seek to clarify information. In this sense, a rumor control page can be viewed as an extension of existing efforts….


ADDED NOTE BY WOLF

This stuff is just off-the-charts suspicious to me.


The Big Picture – CCP Subversion and Influence

I’m going to let people draw their own conclusions here. I’m not going to do anything other that talk about my own experiences with Chinese spies and assets in tech. You do the math.

It is beyond any doubt that the CULTURE of “trust and safety” is off-the-charts CCP in tone. There is SMOKE everywhere. And where there is smoke, there is probably fire.

It is my suspicion that “trust and safety” is filled with CCP-bots of various kinds, both Chinese and non-Chinese. However, diagnosing a spy from a non-spy is difficult, and requires an enormous amount of personal knowledge. I may have suspicions, but they are little more than that. Some may think I have TOO MANY suspicions, and that is fine.

However, it is my opinion that anybody with a potential CCP spy or asset background (thus including non-Chinese Americans) who strongly advocates or (even more tellingly) creates outcomes for things which serve CCP’s interests, and which oppose freedom-loving Americans’ interests, needs to be treated as such, particularly in regards to sensitive information or access. Just my opinion.

CCP loves to use women spies, operatives, and agents of influence, just like CIA. CCP girl spies are not just out of the mainland – many come out of Hong Kong, Taiwan, Singapore, Malaysia, Indonesia, Japan, England, Canada, America, and Latin America. Having them come out of somewhere other than the mainland, gives them a lot of flexibility, by lowering people’s guard and defenses.

CCP girl spies are smart, and the ones in tech tend to be excellent at both the coding side AND the schmoozing, verbal, business and policy side. They will sometimes HIDE one side of their abilities, if that deception is useful. However, in many cases, they will leverage both sides openly.

ChiSpies are often (but not always) among the most relentless social climbers you will ever meet. It’s the job – get as high as they can, targeting higher and higher up the chain. The Russian spies Maria Butina and Anna Chapman were the same way. I saw this much more often with the women than the men. The men tended to be far less obvious in trying to make new connections, whereas the women were extremely socially focused.

Many CCP spies are what I call “two-steppers”, which involve two generations of family as a form of cover. The parents may appear in America as refugees or economic migrants, being apolitical or (less often) even anticommunist. They may come from a place or background which throws off suspicion. The child, however, ends up in a sensitive position, and engages in actions, both of which clearly serve CCP interests. Thus, “two steps” to achieve a solid and easily dismissed infiltration.

CCP spy girls will often change their stories quickly and believably when questioned. They are quite good at planting false or compromising background information in social networks, although men tend to be used when planting something directly to another man, as a technique of peer influence.

Washington is the perfect environment for CCP players, because the operatives don’t stick out. The culture is one of influence and networking, so it looks like everybody else. ChiSpies tend to stick out more in the hinterlands.

Non-Chinese who carry water for CCP can be of many different types. Many are CCP allies, such as old Russian communists, American leftists, American rightists with economic ties to China, or dupes who become personally or professionally involved with agents.

It is important to understand that CCP operatives can have dramatically negative effects on other nations without doing ANYTHING illegal. I saw this form of stealthy sabotage over and over in tech. Just by burying into a key position and turning into an unremovable goldbrick, a CCP operative can create negative effects that have an organization chasing its tail. With only a bit more effort, such as engineered incompetence, organizations can be made weak, unprofitable, and ripe for takeover.

I put the “Trust and Safety” movement in this category of organizational sabotage. I think this entire movement serves CCP goals, and not American interests.

Others may disagree. They may assert that China helped America, if anything, by supporting “trust and safety” in any ways that it did, such as by providing “moderation” services.

To those who might think so, I simply add one more “unit” to my previous assessment of “4”.

W

Apple Commits to the Iceberg – Abandon Ship!

The REEEEE you are about to hear are Apple employees being cut loose when WOKE goes BROKE.

TL;DR – Apple is definitely full steam ahead on “client side user photo analysis and reporting”, and has issued an evasive, sneakily worded denial of concerns about expansions of surveillance, as it rushes the new software into place.


