Friday, April 19, 2024

Cyber War: Largely unnoticed, it has already begun

A cyber attack on US infrastructure planned in China is expected soon. The most dangerous weapons in the digital arsenal, once controlled by the US, may be in foreign hands. 

By Greg Guma


China is developing the “ability to physically wreak havoc on our critical infrastructure at a time of its choosing… Its plan is to land blows against civilian infrastructure to try to induce panic.” 

- Christopher Wray, FBI Director, April 11, 2024


Twelve years after the massive oil drilling disaster in the Gulf of Mexico, experts still weren’t sure how it happened. But according to a detailed analysis“Cybersecurity and Offshore Oil: The Next Big Threat,” the cause actually may have been cascading cyberattacks that crippled the operations of the rig and started an explosion. 

“If the federal government does not take stronger action to secure the country’s oil rigs a cyberattack on an American oil rig — that cripples its functions and causes fatalities, supply disruption, and millions of dollars of damage — is not only probable, but a near certainty,” the report concluded.


Now we know even more. Chinese government-linked hackers have burrowed into critical US infrastructure and are waiting “for just the right moment to deal a devastating blow,” according to FBI Director Christopher Wray. They have gained access to numerous companies in telecommunications, energy, water and other critical sectors, including dozens of pipelines.


How do they do it? By operating a series of botnets — compromised personal computers and servers around the world — that conceal their malicious activities.


In the immediate aftermath of the 2010 spill, experts and politicians immediately dismissed the possibility of a cyber attack. That simply couldn’t happen, they claimed. But even then there were plenty of clues. Sure, based on the first reports, it could have been a “technical failure,” or the result of human error. But labeling it an “accident,” as news outlets insisted, rather than admitting that it might also have been a premeditated attack, was a clear case of avoiding inconvenient reality. Wishful thinking at its mostly deadly. 


More then a decade later, it may be too late to prevent such attacks, or a cyber war that could spell the end of democracy.


There was no doubt, for example, about the May 2021 cyber attack on Colonial Pipeline. The company, which operates the largest gasoline pipeline network in the country, was forced to shut down operations due to ransomware. Its pipelines are crucial for the US eastern seaboard, transporting more than 2 million barrels a day — about 45 percent of fuel used on the East Coast. The attackers — identities still unknown — used a group called DarkSide, which has targeted other companies. 


The same thing happened in October 2020 to the UVM Health Network, which runs six hospitals in Vermont and New York. In the midst of the COVID-19 pandemic UVM lost access to scheduling systems and patient information, and was forced to cancel many elective procedures. Ransomware attacks like this are becoming commonplace. According to Christopher Krebs, the former Homeland Security official ousted by former president Trump, “We are on the cusp of a global digital pandemic driven by greed.”


As I explained in a 2010 article, still available on multiple websites, the summer before the 2010 Gulf oil spill Foreign Policy posted an article citing credible research and directly warning oil companies worldwide that their offshore rigs were highly vulnerable to hacking. As Richard Clarke explained in his book Cyber War, “Computer commands can derail a train or cause a gas pipeline to burst.”


In early 2009, I noted, a 28-year-old contractor in California was charged in federal court with almost disabling an offshore rig. Prosecutors said the contractor, who was allegedly angry about not being hired full time, had hacked into the computerized network of an oil rig off the coast, specifically the controls that detected leaks. He caused some damage, but fortunately not a leak.


In January 2010, the Christian Science Monitor reported that at least three US oil companies had been targets of a series of cyber attacks. In these cases, the culprit was most likely a person or group in China. The incidents, kept secret for two years, involved Marathon Oil, ExxonMobil, and ConocoPhillips. The companies didn’t realize how serious their problem was until the FBI alerted them. Federal officials said that proprietary information – email passwords, messages, and information linked to executives – had been flowing out to computers overseas.


The companies wouldn’t comment, or even admit the attacks had happened. But the Monitor persisted, interviewing insiders, officials and cyber attack experts, and ultimately confirmed the story. Their overall conclusion was that cyber-burglars, using new spyware that was almost undetectable, posed a serious and potentially dangerous threat to private industry. An era of cyber warfare had clearly begun. But most people were mesmerized by the allure of social media and the Internet.

As Clarke noted in his book, many nations were already conducting Internet espionage and sometimes even cyber attacks. Several of the most aggressive were China, Russia, and North Korea.* Spying on defense agencies and diplomats was a major focus, but strategically important businesses and other countries were also being targeted. Google claimed that it had found evidence of at least 20 companies that were infiltrated from China. According to a report in the Wall Street Journal, “logic bombs” had been infiltrated into the US electric power grid. They could operate like time bombs.


On oil rigs, the advent of robot-controlled platforms made a cyber attack possible with a PC anywhere in the world. Control of a rig could be accomplished by hacking into the "integrated operations" that link onshore computer networks to offshore ones. But no one would admit that it had already happened, despite confirmation that computer viruses were causing personnel injuries and production losses on North Sea platforms.


