<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[PwnAllTheThings]]></title><description><![CDATA[Into the weeds on national security, foreign policy, and cybersecurity]]></description><link>https://www.pwnallthethings.com</link><image><url>https://www.pwnallthethings.com/img/substack.png</url><title>PwnAllTheThings</title><link>https://www.pwnallthethings.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 02 May 2026 09:49:15 GMT</lastBuildDate><atom:link href="https://www.pwnallthethings.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Matt Tait]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[pwnallthethings@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[pwnallthethings@substack.com]]></itunes:email><itunes:name><![CDATA[Matt Tait]]></itunes:name></itunes:owner><itunes:author><![CDATA[Matt Tait]]></itunes:author><googleplay:owner><![CDATA[pwnallthethings@substack.com]]></googleplay:owner><googleplay:email><![CDATA[pwnallthethings@substack.com]]></googleplay:email><googleplay:author><![CDATA[Matt Tait]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Georgia Indictment]]></title><description><![CDATA[A quick summary]]></description><link>https://www.pwnallthethings.com/p/the-georgia-indictment</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/the-georgia-indictment</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Tue, 15 Aug 2023 04:23:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TWep!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TWep!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TWep!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png 424w, https://substackcdn.com/image/fetch/$s_!TWep!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png 848w, https://substackcdn.com/image/fetch/$s_!TWep!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png 1272w, https://substackcdn.com/image/fetch/$s_!TWep!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TWep!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png" width="773" height="409" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:409,&quot;width&quot;:773,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:125567,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!TWep!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png 424w, https://substackcdn.com/image/fetch/$s_!TWep!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png 848w, https://substackcdn.com/image/fetch/$s_!TWep!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png 1272w, https://substackcdn.com/image/fetch/$s_!TWep!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F407c7590-86f8-45e5-9b03-c32c64c7921e_773x409.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The indictment is <a href="https://www.documentcloud.org/documents/23909543-23sc188947-criminal-indictment">here</a>. The defendants, including Trump, <a href="https://www.cbsnews.com/news/trump-indictment-fulton-county-district-attorney-fani-willis-speaks/">have until August 25 to surrender</a> for arraignment.</p><p>Along with Trump, 18 other coconspirators are also charged for various sub-schemes within the overall attempt to corruptly overturn the Georgia presidential election in 2020, so I&#8217;ll take them as a few different sections.</p><h2>Trump&#8217;s charges</h2><p>Trump gets 13 charges in this document. Here&#8217;s what they are:</p><p>1. <strong>Violation of the Georgia RICO Act</strong> (count 1)</p><p>This is basically an umbrella charge that covers the whole corrupt scheme. Everyone charged in this indictment is also charged with this offense.</p><p>2. <strong>Solicitation of violation of oath by a public officer</strong> (count 5) </p><p>This charge is for pressuring the Speaker of the Georgia House of Representatives to call for a special session to appoint false electors on December 7, 2020.</p><p>3. <strong>Conspiracy to commit impersonating a public officer</strong> (count 9) </p><p>This is for causing various individuals to falsely represent themselves as presidential electors with the intent to misdirect the January 6 count.</p><p>4. <strong>Conspiracy to commit forgery in the first degree</strong> (count 11) </p><p>This is for the document "Certificate of the votes of the 2020 electors from Georgia" fraudulently certifying a set of Trump electors for the state, to be sent to the Electoral Count in the Joint Session of Congress.</p><p>5. <strong>Conspiracy to commit false statements and writings</strong> (count 13) </p><p>This relates to the same document, but this charge is specifically for the false attestation in it: "we the undersigned, being the duly elected and qualified Electors for President and Vice President of the United States of America from the State of Georgia, do herby certify the following".</p><p>6. <strong>Conspiracy to commit filing false documents</strong> (count 15)</p><p>For conspiring to file that false certification with the Chief Judge of the Northern District of Georgia (as required by the certification process), which is the overt act required for that charge.</p><p>7. <strong>Conspiracy to commit forgery in the first degree</strong> (count 17) </p><p>For the commissioning and creation of a document titled "RE: Notice of Filling of Electoral College Vacancy", to be submitted to the electoral count process, to falsely claim and co-opt the authority of the elected presidential electors</p><p>8. <strong>Conspiracy to commit false statements and writings</strong> (count 19) </p><p>This is for the same document, but this charge attaches to false elector David Shafer and Shawn Still&#8217;s titles as represented on that document. The document named Shafer as &#8220;Chairman of the 2020 Georgia Electoral College Meeting&#8221;, and named Still as &#8220;Secretary of the 2020 Georgia Electoral College Meeting&#8221;.</p><p>9. <strong>Filing false documents</strong> (count 27) </p><p>For causing the creation of a document by John Eastman, titled "Verified complaint for emergency injunctive and declaratory relief", which was filed in Trump v Kemp. That document contained multiple knowingly-untrue statements, including: </p><ul><li><p>"as many as 2506 felons with uncompleted sentences voted"</p></li><li><p>"at least 66,247 underage people voted&#8221;.</p></li><li><p>&#8220;as many as 10,315 or more dead people voted&#8221;</p></li></ul><p>10. <strong>Solicitation of violation of oath by public officer</strong> (count 28) </p><p>Pressuring Georgia Secretary of State Brad Raffensperger (specifically, the Trump phone call asking him to find votes), and asking Raffensperger to send a falsely certified set of Trump electors to the Joint Session of Congress.</p><p>11. <strong>False statements and writings</strong> (count 29) </p><p>Various knowingly false statements made to Raffensperger and his staff during those calls</p><p>12. <strong>Solicitation of violation of oath by a public officer</strong> (count 38) </p><p>For sending Raffensperger a letter on 17 Sept 2021 (months after Biden was inaugurated) soliciting him to "decertify the Election, or whatever the correct legal remedy is, and announce the true winner"</p><p>13. <strong>False statements and writings</strong> (count 39) </p><p>This is for that same letter, but specifically for this false claim inside it: "As stated to you previously, the number of false and/or irregular votes is far greater than needed to change the Georgia election result".</p><h2>Who else was charged?</h2><p>Along with Trump, 18 other codefendants are charged. Some of these names are fairly well known. Others a bit less so.</p><p>Let&#8217;s break them down by group. (Some names appear in multiple groups):</p><p><strong>The Core Conspirators:</strong></p><ul><li><p>Rudy Giuliani (lawyer)</p></li><li><p>John Eastman (lawyer)</p></li><li><p>Ray Smith III (lawyer)</p></li><li><p>Kenneth Chesebro (lawyer)</p></li><li><p>Jenna Ellis (lawyer)</p></li><li><p>Robert Cheeley (lawyer)</p></li><li><p>Sidney Powell (lawyer)</p></li></ul><p><strong>Corrupting the U.S. Department of Justice to falsely allege election fraud:</strong></p><ul><li><p>Jeffrey Clark (ex-assistant attorney general)</p></li><li><p>John Eastman (lawyer)</p></li></ul><p><strong>The Fake Elector schemers:</strong></p><ul><li><p>Michael Roman (GOP strategist)</p></li><li><p>David Shafer (GA Republican Party Chair)</p></li><li><p>Shawn Still (Georgia State Senator)</p></li><li><p>Cathleen Latham (former Coffee County GOP chairwoman)</p></li></ul><p><strong>The Raffensperger call:</strong></p><ul><li><p>Mark Meadows (Former White House Chief of Staff)</p></li></ul><p><strong>Attempts to corruptly influence Ruby Freeman:</strong></p><ul><li><p>Stephen Lee (Illinois pastor)</p></li><li><p>Harrison Floyd (&#8220;Black Voices for Trump&#8221; leader)</p></li><li><p>Trevian Kutti (publicist)</p></li></ul><p><strong>Stealing the ballot machines from Coffee County:</strong></p><ul><li><p>Sidney Powell (lawyer)</p></li><li><p>Cathleen Latham (former Coffee County GOP chairwoman)</p></li><li><p>Scott Graham Hall (bail bondsman)</p></li><li><p>Misty Hampton (former Coffee County elections supervisor)</p></li></ul><h2>The Main Events</h2><p>The first charge is under Georgia&#8217;s RICO law, which acts an umbrella charge for the whole scheme. Everyone is charged with it, and it details everything. But the other charges break down by law, rather than by event, and apply only to subsets of the alleged conspirators per charge, so let's regroup them to make them a bit more understandable:</p><p><strong>1.False testimony to the Georgia Senate </strong>(counts 2-4)</p><p>This was at the Georgia Senate Judiciary Committee on 3 Dec 2020. This intended to influence the proceeding (count 2), and was attended by Rudy Guiliani, John Eastman, Jenna Ellis, Ray Smith III. Giuliani made false claims about mail-in ballot fraud and Dominion Voting Systems (count 3). Ray Smith III made false statements about how many felons, underage people, unregistered voters, and dead people voted in the election (count 4).</p><p><strong>2.Pressuring the Georgia Speaker of the House to call for a special session to appoint presidential electors </strong>(counts 5)</p><p>On the 7th of December, 2020, Trump placed a call to Georgia Speaker of the House of Representatives David Ralston and discussed holding a special session of the Georgia General Assembly, whose purpose would be to falsely certify a new set of electors to be submitted to the U.S. Electoral Count Joint Session in Congress.</p><p><strong>3.False testimony to the Georgia House (counts 6-7)</strong></p><p>There was also hearing at the Georgia House Governmental Affairs Committee (charge 6), where Giuliani made false claims that Fulton County election workers were stealing votes and passing around USB sticks (count 7)</p><p><strong>4.The False Electors </strong>(counts 8-19)</p><p>David Shafer, Shawn Still, and Cathleen Latham are all indicted for their role in the scheme to have 16 false electors (of which Shafer, Still, and Latham were three) to falsely certify the Georgia presidential election for Donald Trump and to fraudulently submit that certification to the Electoral College. Michael Roman, a political consultant, is also indicted for his role in it.</p><p>The false electors represented themselves as real electors (count 8) and created a false election certificate (count 9, 10, 11, 12, 13) to send to be counted at the January 6 tabulation at the Joint Session of Congress (count 14, 15), as well as a document titled &#8220;RE: Notice of Filling of Electoral College Vacancy&#8220; (count 16, 17, 18, 19).</p><p>The certificate and accompanying document can be read <a href="https://www.archives.gov/files/foia/ga-full.pdf">here</a>.</p><p><strong>5.The attempt to influence Ruby Freeman&#8217;s testimony </strong>(counts 20-21, counts 30-31)</p><p>Ruby Freeman, an election worker, and her daughter Wandrea ArShaye &#8220;Shaye&#8221; Moss were substantially harassed through lies spread by Donald Trump and his associates. This harassment originated with false social media claims that Freeman had stayed to count ballots on election night after observers had left, identifying Freeman. The claims <a href="https://sos.ga.gov/sites/default/files/2023-06/SEB2020-059%20ROI%20redacted.pdf">were investigated</a> by Georgia and found to be unsubstantiated.</p><p>Stephen Lee tried to influence Ruby&#8217;s witness testimony (count 20, 21). Later, Stephen Lee, Harrison Floyd, and Trevian Kutti tried again (count 30, 31)</p><p><strong>6.The (unsent) DOJ letter claiming fraud in the Georgia election </strong>(count 22)</p><p>Between 28 Dec 2020 and 2 Jan 2021, Jeffrey Clark wrote a letter saying DOJ had &#8220;identified significant concerns that may have impacted the outcome of the election in multiple States, including the State of Georgia&#8220;. He sent this to then acting-attorney general Jeffrey Rosen (count 22), who did not allow it to be published.</p><p>This letter can be read <a href="https://www.nytimes.com/interactive/2022/06/23/us/jeffrey-clark-draft-letter.html">here</a>.</p><p><strong>7.False Testimony to the Georgia Senate </strong>(counts 23-26)</p><p>Another hearing on 30 Dec, attended by Rudy Guiliani, Ray Smith III, and Robert Cheeley (count 23). Guiliani said false things about how many felons and dead people voted (count 24). Ray Smith said false things about how many people had voted illegally (count 25). Robert Cheeley said false things about ballots being multiple-counted, and poll workers leaving because of a watermain break at the State Farm Arena (count 26).</p><p><strong>8.False statements in Trump v Kemp </strong>(count 27)</p><p>During the Trump v Kemp lawsuit, Eastman wrote a document titled &#8220;Verified Complaint for Emergency Injunctive and Declaratory Relief&#8221; alleging major fraud in the Georgia election. It contained a lot of false statements (count 27).</p><p>The Trump v Kemp documents can be read <a href="https://www.courtlistener.com/docket/28917289/trump-v-kemp/">here</a>.</p><p><strong>9.The Raffensperger call </strong>(counts 28-29)</p><p>In a call on Jan 2, <a href="https://www.washingtonpost.com/politics/trump-raffensperger-call-georgia-vote/2021/01/03/d45acb92-4dc4-11eb-bda4-615aaefd0555_story.html">Trump called Georgia Secretary of State Brad Raffensperger</a> to ask him to &#8220;find&#8221; 11,780 votes (count 28). The audio was later leaked. This charge is the only charge (other than the RICO charge) that applies to former White House Chief of Staff Mark Meadows. Trump made lots of false statements on the call (count 29).</p><p>The full audio of this call can be heard <a href="https://www.youtube.com/watch?v=AW_Bdf_jGaA">here</a>. A transcript of it can be found <a href="https://edition.cnn.com/2021/01/03/politics/trump-brad-raffensperger-phone-call-transcript/index.html">here</a>.</p><p><strong>10.The ballot machine theft from Coffee County </strong>(counts 32-37)</p><p>Sidney Powell commissioned and paid for SullivanStrickler LLC to travel to Coffee County for the purpose of tampering with the ballot machines. When they got there, Cathleen Latham (Coffee County GOP chairwoman), Scott Hall (bail bondsman), and Misty Hampton (elections supervisor) aided and abetted that effort (count 32, 33, 34, 35, 36, 37).</p><p>A detailed description of the charged events in Coffee County is available <a href="https://www.lawfaremedia.org/article/what-the-heck-happened-in-coffee-county-georgia">here</a>.</p><p><strong>11.Hoping to rollback the election long after Biden was inaugurated </strong>(counts 38)</p><p>On 17th September 2021, Trump wrote and published a letter to Raffensperger that claimed the number of irregular votes was enough to change the result (count 39) and that he should &#8220;decertify the Election, or whatever the correct legal remedy is, and announce the true winner&#8220; (count 38).</p><p>This letter can be read <a href="https://web.archive.org/web/20210920033801/https://www.donaldjtrump.com/news/news-fnhrjkbksu706">here</a>.</p><p><strong>12.Perjury during investigation of the false electors</strong></p><p>The District Attorney interviewed at least two of the false electors. David Shafer made false statements during his interview in April 2022 (count 40). Robert Cheeley made false statements during his interview in September 2022 (count 41).</p>]]></content:encoded></item><item><title><![CDATA[Unofficial meetings with Russian officials isn't diplomacy—it's a trap]]></title><description><![CDATA[Why former U.S. officials holding secret talks with Russian officials is actively unhelpful&#8212;and the trap they fell into by doing it]]></description><link>https://www.pwnallthethings.com/p/fake-diplomacy-isnt-real-diplomacy</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/fake-diplomacy-isnt-real-diplomacy</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Thu, 06 Jul 2023 22:20:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3xML!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3xML!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3xML!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png 424w, https://substackcdn.com/image/fetch/$s_!3xML!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png 848w, https://substackcdn.com/image/fetch/$s_!3xML!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!3xML!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3xML!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/efad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8091667,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3xML!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png 424w, https://substackcdn.com/image/fetch/$s_!3xML!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png 848w, https://substackcdn.com/image/fetch/$s_!3xML!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!3xML!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefad9dc8-c097-4b59-9a27-783384f79edd_3072x2304.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>A destroyed Russian tank on display next to Ukrainian flags</em></figcaption></figure></div><p>NBC news has a new story: &#8220;<a href="https://www.nbcnews.com/news/world/former-us-officials-secret-ukraine-talks-russians-war-ukraine-rcna92610">Former U.S. officials have held secret Ukraine talks with prominent Russians</a>&#8221;, including Russian Foreign Minister Lavrov.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The lede reads as follows:</p><blockquote><p>A group of former senior U.S. national security officials have held secret talks with prominent Russians believed to be close to the Kremlin &#8212; and, in at least one case, with the country&#8217;s top diplomat &#8212; with the aim of laying the groundwork for potential negotiations to end the war in Ukraine, half a dozen people briefed on the discussions told NBC News. </p><p>In a high-level example of the back-channel diplomacy taking place behind the scenes, Russian Foreign Minister Sergey Lavrov met with members of the group for several hours in April in New York, four former officials and two current officials told NBC News. </p><p>On the agenda of the April meeting were some of the thorniest issues in the war in Ukraine, like the fate of Russian-held territory that Ukraine may never be able to liberate, and the search for an elusive diplomatic off-ramp that could be tolerable to both sides. </p><p>Sitting down with Lavrov were Richard Haass, a former diplomat and the outgoing president of the Council on Foreign Relations, current and former officials said. The group was joined by Europe expert Charles Kupchan and Russia expert Thomas Graham, both former White House and State Department officials who are Council on Foreign Relations fellows. </p></blockquote><p>The story is getting a lot of traction online, but it&#8217;s mostly getting traction for the wrong reasons.</p><p>First things first, this is not real backchannel diplomacy. As Dan Drezner notes in his excellent post &#8220;<a href="https://danieldrezner.substack.com/p/please-stop-breathlessly-reporting?sd=pf">Please Stop Breathlessly Reporting Every Unofficial U.S. Interaction with Russia, Please</a>&#8221;, the former U.S. officials here are not particularly close to the current U.S. administration. As Drezner writes: &#8220;Graham, Long, and Haass are Republicans who have served in GOP administrations; Kupchan is an academic&#8221;. </p><p>Second, although the participants apparently briefed the White House National Security Council after the talks, the NSC has explicitly disavowed the talks:</p><blockquote><p>The discussions have taken place with the knowledge of the Biden administration, but not at its direction, with the former officials involved in the Lavrov meeting briefing the White House National Security Council afterward about what transpired, two of the sources said.</p></blockquote><p>At best, the White House seems pretty annoyed at the whole thing. The U.S. can&#8217;t stop U.S. citizens talking with foreign governments<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>, but that doesn&#8217;t mean they like or endorse those interactions either.</p><p>Drezner is right: the talks are not backchannel diplomacy, and folks should, for the most part, calm down about it.</p><p>But if the talks are not backchannel diplomacy, why did Lavrov agree to it? And this, to me, is the much bigger story here, and one that everyone seems to be missing: This isn&#8217;t diplomacy. It&#8217;s Haass and his colleagues being played by the Russian Ministry of Foreign Affairs in a game they don&#8217;t seem to fully understand.</p><p>First things first, these talks have directly caused headaches for the U.S. in two separate directions. For people reading the story who (wrongly) read it as Haass et al speaking <em>for</em> the U.S. administration, this leads to the mistaken impression that the U.S. is quietly abandoning its loud commitment to not hold &#8220;talks about Ukraine without Ukraine&#8221;. Several Ukrainians have clearly have read the story this way, and are now (wrongly) upset at the U.S. administration for holding talks about their future behind their backs.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MVHQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MVHQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png 424w, https://substackcdn.com/image/fetch/$s_!MVHQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png 848w, https://substackcdn.com/image/fetch/$s_!MVHQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png 1272w, https://substackcdn.com/image/fetch/$s_!MVHQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MVHQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png" width="362" height="205.77222777222778" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:569,&quot;width&quot;:1001,&quot;resizeWidth&quot;:362,&quot;bytes&quot;:117714,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MVHQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png 424w, https://substackcdn.com/image/fetch/$s_!MVHQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png 848w, https://substackcdn.com/image/fetch/$s_!MVHQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png 1272w, https://substackcdn.com/image/fetch/$s_!MVHQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8b4e12-b6de-41a1-b1e8-0ae46563127e_1001x569.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Correctly reading the story as Haass et al speaking <em>despite </em>the U.S. administration also invites two different cognitive traps. It encourages the (misleading) impression that a diplomatic solution to the conflict is just around the corner, if only the Biden administration would permit it&#8212;after all, here are some other prominent Americans able to &#8220;negotiate&#8221;. And it gives the mistaken impression that the Biden administration is not talking to Russia, thereby encouraging the Russian-sponsored narrative that the U.S. is belligerently opposed to peace when Russia is amenable to it; a bizarre inversion of the reality. On that second point specifically, the U.S. maintains regular open communications with its counterparts in Moscow. Politico <a href="https://www.politico.com/news/2023/06/28/biden-russia-wagner-00104098">recently reported</a>, for example, that &#8220;[a]n administration official confirmed the backchanneling with Moscow to West Wing Playbook, emphasizing that such open channels <strong>are routinely used</strong> when officials on either side have important messages to convey&#8221; (emphasis added).</p><p>But there&#8217;s a deeper reason why Lavrov was so willing to take this meeting, and it&#8217;s a risk inherent to &#8220;Track 1.5&#8221; meetings between official delegations and unofficial ones. It&#8217;s that fake negotiations operate in a framework that is deceptively unrepresentative of real negotiations, and which consistently lead to the official side steamrolling the non-governmental side, and the non-governmental side going home and immediately laundering an unusually friendly paper or article under their supposedly neutral and well-credentialed titles.</p><p>And that&#8217;s exactly what&#8217;s happened here. Shortly after their meeting with Lavrov, Haass and Kupchan cowrote an article for Foreign Affairs, titled &#8220;<a href="https://www.foreignaffairs.com/ukraine/russia-richard-haass-west-battlefield-negotiations">The West Needs a New Strategy in Ukraine: A Plan for Getting From the Battlefield to the Negotiating Table</a>&#8221;. The article did not mention their meeting with Lavrov, and despite a brief overture in support of increased equipment transfers to Ukraine at the start, the article lays out a &#8220;peace plan&#8221; for Ukraine and Russia that is (unwittingly) heavily distorted towards Russian talking points and dismissive of Ukrainian redlines.</p><p>It&#8217;s a bit complicated to parse out exactly why that is, so let&#8217;s unpack it a bit.</p><p>Ceasefire agreements are always rough. Except in the vanishingly rare cases of unconditional surrender and total defeat of one side, ceasefires always strike a difficult bargain where all parties to the conflict are unhappy but can ultimately live with the result. Both sides have to make tough decisions about previously-unacceptable terms to trade in exchange for peace, and both sides have to weigh the emotional, political, and actual costs of the aggregate concessions on their side versus the other. That&#8217;s heavily shaped both by battlefield realities and by political priors brought into the negotiating room.</p><p>When Ukraine, supported by the United States and its other allies, eventually sues for peace against Russia, the Russian delegation will try to minimize its own concessions and extract maximal concessions in response. The Ukrainian delegation will do the reverse. The negotiations will iterate over several rounds towards a middle-ground, trading terms until all sides are able to stomach the result. This is hopefully not a controversial observation: It&#8217;s true of all ceasefires, regardless of the participants.</p><p>That eventual agreement will be emotionally, politically, and actually costly for Russia. It will <em>also</em> be costly for Ukraine. Ukraine will propose one settlement. Russia will propose another. Ukraine will counteroffer; Russia will counter-counter offer, and so on, iterating inwards. If a middle ground is reachable, it will be signed. If it is not, the war will continue until a later date when the process can continue with the benefit of updated battlefield- and political-realities in the next iteration. </p><p>I cannot stress this enough: It&#8217;s very easy to get to a ceasefire if you don&#8217;t care about the terms, or are unwilling or unable to accurately weigh them for <em>both</em> sides. The <em>terms </em>of the eventual ceasefire are the <a href="https://dictionary.cambridge.org/dictionary/english/whole-enchilada">whole enchilada</a>. Gaming your way to a peace deal is not impressive or useful absent a robust analysis of whether the terms are actually acceptable to the actual parties to the conflict in the real world. To belabor this point, here&#8217;s a dumb peace deal that would end the war tomorrow with obviously unacceptable terms: Ukraine surrenders unconditionally, and while we&#8217;re at it, so does every other country in Europe, all agreeing to replace their governments with ministers appointed in Moscow. And for good measure the United States gives them Alaska and hands over 80% of its GDP for the next decade too, why not. See? Super easy. War over in an afternoon. But obviously also very stupid. It&#8217;s easy to come up with terms acceptable to one side and declare the project for peace a big success. It&#8217;s far harder to come up with terms that hold weight in the real world, especially without the state apparatus to fire-test them accurately.</p><p>And this leads us to the problem here. Haass et al are <em>not actually negotiating with Russia</em>. They are negotiating <em>against themselves</em>. They do not speak for Ukraine or for the United States. Lavrov has no incentive to moderate any of his country&#8217;s terms in response to their hypothetical concessions, and every incentive to talk up their own advantages and the non-negotiability of their own terms. Lavrov knows this fake negotiation isn&#8217;t going to lead to an actual peace deal, so playing a maximalist hardball game is free and easy. Moreover, fake-negotiating in good faith yields a later advantage <em>against </em>Moscow in the <em>real</em> negotiation by revealing their hand too early. So <em>of course </em>he will fake-negotiate in bad faith. It&#8217;s the only sensible thing to do in that situation.