You will recall my prior post on this:


Why I Am Dumping Apple and Warning Everybody To Leave NOW

Thanks to Cthulhu, we were warned EARLY about Apple’s surveillance plans. Sounds very innocent, right? I will explain exactly why this is not. This is INCIPIENT POLITICAL SPYING AND PRETEXT FOR ARREST. “But it’s for the CHILDREN!” You remember the last people on the left who used that line to “save children”? THEY’RE BACK. Apple …


It’s a very good thing I didn’t wait to start checking off “DONE” items on my “GTFO” action list, because Apple just confirmed my suspicions that they are NOT backing down, and moreover that there is trouble ahead.


LINK: https://www.cnbc.com/2021/08/09/apple-will-reject-demands-to-use-csam-system-for-surveillance-.html


Reading carefully as only a BURNED CHUMP can, it is very clear that Apple is saying WITHOUT SAYING IN PLAIN WORDS that they won’t concede to government surveillance demands that they themselves OPPOSE.

ANALOGY: “We’re just friends [but if he asks me to run off, I will do it in a heartbeat].”

Apple is not speaking from the heart here, and TRUST is GONE.

You know what I’m saying? There are any number of WORDFARE WAYS for Apple to renege on not allowing surveillance here, after they have designed, implemented, and put into place the KNOWING MECHANISM for such reneging on privacy.

I think everybody who is not satisfied with Apple’s message here is seeing the exact same thing that I am seeing.

Apple IS reserving the right to not just allow but implement government and contractor surveillance with which it agrees.

Do I HAVE to repeat the picture?

Let’s do it anyway.

Nah. I’m no longer a chump.

Tim Cook is part of the ELECTION CARTEL. These are the “Friends of Freedom”, “Friends of Privacy”, and “Friends of the Constitution” who were SILENT.

Martin Luther King Junior was SO RIGHT.


NOW – let me give you some more useful links.

Here is a kinda cute but kinda “jabbed-looking” tech chick with purple hair giving a nice description of what is going on.

Jump to 3:20 to catch the Apple story, or just start at the beginning to hear about more shocking Israeli spy tech.


Here is a rather pithy but “cutting right to the chase” report on the privacy concerns.

LINK: https://www.vox.com/recode/2021/8/10/22617196/apple-ios15-photo-messages-scanned


Here is another brief summary of criticisms in The Register.

LINK: https://www.theregister.com/2021/08/09/apple_csam_faq/


Here is the Ars Technica coverage used as the header.

LINK: https://arstechnica.com/tech-policy/2021/08/apple-says-it-will-refuse-govt-demands-to-expand-photo-scanning-beyond-csam/


Finally, it’s good to include some “Apple Fanbois who know Apple can do no wrong” – isn’t it?

LINK: https://www.macrumors.com/2021/08/09/apple-faq-csam-detection-messages-scanning/

LINK: https://9to5mac.com/2021/08/09/apple-csam-faq/


Well, as long as they don’t oppose the Vote Cartel, they shouldn’t have anything to worry about!

Meanwhile, I’m moving ahead with de-Appling, and not looking back!

W

Why I Am Dumping Apple and Warning Everybody To Leave NOW

Thanks to Cthulhu, we were warned EARLY about Apple’s surveillance plans.

Sounds very innocent, right? I will explain exactly why this is not. This is INCIPIENT POLITICAL SPYING AND PRETEXT FOR ARREST.

“But it’s for the CHILDREN!”

You remember the last people on the left who used that line to “save children”?

THEY’RE BACK.

Apple can no longer be trusted, and they are accelerating their deployment of surveillance technology to serve the LEFT at a breakneck pace. Even by my Suspicious Cat standards, it is an ALARMING speed.

In my opinion their spying software is already a DONE DEAL and it’s READY TO DEPLOY.

They have very likely been alpha testing it on people already.

I just got an email from Apple, inviting me to help beta test iOS 15.

You want to know what I think of that?

NO. F***ING. WAY.