The problem was that even though newer oil rigs had cutting-edge robotics technology, the software that controlled their basic functions was still old school. Most relied on supervisory control and data acquisition (SCADA) software, which had been created in an era when "open source" was more important than security,


"It's underappreciated how vulnerable some of these systems are," said Jeff Vail, a former counterterrorism and intelligence analyst with the US Interior Department who talked with Greg Grant, author of the Foreign Policy article. "It is possible, if you really understood them, to cause catastrophic damage by causing safety systems to fail."


The name of the piece, by the way, was “The New Threat to Oil Supplies – Hackers.” It sounded a lot like “Bin Laden Determined to Strike Inside the US.”


Unusual Suspects


Who would do such a thing? The Right, of course, was quick to blame environmentalists or “eco-warriors,” accusing them either of trying to punish big oil or build pressure for stricter regulations. But there were other, more likely candidates, including extortionists who hoped to blackmail big pocket companies or foreign governments. By 2010, between 20 and 30 countries had cyber attack capabilities. The motives for a government-sponsored attack included a strategic move to change the balance of global oil reserves, or a preemptive strike by a country that felt threatened or had a bone to pick.


Some circumstantial evidence at the time pointed toward North Korea. The Deepwater Horizon oil platform was built and financed by South Korea’s Hyundai Heavy Industries Co. Ltd. Thus, its destruction could hurt both the company and the country’s economy. In July 2009, North Korea was also the main suspect when a series of attacks paralyzed websites of the US and South Korean government. Known as a Distributed Denial-of-Service (DDOS) attack, this one hit on July 4th, targeting computers at the White House, the Pentagon, and the New York Stock Exchange. The websites of the Department of Transportation, the Treasury Department and the Federal Trade Commission were shut down for days.


South Korean targets included the presidential Blue House, the Defense Ministry, the National Assembly, Shinhan Bank, Korea Exchange Bank and the country’s top Internet portal. The attacks coincided with North Korea’s anticipated testing of a long-range missile with the potential to hit Hawaii. That missile was never launched, but several scud missiles were fired.


There were other examples of cyber warfare allegedly orchestrated by a state against a rival government. Russia, for example, was implicated in attacks aimed at Georgia and Estonia. A 2007 cyber attack on Estonia crippled its parliament, banks, ministries, phone systems, newspapers and broadcasters. The reason was allegedly a dispute over the relocation of war graves and a Soviet-era grave marker. Russia denied responsibility, but an ethnic Russian Estonian was tried and convicted for being involved.


Dark Realities


The US government’s failure to address private-sector vulnerability to cyber attacks goes back decades and continues to this day. Even the Obama administration hesitated to challenge the status quo. Given the vulnerability of crucial infrastructure and much of the private sector, surprisingly little  has been done to prepare for what looks inevitable.


A US Cyber Command was established in 2009, and various branches of the military developed their own offensive capabilities. By 2012, under orders from Obama, and with a budget that had reached $14 billion, intelligence officials produced a list of foreign targets — systems, processes, and infrastructure. Attempts were also made to guard federal infrastructure. But not even the Department of Homeland Security took responsibility for protecting the private sector. According to Janet Napolitano, then DHS Secretary, legal and privacy issues were in the way of having the government monitor the Internet or business operations for evidence of potential cyber attacks. Businesses were wary of any regulation that might accompany government help.


Though cyber attacks certainly happened, many left no obvious trace. As Clarke explained, corporations tended to believe that the “millions of dollars they have spent on computer security systems means they have successfully protected their company’s secrets.” Unfortunately, they were wrong. Intrusion detection and prevention systems sometimes failed.


Nevertheless, no federal agency assumed responsible for defending the banking system, power grids or oil rigs from attacks. The prevailing logic was that businesses should handle their own security. Yet their experts readily admitted that they wouldn’t know what to do if an attack came from another nation, and assumed that defense in such a case was the government’s job.


The US was suffering from “a conspiracy of secrecy about the scale of cyber risk,” James Fallows wrote in a March 2010 article for the Atlantic. Companies simply could not admit how easily they could be infiltrated. As a result, the changes in law, regulation, or habits that might increase safety weren’t often discussed. But sooner or later, Fallows warned, “the cyber equivalent of 9/11 will occur—and, if the real 9/11 is a model, we will understandably, but destructively, overreact.”


A decade after planes hit the Twin Towers and Pentagon, offense had outpaced defense in the cyber arms race, and much of the best talent had gone private. The US remained a major buyer, but India, Brazil, Malaysia, Singapore, North Korea, Iran and Russia were also competing for the best weapons. Middle Eastern intelligence services emerged as the biggest non-US spenders. By 2013, the private market was bringing in $5 billion. And that didn’t include cash flowing freely in the largely criminal underground. 