</p><p>For the non-governmental delegation the opposite incentive plays out. To be seen as master diplomats, the non-governmental delegation needs to get a deal! Outsiders will be very impressed at their diplomatic skills of scoring a fake ceasefire, and most observers won&#8217;t pay too much attention to the proposed terms. After all: the resulting agreement will always be couched as what&#8217;s acceptable <em>for Russia</em>, so readers will look less closely at whether the proposed terms are actually acceptable <em>for Ukraine</em>. So where the <em>governmental </em>delegation has incentives to concede nothing, the non-governmental delegation has incentives to <em>over</em>-concede.</p><p>But wait, it gets worse: Not only do fake diplomats come to the fake negotiation against an opponent six-feet taller than reality, they also come into the fake negotiation with one arm tied behind their back. Real diplomats benefit from extensive prior knowledge about the flexibility of the terms on their own side, and national support to help shape those negotiations. Terms made in a hypothetical are easier to concede than equivalent terms in a real negotiation. Fake diplomats don&#8217;t have to actually pay the terms they hypothetically concede, nor do they have to deal with the messy realities of real politics, real victims, or real territory. This effect is further pronounced when the fake diplomat has little direct emotional attachment to the conflict. As a concrete example, Ukrainian diplomats will have a very different emotional and practical problem trading real Ukrainian territory for concessions to end a very real war than a fake American diplomat would have trading imaginary Ukrainian territory as part of a game.</p><p>All of which is to say, &#8220;Track 1.5&#8221; negotiations might be superficially similar to real negotiations, but they are structurally imbalanced towards the governmental participant in a way that is non-obvious to the non-governmental delegation. They will often end up with an outline for a fake deal, but that fake deal will skew wildly in favor of the governmental delegation&#8212;in this case, to Russia&#8217;s advantage.</p><p>But Lavrov didn&#8217;t meet Haass and his friends just to win in a fake game of diplomacy. He met them because of what comes next.</p><p>Newly armed with a hard-won &#8220;plan for peace&#8221;, the academics go home with seemingly-sensible terms that everyone could just about agree to: A brilliant show of diplomacy by a truly esteemed diplomat! The war is solved! Hooray! All that&#8217;s left is to publicly write up their ingenious plan under their own names and be celebrated for their hard-nosed diplomatic prowess. Other people&#8212;including <em>current </em>officials&#8212;who take those former officials seriously then read their article. It reads like a serious and sober analysis of the war as a whole, and provides a seemingly-workable plan to peace. And <em>that </em>shifts the perception of the relative value of the concessions Ukraine is advised to make, as well as inflating the relative value of concessions that Russia might have to make and advising the later <em>real </em>delegations away from requesting them, or at least expecting them to come at a far higher price.</p><p><em>That&#8217;s</em> the game Lavrov is playing here. </p><p>Fake diplomacy isn&#8217;t real diplomacy. It&#8217;s a game of influence, and of laundering talking points through the academics who play it. It&#8217;s a simple trade: the academics get to meet some important people, get treated like very important diplomats, and get to be celebrated by influential people back home for their amazing diplomatic skills once they publish their negotiated &#8220;deal&#8221;. And in response, Russia gets to launder its talking points and throw Ukraine under the bus, all hidden under the credentials of those academics.</p><p>That&#8217;s the game Lavrov played. Haass and his colleagues should have known better than to play it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.pwnallthethings.com/subscribe?"><span>Subscribe now</span></a></p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Please, please stop talking about the Logan Act. No, really. It&#8217;s dead law. In 220 years nobody has ever been successfully prosecuted under it, and any such prosecution would almost certainly be unconstitutional. U.S. citizens can talk to foreign governments. They cannot fraudulently represent themselves as U.S. government officials, but that did not happen here. The legal system will not punish U.S. citizens who talk to foreign governments&#8212;even about foreign policy&#8212;in their capacity as ordinary citizens.</p></div></div>]]></content:encoded></item><item><title><![CDATA[There is No Norm against Prosecuting Former Presidents in the United States]]></title><description><![CDATA[In the past week, many supporters of former President Trump have made an argument in his defense that his indictment violates the norm against prosecuting former presidents.]]></description><link>https://www.pwnallthethings.com/p/there-is-no-norm-against-prosecuting</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/there-is-no-norm-against-prosecuting</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Sat, 17 Jun 2023 13:24:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!r791!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r791!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r791!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r791!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r791!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r791!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r791!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg" width="1024" height="846" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:846,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Judge&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Judge" title="Judge" srcset="https://substackcdn.com/image/fetch/$s_!r791!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r791!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r791!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r791!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F208485f2-4b0c-4a62-a830-88aab1513cc3_1024x846.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the past week, many supporters of former President Trump have made an argument in his defense that his indictment violates the norm against prosecuting former presidents. </p><p>There is no such norm, and there never was.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Norms have gotten a bit of a bad reputation in recent years, and are not especially well understood by the public as a whole. So I want to start with a quick exposition of what norms <em>are</em>. This exposition is important because, among other things, there are actually a few subtly different claims being made for the proposition that there is a norm against prosecuting a former president: One is that it is a <em>fundamental </em>norm rooted in the rule-of-law; another is that it is an <em>emergent </em>norm rooted in historical practice, either since the beginning of the Republic, or in some alternative formulations, a modern emergent norm that has been U.S. practice since the pardon of Nixon. </p><p>All of these claims are wrong, but it&#8217;s nevertheless important to distinguish them early, because they&#8217;re wrong for different reasons.</p><p>So we&#8217;re going to need to start at the top: what <em>is </em>a norm?</p><p>At a high-level, norms are just widely accepted expectations about what constitutes appropriate behavior by various actors within a system. International norms, for example, focus on how countries should behave with respect to each other; legal norms relate to how actors should behave within a legal system; social norms cover how individuals should behave with respect to each other in a society; and so on. </p><p>Norms subdivide into <em>fundamental norms, derived norms</em> and <em>emergent norms</em>. </p><p>Fundamental norms are those which are structural to the system itself, and which are necessary for the system to function. Emergent norms are those which became established simply through longstanding historical practice. Derived norms are those which are logically derived from more fundamental principles, and which act as helpful &#8220;short-cuts&#8221; to avoid needing to continuously derive concepts from first principles.</p><p>That&#8217;s all very abstract, so let&#8217;s just give a couple of examples to nail it down before we go further, and to make the point that norms are not all equal, nor equally formalized or enforced.</p><p>In the legal system, the <em>right to a fair trial</em> is a fundamental norm for the rule-of-law, requiring that criminal trials are fair, impartial, and consistent. This norm is structural because fair trials ensure that state penalties are established on the basis of law, and are not arbitrary. It is possible to have a society that does not have fair trials: Ancient societies, and modern dictatorships all exist without them. But these societies are not <em>rule-of-law</em> societies.</p><p>The <em>right to a fair trial</em> might be a norm, but that doesn&#8217;t mean it has no teeth. In the United States, this norm is given constitutional weight through the Fifth and Sixth Amendments. But the norm is not unique to the American legal system; other rule-of-law systems establish the same principle in their own way. The European Convention on Human Rights, for example, formalizes this norm in Article 47; Germany codifies it through Article 103 of the German Basic Law; Australia encodes it through Section 21 of their Human Rights Act 2004; South Korea through Article 27 of their Constitution, and so on.</p><p>Derived norms, by contrast, are rules that are logically derived from fundamental norms. The right to an attorney, for example, is a not a <em>fundamental </em>norm; but a <em>derived </em>norm, coming from the right to a fair trial. The logic here is that without access to an attorney to properly interpret and argue the law on your behalf, your access to the criminal justice system would be unfairly abridged, undermining your right to a fair trial. Similarly, <em>attorney-client privilege</em> is a derived norm that traces its logic through the right to an attorney, and ultimately back to the right to a fair trial.</p><p><em>Emergent </em>(or historical) norms are different. These are established by consistent historical practice. Emergent norms are not always unimportant, unenforceable, or unwritten. One example would be customary international law, and the laws of armed conflict. Although these are now codified through formal instruments such as the Geneva Conventions, they are much older, and, for the most part, codify <em>emergent norms</em> that, in some instances, existed for hundreds of years prior to World War 2; which were abrogated during that war; and which the victorious powers sought to codify in its aftermath having experienced the horrors caused by their abrogation. The prohibition against poisoning as a form of warfare, for example, dates all the way back to ancient times, when militaries generally avoided poisoning wells for pragmatic reasons because it was simply too destructive to the civilian population. But while this norm is <em>emergent</em>, it is nevertheless important, codified through the Geneva Conventions, and carries the force of law.</p><h4>Unpacking the claim</h4><p>The claims that there is a norm against prosecuting a former president, if we look very carefully, actually turn out to be three slightly different claims. All are wrong. But they&#8217;re wrong for very different reasons. </p><p>The claims, if we unpack them, are:</p><ul><li><p>There exists a <em>fundamental </em>norm against prosecuting a former president, rooted in the rule of law itself.</p></li><li><p>There exists an <em>emergent </em>norm against prosecuting a former president tracing its history to the beginning of the Republic itself</p></li><li><p>There exists an <em>emergent </em>norm against prosecuting a former president established by the pardon of then-former president Nixon by President Ford.</p></li></ul><p>Let&#8217;s start with the first claim: that there is a norm against prosecuting a former president, rooted in the rule of law itself. This is a misinterpretation of a real norm: the prohibition of <em>politicized prosecutions</em>. That might sound superficially a bit like a norm against prosecuting <em>politicians</em>, but it&#8217;s not.</p><p>The norm against politicized prosecutions is not a fundamental norm; it&#8217;s a <em>derivative</em> norm that comes from two more fundamental rules:</p><ul><li><p>The rule-of-law norm of a <em>right to a fair trial,</em></p></li><li><p>The rule-of-law norm of <em>equal treatment under the law</em></p></li></ul><p>These norms carry constitutional weight in the United States: The <em>right to a fair trial</em> is codified in the 5th and 6th Amendments, and the <em>right to equal treatment under the law</em> is codified in the 14th.</p><p>Politicized prosecutions, such as show trials, violate these norms (and, by extension, those constitutional provisions). When a defendant&#8217;s guilt is established through an extrajudicial process&#8212;either explicitly, or implicitly, such as during showtrials where the defendant&#8217;s guilt is politically decided outside of the courtroom&#8212;this implicates the defendants&#8217; rights to a fair trial. Since politicized trials also target the defendant because of their political status, this separately implicates the <em>equal treatment under the law </em>norm.</p><p>Neither of these fundamental norms are implicated in Trump&#8217;s case.</p><p>Let&#8217;s start with the <em>right to a fair trial</em>. Donald Trump&#8217;s guilt has not been pre-established by a political process. Trump will not go to prison merely because a politician wants him to. This is not to say that there is a shortage of politicians who would very much like Trump to be found guilty. Many surely would! And it is also not to say that Biden could not absolve Trump&#8217;s criminal liability by pardoning him&#8212;an observation that is equally applicable to every federal criminal trial. </p><p>Those two statements might be true, but they are both irrelevant to the question of a <em>fair trial</em>. Here, the relevant question is only whether Trump will have a fair opportunity to argue his defense to the judge and jury, and that they will impartially assess that defense without any prejudice from non-relevant facts or non-legal considerations. If Trump can persuade the jury that the facts, as alleged, did not occur beyond a reasonable doubt, he will be found not guilty. If he can persuade the judges that, as a matter of law, the charged offenses either do not apply, or are unconstitutional as applied to his circumstances, the government&#8217;s case will fall apart and he will walk free.</p><p>Is Trump being denied <em>equal treatment under the law</em> because of his status as a former President? Hardly. The facts, as alleged, would be damning for any other defendant, and the charges against Trump are not even unusual given the facts that are alleged&#8212;any other defendant who retained hundreds of highly classified documents and refused to return them would expect indictment and prosecution on similar charges.</p><p>Despite the strength of evidence levied against him, it is still not certain he will be found guilty, precisely because his guilt will be decided solely in the courtroom and has not been pre-decided by some political process happening outside of it. He will be tried by a jury in South Florida&#8212;a district that, if anything, is strongly biased in his favor. His trial will be overseen by a judge that he appointed and who has, in previous cases, gone out of her way to afford him unusually beneficial decisions far beyond what any other comparable defendant would expect, even in their wildest dreams.</p><p>In other words, while the facts, as alleged, are extraordinarily damning&#8212;and entirely self-inflicted&#8212;the judicial circumstances are skewed heavily <em>in Trump&#8217;s favor</em>, not against him. The idea that he is being <em>mis</em>treated by the judicial system is, frankly, laughable.</p><p>In summary: The norm against <em>politicized prosecution</em> is not a norm against <em>prosecution of politicians</em>. It is a derived norm from the right to a fair trial and for equal protection under the law. Trump&#8217;s case will be decided judicially, not politically, and, if anything, the judicial circumstances are unusually skewed <em>in Trump&#8217;s favor</em>, not against it. The norm against politicized prosecutions is not at issue in this case.</p><h4>There is No Modern International Practice Immunizing Former Presidents from Prosecution</h4><p>To lend further weight to the claim that there is no fundamental rule-of-law norm against prosecuting former presidents, we can simply look at several other rule-of-law nations and see that the prosecution of former presidents is not an uncommon practice.</p><p>Just by way of a few recent examples of rule-of-law countries convicting former heads of state and heads of government:</p><ul><li><p>Chen Shui-bian, President Taiwan, (2009, Bribery)</p></li><li><p>Jacques Chirac, President, France (2011, Corruption)</p></li><li><p>Silvio Berlusconi, President, Italy, (2013, sex with a minor; malfeasance in office)</p></li><li><p>Ehud Olmert, Prime Minister, Israel (2014, Bribery)</p></li><li><p>Choi Kyoung-hwan, Prime Minister, South Korea (2018, Bribery)</p></li><li><p>Ma Ying-jeou, President, Taiwan (2018, Leaking classified information)</p></li><li><p>Benjamin Netanyahu, Prime Minister, Israel (2019, Fraud, Bribery)</p></li><li><p>Fran&#231;ois Fillon, Prime Minister, France (2020, Fraud)</p></li><li><p>Nicolas Sarkozy, President, France (2021, Bribery)</p></li><li><p>Cristina Fern&#225;ndez de Kirchner, President, Argentina, (2022, Fraud)</p></li></ul><h4>Prosecution of Former Presidents was Understood as Sometimes Appropriate at the Constitutional Convention</h4><p>As to the question of an <em>emergent </em>norm against prosecution of former presidents, I want to take this in three parts:</p><ol><li><p>There is no <em>historic </em>norm against prosecution of former presidents, as understood during the founding era.</p></li><li><p>The pardon of Nixon did not assert a norm against prosecution of former presidents.</p></li><li><p>There is no <em>modern (</em>post-Nixon) norm against prosecution of former presidents.</p></li></ol><p>Let&#8217;s start with the <em>historic </em>norm, starting at the beginning of the Republic.</p><p>Prosecution of politicians&#8212;and former presidents&#8212;in the United States has always been viewed as appropriate in some circumstances, dating back to the founding era. </p><p>Here is the transcript from the Constitutional Convention, on Tuesday September 15, 1787 (emphasis added):</p><blockquote><p>Mr. RUTLIDGE and Docr. FRANKLIN [&#8230;] Art: II. Sect. 2. "he shall have power to grant reprieves and pardons for offences against the U. S."</p><p>Mr. RANDOLPH moved to "except cases of treason." The prerogative of pardon in these cases was too great a trust. The President may himself be guilty. The Traytors may be his own instruments.</p><p>Col: MASON supported the motion.</p><p>Mr. Govr. MORRIS had rather there should be no pardon for treason, than let the power devolve on the Legislature.</p><p>Mr. WILSON. Pardon is necessary for cases of treason, and is best placed in the hands of the Executive. <strong>If he be himself a party to the guilt he can be impeached and prosecuted.</strong></p></blockquote><p>Here, Wilson&#8217;s response is instructive: According to him, the pardon power doesn&#8217;t need to be abridged or subject to ratification by the other branches, not because a malicious president could never exist, but rather because the Constitution provides a safety valve against such a malicious president: he could be impeached by the Congress to strip him of office and then that former president could be prosecuted.</p><p>This point was sufficiently uncontroversial that nobody objected to it, or suggested any issue with it.</p><h4>Prosecution of Former Presidents was understood as sometimes appropriate in the Federalist Papers</h4><p>There are other contemporaneous sources to this point too. Take, for example, <a href="https://avalon.law.yale.edu/18th_century/fed77.asp">Hamilton&#8217;s Federalist Paper No 77</a> (emphasis added):</p><blockquote><p>The answer to this question has been anticipated in the investigation of its other characteristics, and is satisfactorily deducible from these circumstances; from the election of the President once in four years by persons immediately chosen by the people for that purpose; and from his being at all times liable to impeachment, trial, dismission from office, incapacity to serve in any other, and to forfeiture of life and estate by <strong>subsequent prosecution</strong> in the common course of law.</p></blockquote><p><a href="https://avalon.law.yale.edu/18th_century/fed65.asp">Federalist Paper 65</a>:</p><blockquote><p>The punishment [of the impeached president] which may be the consequence of conviction upon impeachment, is not to terminate the chastisement of the offender. After having been sentenced to a perpetual ostracism from the esteem and confidence, and honors and emoluments of his country, <strong>he will still be liable to prosecution and punishment in the ordinary course of law</strong></p></blockquote><p>In <a href="https://avalon.law.yale.edu/18th_century/fed69.asp">Federalist Paper 69</a>, Hamilton not only asserts a former president&#8217;s liability to prosecution, but goes further, explicitly contrasting it to the King of Great Britain, who has general immunity that the American constitutional system chose to <em>not </em>emulate with respect to the president.</p><blockquote><p>The President of the United States would be liable to be impeached, tried, and, upon conviction of treason, bribery, or other high crimes or misdemeanors, removed from office; <strong>and would afterwards be liable to prosecution and punishment in the ordinary course of law</strong>. The person of the king of Great Britain is sacred and inviolable; there is no constitutional tribunal to which he is amenable; no punishment to which he can be subjected without involving the crisis of a national revolution. In this delicate and important circumstance of personal responsibility, the President of Confederated America would stand upon no better ground than a governor of New York, and upon worse ground than the governors of Maryland and Delaware.</p></blockquote><p>All of which is to say, it was well understood by the Framers that <em>former </em>presidents were liable to prosecution and punishment, in appropriate circumstances.</p><h4>The Constitution Explicitly Provides for Criminal Prosecution of a Former President</h4><p>The United States Constitution provides <em>legislative </em>immunity from criminal prosecution via the Speech and Debate clause, but does not extend that criminal immunity to the Presidency&#8212;and certainly not to former presidents. In fact, it does the opposite, anticipating criminal liability of former presidents in the Impeachment Judgement Clause in Article I, Section 3, Clause 7 (emphasis added):</p><blockquote><p>Judgment in Cases of Impeachment shall not extend further than to removal from Office, and disqualification to hold and enjoy any Office of honor, Trust or Profit under the United States: <strong>but the Party convicted shall nevertheless be liable and subject to Indictment, Trial, Judgment and Punishment, according to Law.</strong></p></blockquote><p>While the first half of this clause constrains the Senate to ensure that impeachment convictions can only lead to the removal and disqualification from office, the second half operates as a double-jeopardy waiver, <em>explicitly anticipating and permitting </em>the trial and punishment under criminal law of the impeached person. In the case of the impeachment of a president, this anticipates and permits the indictment and criminal punishment of a (newly) former president in appropriate circumstances.</p><h4>The United States has an Unbroken History of Prosecuting Federal Politicians</h4><p>The list of prosecutions of federal politicians in the United States is <a href="https://en.wikipedia.org/wiki/List_of_American_federal_politicians_convicted_of_crimes">not small</a>. As an initial count, the United States has indicted and obtained convictions for <em>at least</em> 82 Representatives; 5 Senators; 9 district court judges; one appellate judge; 2 Vice Presidents (Aaron Burr charged, but acquitted for treason; Spiro Agnew charged and convicted for extortion, bribery, and tax fraud); as well as obtaining convictions for dozens of senate-confirmed members of the executive branch, including: two attorneys general; and a Director of the CIA.</p><p>The first conviction of a federal politician was just 10 years after the ratification of the constitution in 1798. Since 1900 there has been no decade where no federal politician was convicted. As of writing, the most recent federally elected politician to be convicted was Representative Jeff Fortenberry, who was convicted and sentenced in July 2022.</p><p>As a purely historical matter, there has never been a historical practice against the indictment or prosecution of federal politicians in the United States; nor any historical practice of immunity that derives from party alignment or even due to separation-of-powers concerns between the branches. Administrations of both parties have prosecuted politicians of their own, and other parties, regardless of governmental branch, as appropriate.</p><p>To the premise that perhaps there is an emergent norm against prosecuting presidents starting at the pardon of former president Nixon, this is refuted directly by that pardon itself. <a href="https://www.govinfo.gov/content/pkg/STATUTE-88/pdf/STATUTE-88-Pg2502.pdf">The pardon of then-former president Nixon</a> by President Ford noted that Nixon would otherwise have expected indictment for his crimes. The text of Ford&#8217;s proclamation 4311 is given in total below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lmzD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lmzD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png 424w, https://substackcdn.com/image/fetch/$s_!lmzD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png 848w, https://substackcdn.com/image/fetch/$s_!lmzD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png 1272w, https://substackcdn.com/image/fetch/$s_!lmzD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lmzD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png" width="434" height="803" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:803,&quot;width&quot;:434,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:453454,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lmzD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png 424w, https://substackcdn.com/image/fetch/$s_!lmzD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png 848w, https://substackcdn.com/image/fetch/$s_!lmzD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png 1272w, https://substackcdn.com/image/fetch/$s_!lmzD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F192c88b6-0a65-4cea-b4e3-99e91cca8e6d_434x803.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For emphasis, the relevant sentence is reproduced below:</p><blockquote><p>As a result of certain acts or omissions occurring before his resignation from the Office of President, Richard Nixon has become liable to possible indictment and trial for offenses against the United States.</p></blockquote><p>Here, Ford states that then-former president Nixon is liable to criminal prosecution, and anticipates that Nixon is liable to possible criminal indictment and trial, if not for this pardon. This is perhaps a very obvious point: if Ford did <em>not </em>think that Nixon was liable to prosecution despite being a former president, granting him a pardon would have been quite pointless. The pardon exists <em>precisely because </em>former presidents are liable to criminal prosecution in administrations that follow.</p><p>The Executive Branch, has, since Nixon, also repeatedly asserted the possibility of criminal prosecution of former presidents. In the United States, the Executive Branch&#8217;s institutional views on matters of separation of powers are encoded through memoranda drafted by the Office of Legal Counsel (OLC). These memoranda do not hold the same weight as an opinion by the Supreme Court, but do, nevertheless, encode the Executive Branch&#8217;s reasoning and analysis on the state of the law, to the extent that it advises the President with respect to separation of his powers from those of the other branches, and is binding on departments and agencies within the Executive Branch, including the Department of Justice.</p><p>In a <a href="https://www.justice.gov/file/19351/download">pair of memoranda</a> in 1973 and 2000, OLC looked at the question of whether a President was liable to prosecution in office. It concluded the answer was <em>no</em>; but the reasoning behind that conclusion is separately instructive: the President might not prosecutable <em>while in office</em>, but this is because, among other things, the remedy for presidential misconduct was impeachment (or removal from office by fact of election), followed by prosecution after leaving office. In other words, OLC affirmatively rejected the idea that the president had a <em>permanent</em> immunity from prosecution.