But it gets worse. It’s not just the fact that it’s ready, and they will not be talked out of it.

It’s not just WHY they’re doing it, which is why they will not be talked out of it.

It’s that they are lying about everything. And I will explain.

My advice to everybody……

GTFO!!!


Apple is NOT the Same Old Apple

Apple today is not the Apple of Steve Jobs. This should be fairly obvious to everybody. I think Jobs had some kind of understanding of why Apple needed to avoid being equated with leftism.

The problem is that the true keys to the empire all really belonged to Steve Jobs. When he handed the company over to a man who would ultimately betray half of Apple’s customers, Apple was done. The only question was how long Apple would take to fully betray ALL of its customers, and for those customers to REALIZE IT.

Now would be a good time to join those who can see the betrayal.

I never trusted Tim Cook when he said that Apple was dedicated to privacy. There was a part of me that wanted to believe that line, but I can say now with no reservation, that part is a CHUMP. I slap that part and say WAKE THE F*** UP.

Tim Cook is a political animal. And his political friends are not nice people. Not if you are US.

Buzzfeed: Apple CEO Tim Cook To Host Hillary Clinton Fundraiser

Cult of Mac: Tim Cook to host fundraiser for Hillary Clinton

Hillary Clinton always wanted “gatekeepers” on information. She just needed the right CHUMP to bring over to her viewpoint.

So how did Hillary World convince Tim Cook to abandon what principles he might have had?


Theory: It’s All About January Sixth

Influencing the influencers is old hat.

Influencing the people who HOST the influencers is where it’s at.

So influencing Tim Cook to break his pledge on privacy MATTERED. It was USEFUL – incredibly useful.

One of the real advantages of Nancy Pelosi’s little SCAM on January Sixth was the shock value for Democrats.

Part of what shocked Democrats was the fact that – yeah, in their heart of hearts they know – Biden didn’t win.

They were, however, OK with that bogus victory, as long as it didn’t lead to problems for them.

If Trump supporters would have had a nice, peaceful, but very loud rally at the Capitol, the Dems would have lost a HUGE portion of mindshare on the stolen election. Many more Democrats would have thought – deep down – “Yeah. No way Biden won.”

The Dems couldn’t have that. So they faked attacks inside, provoked the crowd outside, and their plants began breaking windows and doors to bring in the CHUMPS.

One of the best results for Mafia Nan and Chris Wray was this. It SCARED the Democrats and RINOs.

I personally think that Tim Cook was brought to a state where he literally FEARED an actual “insurrection”. That fear was useful, and all Cook’s half-hearted lip service to “privacy” just DIED.

Now – I do know that Apple iPhones and Apple iCloud were used by Dodge and FIB to go after “insurrectionists” in the days after January Sixth. That happened very quickly and without the slightest pushback from Apple.

I knew at that point that Apple could not be trusted. And so I just waited for confirmation that Apple has completely gone over to the dark side.

Well, we have that now.


Apple’s Alibi

On August 5, Ars Technica (or Arse Technocratica, as I like to call them) produced some only mildly critical reporting on Apple’s move.

That link is worth reading, if you plan to read nothing else.

LINK: https://arstechnica.com/tech-policy/2021/08/apple-explains-how-iphones-will-scan-photos-for-child-sexual-abuse-images/

ARCHIVE: https://archive.fo/g0SN2

Now – without getting into the details of it (they’re very technical), the discussion is basically about HOW Apple plans to check for “certain pictures” on people’s phones. Apple gives a very skeletal but seemingly exact and assuring description of their process, and basically says “don’t worry about it – nobody at Apple will be looking at your photos – they’re still private.”

I can only begin to tell you how much of a lie this is.

First of all, you are assuming that Apple is telling you the truth. It’s very HARD to throw what they say out completely, and not believe them AT ALL, and be fully skeptical, and make them “prove their way” back into trust, but that is really what you need to do.

So I want you to TRY – even though it’s difficult – to just say…..

“HMMM – MAYBE APPLE IS LYING ABOUT SOMETHING HERE.”