Why was this happening? In part, it was about the money. Although many hackers were obsessed with the thrill of the cyber game and some were motivated by principle — the desire to protect people and their privacy, others just wanted to get rich quick. But beyond that, it was also political: the stark difference between democracy and autocracy. The US doesn’t conscript talented hackers; the Russians, Iranians, North Koreans, and Chinese do. Either serve the state or go to jail. 

Eventually, Russia moved ahead of other countries, including the US, in terms of sophistication. According to Nicole Perlroth, in her startling book This Is How They Tell Me the World Ends, Russian hackers infiltrated the Pentagon, White House, Joint Chiefs of Staff, and State Department, among others. In one attack, Russian hackers, posing as Islamic Fundamentalists, took a dozen French TV stations off the air. They were caught dismantling controls at a Saudi petro-chemical company. They manipulated the Brexit referendum, hacked the American grid, and meddled in both the French and US elections. During the same period, they also tested an advanced cyber arsenal in Ukraine.


Soon a group of hackers —  identities still unknown — began to steal the American cyber arsenal** of the National Security Agency, and offered these tools and code to any country, terrorist of cybercriminal able to pay. One buyer was Russia. In June 2017, it used them on Ukraine, in what Perlroth describes as “the most destructive and costly cyberattack in world history.” Every screen turned black. People couldn’t get money from ATMs, pay for gas, send or receive email, buy groceries, get paid, or even monitor radiation levels at Chernobyl. 


And the attack wasn’t restricted to Ukraine. It also hit any company that did business there, including Pharma giants Pfizer and Merck, the shipping conglomerate Maersk, FedEx, even the Cadbury chocolate factory in Tasmania. 


What saved Ukraine, in the end, is precisely what makes the US the most vulnerable nation on earth. It wasn’t fully automated! In other words, its critical infrastructure was not yet “web-enabled.” It also had another advantage — a sense of urgency. After being attacked by Russia for years, it knew that survival depended on cyber vigilance. Thus, when Ukrainians elected a new president in 2019, they voted on paper. No fancy machines. Every ballot was counted manually. 


A Digital Pandemic


America still hasn’t embraced the same awareness as Ukraine or taken the necessary steps to create an effective defense. Yet the leading edge of 21st century warfare, despite the brutal footage from Ukraine we see every day, is not land, air or sea. It is digital. Beyond the disinformation campaign launched during the 2016 presidential election, the more dangerous long-term threat to democracy is manipulation of back-end election systems and voter registration in all fifty states. 

“They may have stopped short of hacking the final vote tallies” in 2016, Perlroth writes, “but everything they did up to that point, American officials conclude, was a trial run for some future attack on our elections.”


In May 2021, Colonial Pipeline was the target. Eight months earlier, it was the UVM Health Network and other hospital systems. In Vermont and elsewhere, the culprit was a botnet called TrickBot, whose developers were based in Moscow and St. Petersburg, according to a detailed account in Perlroth’s book on cyber warfare. By that September, she documents, TrickBot was selling access to targets in both Europe and the US, including Florida, Georgia courts, and state agencies in Louisiana. In response, the US Cyber Command hacked into TrickBot and tried to neutralize the attacks. 


This worked, but only briefly. A week later, TrickBot ransomware was back, and Cyber Command had to strike again. This time the goal was also to send a message: We’re watching you, and if you come after our election, we’ll take you out. A similar warning was issued to Iran. In the following weeks, Microsoft went to federal court on a related matter, accusing cybercriminals of violating copyright law by using its codes for malicious purposes. The objective was to force web hosting providers to take TrickBot offline. It appeared to work. 


But wounded animals can be dangerous. In this case, TrickBot’s Russian operators retaliated by attacking US hospital systems, including the UVM Health Network. One by one, in the days leading up to the election, just when hospitals were seeing spikes in coronavirus cases, more than 400 were hit by ransomware. In a private exchange, later captured by a cyber threat researcher, a Russian hacker explained, “We expect panic.” 


In response, the FBI and other agencies arranged an emergency call with administrators in the targeted hospitals, explaining what was happening and how to handle it. But the damage was done. The attacks interrupted treatments, reduced staffs to pen and paper, and diverted resources. And it was also part of a larger strategy, what was eventually labeled a “perception hack.” The idea is that multiple smaller attacks can be amplified and ultimately become evidence to support the idea that the election itself was unsound — “rigged.” On Election Day, there were some snags, like the suspicious water main break in Georgia that delayed vote counting in Atlanta. But larger attacks didn’t materialize. 


Some experts and researchers claim that the coordinated US response, by government and the private sector, created an effective deterrent. Evidence for this view includes a statement by President Putin, issued just before the US election, calling for cyber “reset.” But others suggest a less optimistic reason there wasn’t more interference: Putin decided the job was done. Russian trolls no longer needed to stir up discord and chaos. Now, led by Trump, there were lots of elected officials and millions of citizens ready and willing to help. So, mission accomplished.