</p><p>Another OLC opinion makes this point again: In 1974, <a href="https://www.justice.gov/file/20856/download">OLC investigated a question of a presidential self pardon</a>. OLC&#8217;s opinion then was that a president could <em>not </em>issue a pardon to himself. But critical here is an unspoken assumption in the request itself: the only point in issuing a self-pardon would be to immunize a <em>former </em>president from criminal proceedings taking place under a future administration. At no point did OLC even consider the idea that a former president was <em>not </em>liable to prosecution, because this fact was obvious to everyone involved.</p><h4>Prosecutors are Prohibited from Using a Potential Defendant&#8217;s Political Status as a Basis to Decline Prosecution</h4><p>In the modern era, federal prosecutors in the United States are required to follow guidelines laid out in the <em>Principles of Federal Prosecution </em>guidebook, formerly known as the <em>U.S. Attorney Manual</em>. Section 9-27.220 lays out the basis under which prosecutorial discretion may be applied to decline prosecution of a federal offense:</p><blockquote><p>The attorney for the government should commence or recommend federal prosecution if he/she believes that the person's conduct constitutes a federal offense, and that the admissible evidence will probably be sufficient to obtain and sustain a conviction, unless (1) the prosecution would serve no substantial federal interest; (2) the person is subject to effective prosecution in another jurisdiction; or (3) there exists an adequate non-criminal alternative to prosecution.</p></blockquote><p>Can a prosecutor decline prosecution simply because the defendant is popular, or a political figure, knowing that this might affect a jury? </p><p>The guidebook gives an answer here too: this is an invalid basis to make a prosecution decision</p><blockquote><p>Where the law and the facts create a sound, prosecutable case, the likelihood of an acquittal due to unpopularity of some aspect of the prosecution or because of the overwhelming popularity of the defendant or his/her cause is not a factor prohibiting prosecution.  For example, in a civil rights case or a case involving an extremely popular political figure, it might be clear that the evidence of guilt&#8212;viewed objectively by an unbiased factfinder&#8212;would be sufficient to obtain and sustain a conviction, yet the prosecutor might reasonably doubt, based on the circumstances, that the jury would convict. In such a case, despite his/her negative assessment of the likelihood of a guilty verdict (based on factors extraneous to an objective view of the law and the facts), the prosecutor may properly conclude that it is necessary and appropriate to commence or recommend prosecution and allow the criminal process to operate in accordance with the principles set forth here.</p></blockquote><p>Indeed, criminal investigation of former presidents of both parties has been regular practice post-Nixon, even if&nbsp;<em>indictment</em>&nbsp;has not resulted. Trump may be the first former president to be&nbsp;<em>indicted</em>, but he is not the first current or former president to be criminally investigated. There are&nbsp;<em>four&nbsp;</em>presidents (not including Trump) who have been criminally investigated; three of which in the modern era:</p><ul><li><p><a href="https://en.wikipedia.org/wiki/Arrests_of_Ulysses_S._Grant">President Ulysses S Grant</a> was famously arrested for speeding while in office, and fined.</p></li><li><p>President Richard Nixon was famously criminally investigated by the Watergate grand jury and special prosecutor; the investigation was ended by the pardon from Ford.</p></li><li><p><a href="https://www.thereaganfiles.com/reagan-bush---criminal.pdf">President George H.W. Bush</a> was&#8212;far less famously&#8212;criminally investigated by the Office of the Independent Counsel in connection with the Iran Contra affair, which occurred while Bush Sr. was Vice President. As the Independent Counsel <a href="https://irp.fas.org/offdocs/walsh/chap_28.htm">notes</a>:</p></li></ul><blockquote><p>The criminal investigation of Bush was regrettably incomplete. Before Bush's election as President, the investigation was primarily concerned with the operational conspiracy and the careful evaluation of the cases against former National Security Adviser John M. Poindexter and Lt. Col. Oliver L. North of the National Security Council staff, prior to their indictment in March 1988. This included a review of any exculpatory material that might have shown authorization for their conduct. In the course of this investigation, Vice President Bush was deposed on January 11, 1988.</p></blockquote><p>The independent counsel considered, but eventually declined to pursue criminal charges against Bush. The investigation closed when OIC filed its final report on August 4, 1993.</p><ul><li><p>President Bill Clinton was the subject of criminal investigation through much of his tenure in office, and the Monica Lewinsky investigation was not closed with a non-prosecution settlement until after he left office. In addition, he was criminally investigated after leaving office in relation to the pardon of Marc Rich. Although Bill Clinton was never charged, the investigation did get as far as empaneling a grand jury in the Eastern District of Louisiana and issuing subpoenas. The cover page of DOJ&#8217;s criminal investigation into Bill Clinton is shown below.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Kx5l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Kx5l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png 424w, https://substackcdn.com/image/fetch/$s_!Kx5l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png 848w, https://substackcdn.com/image/fetch/$s_!Kx5l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png 1272w, https://substackcdn.com/image/fetch/$s_!Kx5l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Kx5l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png" width="599" height="712" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:712,&quot;width&quot;:599,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:227892,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Kx5l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png 424w, https://substackcdn.com/image/fetch/$s_!Kx5l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png 848w, https://substackcdn.com/image/fetch/$s_!Kx5l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png 1272w, https://substackcdn.com/image/fetch/$s_!Kx5l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb968bca-a033-4ccb-852a-9f26b99cb178_599x712.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"></figcaption></figure></div><div><hr></div><p>In other words, there is no theoretical basis to assert a norm against prosecuting former presidents, nor is there an established international practice on which to assert such a norm. It is not a fundamental norm in the rule-of-law.</p><p>There is no historical basis rooted in the founding era for it either: The Constitution by its own text explicitly rejects the existence of such a norm, as do several of the Federalist Papers, and the debate at the Constitutional Convention itself. The United States has a storied and continuous history prosecuting federal officials of both parties and across all branches starting in the founding era and which is unbroken through to 2022.</p><p>There is also no <em>modern</em> basis for such a norm in the post-Nixon era. The text and very existence of the Nixon pardon refutes the concept of a norm against indictments of former presidents; the executive branch has repeatedly rejected the idea of such a norm since; and as a modern historical practice; <em>two other </em>former presidents (not including Trump) have been criminally investigated since Nixon, even if Trump is the first to be indicted.</p><p>So, no, there is no norm against prosecution of former presidents in the United States. </p><p>There never was.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[[Audio] Read with Me: The Trump Indictment]]></title><description><![CDATA[This weekend, I joined Lawfare Editor-in-Chief Benjamin Wittes and Lawfare Fulton County Court Correspondent Anna Bower for a conversation on Read With Me, a podcast associated with Ben&#8217;s Dog Shirt Daily newsletter. In this episode, Ben, Anna, and I went through the indictment of Donald Trump in detail.]]></description><link>https://www.pwnallthethings.com/p/audio-read-with-me-the-trump-indictment</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/audio-read-with-me-the-trump-indictment</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Tue, 13 Jun 2023 19:38:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Pa9e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Pa9e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Pa9e!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png 424w, https://substackcdn.com/image/fetch/$s_!Pa9e!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png 848w, https://substackcdn.com/image/fetch/$s_!Pa9e!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png 1272w, https://substackcdn.com/image/fetch/$s_!Pa9e!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Pa9e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png" width="1400" height="1400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1400,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Pa9e!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png 424w, https://substackcdn.com/image/fetch/$s_!Pa9e!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png 848w, https://substackcdn.com/image/fetch/$s_!Pa9e!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png 1272w, https://substackcdn.com/image/fetch/$s_!Pa9e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f75b3b-61fa-41d6-a10c-7643a7bbca33_1400x1400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This weekend, I joined <em>Lawfare</em> Editor-in-Chief Benjamin Wittes and <em>Lawfare</em> Fulton County Court Correspondent Anna Bower for a conversation on <em>Read With Me</em>, a podcast associated with Ben&#8217;s <a href="https://www.dogshirtdaily.com/">Dog Shirt Daily newsletter.</a> In this episode, Ben, Anna, and I went through the indictment of Donald Trump in detail. </p><p>It's a line-by-line, page-by-page analysis that we thought might be a good resource for people who are trying to make sense of the indictment&#8212;where it's strong, where it raises issues, what issues it raises, and where things might go from here.</p><p>The audio for the episode is available <a href="https://shows.acast.com/60518a52f69aa815d2dba41c/episodes/648802efcd3d3b0011639063">here</a>, and if you want to follow along as we go through the document, a copy of it is available <a href="https://storage.courtlistener.com/recap/gov.uscourts.flsd.648653/gov.uscourts.flsd.648653.3.0.pdf">here</a>.</p>]]></content:encoded></item><item><title><![CDATA[What sentence might Trump get, if found guilty?]]></title><description><![CDATA[It'd be real prison time. But stop saying "400 years".]]></description><link>https://www.pwnallthethings.com/p/what-sentence-might-trump-get-if</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/what-sentence-might-trump-get-if</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Mon, 12 Jun 2023 18:43:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ctai!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ctai!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ctai!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ctai!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ctai!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ctai!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ctai!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg" width="768" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ctai!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ctai!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ctai!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ctai!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08a76e30-eaa0-43eb-ad91-f6830124b811_768x512.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>With the Trump indictment last week, several prominent media organizations and commentators have started asking all sorts of questions about the case. Most fall into four categories:</p><ol><li><p>Are the facts, as alleged, substantially correct?</p></li><li><p>As a matter of law, does the law support the charges?</p></li><li><p>Was the Special Counsel correct to charge Trump, as a matter of discretion? <em>and</em></p></li><li><p>How long would Trump serve if found guilty?</p></li></ol><p>The first of these questions will be answered by the jury. The second will be answered by the judge, and by the appellate judges in the Eleventh Circuit or the Supreme Court who will handle the various questions of law that get appealed. The third question is largely a subjective question: It&#8217;s a question particularly suited to partisan punditry, because it allows them to avoid arguing about or even engaging with the facts or the law.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>But that fourth question&#8212;what would the sentence be if Trump were convicted&#8212;is different. It&#8217;s a weirdly technical question, and one that most folks&#8212;including many publications that should frankly know better&#8212;seem to keep getting very wrong. For example, the <a href="https://www.indy100.com/politics/trump/donald-trump-indictment-jail-sentence">Independent</a>, <a href="https://www.washingtonexaminer.com/news/donald-trump-indicted-how-much-prison-time">Washington Examiner</a>, <a href="https://nypost.com/2023/06/10/republican-candidates-divided-over-trumps-federal-indictment/">New York Post</a>, <a href="https://www.forbes.com/sites/alisondurkee/2023/04/05/will-trump-go-to-prison-counts-against-him-could-result-in-136-year-sentence-but-its-highly-unlikely/">Forbes</a>, and so on, have all said that, if found guilty on all charges, Mr. Trump faces up to 400 years in prison.</p><p>No. He doesn&#8217;t.</p><p>The &#8220;400 years&#8221; number here comes from a basic summation of statutory maximum sentences for each of the charged offenses. The first 31 charges all have a statutory maximum term of imprisonment of 10 years. Charges 32-35 has a maximum of 20. Charges 36 and 37 both have a maximum penalty of 5. If we add all those numbers up we get to this big scary number of 400 years.</p><p>Don&#8217;t do this. </p><p>It&#8217;s stupid. </p><p>Sentences do not work like this in the United States.</p><p>If anyone ever tells you what the &#8220;maximum sentence&#8221; of an offense is, or that someone is &#8220;facing X years in jail&#8221; where X is a big number, stop listening to them immediately. When prosecutors do it, it is to scare a defendant into making a guilty plea. When defense attorneys do it, it&#8217;s to rile up supporters with a fake number about how unreasonable the prosecutors are. When pundits do it, it&#8217;s because they have no idea what they are talking about.</p><p>Not only is the 400 years number divorced from reality, it&#8217;s not even a real maximum. A sentencing judge can do as they please within their courtroom, and could absolutely sentence Trump to a hundred billion years if they really wanted. It would be stupid and immediately appealed and reversed, but a 400 year sentence would be too. </p><p>More importantly, penalty-summation just completely misunderstands how sentencing actually works in the United States. It&#8217;s just not remotely how sentencing works. It does nothing other than yield a completely useless number.</p><p>OK. But what&#8217;s the real number, if he were convicted (itself a big <em>if</em>)? </p><p>That&#8217;s an involved question, but we don&#8217;t have to just guess. Sentences aren&#8217;t random, and we <em>can </em>roughly work out where the sentence would land within a range, so long as we put in the work, and make a few assumptions about how the mitigating and aggravating factors will apply. That process is a bit, well, boring and actuarial, and involves diving pretty deep into the US Sentencing Manual and sentencing precedents to get a feel for where the sentence would end up.</p><p>So let&#8217;s dive in.</p><p>Let&#8217;s start with the first 31 charges in Trump&#8217;s indictment. These all relate to unlawful retention of specific classified documents, mostly, but not exclusively, at the top secret level. If convicted, the guilty counts in this group will all be grouped together under 2M3.3, which carries a base offense level of 29 when at least one of them implicates top secret information:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8-AS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8-AS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png 424w, https://substackcdn.com/image/fetch/$s_!8-AS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png 848w, https://substackcdn.com/image/fetch/$s_!8-AS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png 1272w, https://substackcdn.com/image/fetch/$s_!8-AS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8-AS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png" width="672" height="226" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:226,&quot;width&quot;:672,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8-AS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png 424w, https://substackcdn.com/image/fetch/$s_!8-AS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png 848w, https://substackcdn.com/image/fetch/$s_!8-AS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png 1272w, https://substackcdn.com/image/fetch/$s_!8-AS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F672ac526-d0f1-4a5f-a12f-2637ba509ba2_672x226.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>On top of this base level, prosecutors will push for several enhancements:</p><ul><li><p>+2 for obstruction of justice.</p></li><li><p>+2 for abuse of a position of trust. </p></li><li><p>+4 enhancement for his role as the organizer or leader of the criminal activity with five or more participants, or which was otherwise excessive.</p></li></ul><p>At the sentencing stage, Trump&#8217;s defense will argue against those enhancements, and may push for the inclusion of mitigating factors. In any case, at the sentencing stage Trump&#8217;s team would be fighting at an adjusted offense level of 37 for these charges, if found guilty of unlawful retention of any or all of the top secret documents.</p><p>The second group of charges all generally relate to obstruction of justice, and so we go to the Sentencing Manual&#8217;s 2J1.2 section:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ae_i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ae_i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png 424w, https://substackcdn.com/image/fetch/$s_!Ae_i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png 848w, https://substackcdn.com/image/fetch/$s_!Ae_i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png 1272w, https://substackcdn.com/image/fetch/$s_!Ae_i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ae_i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png" width="481" height="415" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:415,&quot;width&quot;:481,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ae_i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png 424w, https://substackcdn.com/image/fetch/$s_!Ae_i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png 848w, https://substackcdn.com/image/fetch/$s_!Ae_i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png 1272w, https://substackcdn.com/image/fetch/$s_!Ae_i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ae5880a-831a-4b80-bf09-2944c71958bb_481x415.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here Trump would be looking at a base offense level of 14, and the special counsel would push for the +3 enhancement under 2J1.2(2), because Trump&#8217;s actions resulted in a substantial interference with the administration of justice. The special counsel would also likely push for the +2 enhancement under 2J1.2(3) because the scheme was extensive in scope, for an adjusted offense level of 19.</p><p>For obstruction, this isn&#8217;t the end of the analysis, because <em>Obstruction</em> offenses (2J1 offenses) can convert into <em>Accessory After the Fact</em> (2X3.1) offenses if the obstruction substantially impedes an investigation or prosecution of another criminal offense: </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tqRN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tqRN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png 424w, https://substackcdn.com/image/fetch/$s_!tqRN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png 848w, https://substackcdn.com/image/fetch/$s_!tqRN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png 1272w, https://substackcdn.com/image/fetch/$s_!tqRN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tqRN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png" width="591" height="123" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:123,&quot;width&quot;:591,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tqRN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png 424w, https://substackcdn.com/image/fetch/$s_!tqRN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png 848w, https://substackcdn.com/image/fetch/$s_!tqRN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png 1272w, https://substackcdn.com/image/fetch/$s_!tqRN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49fdd5-b4fb-4287-8682-d787b4b1deab_591x123.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Here&#8217;s 2X3.1:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IhYX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IhYX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png 424w, https://substackcdn.com/image/fetch/$s_!IhYX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png 848w, https://substackcdn.com/image/fetch/$s_!IhYX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png 1272w, https://substackcdn.com/image/fetch/$s_!IhYX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IhYX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png" width="694" height="517" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40c3607c-668c-411b-856c-8c7c98516715_694x517.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:517,&quot;width&quot;:694,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IhYX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png 424w, https://substackcdn.com/image/fetch/$s_!IhYX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png 848w, https://substackcdn.com/image/fetch/$s_!IhYX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png 1272w, https://substackcdn.com/image/fetch/$s_!IhYX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c3607c-668c-411b-856c-8c7c98516715_694x517.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here, 2X3.1 starts with a calculated base offense level based on the offense that was being obstructed. Here that&#8217;d be the base level 29 (from the base offense level of the unlawful retention) minus 6, because of 2X3.1(a)(1), for a calculated base offense level of 23. Since the 2X3.1 offense level of 23 is higher than the 2J1 offense level of 19, the obstruction offense converts to the Accessory After the Fact offense, with the higher base offense.</p><p>This offense is <em>also</em> subject to enhancements and mitigations, and the special counsel would again push for a +2 for abuse of trust and +4 for Trump&#8217;s role as the organizer or leader of the criminal activity with five or more participants, or which was otherwise excessive, for a total adjusted offense level of 29.</p><p>Donald Trump has no prior convictions, so has a Criminal History Category of I. We then map both offenses to a sentencing guideline range via the Sentencing Table in the Sentencing Guidelines:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HH0j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HH0j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png 424w, https://substackcdn.com/image/fetch/$s_!HH0j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png 848w, https://substackcdn.com/image/fetch/$s_!HH0j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png 1272w, https://substackcdn.com/image/fetch/$s_!HH0j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HH0j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png" width="646" height="463" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:463,&quot;width&quot;:646,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HH0j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png 424w, https://substackcdn.com/image/fetch/$s_!HH0j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png 848w, https://substackcdn.com/image/fetch/$s_!HH0j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png 1272w, https://substackcdn.com/image/fetch/$s_!HH0j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c29d5a8-501a-4605-accc-f224cec8296c_646x463.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So in summary, if found guilty for retention of any (or all) top secret documents in the first 31 charges, Trump will be looking at a sentence with a guideline in the 210-262 month range. If found guilty on the obstruction charges, Trump would be looking at a sentence of 87-108 months. Those numbers assume that the aggravating factors as alleged all stick and no mitigating factors apply. Those two sentences would likely run concurrently, for an aggregate sentence of 210-262 months, or 17.5-21 years.</p><p>Trump would not spend all of that time in federal prison. His sentence would be automatically eligible for 50% off under the First Step Act with good time credit. He would also be eligible for compassionate release if his health substantially deteriorates, and his sentence could be further commuted or pardoned by a president of either party. </p><p>Trump would not lose protection from the Secret Service if convicted. His protection by them is by statute, so continues to apply regardless of whether Trump is in federal prison (unless Congress amends the legislation), but how exactly that would work in practice, I have no idea. I suspect the Secret Service don&#8217;t know either, and will cross that bridge if and when they come to it.</p><p>But those are the top-line numbers for Trump. If found guilty on essentially <em>any </em>of the classified document retention charges, Trump will be staring down some real prison time. That&#8217;s, of course, still a very big <em>if</em>. Trump&#8217;s prior status as president makes this case far more complicated than it would be for any other defendant, and he would need to be found guilty unanimously by a Florida jury&#8212;something that is by no means certain.</p><p>That does all add up to a very serious sentence. These are big boy crimes, and the penalties don&#8217;t look like a slap-on-the-wrist.</p><p>But it&#8217;s also not 400 years.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Donald Trump indictment: what are the classified documents?]]></title><description><![CDATA[A running update on information in the indictment as I go through it]]></description><link>https://www.pwnallthethings.com/p/donald-trump-indictment-whats-in</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/donald-trump-indictment-whats-in</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Fri, 09 Jun 2023 19:54:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_ukD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_ukD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_ukD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_ukD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_ukD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_ukD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_ukD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg" width="970" height="847" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:847,&quot;width&quot;:970,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_ukD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_ukD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_ukD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_ukD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab472e90-c98b-4a52-bd77-b5e8bfc4002c_970x847.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Donald Trump has been indicted for a second time, but for the first time by the Department of Justice on federal offenses, with charges relating to his mishandling of classified documents, and his subsequent attempts to cover-up that fact from government investigators and the Grand Jury. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The indictment itself is available to <a href="https://storage.courtlistener.com/recap/gov.uscourts.flsd.648653/gov.uscourts.flsd.648653.3.0.pdf">read here</a>.</p><p>Trump&#8217;s valet Waltine (&#8220;Walt&#8221;) Nauta is also indicted too, presumably with a view to persuading him to cooperate as a witness against Mr. Trump.</p><p>Note that this indictment <em>only </em>covers alleged crimes that happened within the jurisdiction of the Southern District of Florida (i.e. at Mar-a-lago). The Office of Special Counsel may bring additional charges in D.C. or in New Jersey (for relevant events taking place at Trump&#8217;s Bedminster property) if it believes there are prosecutable crimes committed in those jurisdictions. It can also add or remove additional charges in Florida at a later date too via superseding indictments.</p><p>Like all indictments, this indictment includes some mandatory redactions (names of countries and individuals not charged), as well as listing 31 specific classified documents obliquely. We can do a bit of digging to de-anonymize or reasonably guess the contents of some of those.