See? Much easier. Just open yourself to the possibility that Apple – wonderful Apple – might just be pushing a WEE FIB on us.

Now – before I get into MY criticisms, I’m going to present a few other people who have been critical, just so that you understand – this is not just Wolf – this is a LOT of people.

Here is an “Apple world follower” article in iPhone Hacks. This one really shows all aspects of the “it’s for the CHILDREN” psychological operation.


Apple’s Plan to Scan iCloud Photos Met with Backlash; Internal Memo Promises to Address Concerns

LINK: https://www.iphonehacks.com/2021/08/apple-plan-scan-icloud-backlash-internal-memo-addresses-concerns.html

ARCHIVE: https://archive.fo/obsQA


It’s not every day that Tim Cook goes Bill Clinton “for the CHILLDRUN” and you get comments like this:

And given that Twitter is so bad now, let’s save that Tweet as an image.

What Snowden is saying is EXACTLY what I thought when I read the Ars Technica article. Snowden knows capabilities from the inside. I know them from the outside. He is exactly right, IMO.

The criticisms of EFF.org (Electronic Frontier Foundation), one of the biggest and most important privacy advocates, are mentioned in this same article, but they are better seen on the EFF website.

LINK: https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life

ARCHIVE: https://archive.fo/2nRbe


Now, I don’t particularly like this explanation by EFF, because MY ANALYSIS, knowing how Democrat lies work, shows that the situation is far, far worse than just some “back door” into your phone.

This is ROUTINE SURVEILLANCE BUILT IN.

EFF, mostly the good liberal sheep that they are, don’t understand that the situation is FAR WORSE than what they think is there. They are essentially being LULL BOTS in this context.

They’re “friends of Democrats” wringing their hands and going “I’m not so sure about this”.

They have NO IDEA how much worse things really are. And I’ll explain that shortly.


Let’s move on now, to 9 to 5 Mac, which shills hard FOR the new Apple “features”.

LINK: https://9to5mac.com/2021/08/06/apple-internal-memo-icloud-photo-scanning-concerns/

ARCHIVE: https://archive.fo/qwLZi

Read this article and you will see – there is NO talking Apple out of this suicidal move.

China has effectively KILLED Apple, and the people at Apple have NO CLUE.

BECAUSE CHILDREN!!!

It’s nuts. Absolutely nuts.

Moving on again, let’s look at ComputerWorld. This is about as mainstream as you can get, and these folks are basically taking Snowden’s position.


LINK: https://www.computerworld.com/article/3628454/apples-plan-to-scan-us-iphones-raises-privacy-red-flags.html

ARCHIVE: https://archive.fo/wynH7

Normally, one would not think there might be a need to archive any article in ComputerWorld, but quite bluntly, we live in extraordinary times.

Removal of speech by either AUTHOR or AUTHORITIES is a SECOND WORLD PROBLEM, and that is exactly where we are going.

But check out that statement. It’s the BOTTOM LINE.

“Once you scan for one thing, you can scan for anything.”

I find it HIGHLY IRONIC that the other side LEVERAGED their own child trafficking against us here, but yeah. They did.

THAT is Democrat evil.

They even nailed a substantial fraction of the Q army this way, because – and I’m being blunt but kind – too many were in it ONLY because of the fight against pedophiles. Many (not all, but many) of those folks are SO single-minded, they are quite ready to throw away the Constitution if they hear the right buzzwords like “FOR THE CHILDREN”.

Yeah, think about it. You will NOT hear a peep out of many of the “BUT IT’S CHILDREN” crowd.

Now – let’s get down to a very meaty criticism of what Apple is doing.

This is VERY analogous to Kary Mullis warning about the ABUSE of PCR testing.

What if what Apple is doing GIVES WAY MORE FALSE POSITIVES THAN THEY ARE ADMITTING?

YEAH. It’s THAT BAD.

LINK: https://rentafounder.com/the-problem-with-perceptual-hashes/

ARCHIVE: https://archive.fo/VwKMo

Yes – read that article, because THAT is where we realize that this is just one more INTENTIONAL BOTCH like the PCR tests.