The attack cost Vermont’s hospital between $40 million and $50 million, mostly in lost revenue. Apparently no ransom was paid. Yet almost a year later Doug Gentile, senior VP of network information technology at the medical center, mistated the case. “There was no specific ransom note,” he said, “no specific dollar amount or anything like that, it was just: ‘here’s how you contact us.’” Yet he also claimed, “The motive here was clearly money, nothing else.” Based on his account, however, and especially on what has been revealed since October 2020, this doesn’t make sense.

And after that? On April 13, 2022 US. government agencies issued an alert warning about malicious cyber tools that are capable of sabotaging the energy sector and other key industries. The culprit wasn’t named, but evidence suggests that Russia is behind the control system-disrupting tools, and that they were configured to target America’s energy concerns.

While alarm about the implications of the attempted coup on January 6, 2021 is certainly warranted, most Americans, as well as their elected representatives, still haven’t noticed the handwriting on the wall. The most dangerous cyber-weapons, once controlled by the US, are now in foreign hands. There are hackers inside our hospitals and the power grid. They probe computer networks millions of times a day, and make this so-called superpower extremely vulnerable to a Cyber Pearl Harbor. 


Two decades after 9/11, it’s far easier to sabotage the software of a fighter jet — or a passenger flight — than physically take the controls and crash it into a building. The warnings began years ago. Even now too few are listening.


* Those who feel I am unfairly accusing these nations would do well to conduct some serious research. China and Russia have been advanced players for at least four decades, later joined by DPRK. Among experts in this field, as distinct from ideologues, there is no dispute. Nicole Perlroth’s 2021 book, This Is How They Tell Me the World Ends: The Cyber-Weapons Arms Race, provides a definitive, well-documented history.


** The US government was among the first to develop cyber weapons. As Fred Kaplan noted in his riveting book Dark Territory: The Secret History of Cyber War, at least twenty nations were already in the game before 2016. At that point the focus turned to Russia's "hybrid warfare," the weaponizing of hacked documents to influence the presidential race. But information war began much earlier, including the US-NATO campaign against Serbian president Slobodan Milosevic. The first major cyber attack, a US-Israeli operation called Olympic Games, was directed at Iran's nuclear program. Later known as Stuxnet, it involved a cyber worm that destroyed a quarter of Iran's centrifuges and set back its nuclear program by several years. The trouble with waging cyber war, warned Kaplan, is that "what we can do to them, they can someday do to us." It's a type of blowback, and did eventually happen. In an afterword written after the 2016 election, he pointed beyond the Russia-Trump operation to the next threat -- denial-of-service attacks executed by thousands of household devices. "There are now about 10 billion Iot (Internet of Things) devices in the world," Kaplan concluded. "Some estimate that, by 2020, there will be 50 billion. That's a lot of bots to be enslaved for a cyber war."

Wednesday, April 17, 2024

Divide and Conquer: Taking Power and Ending Empires

One Trump tactic is bravado in the face of multiple indictments, with the clear intention of sparking another uprising. He made it clear with a provocative rally in Waco, Texas — the perfect spot to rally troops and stoke rebellion.


Commentary by Greg Guma


If you want to seize power, the first step is to stoke divisions. Elections may be about addition, but overturning a political or social order starts with exaggerating differences and deepening resentments. 

Then you need a martyr, or many, and convincing calls for revenge. Better yet, become both the martyr and the savior yourself.

After the assassination of Julius Caesar, his nephew and heir Augustus tracked down and brutally dispatched the conspirators. Then he established himself as the first Roman emperor. After that, power dramatically shifted away from representative democracy and toward centralized authority, an imperial order with a dictator wielding almost absolute power. 

America’s Orange Julius Caesar, after the failure of his first attempt to seize power, is currently preparing a new pretext and waiting for the perfect storm to stage his comeback. Election is either an option or just another obstacle. Adolf Hitler went to prison and was banned from speaking for several years after the Beer Hall Putsch, a failed coup d'état in 1923. Ten years later he was German chancellor, and eventually became The Fuhrer.

One current Trump tactic is bravado in the face of his multiple indictments, with the clear intention of sparking another MAGA uprising in his defense. He telegraphed his intentions by holding a provocative rally in Waco, Texas on March 25, 2023 — the 30th anniversary of the Branch Davidian siege in the same place. A perfect spot to rally the troops and revive the rebellion.


Anticipating the Saturday rally, a Trump supporter brandished a "Trump or Death" flag
near the former president's Mar-a-Lago home on March 20, 2023.

In 1993, Federal agents, aiming to arrest cult leader David Koresh, surrounded his compound in a standoff that lasted more than a month. It ended in a deadly fire that killed 76 people, including 25 children. Deep resentments, distrust of the federal government, and predictions about the collapse of the American Republic have circulated on the Right ever since.