</p><h2>The charges</h2><ul><li><p>31 counts of Wilful Retention of National Defense Information &#8212; 18 USC 793(e)</p></li><li><p>Conspiracy to Obstruct Justice &#8212; 18 USC 1512(k)</p></li><li><p>Withholding a Document or Record &#8212; 18 USC 1512 (b)(2)(A), and abetting</p></li><li><p>Corrupting concealing a Document or Record &#8212; 18 USC 1512[c](1), and abetting</p></li><li><p>Concealing a Document in a Federal Investigation &#8212; 18 USC 1519, and abetting</p></li><li><p>Scheme to Conceal &#8212; 18 USC 1001(a)(1), and abetting</p></li><li><p>False Statements and Representations &#8212; 18 USC 1001(a)(2), and abetting</p></li></ul><p>The first group (wilful retention) relate to the actual holding and retention of <em>specific</em> classified documents. The final group of charges all relate to Trump&#8217;s conspiracy to hide them from government investigators and the Grand Jury during the investigation generally.</p><h2>The documents (overview)</h2><p>The indictment first covers classified documents retrieved by the National Archives (NARA), and which are not the basis of these charges. These are:</p><ul><li><p>15 boxes provided by Trump to NARA in January 2022. These contained 197 classified documents: 98 at SECRET; 30 at TOP SECRET; the remainder at Confidential. Some additionally had Sensitive Compartmented Information (SCI) and Special Access Program (SAP) markings.</p></li><li><p>During the FBI search of Mar-a-Lago Club, a further 102 documents, recovered from Trump&#8217;s office and a storage room. These included 17 documents at TOP SECRET; 54 at SECRET; 31 at CONFIDENTIAL. Of these, Trump&#8217;s office held 6 at TOP SECRET; 18 at SECRET; and 3 at CONFIDENTIAL.</p></li></ul><p>The indictment does not seek to charge possession of <em>all</em> of these documents. Only 31 documents are specifically mentioned for the purposes of the charges; one charge per document&#8212;to allow the government to take or withdraw each document in the trial separately. The case will therefore center on these documents and not the others. </p><p>The named documents are not provided in full, but are described in the indictment. They are:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g-XN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g-XN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png 424w, https://substackcdn.com/image/fetch/$s_!g-XN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png 848w, https://substackcdn.com/image/fetch/$s_!g-XN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png 1272w, https://substackcdn.com/image/fetch/$s_!g-XN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g-XN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png" width="1175" height="674" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:674,&quot;width&quot;:1175,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g-XN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png 424w, https://substackcdn.com/image/fetch/$s_!g-XN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png 848w, https://substackcdn.com/image/fetch/$s_!g-XN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png 1272w, https://substackcdn.com/image/fetch/$s_!g-XN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b45f457-97f9-4c80-8ae9-c89aea91c643_1175x674.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For those with screen readers the text is given below:</p><ol><li><p>[TS//NF//SPECIAL HANDLING] Document dated May 3, 2018, concerning White House intelligence briefing related to various foreign countries</p></li><li><p>[TS//SI//NF//SPECIAL HANDLING] Document dated May 9, 2018, concerning White House intelligence briefing related to various foreign countries.</p></li><li><p>[TS//SI//NF//FISA] Undated document concerning military capabilities of a foreign country and the United States, with handwritten annotation in black marker</p></li><li><p>[TS//SPECIAL HANDLING] Document dated May 6, 2019, concerning White House intelligence briefing related to foreign countries, including military activities and planning of foreign countries.</p></li><li><p>[TS//XX/XX//ORCON//NF] Document dated June 2020, concerning nuclear capabilities of a foreign country</p></li><li><p>[TS//SPECIAL HANDLING] Document dated June 4, 2020, concerning White House intelligence briefing related to various foreign countries</p></li><li><p>[S//NF] Document dated October 21, 2018, concerning communications with a leader of a foreign country.</p></li><li><p>[S//REL FVEY]Document dated October 4, 2019, concerning military capabilities of a foreign country.</p></li><li><p>[TS//XX/X//ORCON/NF/FISA] Undated document concerning military attacks by a foreign country</p></li><li><p>[TS//TK//NF] Document dated November 2017, concerning military capabilities of a foreign country</p></li><li><p>[<em>unmarked</em>] Undated document concerning military contingency planning of the United States</p></li><li><p>[S//REL FVEY] Paged of undated document concerning projected regional military capabilities of a foreign country and the United States</p></li><li><p>[TS//SI/TK//NF] Undated document concerning military capabilities of a foreign country and the United States</p></li><li><p>[S//ORCON/NF] Document dated January 2020, concerning military options of a foreign country and potential effects on United States interests</p></li><li><p>[S//ORCON/NF] Document dated February 2020 concerning policies in a foreign country</p></li><li><p>[S//ORCON//NF] Document dated December 2019, concerning foreign country support of terrorist acts against United States interests</p></li><li><p>[TS//X/TK/ORCON/IMCON/NF] Document dated January 2020 concerning military capabilities of a foreign country</p></li><li><p>[S//NF] Document dated March 2020 concerning military operations against United States forces and others</p></li><li><p>[S/FRD] Undated document concerning nuclear weaponry of the United States</p></li><li><p>[[TS//XX/ORCON//NF] Undated document concerning timeline and details of attack in a foreign country</p></li><li><p>[S//NF] Undated document concerning military capabilities of foreign countries</p></li><li><p>[TS//X/RSEN/ORCON//NF] Document dated August 2019, concerning military activity of a foreign country</p></li><li><p>[TS//SPECIAL HANDLING] Document dated August 30, 2019, concerning White House intelligence briefing related to various foreign countries, with handwritten annotation in black marker</p></li><li><p>[[TS//HCS-P/SI//ORCON-USGOV/NF] Undated document concerning military activity of a foreign country</p></li><li><p>[[TS//HCS-P/SI//ORCON-USGOV/NF] Document dated October 24, 2019, concerning military activity of foreign countries and the United States</p></li><li><p>[[TS//X//ORCON//NF/FISA] Document dated November 7, 2019, concerning military activity of foreign countries and the United States</p></li><li><p>[TS//SI/TK//NF] Document dated November 2019, concerning military activity of foreign countries</p></li><li><p>[TS//SPECIAL HANDLING] Document dated October 18, 2019, concerning White House intelligence briefing related to various foreign countries</p></li><li><p>[TS//X/SI/TK//ORCON/NF]Document dated October 18, 2019, concerning military capabilities of a foreign country</p></li><li><p>[TS//X/ORCON/NF/FISA] Document dated October 15, 2019, concerning military activity in a foreign country</p></li><li><p>[TS//SI/TK//NF] Document dated February 2017, concerning military activity of a foreign country</p></li></ol><p>Classification guide/Key</p><ul><li><p>TS: TOP SECRET</p></li><li><p>S: SECRET</p></li><li><p>NF: NOFORN - for distribution within the United States only, and not to foreign governments</p></li><li><p>REL FVEY - information relating to and shared with FIVE EYES partners; namely the United Kingdom, Canada, Australia, and New Zealand.</p></li><li><p>TK - TALENT KEYHOLE, a compartment that merged from TALENT (imagery product from sensitive manned overflight) and KEYHOLE (imagery from satellite). The combined compartment covers overhead imagery. <a href="https://nsarchive2.gwu.edu/NSAEBB/NSAEBB225/doc23.pdf">The existence of the compartment is now unclassified.</a></p></li><li><p>SI &#8212; Special Intelligence; generally collected signals intelligence and communications intelligence.</p></li><li><p>FISA &#8212; Information relating to, or collected under the Foreign Intelligence Surveillance Act, and which carries additional handling sensitivity because of it.</p></li><li><p>ORCON &#8212; Originator Controlled - a handling caveat specifying that the originator (or originating agency) must be consulted prior to further sharing and/or release of the document.</p></li><li><p>HCS-P &#8212; HUMINT (Human-source derived intelligence) Control System (Product). Used to mark analysis and intelligence reporting whose ultimate information providence includes covert human sources.</p></li><li><p>X &#8212; used here to denote a compartment that is redacted in the document.</p></li><li><p>FRD &#8212; Formerly Restricted Data. A classification category for nuclear secrets under the Atomic Energy Act. See Document #19 section below.</p></li></ul><h2>Document #19: US Nuclear Capability</h2><blockquote><p><em>[S/FRD] Undated document concerning nuclear weaponry of the United States</em></p></blockquote><p>Ordinarily, classified documents fall within the purview of the Executive Branch to classify or declassify. You may, for example, have heard that the President can declassify any document. This is <em>usually </em>true, because <em>most </em>classifications inside the US government track their authority back to the President&#8217;s Article II powers as Commander in Chief (or Foreign Affairs), and in both cases are regulated by Executive Order 13526 and its predecessors. Classification crimes are proscribed by statute (as National Defense Information), but <em>usually</em> the definition of National Defense Information will lean on the Executive Branch&#8217;s definitions, as defined in the Executive Order.</p><p>Not so with nuclear documents. Classification of <em>these </em>documents is by statute, not by EO 13526 or its predecessors. Specifically, these are classified directly via the Atomic Energy Act.</p><p>In this group, document #19 is special. This is <em>Formerly Restricted Data,</em> and is classified by virtue of the Atomic Energy Act (as implemented by 10 CFR part 1045). Trump could not have declassified this document <em>even while president</em>&#8212;at least not directly. It is National Defense Information by statute, not by executive order.</p><p>By statute, documents are classified under the Atomic Energy Act if the Department of Energy and Department of Defense agree that the document (or category) falls within the categories laid out in the Atomic Energy Act. If DOE and DOD disagree, the President can break the tie (in either direction). This means the President <em>could </em>in principle force documents to be declassified by directing the relevant Secretaries to declassify the documents (and firing them if they don&#8217;t comply). But critically: the process <em>must </em>occur for the document to be declassified. It is not &#8220;at will&#8221; declassification by the President. A longer exposition on this point is <a href="https://www.lawfareblog.com/can-trump-just-declare-nuclear-secrets-unclassified">here</a>.</p><p>This is a really big deal, not just because of what it contains, but because it resolves a nasty question about classification EOs and the extent to which they bind upwards as well as downwards in the executive branch heirarchy. Here, document 19 side-steps the question. This document is classified <em>by statute</em>. </p><p>Be careful with the term <em>formerly restricted data</em> here. It does not mean the information is no longer national defense information; it means that it can, for the most part, be treated like normal classified information. From a <a href="https://www.energy.gov/sites/prod/files/hss/Classification/docs/CTI-Training-RD-FRD-Briefing.pdf">slide at DOE</a>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WgBX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WgBX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png 424w, https://substackcdn.com/image/fetch/$s_!WgBX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png 848w, https://substackcdn.com/image/fetch/$s_!WgBX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png 1272w, https://substackcdn.com/image/fetch/$s_!WgBX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WgBX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png" width="716" height="532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:532,&quot;width&quot;:716,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WgBX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png 424w, https://substackcdn.com/image/fetch/$s_!WgBX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png 848w, https://substackcdn.com/image/fetch/$s_!WgBX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png 1272w, https://substackcdn.com/image/fetch/$s_!WgBX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bb4ebc-41d2-4480-af38-8369e96d7a92_716x532.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It is not clear what, exactly, the document contains. But a few canonical examples of Formerly Restricted Data include US stockpile quantities, nuclear weapons safety and storage, nuclear weapon yields, and locations of US nuclear weapons.</p><p>By contrast, at that level it <em>would not</em> contain information about nuclear weapon design, nuclear material production, reactor design, or use of special nuclear material in the production of energy, which is, by statute, held at the higher RESTRICTED DATA designation.</p><p>Note that RD and FRD run in parallel to the &#8220;traditional&#8221; classification system. Documents can (and often are) both NSI-classified <em>and </em>F/RD-classified. For example, a TSRD document is <em>both</em> TOP SECRET NSI-classified within the meaning of EO13526 <em>and </em>Restricted Data within the meaning of the Atomic Energy Act. </p><p>This particular document is classified at <em>both</em> SECRET <em>and </em>FRD.</p><h2>Document #5 Nuclear capabilities of a foreign country (probably Russia)</h2><blockquote><p><em>[TS//XX/XX//ORCON//NF] Document dated June 2020, concerning nuclear capabilities of a foreign country.</em></p></blockquote><p>The indictment doesn&#8217;t list the country. I think this is probably Russia. </p><p>On June 2, 2020, the Russian Federation published for the first time their nuclear deterrence policy, which was previously classified. The Russian nuclear deterrence doctrine is called &#8220;Basic Principles of State Policy of the Russian Federation on Nuclear Deterrence&#8221;.</p><p>Russia changing their nuclear deterrence posture will have certainly featured in the President&#8217;s Daily Brief in June 2020.</p><h2>Document #2: PDB after the Iran Deal</h2><blockquote><p><em>[TS//SI//NF//SPECIAL HANDLING] Document dated May 9, 2018, concerning White House intelligence briefing related to various foreign countries.</em></p></blockquote><p>This is almost certainly excerpts taken from a Presidential Daily Brief (PDB).</p><p>It is a little hard to parse which specific issues the President was interested in from these briefs, other than by analyzing major events that took place contemporaneously which the president was openly interested in.</p><p>This PDB is May 9, 2018. This is the day after President Trump made a televised address, withdrawing the United States from the Joint Comprehensive Plan of Action (JCPOA), known colloquially as the &#8220;Iran Deal&#8221;. The May 9 PDB will certainly have prominently featured international response to this withdrawal.</p><h2>Document #14: Military options of a foreign country (probably Iran)</h2><blockquote><p><em>[S//ORCON/NF] Document dated January 2020, concerning military options of a foreign country and potential effects on United States interests</em></p></blockquote><p>I think this is related to Iran in the aftermath of Operation Martyr Soleimani.</p><p>On 8 January 2020 (local time, 7 January US time), Iran&#8217;s IRGC launched 12 ballistic missiles at the Ayn al-Asad airbase in western Iraq and at the airbase in Erbil, in response to the earlier assassination by the United States of Iran&#8217;s Major General Qasem Soleimani in a drone strike.</p><p>Although the United States did not retaliate militarily to the strikes (it did respond with several rounds of sanctions), this was a period of very high tensions with Iran, and the United States would quite likely have produced various kinetic option responses for the President in January 2020, as well as requested IC assistance to report on potential effects on United States interests if those options were taken.</p><h2>Document #16: Foreign government support of terrorist acts against the United States (probably Saudi/AQAP after Pensacola)</h2><blockquote><p><em>[S//ORCON//NF] Document dated December 2019, concerning foreign country support of terrorist acts against United States interests</em></p></blockquote><p>My guess is Saudi Arabia and AQAP.</p><p>In late November 2019 through end of December 2019, there were a few substantial terrorist attacks:</p><ol><li><p>29 November 2019: The <a href="https://en.wikipedia.org/wiki/2019_London_Bridge_stabbing">Mass-stabbing attack in London</a> by Usman Khan, wearing a false explosive belt which killed 3 and injured a further 3.</p></li><li><p>6 December 2019: Naval Air Station Pensacola shooting, by a Saudi student.</p></li><li><p>10 December 2019 Jersey city shooting at a kosher grocery store, with anti-semitic and anti-police motives</p></li><li><p>11 December 2019: 2019 Bagram Airfield attack. Taliban militants attacked the main US base, killing 3 and injuring 80.</p></li></ol><p>To be clear: this document could have been in response to any one of these, or none of them. It could also be in response to a foiled terrorist attack.</p><p>Of these, President Trump took significant personal interest in both the London stabbing attack, and the Pensacola shooting attack. Of these, the Pensacola attack has a clear foreign terrorist organization behind it (AQAP) and the shooter&#8217;s nationality was both politically significant and factored into President Trump&#8217;s tweets on the day, as well as the call he took from King Salman of Saudi Arabia, hence my guess.</p><h2>Document #7: Communications with a foreign leader (probably INF withdrawal)</h2><blockquote><p><em>[S//NF] Document dated October 21, 2018, concerning communications with a leader of a foreign country.</em></p></blockquote><p>This could be a lot of things. The previous administration didn&#8217;t take care to ensure that communications with foreign leaders were properly documented or relayed to the public, and there is no call sheet for it.</p><p>First of all, this is <em>not </em>the famous Kim Jong Un letter, which was focus of one of the early document production requests by NARA, and which Trump showed to Bob Woodward for his book &#8220;Rage&#8221;. That letter is public (thanks to the book <em>Letters to Trump</em>), is unclassified, and is dated July 30, 2018, not October. It&#8217;s not that one.</p><p>Rather, there&#8217;s two main candidates here based on what was happening at the time. The first is communication with Saudi Arabia about the murder of Jamal Khashoggi, who was killed on the 2 October 2018. Although this was several days earlier, the Saudi Foreign Ministry reported on October 20 that Hkashoggi died at the consulate after being engaged in a fight; the first Saudi acknowledgement of Khashoggi&#8217;s death. <a href="https://theweek.com/speedreads/803006/trump-apparently-accepts-new-saudi-account-khashoggis-death">On October 20</a>, Trump publicly stated he found this claim &#8220;credible&#8221; and that he had talked two days earlier to the ailing King Salman. It is possible that Trump spoke to either King Salman or Crown Prince Mohammed bin Salman and retained a memorialized copy of the conversation.</p><p>I don&#8217;t particularly like this theory, though. Trump famously spoke a lot by phone, but not by text. It&#8217;s a bit hard to see how that call would have been memorialized, and given Trump&#8217;s communication with Salman two days earlier, it would have been perhaps a bit much to expect an additional call three days later on it. And Trump didn&#8217;t reference any explicit new communication with the Saudis on October 21. The classification marking is also higher than it should be for such a call.</p><p>A better option is probably a communication with the Russian President. On October 21, 2018, Trump announced that the US would withdraw from the 1987 Intermediate-range Nuclear Forces Treaty (INF), which banned ground-launch nuclear missiles with ranges from 500-5500km.</p><p>These documents, which are notionally addressed president to president, will <em>certainly</em> have been memorialized in writing, and would plausibly be described in the indictment as &#8220;communications with a leader of a foreign country&#8221;. The classification looks about right for that type of exchange of letters too.</p><h2>Document #18: Military operations against US Forces (probably Hezbollah)</h2><blockquote><p><em>[S//NF] Document dated March 2020 concerning military operations against United States forces and others</em></p></blockquote><p>This is probably relating to the <a href="https://en.wikipedia.org/wiki/2020_Camp_Taji_attacks">2020 Camp Taji attacks</a> between 11-14 March 2020 targeting Camp Taji near Baghdad, which killed two Americans and one British soldier. The US and UK launched air raids against Hezbollah in response.</p><h2>Document #4: PDB, military activities and planning of foreign countries (probably Iran)</h2><blockquote><p><em>[TS//SPECIAL HANDLING] Document dated May 6, 2019, concerning White House intelligence briefing related to foreign countries, including military activities and planning of foreign countries.</em></p></blockquote><p>Again, could be a lot of things, but probably related to <a href="https://edition.cnn.com/2019/05/05/politics/iran-carrier-bomber-task-force/index.html">Iranian direct and proxy threats against American forces in the region, and the US&#8217; deployment of the USS Abraham Lincoln carrier and a bomber task force to threaten Iran in response</a>. </p><h2>Document #11: US Military Contingency Planning </h2><blockquote><p><em>[unmarked] Undated document concerning military contingency planning of the United States</em></p></blockquote><p>This is probably the &#8220;Milley&#8221; plan to attack Iran.</p><p>Earlier in the indictment (before the charges), DOJ references a conversation transcript in which Trump shows a plan by a &#8220;Senior Miltary Official&#8221; about a plan to attack &#8220;Country A&#8221;. The transcript, as given in the indictment, is shown below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8KsH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8KsH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8KsH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8KsH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8KsH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8KsH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg" width="1456" height="1340" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1340,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8KsH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8KsH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8KsH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8KsH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F450120da-74c7-4f97-ab62-8bd8558780eb_2000x1841.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iC2u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iC2u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iC2u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iC2u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iC2u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iC2u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg" width="1456" height="1739" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1739,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iC2u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iC2u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iC2u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iC2u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef5314da-779f-4e55-a667-ff48eef50350_1675x2000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This transcript comes from a tape <a href="https://edition.cnn.com/2023/05/31/politics/trump-tape-classified-document-iran-milley/index.html">recording of Trump</a>, which reveals the Senior Military Official as Chairman of the Joint Chiefs General Milley, and Country A as Iran.</p><p>We also <em>separately</em> know that this plan was presented to Trump on January 3, 2021, just days before he left office, <a href="https://www.newyorker.com/news/letter-from-bidens-washington/youre-gonna-have-a-fucking-war-mark-milleys-fight-to-stop-trump-from-striking-iran">thanks to an interview</a> that almost certainly has Milley himself as a source.</p><p>This leaves a bit of a conundrum: if this conversation is in the transcript, is the corresponding document on the charge sheet? It would be unusual not to, since the entire point of including the transcript is to show Trump showing off documents he did not have access to, and undermining legal defenses he might otherwise try and employ. Here he freely admits that he knows the document is classified, that the person he is showing to is not cleared to see it, and that Trump did <em>not </em>declassify it while he was President.</p><p>Nevertheless, for the transcript to be useful evidence, DOJ would need to show not just that Trump thought the document is classified, but that it really is. Which would mean it is probably in the list. It doesn&#8217;t <em>have </em>to be on the list. But since the point of the transcript here is to show <em>wilful </em>violation by Mr Trump, and the structure of the indictment lists each document as a separate charge, it makes much more sense for one of the charged documents to be this one.</p><p>If it is on the list, there&#8217;s not many options for it because of the date: it would have to be an undated entry. Of these, document #11 fits the bill nicely.</p><p>Of course, I could be wrong here. It could be unrelated. But it makes the most sense given the information we have.</p><h2>Documents #28, #29, #30: Probably related to the Turkish offensive into north-eastern Syria</h2><blockquote><p><em>#28: [TS//SPECIAL HANDLING] Document dated October 18, 2019, concerning White House intelligence briefing related to various foreign countries</em></p><p><em>#29: [TS//X/SI/TK//ORCON/NF]Document dated October 18, 2019, concerning military capabilities of a foreign country</em></p><p><em>#30: [TS//X/ORCON/NF/FISA] Document dated October 15, 2019, concerning military activity in a foreign country</em></p></blockquote><p>These three documents cover events over the three day period October 15-18, 2019.</p><p>The first of these (#28), based on the handling requirements, is probably a direct excerpt from a PDB. The second (#29) is probably a map or satellite graphic, based on the compartment.</p><p>These three documents happen about the time of the 2019 Turkish offensive into north-eastern Syria. A close timeline of these events is <a href="https://en.wikipedia.org/wiki/2019_Turkish_offensive_into_north-eastern_Syria#:~:text=The%20operation%20began%20on%209,town%2C%20Ayn%20Issa%20and%20Qamishli.">here</a>.</p><p>Specifically, on 14 October 2019, President Trump <a href="https://web.archive.org/web/20191015063732/https://www.koamnewsnow.com/news/politics/national-politics/trumps-syria-decision-sparks-scramble-to-safely-remove-us-troops/1132156902">announced that all U.S. personnel would withdraw from Syria</a>, except those at Al-Tanf base. The PDB the day after (15th) would likely include IC reporting, not just from Turkey and inside Syria, but also other interested parties to the conflict, about their reaction to the withdrawal.</p><p>A few days later, on 17 October 2019, Vice President Mike Pence and Turkish President Erdogan reached a deal to implement a 120-hour cease-fire, ending Turkey&#8217;s operation in norther Syria. The President would likely have been briefed the day after with maps and other analysis about the state of the ceasefire, and the IC&#8217;s analysis about reactions to the ceasefire, whether it will hold, and the state of forces on the ground.</p><h2>Document #6: PDB (maybe related to barring Chinese flights to the US)</h2><blockquote><p><em>[TS//SPECIAL HANDLING] Document dated June 4, 2020, concerning White House intelligence briefing related to various foreign countries</em></p></blockquote><p>This is most likely a PDB or extract from a PDB, based on the classification marking here, but it&#8217;s a bit unusual. The big international event here is from the day before: June 3, <a href="https://www.washingtonpost.com/local/trafficandcommuting/trump-administration-bans-flights-by-chinese-airlines/2020/06/03/d5eb7136-a5a5-11ea-b619-3f9133bbb482_story.html">when the Trump administration announced a ban on all commercial passenger flights by Chinese carriers</a>, to begin on June 16. </p><p>Although this event has been largely re-cast in recent years to have been motivated by a desire to prevent the spread of COVID to the United States, the proximate cause of the ban was actually in response to a Civil Aviation Administration of China order in late March which limited Chinese and foreign flights. <em>That</em> order also capped the number of flights by any airline to China beyond the baseline of March 12. With no U.S. airlines actually flying to China on that date, that Chinese order effectively barred all U.S. flights to China. By June, Delta and United had been pushing to resume flights to China, but the Civil Aviation Administration of China order blocked this.