You starting to see how dangerous this is?

It gets worse.


The thing that shocks me most can be described by creating an analogy.

Watch closely.

“We, the FBI, needs to catch terrorists and drug cartels laundering money. We also need to catch financial criminals. But unlike Wall Street professionals, we’re not experts in these financial matters. Likewise, we need to catch cybercriminals, and we’re good, but we’re not the best. Not like people who do this for a living.”

“Therefore, we would like to let two contractors be the ones who upload the data that we’ll be looking for. It’s very harmless – the FBI will not be involved in looking at people’s financial data or their cyber behavior. Instead, we will use hashes – encrypted numerical data for the suspect transactions and internet packets – supplied directly from our two respected expert contractors, Fusion GPS and Crowdstrike.”


Do you see it now?

It is PLAUSIBLE DENIABILITY for Apple, and ACCESS FOR CONTRACTORS.

The first contractors will be unknown (to us) experts in going after child pornography.

ONLY if they find something that is approved by Wokesters at Apple, will the FBI be called in.

https://www.foxnews.com/us/fbi-ambush-florida-suspect-david-lee-huber-child-porn-case

I’m gonna be blunt. I don’t TRUST the FBI that this guy was really a child pornography suspect. What if they “trumped up” a charge against him?

I mean, they did it to a sitting President of the United States. Why not some average patriot?

And those contractors could be anybody. What’s to prevent them from harassing – from SWATTING – a guy like Andrew Torba, who they HATE?

And what if they expand this stuff to HATE SPEECH and HATE MEMES?

Who would the contractors be?

ADL?

SPLC?

Who’s next?

Next, it could be BLM.

Next, it could be those “Antifa profs”.

Next, it could be those “QAnon experts”.

No, my friends. This all goes to a VERY bad place.

AND IT GETS WORSE.

I have reasons to believe that Apple is actually LYING about the technology they want to put on our phones.

I think that the lies go beyond things like HIDING the “GARBAGE IN, GARBAGE OUT” (GIGO) risks of using third-party contractors who were in NO WAY approved by us or responsible to us.

BECAUSE APPLE IS INDEED HIDING THOSE RISKS.

According to the author above, Apple lied about the success of their algorithms.

Hell – I think they’re lying about the algorithms, too. I think they’re misleading us as to how the process actually works. I think they’re making VERY nondeterministic stuff sound very deterministic, and it’s not.

The following mistake is illustrative of BAD ROBOT MATCHES.

This is ROBOTS, on our phones, SPYING ON US. BADLY.

Robots that will be pretty much “EUA quality” – experimenting ON US.

Sound familiar?


No. Just NO.

Here’s my bottom line.

I am getting rid of Apple completely. It’s GONE. Scrubbed. History.

The ONLY way I’m keeping my Apple devices is if Tim Cook retires or is FIRED.

That’s it. He cannot be trusted. He has WRECKED Apple.

And they’re not smart enough to fire that guy, so BYE-BYE, APPLE.

See you in the history books.

W

Scammin' Me

Thanks to our QTreeper realsauce who posted a great Tom Petty video, Won’t Back Down, here:

LINK: https://wqth.wordpress.com/2019/08/14/speech-protecting-the-red-flags/comment-page-1/#comment-230851

Suddenly I remembered one of my FAVORITE videos of all times – the one where Tom Petty understood FAKE NEWS, FAKE ENTERTAINMENT, FAKE SCIENCE and FAKE HISTORY literally DECADES before we did.