After seizing power, Emperor Augustus went after the ability to introduce and veto laws, as well as command of the army. Until then, military leaders had stayed out of domestic affairs, and the Senate was a check on authoritarian challenges. The emperor also took control over officials in lower-level executive positions. No citizen could hold office without the emperor’s personal consent. In other words, he gained power over public institutions by eliminating critics and repopulating the bureaucracy with loyalists. As President, Trump was working hard on that, and would certainly finish the job in a second term. He’s already got a foothold in the Supreme Court, Congress and military.

As a result of the redistribution of power, Rome’s popular assemblies, a legislative structure that had limited executive power, became less important. They had operated on the basis of direct democracy and involved ordinary citizens.

In theory, the powers wielded by Rome’s emperors came from the Senate. But frequently it served as a legitimizer of the emperor’s expanding rule. The rubber-stamping of a dictator’s power plays sometimes provides a patina of legitimacy. In America, the Senate can convict a president after impeachment, but it has never actually happened.

On the other hand, the Roman Senate was composed of elite and intellectual citizens and also influenced public opinion. It could declare the emperor an enemy of the state. Or, after a dictator’s removal or death, it could wipe the record of his reign from official history.

In the US, struggles to control the national narrative and shape the teaching of history are underway. It’s still almost impossible to erase important events, except in insulated strongholds like North Korea, Florida or Fox news. But US states and communities are working on it, fast becoming laboratories for autocracy and christian nationalism. 

Meanwhile, the balance between legislative and executive power is shifting, aided by gridlock, obstruction, and a preoccupation with investigations and payback rather than finding solutions to what looks like a global spasm.

Trump in Waco, after claiming his own arrest. 

Maintenance is a chronic problem and a key to an empire’s longevity. While bringing Rome enormous wealth, power, and prestige, expansion ultimately helped bring about its downfall. An excellent road system contributed to trade and mobility, military and otherwise, much like America’s infrastructure. Both the US Interstate Highway system and the Internet were initially designed with military purposes in mind. But the cost of maintaining the infrastructure of a vast empire weighs heavily. In Rome’s case, both the treasury and administration were seriously overstretched by domestic instability and persistent attacks from foreign forces. 

Rome’s emperors tried to solve some of their problems through internal reforms. For example, Diocletian split control of the empire into western and eastern administrations. He thought it would be easier to manage. But it was a fatal choice. For the next 100 years, Rome went through more divisions. Finally, it split into a Western and Eastern Empire, a permanent break that changed the world.

Known as the Byzantine Empire, the Eastern Empire survived for almost 1000 more years. Rome’s rule didn’t last half as long. The fall was complete by 476, when a German chieftain deposed the last emperor.

It’s a cautionary tale. Lincoln warned about what happens to a house (or nation) divided — it “cannot stand." Yet these days right-wing lightning rod Marjorie Taylor Green and others have a similar plan, a national “divorce” for Red and Blue America. 

Various Roman emperors introduced managerial innovations. Yet, in the end conflicts between East and West, plus external pressures and the slow depletion of its wealth and infrastructure, made the empire vulnerable to collapse. It sounds familiar, almost like a possible future.

Monday, April 1, 2024

Fuzzy Logic: The Dangers of Life in a Bubble

The current age favors subjective impressions over rational arguments and clear thinking. In 2016 this led to the first postmodern president, a power-mad fabulist. 

By Greg Guma


Despite their promise and early benefits, digital media have deepened social and political divisions.  Websites, blogs, and podcasts, along with major media platforms, attract mostly like-minded people, and reinforce a segregated news and information environment that reinforces and amplifies extreme ideas and behavior. 

This isn’t completely different from the type of partisanship and zealotry that characterized public communications in the past. But this version is more potent, closed off and addictive. 

Millions live in sound-proof, mesmerizing “silos” and “bubbles.” Truth and facts have meanwhile become debatable and difficult to define.

Conflict drives the news cycle. Partisan sources and individual “influencers” often shape national and local narratives. This makes it more difficult to reach agreement or even have a civil discussion, and easier for opportunists and demagogues to ignore or distort reality, pushing narratives and initiatives based on convenience or self-interest. 


Along the way there has been a loss of faith in almost everything, and a growing escapist mentality rooted in belief that no meaningful progress is possible. Popular culture feeds this attitude, encouraging excess and striking poses while confusing commitment with fanaticism and "straight talk" with hate speech.

Insurgent 1968 presidential candidate Eugene McCarthy once warned that the emerging postmodern age favored “fuzzy logic” and subjective impressions over rational arguments and clear thinking. It recognizes no absolutes, just degrees and disposable attitudes. “This predicament is not altogether reassuring,” he lamented, “as it may lead us to a state of ‘entropy,’ of randomness, chaos and disorder, with little basis for optimism as to what may result.” 

In 2016 it led to the first postmodern president, a power-mad fabulist. That in turn opened the door to an authoritarian cultural counterrevolution. 