</p><p>On June 3, the U.S. administration retaliated, barring all direct flights to the United States from China. This PDB is from the day after.</p><p>There are a several other things the PDB would have contained, but this would seem to be the most likely extract that Trump was personally interested in retaining.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Mint the Coin]]></title><description><![CDATA[And why the President's 14th Amendment Plan is the wrong tool for the job]]></description><link>https://www.pwnallthethings.com/p/mint-the-coin</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/mint-the-coin</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Wed, 24 May 2023 11:18:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1Vbx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1Vbx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1Vbx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1Vbx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1Vbx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1Vbx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1Vbx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg" width="480" height="430" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:430,&quot;width&quot;:480,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A picture of a platinum dollar coin, marked \&quot;one trillion dollars\&quot; and featuring a picture of Dr Evil laughing from the movie Austin Powers&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A picture of a platinum dollar coin, marked &quot;one trillion dollars&quot; and featuring a picture of Dr Evil laughing from the movie Austin Powers" title="A picture of a platinum dollar coin, marked &quot;one trillion dollars&quot; and featuring a picture of Dr Evil laughing from the movie Austin Powers" srcset="https://substackcdn.com/image/fetch/$s_!1Vbx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1Vbx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1Vbx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1Vbx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474e6acb-a305-410c-a3b8-ef2dc2f7af7e_480x430.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For the past few weeks, the biggest problem facing D.C. has been the debt ceiling. It&#8217;s a uniquely D.C. problem: a completely avoidable catastrophe unless a deal is reached, but&#8212;if we&#8217;re lucky&#8212;perhaps at the eleventh-hour the whole shebang will go away and we&#8217;ll scrape through with the U.S. having laudably decided not to detonate its own economy.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>As with many of these recent artificial crises, this negotiation seems, at least from the outside, to be going rather badly. President Biden has signaled that he&#8217;s open to looking at ways to dodge the issue&#8212;namely by using the 14th Amendment to declare the debt ceiling unconstitutional and to ignore it. Several prominent Democrats are also loudly pushing this plan.</p><p>Biden is right to want to circumvent the debt ceiling&#8212;especially if the alternative is a national default. But, unfortunately, the plan to do it via the 14th Amendment is a very bad one&#8212;especially compared to alternative plans like the <em>trillion dollar coin</em>. </p><p>Understanding the difference in those two plans is a bit involved, so I figured it might be useful to go into them in detail, and why they aren&#8217;t, well, two sides of the same coin. Yes, superficially both seek to neutralize the debt-ceiling. But one does so in a way that trips through a dozen legal and economic minefields, and the other, while superficially very gimmicky, is actually a very straightforward approach that avoids virtually all of the problems inherent in the President&#8217;s 14th Amendment plan.</p><p>So, without further ado: what is the debt ceiling? Why does it even exist? What is the President&#8217;s 14th Amendment plan, and why is it problematic? What is the <em>mint the coin </em>strategy, and how does it work legally and monetarily? And finally, let&#8217;s look at why minting the coin isn&#8217;t merely a better plan, but also avoids separation-of-powers issues and renormalizes government back towards a healthy approach to governance where major changes to the status-quo require active legislation rather than having to constantly try and dodge crash-by-default timebombs. In fact, those final points mean I think the President should mint the coin <em>whether or not </em>he gets an agreement to raise the debt ceiling. But we&#8217;ll get to that in due course.</p><div><hr></div><h2>The Debt Ceiling</h2><p>The debt ceiling is a legislative limit on the total public national debt held by the US Treasury. In the United States, the power to raise debt belongs to Congress and not the Executive Branch, thanks to Article I Section 8: &#8220;[The Congress shall have power] to borrow money on the credit of the United States&#8221;. Congress delegates that power by statute to the US Treasury, up to a defined limit. The limit was first set in 1917, and has been updated several times since.</p><p>The debt ceiling was most recently lifted in December 2021 to its current limit of $31.4tn, and the United States <a href="https://www.foxbusiness.com/politics/us-hits-debt-ceiling-threatening-economic-outlook">hit this limit around January 19th this year</a>. The U.S. government is now operating solely on its remaining cash balance. It can no longer borrow to get new cash because of the debt ceiling, and its next infusion of tax revenue will occur at the end of June, which will be too late.</p><p>At the end of April, the US federal account stood at about $350bn. As of yesterday, it&#8217;s about $57bn. In a few days it will simply run out. The exact day is unclear, but on one of the days in the week 5-9th of June, the US will be unable to clear its overnight debt payments for the day, and the US will, for the first time ever, be in actual default.</p><p>If this happens, US debt will lose its trusted status in the market and the cost of all future borrowing will price in this new reality. The US&#8217; total debt is very large, so even very small spikes in the cost of borrowing quickly add up to hundreds of billions of dollars a year. A rise in the base cost of borrowing of even just one quarter of one percent translates to about $50bn a year of direct additional debt payments.</p><p>Basically everyone agrees that this would be terrible. But that raises the pretty obvious question: why do we even have a debt ceiling at all?</p><p>The debt ceiling is, after all, a completely arbitrary figure. It has no intrinsic economic purpose or significance&#8212;increasing the ceiling by $100tn does not incur $100tn of new debt, or have any effect on the wider economy whatsoever. The ceiling&#8217;s value, rather, only determines when the next debt-ceiling fight happens. And this is its point: The debt ceiling forces Congress to take another look at the issue, and provides an artificial negotiating advantage to those who want to extract concessions from the governing party. That&#8217;s because maintaining the status-quo necessarily requires passing new legislation.</p><p>Notice that this is an inversion of the traditional &#8220;schoolbook&#8221; model of US governance. Under that model, major changes to the status-quo would normally require legislation passed by the Congress and signed by the President to take effect. Legislative timebomb clauses and the debt-ceiling invert that normal ordering. Here, instead, the status quo changes <em>unless </em>the President, House, and Senate can all bang heads together and kick the can down the road. When the President, House and Senate are not all controlled by the same party (and, for issues subject to filibuster rules, even then without a supermajority) this forces a negotiation that is advantageous to the minority party: They get to hold the country hostage.</p><p>These timebomb-style games-of-chicken have always been structurally bad. Passing legislation in the United States is constitutionally hard on purpose, because it is normatively good for big changes in the governance status-quo to require debate and agreement in the political branches. Sunset clauses and debt-ceilings invert this so that <em>maintaining </em>the status-quo and avoiding catastrophe is hard, and requires debate and agreement in the political branches. That&#8217;s a perversion even under the best of times. In a time when the political branches are dysfunctional and can barely agree on anything, it&#8217;s wildly irresponsible.</p><p>All of which is to say: the debt ceiling is not only bad because <em>defaulting</em> would be bad, it&#8217;s also <em>structurally</em> bad because it inverts the traditional model of decision-making, and sets the country up to periodically try and disarm a timebomb that the political branches self-evidently are now too dysfunctional to reliably defuse.</p><div><hr></div><h2>The President&#8217;s 14th Amendment Plan</h2><p>The administration, for its part, seems to be leaning towards the 14th Amendment solution, so let&#8217;s start with that one. The claimed authority here comes from the 14th Amendment&#8217;s Section 4, which reads:</p><blockquote><p>The validity of the public debt of the United States, authorized by law, including debts incurred for payment of pensions and bounties for services in suppressing insurrection or rebellion, shall not be questioned. [&#8230;]</p></blockquote><p>Here, the argument is that the debt ceiling is <em>inherently</em> unconstitutional, because the debt ceiling legislation means that the US government would be unable to pay its debts. The theory states that since the 14th Amendment ensures that public debt shall not be questioned, that implies a conflict between the 14th Amendment and the debt ceiling legislation. As all schoolchildren know, if there&#8217;s a dispute between legislation and the constitution, the constitution wins. So under this theory, the executive branch can declare the debt ceiling unconstitutional and borrow straight past the limit. </p><p>Hurrah!</p><p>The problem is the plan doesn&#8217;t work.</p><p>The first, and most obvious defect in this strategy is that the US government doesn&#8217;t just need money in order to service its existing debt. It also needs money for, well, everything else. If the 14th Amendment permits borrowing to avoid a default&#8212;and that is not at all clear&#8212;it definitely doesn&#8217;t cover borrowing to cover non-debt obligations like, say, paying government employees, its invoices, or social security.</p><p>Even when it comes to the very narrow issue of <em>just</em> raising debts to avoid a default, it&#8217;s not at all obvious that the 14th Amendment permits even it.</p><p>First, let&#8217;s dispense with the idea that this is a statute-disagrees-with-constitution issue, because it&#8217;s just not. It&#8217;s a separation-of-powers dispute. To execute the 14th Amendment plan, the President would need to borrow against the credit of the United States. That&#8217;s a power given to Congress in Article I Section 8. Congress has only given a <em>limited </em>delegation of that authority to the Treasury&#8212;and worse&#8212;that limitation is very explicit that the President must not exceed the specified ceiling.</p><p>Secondly, while the 14th Amendment says that public debt shall not be questioned, it doesn&#8217;t say <em>how</em> the government must raise money to service those debts. It doesn&#8217;t follow at all from the 14th Amendment that honoring the United States&#8217; debts requires the President to raise some other debts, absent a grant of authority by Congress to do so.</p><p>That might not be obvious, but here&#8217;s an extreme example to make the point: if the President decided that a different way to honor the debts was to invade Denmark and steal all of the gold in their Treasury, everyone would agree that&#8217;s pretty obviously <em>not </em>authorized by the 14th Amendment. Similarly, another way to raise money to honor the debt would be for the President to unilaterally issue a one-off emergency tax on the public without consulting Congress. Again: nobody would think the 14th Amendment authorizes the President to do this just because the 14th Amendment says that public debt must be honored. The same would go for selling federal land, or exports of military equipment against Congress&#8217; express prohibition.</p><p>And this is the crux of the problem: it doesn&#8217;t follow from the 14th Amendment that the President can raise debt independent of Congress, <em>even if </em>it states that debts must be honored.</p><p>But wait! It gets worse. Not only does the 14th Amendment fight get the president into a separation-of-powers fight with Congress where he might not succeed&#8212;and does so in order to get money that doesn&#8217;t even keep most of the government operational&#8212;the legal status of all debt incurred past the ceiling under this plan has a very unclear legal status. </p><p>Will that new debt be honored? Maybe. Probably. I don&#8217;t know. Nor do you. But most importantly: the <em>markets </em>don&#8217;t know. And the 14th Amendment won&#8217;t guarantee it either: Debt past the ceiling isn&#8217;t public debt authorized by law&#8212;in fact, it&#8217;s explicitly <em>not </em>authorized by law!</p><p>In other words, when the President raises debt past the ceiling under this plan, that new borrowing is qualitatively different to existing borrowing, and comes with all sorts of new risks to the financial institutions purchasing it. And&#8212;as night follows day&#8212;financial instruments that carry more risk charge higher premiums. So, despite all the trouble and limitations of this plan to bypass the ceiling, we still somehow ended up with basically all the problems we were trying to avoid anyway: the government still shuts down; social security still doesn&#8217;t get paid; and the markets lose trust in the U.S.&#8217; debt anyway and so we still see a massive surge in debt interest rates and increased debt payments.</p><p>So, yes, it&#8217;s fine&#8212;admirable, even&#8212;to find ways to creatively ignore the debt ceiling. </p><p>But&#8212;I&#8217;m sorry&#8212;the 14th Amendment plan to do it is bad. It&#8217;s the wrong way to do it.</p><p>The right way to do it is <em>the coin</em>.</p><div><hr></div><h2>Mint the Coin</h2><p>The <em>Mint the Coin </em>strategy, or &#8220;31 USC 5112(k) Treasury seigniorage plan&#8221; if we want to be very boring about it, is very different, both technically and legally. Here, rather than trying to argue that Congress&#8217; debt ceiling is unconstitutional, it takes a radically different approach rooted in the inspired observation that, from the government&#8217;s perspective, <em>money and debt are the same</em>.</p><p>This is perhaps not obvious, but here&#8217;s why: If you buy $20 worth of Treasury debt, the US government definitionally has a debt obligation to you in the sum of $20 (plus interest). But if you have a $20 bill in your wallet, the US also has an obligation to you in the sum of $20. It says so right on the bill. They&#8217;re <em>both </em>a Treasury-backed financial obligation, just in different forms.</p><p>So let&#8217;s walk through this plan and see how it works.</p><p>As with debt-raising, Congress has the ultimate authority in deciding how the US issues hard currency: &#8220;[The Congress shall have power] To coin Money, regulate the Value thereof, and of foreign Coin, and fix the Standard of Weights and Measures&#8221;. This authority is separately delegated to the Treasury (which sub-delegates it to the Mint for coins and to the Bureau of Engraving and Printing for notes) under a limited grant that precisely defines the types of currency that the Treasury can create, as well as their form, and, in most cases, their denomination and maximum circulation.</p><p>But there is one exception, described in 31 USC 5112(k): The <em>Platinum Coin</em>.</p><blockquote><p>The Secretary may mint and issue platinum bullion coins and proof platinum coins in accordance with such specifications, designs, varieties, quantities, denominations, and inscriptions as the Secretary, in the Secretary&#8217;s discretion, may prescribe from time to time.</p></blockquote><p>The breadth of delegation here is not an accident of drafting. The clause is designed to permit the Secretary to mint special-edition coins at any value or design without needing to bother Congress with the specifics. While its drafters expected that to be for <em>collectable </em>coins, the Secretary can absolutely choose to make high value coins&#8212;yes, even trillion dollar coins&#8212;if she wants to. She doesn&#8217;t even need any particular reason. She just can: Congress gave her that power. The only restriction she faces is that the coin must be made of platinum, and that it must otherwise operate like any other coin.</p><p>So why does minting a trillion dollar coin help with the debt ceiling? It all comes down to the way hard currency is accounted for inside the federal government.</p><p>Once the Secretary authorizes the creation of a trillion dollar coin, the Mint creates the physical coin itself, probably with a lightly-modified commemorative coin design and an existing platinum coin blank. The Mint then takes that physical coin across town and deposits it at the Federal Reserve. As with all other coins deposited there, the Mint is then credited with the coin&#8217;s <em>seigniorage</em>, i.e., the face-value of the coin minus any costs incurred creating it. The Fed then holds the coin as an asset.</p><p>Notice that in economic terms, nothing has really happened here yet&#8212;at least beyond the small-dollar costs of the metal and the bureaucracy in processing it. But in <em>accounting </em>terms, the Mint has just been credited with $1tn into its account by the Fed, and the Fed balances its balance sheet by holding the $1tn coin as an asset alongside all of its other multi-trillion dollar assets. </p><p>That $1tn payment to the Mint is operating surplus for the Mint, which, like all government department operating surpluses, is deposited back to the Treasury General Fund. Armed with this new money, the Treasury can spend it to keep the government operating and to satisfy its debts, invoices, wages, and other obligations.</p><p>There&#8217;s two easy mistakes to make with this plan if you&#8217;re not careful, so let&#8217;s tackle those now. Because this plan <em>doesn&#8217;t</em> give the executive branch free rein with the money, and it <em>doesn&#8217;t</em> have a direct inflationary impact.</p><p>On spending authority, this doesn&#8217;t touch or upend Congress&#8217; budget power. The new $1tn ends up in the Treasury General Fund, but it isn&#8217;t the Executive Branch&#8217;s money to spend as it pleases&#8212;that still requires Congressional appropriations. This plan lets the executive branch dodge the debt ceiling. It doesn&#8217;t let it dodge the federal <em>budget</em>.</p><p>On inflation, isn&#8217;t this a case of &#8220;printing money&#8221; that will trigger hyperinflation? </p><p>No. And not just because it&#8217;s stamping the money, not printing it. </p><p>When countries that perform unchecked currency printing spiral into hyperinflation, the proximate cause of the spiral isn&#8217;t <em>printing </em>the money. It&#8217;s <em>spending</em> it. Here that&#8217;s not the case. Counter-intuitively, even if the government is making new currency, its total spending after minting the coin is identical to what its spending would have been with just a vanilla debt-ceiling increase. It&#8217;s inflation-neutral.</p><p>This is more visible if we use an extreme example. Suppose the government were to mint a $999tn<em> </em>coin, and not just a $1tn coin. Here the practical result is that the Federal account will have a very large number in a database. But no other economic effects are occurring anywhere else: it doesn&#8217;t impact anyone else&#8217;s money. The coin isn&#8217;t in circulation, and it doesn&#8217;t change the budget&#8212;at least compared with simply raising the debt-ceiling by any other means&#8212;and so it is no more or less inflationary than any other mechanism of raising the debt ceiling and spending at the current budget rate. Of course, if Congress decided to start <em>spending</em> the $999tn money through gigappropriations, then, yes, sure, that would be hyperinflationary. But that&#8217;d be inflationary whether it&#8217;s funded by seigniorage or by external debt; it&#8217;s the <em>spending</em> not the <em>financing</em> that triggers the inflation. And, just as importantly, that&#8217;s not something the executive branch can do independently of a Congressional appropriation.</p><p>In short, the whole <em>Mint the Coin </em>scheme is just a very elaborate accounting mechanism to restructure some of the debt to be Fed-managed rather than Treasury-managed. That&#8217;s because one of those debt piles has a Congressionally-imposed maximum, and the other has a Congressional grant to the Treasury Secretary to mint coins with an unlimited upper value. </p><p>That&#8217;s all it is. It&#8217;s fancy accounting wrapped around a physical coin. It&#8217;s not got any wider economic significance beyond that.</p><div><hr></div><p>But while minting the coin feels a bit, well, gimmicky and undignified&#8212;and it is&#8212;it serves several very important purposes that the President&#8217;s 14th Amendment plan does not. First, and most importantly, it uses a delegated power from Congress in a way that is explicitly authorized, in contrast to using a Congressional power in a way that is explicitly <em>unauthorized</em>. That side-steps the separation-of-powers fight that the 14th Amendment plan would otherwise involve entirely.</p><p>The second great thing is that it&#8217;s very limited in scope. Congress can, if it chooses, amend the law to withdraw the authorization from the Treasury Secretary to mint trillion dollar coins. A bill to withdraw that authorization&#8212;perhaps in exchange for repealing the debt ceiling&#8212;for example, is entirely possible. And even if Congress does not withdraw the authorization, there is no opportunity for executive misbehavior here: Federal spending is still firmly limited by Congressional appropriations. This isn&#8217;t magic money for the president to use as he pleases, and has no effect on the rest of the economy beyond what would be the case if the same spending were debt-financed rather than money-financed.</p><p>The third great thing is that it stabilizes the national economy by defusing the national-debt timebomb permanently. Changes to the status-quo, whether for better or for worse, can and should always be done through affirmative legislation. It is bad enough that Congress puts timebombs in its legislation. It certainly should not put one under the economy as a whole. This defuses that bomb forever.</p><p>The next benefit is the delegation of authority to the Secretary of the Treasury&#8217;s total discretion means there are very few avenues to appeal her decision. It&#8217;s fully hers to make; the executive branch doesn&#8217;t stamp on anyone else&#8217;s toes to do it. It&#8217;s not only plainly lawful: it also doesn&#8217;t implicate anyone else&#8217;s interests. It is not clear who, if anyone, would have standing to oppose it.</p><p>And the final great thing about this plan is it simply doesn&#8217;t involve the markets at all. All existing debt is honored, and no new debt is created with any type of uncertain legality. There&#8217;s no new uncertainties for the markets, and nothing for them to reprice or to price-gouge to take advantage of the crisis. It just averts it.</p><p>Finally, if anyone in Congress happens to be upset that neutering the debt ceiling undermines their ability to re-debate the topic of total federal debt, then on that, too, I have happy news: Both chambers of Congress independently have the power, if they wish, to create new standing committees or rules in their respective chambers, or to periodically compel new debate on the topic within their respective bodies through Congressional rules. They don&#8217;t need a timebomb under the economy to force internal debates about overall spending.</p><div><hr></div><p>In short, ending the debt-ceiling is a very good idea. Defaulting would be catastrophic. But the 14th Amendment is the wrong tool for this job. </p><p>It is true that when you&#8217;re trying to defuse a bomb, you sometimes have to turn a few screws. But that doesn&#8217;t mean you have to use a spoon to do it&#8212;especially if there&#8217;s a screwdriver lying next to you.</p><p>If a deal cannot be reached before zero-hour&#8212;and honestly, even then&#8212;the right answer is clear: You just gotta mint the coin.</p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Long Live the King?]]></title><description><![CDATA[What's the point of the British Monarchy anyway?]]></description><link>https://www.pwnallthethings.com/p/long-live-the-king</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/long-live-the-king</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Sat, 06 May 2023 19:42:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fjts!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fjts!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fjts!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fjts!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fjts!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fjts!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fjts!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg" width="1456" height="1084" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1084,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;King George III, as played by Rory O'Malley in &#8220;Hamilton&#8221; the Musical on Broadway. (Photo by Joan Marcus)&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="King George III, as played by Rory O'Malley in &#8220;Hamilton&#8221; the Musical on Broadway. (Photo by Joan Marcus)" title="King George III, as played by Rory O'Malley in &#8220;Hamilton&#8221; the Musical on Broadway. (Photo by Joan Marcus)" srcset="https://substackcdn.com/image/fetch/$s_!fjts!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fjts!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fjts!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fjts!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bc8458b-47b0-483c-b79c-20c76f8534e7_4000x2979.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">King George III, as played by Rory O'Malley in &#8220;Hamilton&#8221; the Musical on Broadway. (Photo by Joan Marcus)</figcaption></figure></div><p>Let&#8217;s be honest. The British Monarchy is a very weird institution. And I&#8217;m saying that as a Brit.</p><p>I grew up in the UK. Not in London, of course. God no. London might as well have been foreign; a place full of bankers and lawyers and politicians. People you&#8217;d see on television, but who would never visit unless it was election season and they wanted a photo wearing a high-vis jacket in front of some heavy machinery to collect votes. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>No, I grew up in a little town famous&#8212;if such a word can even be used for it&#8212;for being a short drive from the nearby car assembly plant and an oil refinery that drove the local economy after a few centuries of industries coming and going, each making it briefly livable and then collapsing back into obsolescence. A town where the locals knew you had to work hard to live, but also knew that others who didn&#8217;t would be the ones setting the rules from a distance.</p><p>And sure enough, today there is a new ruler: an elderly man who has never worked a day in his life, and, thanks to his (literally) crowning achievement of being born to the right family and managing to outlive his own mother, now gets a national parade and to subjugate everyone in the entire United Kingdom. </p><p>His face will literally be on the money.</p><p>So when my international friends have asked me this week if I&#8217;m excited for the coronation, &#8220;no&#8221; is very much an understatement. I am not especially anti-monarchist, but the whole thing has me Googling pictures of guillotines and quietly thinking that most treasonous of all British thoughts: that perhaps the French had a point.</p><p>Much of my dislike for the event comes not so much from the event itself, but from the truly awful coverage and takes about it from the UK and around the world. The obsession by media and major British institutions in trying to make the coronation a Big Thing(TM) is&#8212;for want of a better description&#8212;extremely gross and cringe. The coronation is simply not a profound, important, or patriotic thing to normal working people, no matter how many supposedly serious commentators declare it to be so. It&#8217;s obnoxious and insulting enough when that lie comes from the British government as a distraction from other, actually important things. When it comes from the British media, it&#8217;s pathetic and frankly disturbing.</p><p>At the same time, the reactionary anti-monarchy takes, especially in Europe and the U.S., are somehow often just as bad, usually rooted in the observation that Kings are not democratically elected, or noticing that the royal family is comprised of genuinely awful people. </p><p>Thanks. I assure you, we know.