Here are the original lyrics, as nearly as I can tweak them to the ad libs of the video:

Tom Petty And The Heartbreakers Lyrics

“Jammin’ Me”

You got me in a corner
You got me against the wall
I got no – where to go
I got no – where to fall

Take back your insurance
Baby nothin’s guaranteed
Take back your acid rain, baby
Let your T.V. bleed

You’re jammin’ me
You’re jammin’ me
Quit jammin’ me
Hey you can keep me painted in a corner
You can look away, but it’s not over

You’re jammin’ me

Take back your angry slander
Take back your pension plan
Take back your ups and downs of
Your life in raisin-land

Take back Vanessa Redgrave
Take back Joe Piscopo
Take back Eddie Murphy
Give ’em all some place to go

You’re jamming me
You’re jamming me
Quit jammin me
Yeah you can keep me painted in a corner
You can walk away, but it’s not over

Take back your Iranian torture
And the apple in young Steve’s eye
Yeah take back your losing streak
Check your front wheel drive

You’re jammin’ me
You’re jammin’ me
Quit jammin’ me

Take back Pasadena
Take back El Salvador
Take back that country club they’re
Tryin’ to build outside my door

You’re jammin’ me
You’re jammin’ me
Quit jammin’ me
Baby you can keep me painted in a corner
You can walk away, but it’s not over

Oh you’re jammin’ me
Quit jammin’ me
You’re jammin’ me

Well, you know what?

Time for an update.

STAND BACK!


Wolf Moon And The Deplorables Lyrics

“Scammin’ Me”

(Try playing the song while you read – it really helps!)


You got us in a corner

You got us against the wall

We got no – where to go

We got no – where to fall

Take back your crap insurance

With Obama’s guarantee

Take back your global warming

‘Cause we cut our T.V.s free

You’re scammin’ me

You’re scammin’ me

Quit scammin’ me

Hey you can keep us punched in a corner

But we will walk away, and it’s not over

You’re scammin’ me

Take back your patsy killers

Take back your gun grab plan

Take back your mind control of

Your lies in razor-land

Take back your crooked Clintons

Take back your fraud named O

Take back Loretta Comey

Give ’em all some place to go

You’re scamming me

You’re scamming me

Quit scammin’ me

Yeah you can keep us punched in a corner

But we will walk away, and it’s not over

Take back your Iranian cash grab

And our Apple as Tim Cook’s spy

Yeah take back your losing wars

Based upon your lie

You’re scammin’ me

You’re scammin’ me

Quit scammin’ me

Take back your Venezuela

Take back Paul Manafort

Take back your city slackers

You’re tryin’ so hard to import

You’re scammin’ me

Representative Alexandria Ocasio-Cortez (D-NY) and Senator Ed Markey (D-MA) were joined by Democratic lawmakers from both the House and Senate on February 7, 2019, to introduce Green New Deal legislation.

You’re scammin’ me

Quit scammin’ me

Baby you can keep us punched in a corner

But we will walk away, and it’s not over

Oh you’re scammin’ me

Quit scammin’ me

You’re scammin’ me


Wolf Moon And The Deplorables Lyrics

“Scammin’ Me”

You got us in a corner
You got us against the wall
We got no – where to go
We got no – where to fall

Take back your crap insurance
With Obama’s guarantee
Take back your global warming
‘Cause we cut our T.V.s free

You’re scammin’ me
You’re scammin’ me
Quit scammin’ me
Hey you can keep us punched in a corner
But we will walk away, and it’s not over

You’re scammin’ me

Take back your patsy killers
Take back your gun grab plan
Take back your mind control of
Your lies in razor-land

Take back your crooked Clintons
Take back your fraud named O
Take back Loretta Comey
Give ’em all some place to go

You’re scamming me
You’re scamming me
Quit scammin me
Yeah you can keep us punched in a corner
But we will walk away, and it’s not over

Take back your Iranian cash grab
And our Apple as Tim Cook’s spy
Yeah take back your losing wars
Based upon your lie

You’re scammin’ me
You’re scammin’ me
Quit scammin’ me

Take back your Venezuela
Take back Paul Manafort
Take back your city slackers
You’re tryin’ so hard to import

You’re scammin’ me
You’re scammin’ me
Quit scammin’ me
Baby you can keep us punched in a corner
But we will walk away, and it’s not over

Oh you’re scammin’ me
Quit scammin’ me
You’re scammin’ me

Wolf Moon, 2019

The words are yours. The music is presumably somebody else’s. Enjoy.