Speaking on his own TV network back in the Reagan era, televangelist Pat Robertson made the long-term goal of his “moral majority” movement clear: “to mobilize Christians, one precinct at a time, one community at a time, one state at a time, until once again we are the head and not the tail, and at the top rather than at the bottom of our political system.”

In a country founded on the principle of church-state separation, it sounded unlikely at first. But Robertson’s allies and followers ultimately found an opening and vehicle to redefine civic life and reality itself, while simultaneously promoting themselves as national saviors in a “final” battle between good and evil. 

Demagogues and evangelists had been using different media to do the same thing for generations. We’ve gone from traveling Chautauqua tent shows and radio sermons to Tiktok, Truth Social, and X. Only the specific targets have changed. These days it can be practically anything associated with multiculturalism, progressive politics, reproductive rights, or social justice. 

Fueled by Fox News and conservative powerhouses like the Koch brothers, christian nationalists and white supremacists have mass marketed an extreme, paranoid vision, immersing millions in a false reality. They present specious arguments and patent falsehoods as history, biblical truth or indisputable fact. Too often other “reality based” outlets let the disinformation slide.

It also migrates too easily — from Russian media fronts to Democratic Socialists and US radicals. This is one reason that the current political system is in the process of slowly unraveling.  After decades of open hostility, the far right and far left have finally found some common ground — contempt for “liberal” elites and their “oppressive” governments.

Rather than being at opposite ends of the spectrum, they resemble each other in some ways — two ends of an ideological horseshoe. Political scientist Jeff Taylor argues that the political spectrum “may be linear, but it is not a straight line. It is shaped like a horseshoe.” Some say this may help explain the resurgence of antisemitism on both the right and left.

The common ground is a “shared anti-liberal resentment,” warns Kyrylo Tkachenko. “Of course, there remain palpable differences between the far left and the far right. But we should not underestimate the dangers posed by these left-right intersections.” 

The extreme declarations and leading questions of so-called “defenders of liberty” from Tucker Carlson to Vandana Shiva and Robert Kennedy Jr., are music to many ears. Conspiracy theorists who discounted the safety and efficacy of COVID-19 vaccines and other public-health mandates are often portrayed as far right. But many are organic farmers, members of homeschooling and alternative communities, and anti-war hippies. The anti-vax faction is linked to left-libertarian politics and a deep mistrust of institutional authority.

Media echo chambers have helped to create a distorted picture of contemporary reality that makes sense to millions who feel insecure, angry, and hungry for clear answers. In response, some people try to puncture the bubble, putting their faith in exposing the lies and contradictions. When the public finally understands the distorted, illogical views of extremists, goes the argument, they will be exposed, and their followers freed from the bubble. 

Once upon a time, it felt like a safe bet.

Unfortunately, millions are angry, alienated and worried about their futures and the safety of families and friends. It makes them vulnerable to the politics of paranoia and blame. Bombarded with lies and distortions, they choose to remain inside a toxic bubble, placing their faith and the planet's future in the hands of demagogues and hucksters who offer slogans as answers and the elusive promise of a return to “the good old days.”

It’s a formula for disappointment and disaster.

Wednesday, March 20, 2024

From Fabian Socialism to Class Struggles: Looking Both Ways on the Road to Revolution

BY GREG GUMA
  
In Edward Bellamy's 1888 best seller a time traveler went a century forward, "Looking Backward" from a future when the work week has been drastically reduced, products and services are delivered instantly and everyone retires at forty-five with health benefits. Transported to the same year in Dons of Time, my time-traveling hero Tonio Wolfe interrupts a debate with William Morris at a London soiree and discusses modern problems with Ignatius Donnelly.