</p><p>Not all takes are terrible though. My favorite comments have come from my Ukrainian friends, which roughly sum up as &#8220;we absolutely do not understand why Brits are doing this, but it seems to make you all happy, so we&#8217;re happy for you&#8221;. It&#8217;s fabulously sincere and genuine both in its bafflement at the absurdity of it, and its genuine happiness for Brits that the little dour island gets to have a fancy-dress party, like a grumpy Eeyore wearing a party hat.</p><p>The problem with the both the pro- and anti-monarchy takes, though, other than their shallowness and fake performativity in both directions, is that most people&#8212;including most of the institutions inside the UK itself&#8212;seem to have forgotten what purpose the Monarchy actually serves as an institution to modern Britain, or what exactly it&#8217;s <em>for</em>. And it&#8217;s not tourism, or opportunities to wave flags. The real value in the British Monarchy is that it keeps the pomp of state as far away from the Prime Minister as possible, so that <em>they </em>never get carried away and forget that they are not&#8212;and never will be&#8212;the King.</p><p>Let me explain.</p><p>The executive branch of every country has to juggle operating in two rather different domains at the same time: domestic and international. For democratic countries, leaders are explicitly decoupled from the State itself, at least domestically. They may have a bully pulpit, but their power is not absolute, and they are required to drive their domestic agenda by persuasion and navigation of elite and public interest groups. Only then can they pass a law that is enforced by the coercive police power of the State. It is a difficult process on purpose; it is not automatic.</p><p>The international domain is quite different. Here, leaders&#8212;including democratic ones&#8212;greet each other not just as some politically well-connected foreign individual, but rather as the embodiment of the foreign state itself. When the U.S. President lands in London for a state visit, he is greeted by the British ceremonies of state not because Britain has some particular respect for the man Joe Biden, but because, for the duration of his visit, he <em>is </em>America.</p><p>Perverse as it might sound to say, but the ceremony is not for him. It&#8217;s for you.</p><p>Authoritarian countries do not bother as much with switching modes for the two domains. When a dictator speaks for his country on the international stage, he speaks for his country. No difference there. But when he speaks domestically he <em>also</em> speaks as the state, and his word is law. On the international stage, at least, the roomful of near-equals might still choose to ignore his words. But the danger of authoritarianism is that when the authoritarian speaks his will into domestic law, those words are enforced coercively by the state <em>without</em> the need for prior discussion, navigation, or even recognition of the private interests of the citizenry.</p><p>For democratic countries, this duality causes a really odd&#8212;and very non-obvious&#8212;mental drift for democratically-elected leaders that, if not actively guarded against, insidiously pushes them towards authoritarian and anti-democratic thinking as they last longer and longer in office: they lose the mental distinction between themselves and the state.</p><p>Newly elected democratic leaders tend to navigate the domestic front rather well. After all, it&#8217;s basically a prerequisite for the job. By contrast, they usually find themselves out-of-place on the international stage&#8212;it has no analogy in normal public life. After a while in office this reverses. The international stage becomes second nature, and the domestic one starts to feel uncomfortable. </p><p>This basically comes down to ego: as a leader on the international stage, you are treated with enormous dignity, respect, and deference, and your authority to speak on behalf of your country is implicit and unquestioned. You get fine food; visit fancy palaces; meet famous people. When you land in their country they throw literal parades in your honor! </p><p>The adjustment when you fly back home is palpable. You are greeted on return by your nation full of ungrateful yobs who do not see you as the forever-president like your fancy new friends do, and these dirty plebs instead insist that you degrade yourself by doing nasty petty things like &#8220;defending your record&#8221;, facing media accountability, or articulating a plan for the future, even though that means implicitly criticizing yourself for having not already done it yet.</p><p>It is perhaps no surprise, then, that democratic leaders start slowly disengaging from the ugly world of domestic democratic process, and instead start longing to be something, well, kinglier.</p><p>The worst part of this insidious shift is that it always occurs alongside a parallel drift in the body-politic when a leader stays in power too long: If a person has been leader for just one term or two, it is relatively easy to see how another person may replace him, and to simply vote him out. But when a leader has been in office too long, it starts to become hard to see anyone else fitting the great leaders&#8217; shoes. After all, there are two candidates: One is the God-Prince and Father of the Nation, unquestionably fit for office, and whose statesmanlike knowledge in all matters of state are second nature.  His opponent is just some guy&#8212;No, worse: a <em>politician</em>.</p><p>I don&#8217;t know why, but the terminal limit for this effect seems to be just over a decade or so. Leaders, and in some cases, entire <em>parties</em>, that have been in power too long lose interest in negotiated improvements to domestic life, and start instead to become obsessed with power for its own sake, often with horrendous effects both at home and abroad. Some people certainly fall prey to this impulse much earlier, and some hold out longer, for sure. But there is no shortage of examples of individuals who were once celebrated by the public on their first election to office and who stayed in power long enough to become a villain to their own public and neighboring states. </p><p>America&#8217;s solution to this problem, for what it&#8217;s worth, is the 22nd Amendment: no president may be elected more than twice. No matter how popular you are, as the clock strikes Twelve O&#8217;Clock eight years after you take office, the trappings of power instantly evaporate and the Constitution transforms you back into your ordinary pumpkin self.</p><p>Britain has no 22nd Amendment. It has a different solution: someone else wears the crown.</p><p>In the United Kingdom, anyone can be Prime Minister. But you will <em>never</em> wear that crown. No matter how powerful or popular you are, your colleagues will have sworn allegiance to someone else. The British Armed Forces; her Police Forces; her Intelligence Agencies have allegiance not to <em>you</em>, but to <em>them</em> as embodiment of the State itself, and never to you personally. If you win your election you will have a nice (but not elaborate) house and office. And once a week you go meet the King in his palace for the sole purpose of reminding you that&#8212;no matter what&#8212;you inhabit the world of mere mortals, and will never get to live in the lofty realm of kings.</p><p>The coronation&#8217;s job, then, is rather strange in what it attempts to do: it is the gate between the king as man and the king as state. Its functional job, if you draw back the curtain a bit, is to throw so much pomp and ceremony at the little man in the chair that everyone is dazzled and simply forgets that he&#8217;s just an unremarkable man with no particular achievements, and set him up to authoritatively represent the nation in all matters of state going forward.</p><p>To be clear: I&#8217;d rather it be someone else. Honestly, pick someone out of a phone book. I&#8217;m no fan of nepo-babies having generational fame and wealth air-dropped on them for no reason other than birth. I&#8217;d certainly prefer not also giving them <em>constitutional</em> status.</p><p>But his job is, ultimately, just to wear the crown so Rishi Sunak&#8212;and others like him&#8212;can&#8217;t. The Monarchy is the British constitutional mechanism of perpetually reminding the Prime Minister that, no matter how many votes they get, nor how rich, or how famous, they will always be a little man too; forever smaller than they want to be, and to save the nation from what it would become if it reverted back to the age of <em>real</em> kings.</p><p>Other countries solve this problem in other ways. No other country has a person whose job is to remind the political leader of the nation once a week, to their face, that, despite everything, and no matter what, they&#8217;ll always be, well, a little bit shit. No other country would tolerate it. Modern Britain has it as its constitutional bedrock.</p><p>And there&#8217;s just nothing that could be more British than that.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Pentagon Leaks: What's the Damage?]]></title><description><![CDATA[Not all the leaks are equally bad, and only by chance we avoided much worse]]></description><link>https://www.pwnallthethings.com/p/pentagon-leaks-whats-the-damage</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/pentagon-leaks-whats-the-damage</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Sat, 15 Apr 2023 11:53:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IRBD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IRBD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IRBD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IRBD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IRBD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IRBD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IRBD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg" width="976" height="549" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:549,&quot;width&quot;:976,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Pentagon leak: How secret US files spread then vanished online - BBC News&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Pentagon leak: How secret US files spread then vanished online - BBC News" title="Pentagon leak: How secret US files spread then vanished online - BBC News" srcset="https://substackcdn.com/image/fetch/$s_!IRBD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IRBD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IRBD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IRBD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9528ce2b-e20e-4bdd-b17c-2b5ad2299006_976x549.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Every national security leak is a saga in five parts. This one is no different.</p><p>The first of these stories is always the one written by the national security apparatus itself, though originally intended for a more select audience. It shows the world as the intelligence community sees it, and with the curtain pulled back. Along with the stories of foreign governments and targets, it also tells a story about the IC itself, and its analysis, priorities, and the mechanics and people through which they see the world and report on it out to policymakers. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The second story is the rush of the chase and the scramble to catch the leaker; the trail of clues that starts with a picture of a classified document and the journey as journalists and government investigators race to identify its photographer.</p><p>This second story gives way to the third: the human story of the leaker themselves. Who are they? How did they do it? What signs did their friends, family, and colleagues see as they changed from trusted official into public leaker? And what motivated them to reveal the things they were supposed to keep secret?</p><p>For many, the saga ends here. With the documents published and the leaker starting their long and arduous journey through the federal criminal justice system, the story moves on to other, more current things. But two more stories are due. </p><p>The next part is the damage assessment and the unfortunate reminder that leaks often come at a price. And the fifth is the story of the future, and what the government will try and do to stop it happening again.</p><p>For a variety of reasons, these final two stories usually get little attention. They are more bureaucratic and inward-facing than the others, and are usually poorly explained. They&#8217;re also written by the government&#8212;who are no neutral party in the story they are trying to tell&#8212;and it usually suffers itself from over-classification, over-abstraction, and, perhaps most unforgivably to the public in the relentless news cycle: <em>they&#8217;re late to the party</em>. By the time those stories are ready to be told, it&#8217;s old news, and the world has moved on.</p><p>But while those last two stories are the least well understood, they&#8217;re also important. So let&#8217;s talk about the damage. What&#8217;s in this leak? Is it really so bad? Were sources and methods lost? Is it repairable? And who pays the price when leaks like this occur?</p><div><hr></div><h2><strong>The Leak</strong></h2><p>The Discord Leaks is a collection of approximately 300 photographs taken from the JCS daily brief over a few months, as well as from the CIA Operations Center Intelligence Update. Eight of these are high-resolution images from a briefing in early March that are readily available on the Internet. These eight mostly relate to Ukraine&#8217;s planned Spring counteroffensive and the operational status of a few active combat areas in Ukraine.</p><p>One of these documents was clumsily altered by a pro-Russian Telegram channel last Thursday. That laughably terrible attempt at photoshop changed a table of Russian casualty numbers down by a factor of about 10 and inflated Ukrainian casualty numbers. Amazingly, despite the photoshop being glaringly obvious, they were quoted by Tucker Carlson to his nightly audience of 2.5 million conservative viewers nearly a week after they were shown as fabricated.</p><p>Beyond those eight high resolution images floating round the Internet, a second set of about 50 high-resolution images exist, and two publications appear to have additional images beyond that set&#8212;about 100.</p><p>The full archive covers a far broader set of IC analytic product than might be obvious just from the public eight photographs, and they cover the whole spectrum&#8212;it&#8217;s not just maps and military intelligence. This information is mostly, but not entirely, in the form of short-form summary reports, and so is relatively dense in its coverage of global events and equally dense in the variety of sources and methods that underlie that analysis.</p><p>From a damage-assessment perspective, it&#8217;s important to notice that the information in these documents isn&#8217;t all the same. Some are essentially inert; the IC will lose no sleep to lose it. Other bits will have had senior intelligence officials throwing anything not nailed down across the room, clearing their schedule, and trying desperately to extinguish the dumpster fire.</p><p>So let&#8217;s categorize them and take them in turn. The information here splits broadly three ways: <strong>military intelligence</strong> about Ukraine, <strong>political analysis</strong> using non-fragile sources, and <strong>foreign intelligence</strong>. They&#8217;re quite different.</p><div><hr></div><h2><strong>Military Intelligence about Ukraine: <br>Acute damage potential, but very short-lived</strong></h2><p>The first part of the leaks is intelligence<em><strong> </strong></em>regarding Ukraine&#8217;s military operations in the very immediate term. These leaks include maps of then-current operational areas and positions, training timelines, and confirmed delivery estimates for plausible and planned force deployment with a timeline in the days-to-weeks ahead. The documents also reveal a lot of technical information and plausible windows of opportunity for Ukraine&#8217;s planned Spring offensive.</p><p>The damage of losing this kind of information is extremely acute<em> </em>if the information is fresh and sustained. But the information is also extremely time-sensitive, and so the damage of this particular category of information in the leak tapers off very quickly. So far as I can tell, <em>most </em>of the people downplaying the damage of the leak are basing it on this observation.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2ZsG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2ZsG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png 424w, https://substackcdn.com/image/fetch/$s_!2ZsG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png 848w, https://substackcdn.com/image/fetch/$s_!2ZsG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png 1272w, https://substackcdn.com/image/fetch/$s_!2ZsG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2ZsG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png" width="545" height="111" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:111,&quot;width&quot;:545,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:14713,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2ZsG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png 424w, https://substackcdn.com/image/fetch/$s_!2ZsG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png 848w, https://substackcdn.com/image/fetch/$s_!2ZsG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png 1272w, https://substackcdn.com/image/fetch/$s_!2ZsG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F099fd06f-38c2-4a51-9990-01b0c94f7320_545x111.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Image: the classified documents here being cross-posted out of Teixeira&#8217;s private Discord and on to the public Internet&#8212;here via the Minecraft Earth Map Discord&#8212;within days of them being created</figcaption></figure></div><p>One document, titled &#8220;Ukraine: Disposition of Ukraine Armed Forces Around Bakhmut, February 24&#8221; shows a very detailed map of Ukrainian forces in and around Bakhmut from the day of the report. Another, titled &#8220;Bakhmut City Map as of 01 0600 EST Mar 2023&#8221;, shows Ukraine&#8217;s precise military locations within the city at the time with high granularity.</p><p>Had Russian artillery commanders obtained these maps within a few hours of the JCS writing it, it would have been an unmitigated disaster for Ukraine. There&#8217;s really no way to gloss over that. Had that map reached Russian artillery commanders on the same day, Russia could have killed a <em>lot </em>of Ukrainians as Ukraine scrambled to figure out what was happening and urgently repositioned everyone to try and mitigate it. That repositioning would have, in itself, been a massive disruption for Ukraine&#8217;s operations in the area, and an extremely valuable window of opportunity for Russian forces.</p><p>But wars are dynamic, and nothing stays still for long. The spots on the map no longer show where Ukrainians <em>are</em>; only where Ukrainians<em> were</em>. The intelligence value of those maps has mostly, though not entirely, &#8220;aged off&#8221; already.</p><p>Another map shows detailed air-defense locations in Ukraine, down to the types, locations, and effective range of the equipment. Let&#8217;s not be coy here: this is information that Russia has expended vast sums of money and equipment trying to obtain. Losing maps like these to the Russian military is <em>horrific</em>, and nobody should downplay it. It is less acute several weeks after the fact than had Russia gained it and used it while it was fresh&#8212;air defense systems in Ukraine are also mobile&#8212;but it is genuinely horrific for this information to have been lost. Don&#8217;t forget: Ukrainian air defense protects not just their forces, but also their cities from Russian bombardment. Ukraine and its allies have expended huge effort and costs to provide this air defense equipment. This map would have let Russian drones, missiles, and aircraft completely bypass it.</p><p>Other awful leaks in the set include detailed schedules and plans for Ukraine&#8217;s Spring counteroffensive. By colossal luck, the documents became public at the tail end of this schedule, depriving Russia of most of the value they contain. But it goes without saying that advance knowledge of schedules, equipment, and scale of a counter-offensive is very, very valuable to Russia&#8217;s military as they plan how to defend against it.</p><p>In short, this is a leak with a very direct cost that will certainly be paid in Ukrainian lives and destroyed equipment. Thanks only to sheer luck, the severity is far lower than could have been the case. And not to labor this point, but this luck is <em>despite</em> Teixeira, not thanks to any proactive attempt by him to mitigate those harms, or lack of damaging material in the documents as he posted them. At the point where he posted them, those maps were current. He posted it to a channel that had overtly pro-Russian members. The channel he shared it in was called &#8220;Bear-vs-Pig&#8221;; named for a racist slur commonly used by Russians against Ukrainians. That the documents didn&#8217;t route <em>immediately </em>into the hands of Russian commanders is not due to any attempt on his part to mitigate the harms prior to leaking those documents.</p><p>We don&#8217;t know yet if Teixeira <em>wanted</em> lots of Ukrainians to die as a result of his leak. But we definitely know he didn&#8217;t care if they did, and they certainly had the potential to cause colossal amounts of death&#8212;both military and civilian&#8212;in Ukraine, even if that huge potential was never fully realized.</p><div><hr></div><h2>Political analysis: <br>Embarrassing, but quickly forgotten</h2><p>The second group of leaks in the archive is <em><strong>political analysis </strong></em>of public events. These do appear with classification markings in the documents, but don&#8217;t be fooled: the classification here derives from the accompanying analysis, not the fragility of the source.</p><p>Let me give you an example to show what I mean.</p><p>In the archive, one report talks about Hungarian Prime Minister Orban describing America as one of its &#8220;enemies&#8221; during his State of the Union speech. This paragraph is marked &#8220;C/NF&#8221;&#8212;short for Confidential / NOFORN. This is a great example of over-classification, but leaving that aside for a minute, notice that the classification marking here isn&#8217;t about a fragile source. <a href="https://visegradpost.com/en/2023/02/19/prime-minister-viktor-orbans-state-of-the-nation-address-february-2023/">Orban&#8217;s speech was televised</a>, and the transcript was even posted on the Hungarian government&#8217;s website. There is nothing secret about it. The (C/NF) designation comes not from the source, but from the (amazingly banal) analysis that accompanies it, specifically the local US embassy&#8217;s view that it&#8217;s an escalation from Orban&#8217;s prior rhetoric.</p><p>Importantly, the IC&#8217;s source in this case is not fragile with respect to the leak. Orban will not mitigate his public speeches knowing that the US embassy is watching them. If anything, it probably encourages him. And he&#8217;s certainly not going to start doing his State of the Union speeches in secret.</p><p>A more complicated example is a document discussing circumstances under which Israel might take a more active role in helping Ukraine militarily. There is not obviously any direct source underlying this document, and it is marked &#8220;Exploratory Analysis&#8221;. It&#8217;s not reporting in response to a human source&#8217;s observations or some intercepted communication, but rather the output of informed brainstorming by IC analysts, almost certainly in response to a specific question posed by senior US officials. Israel might be unhappy with the IC thinking about this topic, and also upset that US seniors are asking questions about it. But there&#8217;s nothing <em>fragile</em> here. Israel can&#8217;t easily thwart the IC making such analysis in future because, to the extent that the reporting is based on any fragile sources at all, it does so extremely indirectly.</p><p>Political analysis can be embarrassing&#8212;sometimes acutely&#8212;but rarely degrade the IC&#8217;s capability over the long-term. The local ambassador, or, heaven forbid, the Secretary of State, might have to eat some humble pie and do an apology tour over it. But such is life. Everyone will move on quickly enough.</p><div><hr></div><h2>Foreign Intelligence Analysis:<br>Fragile and opaque longer-term damage</h2><p>The third group of leaks is the meat of the IC: <em><strong>foreign intelligence</strong></em>, derived from the IC&#8217;s non-public signals intelligence and human source-based collection activities. What the IC refers to as &#8220;sources and methods&#8221;.</p><p>The leaked documents have <em>dozens</em> of examples of end-product foreign intelligence reporting. It discusses foreign leaders and their interactions with or about US adversaries; foreign businesses flirting with or actively engaging in sanctions evasion; foreign businesses and leaders planning strategic re-alignments towards America&#8217;s adversaries; political and military decisions being made everywhere, from Africa, to Asia, to the Middle East, and even of allied governments from Israel, the UK, South Korea, and even Ukraine, along with accompanying assessments as to their likely success and significance to America&#8217;s medium and long-term interests.</p><p>Foreign intelligence leaks are not like the other types of leak in this archive. Battlefield intelligence leaks tends to have a very fast age-off rate. Political analysis rarely have lasting impact because their sources are non-fragile. But <em>foreign intelligence analysis</em> really does rely on fragile collection capabilities, and the tail of damage for these can be <em>both</em> locally acute <em>and </em>age-off slowly.</p><p>This point is, hopefully, fairly straightforward. If the IC&#8217;s human sources are killed, jailed, or have to be extracted from country, or if sources stop helping the US because it cannot protect their identities, the IC loses the visibility and insights that come from those sources&#8217; access. If influential people learn that they are being watched by American signals intelligence&#8212;not just in an etherial abstract sense, but the concrete knowledge that they <em>really are</em> targeted&#8212;they will become more paranoid and reorient their communications to use better secrecy. </p><p>To be fair, sometimes that reorientation will fail, and NSA will be able to get at their newly hidden information in some other way. But sometimes they will succeed, and NSA will just lose visibility of what those targets are doing. Worse, if the target knows not just <em>that </em>they are surveilled, but <em>how</em>, that reorientation away from NSA&#8217;s gaze is much more likely to be successful.</p><p>Unfortunately&#8212;and perhaps non-obviously&#8212;leaks can derail IC operations in ways that are rather unintuitive to a casual observer. A document that doesn&#8217;t explicitly name a source or method can nevertheless destroy it, and can cause harms in ways that are completely non-obvious to an ordinary reader.</p><p>A simple example of this, weirdly enough, is <a href="https://www.bellingcat.com/news/2023/04/09/from-discord-to-4chan-the-improbable-journey-of-a-us-defence-leak/">Bellingcat&#8217;s identification of Teixeira</a>. For a full week, thousands of people have seen some of these leaked photos and the objects in the background. Almost none will have noticed a tiny patch of granite lurking in the background. But this tiny fact was important to a tiny number of people with extensive backgrounds in online investigations, and even then, only because of the addition and context from other non-public sources discovered during their investigation. </p><p>In other words, just because <em>you</em> can&#8217;t see the significance of how something tiny in a photo can have massive repercussions doesn&#8217;t mean that experts with extensive experience and that little bit of extra context can&#8217;t.</p><p>That might all sounds a bit hypothetical. So let&#8217;s be concrete here. The documents reveal <em>at least</em> one human source to a specificity that means the IC will have had to intervene to protect them. For signals intelligence, picking it apart is even easier. It is fairly easy with this set of documents to identify a dozen specific NSA targets and the exact mechanism used to surveil them. Some of these targets won&#8217;t notice. Others will.</p><p>But why does it matter? Is the benefit of the disclosure worth the costs that they incur? That depends a lot on your priors and the specific information released and its value to the public discourse about what the government is doing. But beyond the human sources themselves for whom a sudden exposure can be life-threatening, the IC losing fragile accesses generally reduces the volume and quality of the IC&#8217;s reporting out to the US&#8217; principal decisionmakers. In isolated cases, that&#8217;s painful, but manageable. But as the IC&#8217;s reporting degrades to rely more on guesswork and second-order sources, it ultimately starts producing weaker analysis, and that, in turn, means more errors by policymakers&#8212;both in terms of volume and severity. It means more unhappy surprises for America as global events shift without warning, and fewer opportunities for America to mitigate them before they become a critical issue that is far more expensive in blood and gold to resolve. Those costs are real as they build up in the aggregate. </p><div><hr></div><p>Anyway, this post has gone on long enough, so I&#8217;ll just end with a thought experiment to ponder on. </p><p>Imagine a CIA officer walks into the Director&#8217;s office. &#8220;We&#8217;ve found a way to get the daily briefing for the Russian General Staff!