"That's William Morris," said Annie Besant. "Wallpaper, carpets, curtains and all that. These days he's a revolutionary." Five years ago, she explained, Morris had joined the Democratic Federation, then the only active socialist organization in the country. But the businessman knew nothing about Marx or Henry George. He was an aesthete and an instinctive rebel. As a result he split the Federation a year after joining it, and formed the Socialist League.
      Last year he split again when the anarchist faction asserted itself.
      "As much as I would like to join the chorus I'm afraid I cannot," Morris announced. "We have moved past the point where propaganda will turn the tide. We are on the road to revolution - or oblivion. The corruption of society is complete, is it not? Well, all right, then the time has come for a new order, not another manifesto."
      "And what is this order -- is it imposed by force, does it include nationalization and control of individual initiative?" It was a comment from someone in the crowd, just beyond Tonio's view. That voice, so familiar. He strained to see.
      Ignatius Donnelly looked exactly as Tonio remembered him from the View Room, piercing blue eyes, stocky frame, commanding presence. "I enjoyed and appreciated Progress and Poverty," he said, an acknowledgement of Henry George's grand opus. "His argument is logical, and in terms of Ireland it may be correct. There is no way to justify such vast quantities of land in the hands of so few."
      "Your point, sir." Morris didn't appreciate being interrupted mid-rant.
      "But personally, I remain too much a Jeffersonian to embrace nationalization and so-called panaceas like the single tax. Such ideas strike at basic rights and the very fundamentals of society."
      "What rights?" A challenge from the crowd.
      "The right of any man -- or woman -- to enjoy the fruits of his labor," Donnelly said defiantly. "Without that we relapse into barbarism."
      "I think we've heard enough of the American position," Morris cut in. "So, what can the Society do about the individualist strain? I suspect any educational project on the other side of the pond will run a bit longer than the masses can afford."
      "America will follow its own road," Donnelly insisted.
      "And who will lead it, sir? You?"
      "Maybe he will," blurted Tonio before he could stop himself. Dozens of faces turned his way. Realizing what he'd done, he quickly added, "as governor in the great state of Minnesota. You are the Farmer Labor Party candidate, are you not?"
      "I have that honor," acknowledged Donnelly, a bit shocked that anyone in the audience recognized him. The room erupted into spontaneous applause. Donnelly basked in the moment.
      "You know him?" Annie was impressed. "I do as well actually, we met briefly last spring. Interesting man -- strange ideas."
      Tonio thought: There goes another time commandment. This is not inconspicuous.
      As the debate continued, they retreated outside for a private moment. Donnelly needed to know something about the random American who had come to his defense. Annie re-introduced herself and apologized for Morris, insisting that there was enough room in the Fabian Society for differing views on the issues he raised.
      Tonio kept his introduction vague, then inquired about Donnelly's latest book, The Great Cryptogram.
      "That's why I'm here instead of campaigning at home," the politician explained. "It's my second trip this year. But this one will be brief, a few paying engagements and I'm gone. Where are you staying, we should meet."
The Great Cryptogram (1888) 
       In February, he'd attended a Labor Alliance convention but failed to notice a growing rift between farmers and the Knights of Labor. After he left for England the Alliance endorsed a St. Paul banker named Albert Scheffer as its candidate for governor. This upset the unions, which hadn't been consulted. Scheffer was playing the angles, seeking the Republican nod while talking about temperance and tariffs. The establishment sensed a split they could exploit, while Donnelly's labor friends launched a plan to draft him. A letter from one ally, reaching him in London, said he was "the only man in the state in whom the people have confidence."
      "It was an awful dilemma," Donnelly lamented. "Meanwhile, savage insects ravaged the wheat. For the first time in twenty-five years we didn't have a bushel to show this season. And the Bank of Minnesota was making unpleasant noises about some debts. Still, the party leaders promised to raise a substantial war chest. In a sense I suppose my critics are right. I really can't say no to a nomination, one more chance to put my case before the people."
      "Then what are you doing here?"
      Donnelly flashed a devilish grin. "Money goes farther and the food is cheap. But seriously, it's all the Republican's fault. They may be many things but they are not stupid. In the end they didn't nominate Scheffer. Instead they went with Bill Merriman. Do you know who that is? Why should you? He's the man I supported for Speaker of the House just last year, a solid supporter of many of our issues, including the usury bill. Yes, he is also a banker, but I have to say he is essentially an honest fellow who seems to want fair, economical government."
      He had decided to withdraw from the race after several friends in the GOP arranged an invitation by the Republican National Committee to speak on behalf of Ben Harrison in New York. But at a meeting the pols suggested, without much subtlety, that should Harrison become President, well, Donnelly's contribution would not be ignored. He despised such vote buying and influence peddling. On the other hand, he thought James Blaine's decision to break the GOP convention deadlock and back Harrison had given him a solid edge.
      "It's also really what Kate wants," Donnelly admitted with some embarrassment, "for me to be paid for all the campaigning and perhaps to secure a federal appointment at some point."
      "What did you decide?"
      "I declined," he said glumly. "I had to. I'm in pretty hot water at home over that. And meanwhile, the Alliance hasn't been able to raise the promised funds for the governor's campaign. So, as to why I'm here, the honest answer would be, I'm in hiding. Hopefully, by the time I start home word will begin circulating that my withdrawal is imminent. Eventually, I will have to bite the bullet and make the endorsement."
      "Won't your labor friends feel betrayed?"
      "I'm not looking forward to that discussion."

Terror in the Air

Donnelly was a pleasant host but a bit mercurial. He would begin most days like a fighter in training for a match, but then get distracted or preoccupied for hours by some minor statistic or news item. He'd then regroup and pen some letters, corresponding rapid-fire with family and friends in Minnesota and Illinois. On the other hand, he would fret over a single line in a note from Kate Donnelly saying the bank might seize a parcel of land. Then someone would call and he'd be off in fine form with a list of talking points in hand. He was a whirlwind, no vortex required.
      That evening Tonio was in the sitting room on Duke Street when he returned with news of a new assault on rationality. Near Ratcliffe Highway he'd watched a crowd pursue a hapless seaman, trailing and surrounding him with curses and accusations. He was "Leather Apron," they shouted, and "the Ripper." He wasn't of course. If the police hadn't arrived in time, Donnelly thought they might have killed the fellow.
      "Who was he in the end?"
      "No one, just someone with red paint stains on his pants. But they held him, for his own protection. It's mayhem out there."
      "Talk about deja vu," Tonio mumbled.
      "How so? I've never seen a thing like it. People are frantic, suspicious of everything. There's a smell of terror in the air."
      Tonio wasn't sure how to respond. The mood actually reminded him of the period after 9/11, as well as several cities he had visited in recent years, desperate neighborhood in tough times, and too many lives wasted. How could he begin to explain that? "I was thinking about my novel," he answered instead.
      "Really." Donnelly sounded skeptical but curious. "The one about the detective who tracks a killer into a cave? What happens next? They didn't let you get very far the other night. Do tell, where does he end up?"
      What could he say? In Edward Bellamy's book the time traveler went a century forward, "looking backward" from a future when the work week has been drastically reduced, products and services are delivered instantly and everyone retires at forty-five with health benefits. "The nation is the sole employer and capitalist," Bellamy wrote about the year 1988. All industrial production has been nationalized and goods are equally distributed. There is no need for dissent, and crime, though not completely eliminated, is handled as a medical issue, well on its way to the dustbin of history.
      Quite a fantasy, he thought, very much the conservative Tea Party's nightmare.
      "Actually, in my book the detective comes to this time to catch the killer and eventually takes him back," Tonio pitched. Technically, he wasn't breaking rules. He wasn't revealing anything about the Jump Room or claiming to be a detective. The way he saw it, there was no reason to think any fantasy he concocted would have any impact. And if it did, well, he was stuck here and would just have to do what felt right.
     "Wonderful," cheered Donnelly. "What kind of future is it? Peace and harmony?"
      "I wouldn't want to give away too much. That would spoil the ending. But let's begin with technology," he offered, and commenced an elaborate description of modern marvels like air travel, air-conditioning, mass communications and other features of the high-tech world he missed, a place where everything seemed possible and almost anything was for sale.
      "And yet there is enormous inequality. A very few, just one percent, have almost half the wealth, while most people don't have basic security. Many are hungry and brimming with rage. Guns are everywhere. It's a heavily armed, alienated and unhappy society, I'm sorry to say, a mockery of its past, glittering on the outside but sick inside, prone to arbitrary and senseless violence, and littered with unnecessary victims. Sometimes, for no apparent reason, someone simply goes berserk, and executes dozens in public, then kills himself, or commits what we call suicide by cop."
      He stopped before getting into nuclear weapons and genocide, fearing they would sound too extreme or too debilitating if believed.
      "Terrible. But possible." Donnelly sat down to enjoy the performance. "Tell me about women. Are so many still forced to sell themselves on the streets?"
      "On the streets? Maybe not so much. There are private clubs for that type of thing. But pimps are bigger than ever. I mean, the word has become a verb. Still, in many places women are afraid to go out alone at night."
       "Why's that?"
      "Fear of rape, robbery or murder." Donnelly remarked that it sounded like London these days. Tonio had to agree. "Some women have learned to defend themselves," he continued. "In fact, some are as strong or powerful as any man. But they make the same mistakes."
     "Fascinating. Has humanity at least solved problems like crime, illness and poverty?"
      What a question. The straight answer was no. But instead he talked about the kafkaesque criminal justice system and byzantine corrections industry, balancing that with improvements in life expectancy and medical care.
      "Have we at least agreed that people have a right to end their own lives?"
      "Not yet," Tonio said, taken aback by his interest. "But professionals do tell us how to live."
      "You paint a grim picture, almost anti-Bellamy. And who are the rulers of this dystopia? Has royalty made a comeback?"
      "Not officially, but we do have dynasties and hand out titles. First at this, best of that. And people are celebrated just for being well-known." He'd moved from narration to role playing along the way.
      "A corrupt paradise, you might say a commons pillaged by violence and greed."
      "Elementary, my dear Donnelly."
      "Then it's a matter of choosing sides," the old politician concluded. "Ask yourself: What really threatens humanity, the few who break some arbitrary rules or challenge the government, or those who control the economy and the government, and enact laws causing millions to suffer and die? It's obviously a rhetorical question. But I do wonder, in this troubled future of yours, is progress and reform still possible?"
      Tonio had no clever plot twist to cover that. 

Greg Guma is the Vermont-based author of Dons of Time, Uneasy Empire, Spirits of Desire, Big Lies, and The People’s Republic: Vermont and the Sanders Revolution.  Based on real events, these recreations were excerpted from Dons of Time, Part Three: Gilded Nights, Chapters 31 (Society), 32 (Choices) and 33 (Another Normal). From Fomite Press, also availabe from Amazon.

Want more time travel? Try Annie Besant: London's 1st Wonder Woman or Finding Annie Besant