&#8221; They say. &#8220;But, unfortunately, this op will be very expensive. To do it, we&#8217;ll need $ X&#8221;. Where is the tipping point where $ X grows large enough to flip from a &#8220;yes&#8221; to a &#8220;no&#8221;? </p><p>The real answer is probably eye-wateringly large. Just as we&#8217;d pay through the nose to see those documents because of the information they contain, our adversaries would dearly, dearly love to see these types of documents, and would unquestionably spend heavy resources to get them. </p><p>Ideally they shouldn&#8217;t just be able to log on to Discord to get them.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Putin's Christmas Truce was Designed to Fail]]></title><description><![CDATA[It's part his information war inside Russia and the West]]></description><link>https://www.pwnallthethings.com/p/putins-christmas-truce-was-designed</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/putins-christmas-truce-was-designed</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Thu, 05 Jan 2023 19:21:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rBsr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rBsr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rBsr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png 424w, https://substackcdn.com/image/fetch/$s_!rBsr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png 848w, https://substackcdn.com/image/fetch/$s_!rBsr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!rBsr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rBsr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5314957,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rBsr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png 424w, https://substackcdn.com/image/fetch/$s_!rBsr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png 848w, https://substackcdn.com/image/fetch/$s_!rBsr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!rBsr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02ea267b-5dec-4946-8bc8-469a2301239a_3072x2304.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>St Volodymyr's Cathedral, the mother cathedral of the Ukrainian Orthodox Church &#8211; Kyiv Patriarchate</em></figcaption></figure></div><p>Today, several Russian state news agencies <a href="https://www.nbcnews.com/news/world/putin-russia-ukraine-cease-fire-orthodox-christmas-rcna64421">reported</a> that Putin offered a 36-hour &#8220;truce&#8221; along the entire line of contact in Ukraine, starting at 12:00pm January 6th, running through midnight on January 7th, designed to cover the Orthodox Christmas period. Notionally, the offer was originally proposed by Russian Patriarch Kirill, and agreed by Putin. <a href="https://www.reuters.com/world/europe/russia-blames-its-soldiers-mobile-phone-use-deadly-missile-strike-2023-01-03/">Ukraine has already rejected it</a>.</p><p>The interesting thing about this offer is that it was <em>designed</em> to fail. There&#8217;s no indication that Moscow ever expected it to be accepted; including that it does not appear to address any non-MOD forces, and runs counter to logistical indications that Russia is preparing for additional bombardments of Ukraine during the Christmas period.</p><p>It also conspicuously offered now; it was not offered for New Years&#8217; or for December 25. The Russian government bombed civilian infrastructure in Ukraine relentlessly for both of those to maximize disruption. The decision to offer it only for Orthodox Christmas is quite relevant to why it was offered at all.</p><p>Sometimes in negotiations&#8212;often, in fact&#8212;people make offers not so much because they want an agreement, but because it is important to show non-parties to the agreement that an offer was made and it was rejected. This allows the offering party to argue that their &#8220;entirely reasonable&#8221; demands were rejected by the &#8220;unreasonable&#8221; opposite party, despite the offer being intentionally constructed to get to a &#8220;no&#8221;, not a &#8220;yes&#8221;.</p><p>That&#8217;s what happened here. Putin&#8217;s offer isn&#8217;t really directed at Ukraine. It&#8217;s directed at two main audiences: an internal Russian audience, and a Western one.</p><p>The internal audience is the Russian public as a whole. A failed truce gives their propaganda two &#8220;helpful&#8221; strands to play with. The first is an argument that Russian government bombing of Ukraine isn&#8217;t really Russia&#8217;s fault, but somehow Ukraine&#8217;s. Any civilian casualties during Russia&#8217;s expected bombardment of Ukraine over the next few days will be grossly and instantly rationalized and justified&#8212;no matter how irrational and unjustifiable&#8212;as Ukraine &#8220;deserving it&#8221; for refusing the truce.</p><p>It&#8217;s important to remember that these arguments aren&#8217;t&#8212;and aren&#8217;t designed to be&#8212;coherent. Their purpose is to let people pre-inclined to believe it a simple way to self-rationalize their decision to support Russia&#8217;s war.</p><p>The second strand is a cynical excuse to draw on the Russian Orthodox establishment itself over the Christmas as a tool of propaganda and morale internally too, and to align it (again) explicitly to the Russian war. Putin&#8217;s failed truce lets them argue his religious piety and desire for peace in churches in Russia while he simultaneously bombs schools and apartments in Ukraine, and that Orthodox Christmas was unpeaceful because of Ukrainian leadership&#8217;s refusal of the truce, not because of Russian leadership&#8217;s decision to invade and continue operations during the period.</p><p>It also lets them use the dueling Christmas dates in Ukraine to argue that Kyiv&#8217;s decision to avoid the truce is uniquely anti-Orthodox, for a convenient repivot to why Putin, and not Ukraine, is the one who truly cares about the interests of the &#8220;Russian-speaking Christians&#8221; in the ostensibly-annexed regions of Eastern Ukraine, and why support of Putin&#8217;s war is the right approach for all Orthodox adherents in churches across Russia.</p><p>The Western-directed narrative is also important, and draws on the same two strands, but with a slightly more Western-orientation. Here, the argument will be that Zelensky was offered, but is not interested in peace, as an argument for reducing Western support to Ukraine. That will probably also draw on distorted comparisons with the famous &#8220;World War I Christmas Truce&#8221; that has, in recent decades, come to take on an over-sentimentalized and saccharin status in Western narratives of what that war and event <em>was</em>. For example, it will ignore how that truce was an emergent phenomenon from the trenches directed by soldiers in the trenches themselves <em>despite</em> military leadership, not <em>directed by </em>leadership. </p><p>It also makes for a convenient way to slot-in to pre-existing &#8220;war on Christmas&#8221; / &#8220;war on Christians&#8221; culture-war tropes in the United States and certain parts of Europe too, as a way of ultimately seeking to demoralize support in the West. Such narratives will inevitably ignore Russia&#8217;s bombing of Ukraine over the western Christmas period without even the pretense of a truce being offered. But again, such arguments are not designed to be coherent.</p><p>As is the nature of traps, Ukraine cannot avoid this trap by simply agreeing to the truce. Were they to do so, Russian forces would immediately break it in order to invite a response, whereupon Russia would then immediately declare the truce violated by Ukraine. Ukraine&#8217;s best bet&#8212;which to their credit, they appear to already have adopted&#8212;is to ignore it for the propaganda it is.</p><p>That all said, Russian propaganda to demoralize Western support is slowly getting louder, and at some point Ukraine and its allies will need to reckon with it directly.</p><p>But that, at least, is a problem that will have to wait until after Christmas.</p><div><hr></div><p><em>If you enjoyed this post, feel free to share with others!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMDg4NTI4NDgsInBvc3RfaWQiOjg5NDU0ODg2LCJpYXQiOjE2NzE0ODQ5NzQsImV4cCI6MTY3NDA3Njk3NCwiaXNzIjoicHViLTExNjMxMjEiLCJzdWIiOiJwb3N0LXJlYWN0aW9uIn0.5FFye-t-3LTz1phgYTWfumQQPAWkoPnbNWZTJ-VwplE&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMDg4NTI4NDgsInBvc3RfaWQiOjg5NDU0ODg2LCJpYXQiOjE2NzE0ODQ5NzQsImV4cCI6MTY3NDA3Njk3NCwiaXNzIjoicHViLTExNjMxMjEiLCJzdWIiOiJwb3N0LXJlYWN0aW9uIn0.5FFye-t-3LTz1phgYTWfumQQPAWkoPnbNWZTJ-VwplE"><span>Share</span></a></p><p><em>If you&#8217;d like to receive future articles directly to your email in-box, you can subscribe for free or become a paid subscriber to help support my work if you find it valuable</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.pwnallthethings.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[The House has No Members and the Bootstrapping of Power]]></title><description><![CDATA[Over at Dog Shirt Daily&#8212;the awfully named, but otherwise great daily publication by Ben Wittes&#8212;Ben has a really interesting question that he proceeds quickly to not answer: does the House have any Representatives?]]></description><link>https://www.pwnallthethings.com/p/the-house-has-no-members-and-the</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/the-house-has-no-members-and-the</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Wed, 04 Jan 2023 03:30:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!stZe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!stZe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!stZe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png 424w, https://substackcdn.com/image/fetch/$s_!stZe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png 848w, https://substackcdn.com/image/fetch/$s_!stZe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!stZe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!stZe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3590981,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!stZe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png 424w, https://substackcdn.com/image/fetch/$s_!stZe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png 848w, https://substackcdn.com/image/fetch/$s_!stZe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!stZe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F323808a9-4d5e-4959-8c5b-c732354f0837_3072x2304.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Storms gather behind the Congress</figcaption></figure></div><p>Over at <em><a href="https://substack.com/inbox/post/94526027">Dog Shirt Daily</a></em>&#8212;the awfully named, but otherwise great daily publication by Ben Wittes&#8212;Ben has a really interesting question that he proceeds quickly to not answer: <em>does the House have any Representatives?</em></p><p>The motivation for his question is this post by Adam Kinzinger</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/AdamKinzinger/status/1610397522907877378?s=20&amp;t=Yvmi_UQVTMFnImfcqFDTdA&quot;,&quot;full_text&quot;:&quot;Am I still a congressman since the new ones haven&#8217;t been sworn in?!?! \n\n<span class=\&quot;tweet-fake-link\&quot;>#cantquit</span>&quot;,&quot;username&quot;:&quot;AdamKinzinger&quot;,&quot;name&quot;:&quot;Adam Kinzinger #fella&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Tue Jan 03 22:07:43 +0000 2023&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:2736,&quot;like_count&quot;:43430,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:false}" data-component-name="Twitter2ToDOM"></div><p>It might not be a crazy question, but it turns out to be a simple one. The 20th Amendment of the Constitution solves it decisively. As of Tuesday at noon, Mr Kinzinger is, well, <em>Mr </em>Kinzinger, and not Representative Kinzinger anymore:</p><blockquote><p>The terms of the President and Vice President shall end at noon on the 20th day of January, and the terms of Senators and Representatives at noon on the 3d day of January, of the years in which such terms would have ended if this article had not been ratified; and the terms of their successors shall then begin.</p></blockquote><p>But Ben goes on to ask a better question in the wake of it. If there&#8217;s no Representatives from the previous Congress, and there&#8217;s not (yet) any sworn-in Representatives from the <em>new </em>Congress, then by what authority is anyone in that chamber even electing a Speaker in the first place?</p><p>That&#8217;s a <em>great </em>question. Although admittedly the right answer is probably &#8220;who cares, it doesn&#8217;t matter, eventually they&#8217;ll work it out&#8221;.</p><p>But to me, at least, it&#8217;s a fun question to work through.</p><p>As it happens, bootstrapping authorities and power-transfer ceremonies are <em>fascinating</em> to me<em>. </em>They&#8217;re just really weird. That&#8217;s because what they are <em>for</em> and how they work are very subtly different.</p><p>In one sense, these ceremonies are mostly just a purely ceremonial hand-over of power from one collection of individuals to another. It&#8217;s really that simple. Under normal circumstances they&#8217;re a boring and mostly pompous show designed to pretend that the transfer of power is something more abstract and ethereal than one collection of individuals agreeing that another collection are in power now in accordance with the basic agreement of democracy that voters, and not violence, gets to decide what the agenda is for the next few years.</p><p>But in formalizing that hand-over, we always end up with a multi-step process that encodes a weird gap. At one point in the process, the previous set of people in power lose power. A few steps later the next set of people notionally take power. But between these two steps is a really weird gap where nobody is actually in charge. Usually nothing interesting happens in that gap. But the gap is fascinating because if something goes wrong during it, it&#8217;s usually a colossal mess to clean up. That&#8217;s because you don&#8217;t really know whether that job rightly belongs to the <em>previous </em>people or the <em>next </em>people, and in most cases, the gap is likely to be problematic only in the case where frictions between those two groups is already large.</p><p>It&#8217;s worth pointing out that this problem isn&#8217;t unique to the House of Representatives. It&#8217;s true of all non-continuing bodies (and all unitary bodies such as heads of state or government). So it also exists for the President too, as well as for Governors, many state chambers, and many countries&#8217; executive and legislative branches around the world too. Each have their own weird formalizations of this process. </p><p>I&#8217;m admittedly biased here, but one of my favorite examples of the Power Gap is in the UK. There, the transfer of power after an election involves the previous Prime Minister tendering his or her resignation to the monarch, followed by the next Prime Minister being invited to form a government. That leads to a wonderfully bizarre gap in the UK where the (traditionally nearly powerless) monarch notionally has <em>all</em> of the executive power for half an hour or so, and spends most of that time waiting in their gilded living room eating cucumber sandwiches and hoping that the incoming PM could just hurry it up and get a move on so they can get on with their normal kingly day. </p><p>But what we&#8217;re talking about here is the Power Gap as it relates to the House of Representatives. The previous representatives were all auto-fired by the 20th Amendment, and the next collection of newly elected Representatives are not actually Representatives yet because none of them have actually taken their oaths of office. They&#8217;ve been avoiding that so far because tradition dictates that they pick a Speaker first. The oath being a hard requirement for transitioning from a Representative-elect to a full member comes directly from Article IV:</p><blockquote><p>The Senators and Representatives before mentioned, and the Members of the several State Legislatures and all executive and judicial Officers, both of the United States and of the several States, shall be bound by Oath or Affirmation, to support this Constitution; but no religious Test shall ever be required as a Qualification to any Office or public Trust under the United States.</p></blockquote><p>In other words, it really is the case that, for the first time in at least a hundred years, the day has ended with the House having <em>zero </em>sitting members.</p><p>Before getting to Ben&#8217;s question of under what authority the Representative-elects have to attend Congress and pick a Speaker, it&#8217;s worth pointing out an additional oddity of the House of Representatives. Unlike the Senate, which is a continuing body, the House Rules also expire with each Congress.</p><p>What that means is not only does the House have no members; it has no Rules either. It&#8217;s a sort of lawless Power Gap vacuum where anything would go, if only there were someone with the power to do anything in it.</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/joshchafetz/status/1610392788729823234&quot;,&quot;full_text&quot;:&quot;Every year my Legislation students roll their eyes when I try to explain why it matters that House rules expire and new Houses convene under general parliamentary law ... &quot;,&quot;username&quot;:&quot;joshchafetz&quot;,&quot;name&quot;:&quot;Josh Chafetz&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Tue Jan 03 21:48:55 +0000 2023&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{&quot;full_text&quot;:&quot;Adjournment is one of the very few options on the table for members to off-ramp endless roll call votes. \n\nThey can't hit pause &#9208;&#65039; with a recess subject to the call of the chair or anything like that because that requires the House Rules to be enacted first. https://t.co/8HcTKwIkEd&quot;,&quot;username&quot;:&quot;ktullymcmanus&quot;,&quot;name&quot;:&quot;K Tully-McManus&quot;},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:8,&quot;like_count&quot;:43,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>So what happens when the House has no Rules? The answer is we look first to the Constitution itself, and then to general parliamentary law, as described in the applicable provisions of Jefferson's Manual. These rules are ultra-basic rules of underlying democratic principles of debate that long-predate the Constitution (and Jefferson). I&#8217;ll lose lots of friends for pointing it out, but Jefferson&#8217;s Manual is actually a fantastic example in its own right of America&#8217;s constitution that don&#8217;t sit in the main body of the Constitution itself, in a way that Britain embraces and America likes to pretend isn&#8217;t the case.</p><p>But glossing quickly over that, these rules do such ultra-basic things as provide for the Clerk of the House to Chair debate in the chamber until a Speaker is selected; for debate to occur at all; and for certain motions (such as a motion to adjourn) to be passed; for the yays and nays to be counted; and for basically everything else to fall to a ruling by the Chair which can be appealed by the full body. It&#8217;s essentially just the bare minimum to get the House into a position where it can vote to select a Speaker and adopt some Rules that let it get started on the more heavyweight work of actual legislative business, like establishing committees, or scheduling bills.</p><p>But even a House with some basic rules needs some members. Which gets us back to Ben&#8217;s question. Under what authority do Representative-elects even vote on a Speaker?</p><p>Here there&#8217;s basically three ways to rationalize this. Two are about divining an <em>inherent </em>right in the Constitution for Representative-elects to vote on a Speaker, and the other is a process argument about timing. Let&#8217;s go through them.</p><p>The first classical argument comes from Deschler's Precedents Volume 1 Chapter 2 &#8212; specifically Footnote 13 on Page 89:</p><blockquote><p>Although no constitutional provision uses the term &#8220;Member-elect&#8221; or &#8220;Representative-elect&#8221;, the Constitution impliedly empowers Members-elect to vote for a Speaker (under art. I, Sec. 2, clause 5, the House chooses a Speaker before the House is sworn), and to demand the yeas and nays (art. I, Sec. 5, clause 3), and uses the term &#8220;Representatives&#8221; when referring to Members not yet sworn (see art. I, Sec. 6, clause 2 and art. VI, clause 3). Some sections of the United States          Code similarly use the term &#8220;Members&#8221; when obviously referring to Member-elect. See 2 USC Sec. 25 (administration to Speaker of oath by &#8220;Member&#8221;); 2 USC Sec. 27 (changing the place of meeting before Congress convenes, to protect the health of &#8220;Members&#8221;). See also 2 USC Sec. 21 (administration of oath to &#8220;Senators&#8221;).</p></blockquote><p>As Deschler would have it, the Speaker is chosen before Representative-elects take their oaths, and the Constitution requires that the House pick its own Speaker. That must mean, according to Deschler, that the Constitution <em>must</em> imply that Representative-elects have inherent authority by raw force of election to select their Speaker <em>prior </em>to becoming a full Representative.</p><p>Far be it for me to disagree with this approach, but I&#8217;ve always found this particular line of reasoning to be a bit dubious. After all, while it&#8217;s true that the Constitution requires Representative-elects to take their Oath before becoming Representatives, and it&#8217;s true that the House of Representatives must select their Speaker, it&#8217;s not at all obvious to me that the Constitution requires Representatives to select their Speaker <em>before</em> taking their oaths. By switching the order round (take the oath, then select the Speaker) you avoid the whole mess.</p><p>It&#8217;s true that, by tradition, the Speaker&#8217;s oath is administered first and the Speaker then administers the oath to other members. But this is just tradition. There&#8217;s no Constitutional reason why the person administering the oath needs any kind of special status at all. The Representative-elects could simply administer these oaths to each other. After all, the Speaker in <em>every </em>Congress has their oath administered to them by a Representative-elect, and in early House practice, Representative-elects had their oaths administered by their respective State delegations, not by the Speaker.</p><p>A better way to get to the same argument, at least in my view, is to use Article I Section 5, clause 1:</p><blockquote><p>Each House shall be the Judge of the Elections, Returns and Qualifications of its own Members, and a Majority of each shall constitute a Quorum to do Business; but a smaller Number may adjourn from day to day, and may be authorized to compel the Attendance of absent Members, in such Manner, and under such Penalties as each House may provide.</p></blockquote><p>Here, this argument relies on the House being judge of the returns of its own members. For the Senate, this poses no problem: the sitting Senators can judge the returns of the Senator-elects with no issue. But for the House this leads to a catch-22 situation. How can anyone judge the validity of an incoming Representative&#8217;s election if there are no Representatives yet to judge it? And if all of them are elected without such judging, then what is the point of the clause? You can&#8217;t even do it iteratively, because then the first person to take the oath has nobody able to judge it, and the Constitution expressly strips anyone other than the House from making the judgement.</p><p>It therefore makes sense to conclude that the House doing the judging of returns in Article I Section 5 must be a House made up of Representative-<em>elects</em>, and not Representatives. By extension, if the Constitution envisages that Representative-elects are the House in Article I Section 5 for <em>returns</em>, then perhaps they are also the House in Article I Section 2 for choosing a Speaker too.</p><p>At least to me, this seems like a stronger form of Deschler's argument, though I am certainly no Deschler. Even here you could perhaps argue that the Constitution could be read (despite common practice) to allow the <em>previous </em>Congress to judge the returns of the incoming Congress prior to leaving office, to avoid the implication. There&#8217;s a bunch of reasons why I think that&#8217;s an more problematic argument than it falling to the <em>incoming</em> group of Representatives. But I include it for the sake of argument because it means even here the implied right of Representative-elects to pick a Speaker prior to taking their oath of office isn&#8217;t automatic. There are other ways to read the clause.</p><p>But to me, the strongest alternative take is that the Representative-elects&#8217; choice to pick a speaker is really an informal vote that is formalized by the adoption of the House Rules once everyone&#8217;s oaths are taken, thus avoiding the temporal gap. In other words, the order of operations is:</p><ol><li><p>Representatives choose who their Speaker will be, and this process gets the pomp that <em>implies</em> but does not <em>actually entail</em> a binding vote.</p></li><li><p>The winner of the informal vote takes their oath</p></li><li><p>The other members are sworn in by that first member, and themselves become full members</p></li><li><p>The members then vote on the Rules, which are adopted, and <em>this</em> formalizes the selection of the Speaker (and the Rules).</p></li></ol><p>Which one of these three arguments you prefer is up to you. It doesn&#8217;t really matter, because, in real life, the power of the Representative-elects to pick a Speaker comes from the more arcane and normative feature of the Power Gap itself: they are Representatives by force of election, and no technicality of ordering in the pomp of the transfer will deny it to them, since the order of events at the start of the Congress are, in reality, mostly ceremonial.</p><p>Luckily for the Representative-elects, there&#8217;s not a lot of practical difference between being a Representative-elect and a Representative until the Speaker is selected anyway. Representative-elects mostly obtain the same powers and privileges of their full counterparts, including the protection of the Speech and Debate clause, compensation, office space, and expenses. </p><p>It&#8217;s true that they cannot vote on or introduce legislation, but until there is a Speaker they can&#8217;t do that anyway. In fact, the only obvious difference is that the payment of their salaries might be delayed if the situation is not resolved prior to the end of the month. So if it&#8217;s resolved in less than a month, they won&#8217;t notice the difference.</p><p>And, let&#8217;s be real, if it takes more than a month, they&#8217;ve got a much bigger problem to deal with anyway.</p><div><hr></div><p><em>If you enjoyed this post, feel free to share with others!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMDg4NTI4NDgsInBvc3RfaWQiOjg5NDU0ODg2LCJpYXQiOjE2NzE0ODQ5NzQsImV4cCI6MTY3NDA3Njk3NCwiaXNzIjoicHViLTExNjMxMjEiLCJzdWIiOiJwb3N0LXJlYWN0aW9uIn0.5FFye-t-3LTz1phgYTWfumQQPAWkoPnbNWZTJ-VwplE&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMDg4NTI4NDgsInBvc3RfaWQiOjg5NDU0ODg2LCJpYXQiOjE2NzE0ODQ5NzQsImV4cCI6MTY3NDA3Njk3NCwiaXNzIjoicHViLTExNjMxMjEiLCJzdWIiOiJwb3N0LXJlYWN0aW9uIn0.5FFye-t-3LTz1phgYTWfumQQPAWkoPnbNWZTJ-VwplE"><span>Share</span></a></p><p><em>If you&#8217;d like to receive future articles directly to your email in-box, you can subscribe for free or become a paid subscriber to help support my work if you find it valuable</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.pwnallthethings.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Jan 6 Congressional referrals: what are they, and what does it mean?]]></title><description><![CDATA[The referrals don't compel DOJ to act. But they don't have to.]]></description><link>https://www.pwnallthethings.com/p/jan-6-congressional-referrals-what</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/jan-6-congressional-referrals-what</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Mon, 19 Dec 2022 21:23:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!a978!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a978!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a978!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png 424w, https://substackcdn.com/image/fetch/$s_!a978!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png 848w, https://substackcdn.com/image/fetch/$s_!a978!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!a978!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a978!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3590981,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a978!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png 424w, https://substackcdn.com/image/fetch/$s_!a978!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png 848w, https://substackcdn.com/image/fetch/$s_!a978!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!a978!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4b0f1a25-60a9-4359-9df0-c94cbe7454b9_3072x2304.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The January 6th Committee has finally ended its investigation. The executive summary of the report can be found <a href="https://s3.documentcloud.org/documents/23466439/j6-executive-summary.pdf">here</a>. It has made referrals to the DOJ for criminal prosecution of Donald Trump, and his key allies, including John Eastman, Rudy Giuliani, Jeffrey Clark, Kenneth Chesebro, and Mark Meadows.</p><p>Four Members are also referred to the House Ethics Committee for failure to respond to committee subpoenas. These members are House Minority Leader Kevin McCarthy, Jim Jordan, Scott Perry, and Andy Biggs.</p><p>So what are the criminal referrals, and what do they mean?</p><p>First, the specific referrals are for five statutory violations:</p><ul><li><p>(1) 18 USC 1512(c) for Obstruction of an Official Proceeding</p></li><li><p>(2) 18 USC 371 for Conspiracy to Defraud the United States</p></li><li><p>(3) 18 USC 1001 for Conspiracy to Make False Statements</p></li><li><p>(4) 18 USC 2383 for Incitement, Assistance, or providing Aid or Comfort to an Insurrection</p></li><li><p>(5) 18 U.S.C. 2384 for Seditious Conspiracy</p></li></ul><p>The first of these is a referral for Trump, Eastman, and others for &#8220;Obstruction of an Official Proceeding&#8221;&#8212;namely, the 12th Amendment&#8217;s Electoral College Vote Count process in Congress itself on January 6th. The allegation is that the &#8220;sole purpose and obvious effect&#8221; of Trump&#8217;s scheme was to &#8220;obstruct, influence and impede&#8221; the official proceeding of the Electoral College count in Congress which certified Joe Biden to become the President.</p><p>The second referral is for Trump, Eastman, and others for &#8220;Conspiracy to Defraud the United States&#8221;. Be a bit careful with this one: the name can be a bit deceptive. It&#8217;s not a reference to money fraud in the traditional sense that most people understand it, but rather, it&#8217;s an allegation that the scheme involved an agreement to impair, obstruct, or defeat the lawful functions of the United States government by deceitful or dishonest means.</p><p>The third referral is for Trump, Eastman, and others for &#8220;Conspiracy to Make a False Statement&#8221;. This statute&#8212;18 USC 1001&#8212;is routinely used against people who lie to government investigators during law-enforcement or congressional investigations. Michael Flynn, for example, eventually pled guilty to one of these charges for lying to FBI investigators during their investigation of him. Here it&#8217;s being used a bit differently. The referral is alleging that Trump, Eastman, and others materially misled Congress through its scheme to appoint an alternative set of &#8220;fake electors&#8221; and send their uncertified votes to the electoral college.</p><p>The report also alleges cases of witness tampering. One, for example, is an allegation that witnesses were promised amazing job offers from opaquely-funded organizations that were ultimately controlled by Trump and his associates in exchange for &#8220;failing to remember&#8221; in response to certain questions by the committee. The committee alleges that the witnesses who didn&#8217;t take that bribe found those job offers rescinded.</p><p>These first three referrals are all relatively straightforward, as congressional referrals to DOJ go. But the final two are super interesting. So before we get to that, and to understand <em>why</em>, we need to first understand the slightly strange world of criminal referrals from Congress.</p><p>In the US constitutional structure, Congress and the Executive Branch have different duties. Criminal prosecutions occur exclusively in the Executive Branch, overseen by DOJ, and not by Congress. Congress does, however, have an independent role to play performing its own investigations. Those investigations are done for a <em>legislative</em> purpose or an <em>impeachment</em> purpose, not for criminal investigative purposes. But if, in the course of their investigation, Congress (as a whole, or as a committee) discovers something it thinks DOJ should be aware of, it can make a criminal referral directly to DOJ. </p><p>DOJ is not obliged to do anything with these referrals, other than to write a letter in response.</p><p>Often, criminal referrals to DOJ are performative grandstanding. DOJ generally is better resourced and has better powers to obtain evidence than Congress when investigating crimes, and most Congressional committees operate publicly, so anything they uncover is usually known by DOJ long before the referral is made. It&#8217;s rare for Congress to know of a crime that DOJ doesn&#8217;t, and Congress has different priorities to DOJ. DOJ&#8217;s job is to get a conviction; Congress&#8217; job is usually more about base politics. And so there is some considerable tension between the two branches when it comes to criminal referrals. After all, Congress weighing in on criminal cases can undermine DOJ&#8217;s ability to keep the eventual case from looking like it has partisan motivation.</p><p>But not all criminal referrals are useless or grandstanding: DOJ will generally not prosecute crimes <em>relating to Congress</em> without a referral from Congress itself, as a deferential matter. The most obvious example is 18 USC 1001 cases involving a witness lying to Congress, or cases involving disruption of Congressional proceedings.</p><p>In the case of the January 6th Committee, the first three referrals all fall into this category of cases that DOJ would normally want a congressional referral prior to opening a full investigation. </p><p>But the last two referrals are not like the others. It&#8217;s different in two key ways.</p><p>The first way it&#8217;s different is that these referrals relate to Trump only. The other three refer to Trump, Eastman, and others. The second way it&#8217;s different is that it&#8217;s not a crime specifically related to Congress. It&#8217;s doing something different.</p><p>The fourth referral is for &#8220;Inciting, Assisting or providing Aid and Comfort to an Insurrection&#8221;. Here, the committee alleges that Trump&#8217;s actions&#8212;and inactions&#8212;during January 6 amount to providing aid and comfort to the rioters at the Capitol, despite the absence of an explicit agreement; relying instead on his statements to various aides, and his otherwise inexplicable actions and inactions during the course of the riot.</p><p>The fifth referral is &#8220;Other Conspiracy Statutes&#8221;, but explicitly calls out the seditious conspiracy statute 18 USC 2384 and 18 USC 372. The committee notes in their summary that the leader of the Oath Keepers was convicted under this statute. The committee says it believes Mark Meadows could have specific evidence relating to such charges but could not obtain them due to Meadows&#8217; refusal to testify.</p><p>But the insurrection referral is the most interesting of all of these. It&#8217;s not really about DOJ or criminal charges&#8212;although I don&#8217;t doubt for a second that the committee would be very happy for DOJ to charge it. Rather, it&#8217;s all about the 14th Amendment, and Section 3 disqualification. The relevant section is below:</p><blockquote><p>No person shall be a Senator or Representative in Congress, or elector of President and Vice President, or hold any office, civil or military, under the United States, or under any state, who, having previously taken an oath, as a member of Congress, or as an officer of the United States, or as a member of any state legislature, or as an executive or judicial officer of any state, to support the Constitution of the United States, shall have engaged in insurrection or rebellion against the same, or given aid or comfort to the enemies thereof. But Congress may by a vote of two-thirds of each House, remove such disability.</p></blockquote><p>Parsing that out concretely has fallen to the courts, <a href="https://www.lawfareblog.com/14th-amendments-disqualification-provision-and-events-jan-6">as Ben Wittes describes in </a><em><a href="https://www.lawfareblog.com/14th-amendments-disqualification-provision-and-events-jan-6">Lawfare</a></em>. In particular, unlike <em>impeachment</em>, where permanent removal from office falls exclusively to the Senate to decide, Section 3 disability is decided by the Courts; it is not something that Congress merely declares. </p><p>But this is a problem too. Section 3 disability cases don&#8217;t involve Congress directly; Congress will not be one of the litigants in the case. So, while the judge will take into account Congress&#8217; view, it won&#8217;t affirmatively seek it out either. If Congress wants to make its view known (specifically that January 6th was an insurrection within the meaning of the 14th Amendment, and laying out its reasons why), it needs to publish that <em>now</em>.</p><p>That&#8217;s what this insurrection referral <em>is</em>. </p><p>Without this, it would be possible for a judge to take the January 6th report and conclude that while the House concluded that insurrection <em>occurred</em> at the Capitol, they didn&#8217;t decisively conclude that Donald Trump <em>was himself an insurrectionist</em> within the meaning of the 14th Amendment. This referral guards against that. It shows decisively that, in the view of the House of Representatives, Trump was involved in the insurrection personally, and then sets out their body of evidence as to why they concluded it.</p><p>Of course, the judge is not obliged to abide by Congress&#8217; view. But it adds significant weight to that eventual Section 3 dispute.</p><p>So that&#8217;s what the referrals are doing. </p><p>The first three are congressionally-related crimes that DOJ would normally not charge without a congressional referral. Those apply to Trump, Eastman, and others. </p><p>The seditious conspiracy referral is a bit different; it&#8217;s really tossing the open investigation over the fence to DOJ, now that the committee knows it will be disbanded when the next Congress is sworn in.</p><p>But the insurrection charge is different. It&#8217;s addressed to DOJ, but it&#8217;s really for the judge in an eventual Section 3 disability case; it&#8217;s setting out the committee&#8217;s view and assembling a body of work that the judge can use to declare Donald Trump unable to hold any office under the United States by virtue of him instigating an insurrection at the Capitol, and is therefore disqualified under the 14th Amendment.</p><p>Beyond that, the January 6th Committee has avoided the temptation to refer other criminal cases to DOJ that DOJ is able to conduct and investigate themselves.</p><p>That&#8217;s a good thing. After all, <a href="https://www.nytimes.com/2022/11/21/podcasts/the-daily/special-counsel-trump-garland.html">DOJ were already doing that anyway</a>.</p><div><hr></div><p>If you enjoyed this post, feel free to share with others!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMDg4NTI4NDgsInBvc3RfaWQiOjg5NDU0ODg2LCJpYXQiOjE2NzE0ODQ5NzQsImV4cCI6MTY3NDA3Njk3NCwiaXNzIjoicHViLTExNjMxMjEiLCJzdWIiOiJwb3N0LXJlYWN0aW9uIn0.5FFye-t-3LTz1phgYTWfumQQPAWkoPnbNWZTJ-VwplE&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMDg4NTI4NDgsInBvc3RfaWQiOjg5NDU0ODg2LCJpYXQiOjE2NzE0ODQ5NzQsImV4cCI6MTY3NDA3Njk3NCwiaXNzIjoicHViLTExNjMxMjEiLCJzdWIiOiJwb3N0LXJlYWN0aW9uIn0.5FFye-t-3LTz1phgYTWfumQQPAWkoPnbNWZTJ-VwplE"><span>Share</span></a></p><p>If you&#8217;d like to receive future articles directly to your email in-box, you can subscribe for free or become a paid subscriber to help support my work if you find it valuable</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.pwnallthethings.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Bonus post: Tracking the Peace Terms]]></title><description><![CDATA[In a post earlier this week, I laid out why a peace agreement between Russia and Ukraine was very unlikely in the near-term; they disagree too fundamentally on the terms of the peace agreement, and are both holding out expecting an negotiating advantage later based on their respective views on their medium and long-term battlefield prospects.]]></description><link>https://www.pwnallthethings.com/p/bonus-post-tracking-the-peace-terms</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/bonus-post-tracking-the-peace-terms</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Sat, 10 Dec 2022 01:29:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/h_600,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VgIc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VgIc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VgIc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VgIc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VgIc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VgIc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg" width="800" height="600" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;File:IMO welcomes maritime humanitarian corridor in Black Sea (52233881214).jpg&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="File:IMO welcomes maritime humanitarian corridor in Black Sea (52233881214).jpg" title="File:IMO welcomes maritime humanitarian corridor in Black Sea (52233881214).jpg" srcset="https://substackcdn.com/image/fetch/$s_!VgIc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VgIc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VgIc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VgIc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6810d66-74c0-4de1-8a63-6fa1ae7bcfe3_800x600.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The signing of an agreement between, the Russian Federation, Turkey, Ukraine and the United Nations to establish a humanitarian maritime corridor in the Black Sea as part of the Grain Deal. Photo credit: International Maritime Organization</figcaption></figure></div><p>In a post earlier this week, <a href="https://substack.com/inbox/post/89040167">I laid out why a peace agreement between Russia and Ukraine was very unlikely in the near-term</a>; they disagree too fundamentally on the <em>terms </em>of the peace agreement, and are both holding out expecting an negotiating advantage later based on their respective views on their medium and long-term battlefield prospects.</p><p>This post looks to answer a slightly different question: <em>what are those terms</em>?</p><p>The purpose of this post really two-fold: </p><ul><li><p>as a memorialization of the evolution of these negotiations so far as best as I can reverse-engineer them from public sources, starting at the beginning of the conflict, and how those terms have evolved on the two sides. </p></li><li><p>as a reference for future negotiations, when they eventually materialize</p></li></ul><p>It&#8217;s also partly a response to Peskov&#8217;s statements today:</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/TheStudyofWar/status/1601044360002703360&quot;,&quot;full_text&quot;:&quot;5/ Peskov, however, reiterated that the Kremlin is still pursuing its &#8220;demilitarization&#8221; and &#8220;denazification&#8221; objectives in Ukraine, which confirms that Russia is still pursuing regime change and the elimination of Ukraine&#8217;s ability to resist future Russian attacks or pressure.&quot;,&quot;username&quot;:&quot;TheStudyofWar&quot;,&quot;name&quot;:&quot;ISW&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Fri Dec 09 02:41:36 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:16,&quot;like_count&quot;:136,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:false}" data-component-name="Twitter2ToDOM"></div><p>These two phrases <em>demilitarization </em>and <em>denazification</em> have specific meaning in the context of Russia&#8217;s demands, and interpreting their precise meaning requires a bit of work to keep close track of the negotiations over time.</p><p>Note that because negotiations are generally conducted in secret, many of these are based on my interpretation of public statements by key figures and after-the-fact reporting; the formal drafts are not public.</p>
      <p>
          <a href="https://www.pwnallthethings.com/p/bonus-post-tracking-the-peace-terms">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[No, Tech Companies and Cybersecurity Firms Aren't Close to Becoming Direct Participants in the Conflict by Helping Ukraine]]></title><description><![CDATA[And it's not particularly close. But here's what the Laws of Armed Conflict have to say about it.]]></description><link>https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Fri, 09 Dec 2022 02:57:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gIxG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gIxG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gIxG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gIxG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gIxG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gIxG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gIxG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg" width="728" height="484.5" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:969,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gIxG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gIxG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gIxG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gIxG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F57ef9676-93d1-4cbb-be2a-dd16b2485cc3_2000x1331.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Photo: U.S. Air Force Staff Sgt. Jalah Patten (left) shows members of the Ukrainian armed forces a tower simulator system during a visit to Germany in 2021. <a href="https://www.mildenhall.af.mil/News/Photos/igphoto/2002830589/mediaid/5469396/">Photo credit</a>: Senior Airman John R. Wright</em></figcaption></figure></div><div><hr></div><p>Over at <em><a href="https://zetter.substack.com/p/security-firms-aiding-ukraine-during">Zero Day</a></em>, the fantastic cybersecurity journalist Kim Zetter has a great article with a warning: cybersecurity firms working to help Ukraine need to be careful if they want to avoid being direct participants in the war in Ukraine.</p><p>It&#8217;s a great article because it serves as a useful reminder: International law applies to individuals and organizations, not just states, and that getting involved in a war without real care and attention can be problematic in all sorts of unexpected ways.</p><p>The natural question that arises for executives and individuals working in Western companies reading Zetter&#8217;s article will probably be: <em>am I at risk of being a participant in the conflict?</em></p><p>The correct answer to this question, of course, is &#8220;I am not your<em> </em>lawyer; hire someone who is, and then take their advice&#8221;. </p><p>But with that caveat aside, the answer is almost certainly <em>no</em>. </p><p>The unhappy news is that <em>not</em> being a direct participant probably does less for you than you might think. For example, it doesn&#8217;t provide immunity against Russian government reprisals against you or your company in a whole variety of different forms, ranging from Russian sanctions, Russian domestic criminal liability, or Russian cyberattacks against your own firm. </p><p>It also doesn&#8217;t prevent Russia simply ignoring IHL and attacking your buildings and employees anyway. In practice, Russia is more likely to be constrained by its own practical limitations and the international consequences of doing so than by the IHL consequences; it has a pretty poor record of respecting civilian protected status so far in its war in Ukraine.</p><p>But that all said, it&#8217;s a great excuse for a discussion on what it actually means to be a <em>direct participant in hostilities</em>, and why it&#8217;s very unlikely that you&#8217;ll become one by accident through your ordinary work at a US technology or cybersecurity vendor, even if you are helping Ukraine.</p><p>While we&#8217;re at it, we can also have a little discussion about why even if someone in the US tips over that line, it&#8217;s not going to drag the US (or any other country) into a direct hot war with Russia too.</p><div><hr></div><h2>Direct participation in hostilities</h2><p>First of all, what is &#8220;direct participation in hostilities&#8221; all about? It&#8217;s a term that is derived from the <em>principle of distinction&#8212;</em>a central notion under International Humanitarian Law (IHL). As the <a href="https://casebook.icrc.org/glossary/direct-participation-hostilities">ICRC explains</a>: </p><blockquote><p>In international humanitarian law the concept of &#8220;direct participation in hostilities&#8221; refers to conduct which, if carried out by a civilian, suspends his protection against the dangers arising from military operations. Most notably, for the duration of his direct participation in hostilities, a civilian may be directly attacked as if he were a combatant.</p></blockquote><p>The <em>principle of distinction</em> requires that military forces at war only directly target the armed forces of the opposing side. Direct attacks on civilian people or objects are prohibited. But this is not a blanket rule; there are exceptions. If a civilian becomes a <em>direct participant in the hostilities</em>, they may be freely targeted as if they belonged to the military and the opposing side may purposely directly target and kill them as part of the war.</p><p>Parsing out when those protections are suspended is not always clear cut&#8212;IHL evolves over time out of a variety of principles, texts, prior cases, and formal and informal agreements between states&#8212;but the <a href="https://casebook.icrc.org/glossary/direct-participation-hostilities">ICRC </a>has you covered with the basics: To qualify as being a direct participant in hostilities, the individual must generally be engaged in specific acts that meet all three of the following criteria:</p><ol><li><p>The act must be likely to adversely affect the military operations or military capacity of a party to an armed conflict or, alternatively, to inflict death, injury, or destruction on persons or objects protected against direct attack (threshold of harm);</p></li><li><p>There must be a direct causal link between the act and the harm likely to result either from that act, or from a coordinated military operation of which that act constitutes an integral part (direct causation); and</p></li><li><p>The act must be specifically designed to directly cause the required threshold of harm in support of a party to the conflict and to the detriment of another (belligerent nexus).</p></li></ol><p>In other words, civilians, whether Ukrainian or foreign, are at risk of losing their IHL civilian protected status and could be directly targeted as if they were the Ukrainian military if they do something that meets all of these three criteria. For most cybersecurity firms working in Ukraine, <em>all three</em> will not be met, and meeting all three by accident is vanishingly unlikely.</p><h2>The &#8220;threshold of harm&#8221; test</h2><p>It&#8217;s tempting when looking at the three tests to come up with scenarios where a cybersecurity firm might trip over the line and qualify. For example, a cybersecurity company catches Russian malware deployed by the Russian military, and then patches it in order to stop them. This self-evidently harms Russian military capability by stopping the hack; it does so directly; and you&#8217;re doing this to help Ukraine. So does that make you a direct participant in the hostilities?</p><p>No.</p><p>The key thing about the &#8220;degrading military capacity&#8221; test here is the &#8220;threshold of harm&#8221; test. Importantly it&#8217;s not <em>any </em>harm, it&#8217;s harm meeting or exceeding that threshold.</p><p>So what is the threshold? Let&#8217;s take a look:</p><blockquote><p>For a specific act to qualify as direct participation in hostilities, the harm likely to result from it must attain a certain threshold. This threshold can be reached either by causing harm of a specifically military nature or by inflicting death, injury, or destruction on persons or objects protected against direct attack</p></blockquote><p>Note the two key phrases here. To reach the threshold of harm<em>, </em>your company would need to be doing something that either:</p><ul><li><p>Causes harm of a specifically military nature</p></li><li><p>Inflicts death, injury or destruction on persons or objects</p></li></ul><p>Most cybersecurity firms will not be particularly close to this threshold on either count. Virtually all ordinary defensive cybersecurity work will not get close. Providing network security equipment or end-point security software for Ukrainian networks&#8212;even military networks&#8212;doesn&#8217;t get you there.</p><p>This might be obvious, but I&#8217;ll call it out anyway: failing to <em>assist</em> Russia doesn&#8217;t count as a harm either. As the ICRC notes:</p><blockquote><p>It the same time, the conduct of a civilian cannot be interpreted as adversely affecting the military operations or military capacity of a party to the conflict simply because it fails to positively affect them. Thus, the refusal of a civilian to collaborate with a party to the conflict as an informant, scout or lookout would not reach the required threshold of harm regardless of the motivations underlying the refusal.</p></blockquote><p>In other words, rejecting Russian clients in favor of Ukrainian ones does not come close to meeting this threshold. If your company <em>could</em> materially help Russia, but chooses not to, you are not causing a harm within this &#8220;threshold of harms&#8221; definition. It&#8217;s not a requirement that civilians be neutral in the conflict, and having Ukrainian customers but not Russian ones doesn&#8217;t jeopardize your IHL civilian status.</p><p>So if most cybersecurity company actions don&#8217;t get close to meeting this threshold, what circumstances could? Here&#8217;s a few:</p><ul><li><p>Wiretapping (passively, or through hacking) Russian military communications</p></li><li><p>Transmitting targeting coordinates to the Ukrainian military for use in strikes</p></li><li><p>Certain forms of CNE against Russian networks if they are of a &#8220;military nature&#8221;, for example, by directly degrading military logistics, command and control, or causing kinetic effects that are designed to inflict death, injury, or destruction on persons or objects.</p></li></ul><p>Be careful here: even most computer network exploitation (CNE) does not automatically meet this threshold:</p><blockquote><p>Acts that neither cause harm of a military nature nor inflict death, injury, or destruction on protected persons or objects cannot be equated with the use of means or methods of &#8220;warfare&#8221; or, respectively, of &#8220;injuring the enemy&#8221;, as would be required for a qualification as hostilities. For example, [&#8230;] the manipulation of computer networks, [&#8230;] may have a serious impact on public security, health, and commerce, and may even be prohibited under IHL. However, they would not, in the absence of adverse military effects, cause the kind and degree of harm required to qualify as direct participation in hostilities.</p></blockquote><p>For most tech companies and cybersecurity firms, the question of whether they meet this threshold isn&#8217;t a close call: they&#8217;re not. </p><p>Organizations and individuals that are closer to the line would be those closely involved in analyzing the on-the-ground military operations, such as satellite imagery firms and some OSINT providers that track the physical war closely, or when engaging in CNA or CNE type activities. As an example that probably <em>did </em>cross this line, the Belarusian hacking group &#8220;<a href="https://en.wikipedia.org/wiki/Cyber_Partisans">Cyber Partisans</a>&#8221; probably exceeded this harms threshold when targeting Russian and Belarussian military rail logistics earlier in the year.</p><p>But for those organizations and individuals that get close to the line, meeting this threshold isn&#8217;t sufficient; this is only one of three tests. Instead, they&#8217;ll be looking to rely on the <em>direct causation </em>test.</p><h2>The &#8220;direct causation&#8221; test</h2><p>This test is relatively straightforward: there must be a <em>direct causal link</em> between the act and the harm in order to justify losing IHL civilian protected status, and moreover that harm must have been likely given the act.</p><p>This directness test is quite strict. Examples that don&#8217;t meet the directness test include the design, shipment, production, or repair of military equipment. Nor does financial support to Ukraine, or even financial or equipment support given directly to the Ukrainian military suffice.</p><p>Notice that this is an <em>additional</em> test to the earlier &#8220;harm&#8221; test. And it&#8217;s important to see how high the bar is to meet them. For example, American civilians working on, say, the design, construction, and logistics for delivering HIMARS to Ukraine easily meet the <em>harm</em> standard in the previous definition, but their support is too indirect to meet the <em>directness </em>standard; even those civilian defense contractors do not qualify as <em>direct participants </em>in the conflict.</p><p>So how direct do you have to be to meet this directness standard? The ICRC provides two concrete examples: a truck driver delivering ammunition supplies to the front-lines, or a voluntary human shield would both quality.</p><p>For most tech and cybersecurity companies&#8212;and most defense companies for that matter&#8212;in the West, this directness test isn&#8217;t a close call either. Plausibly a US company that themselves hacks Russian military communications; or which itself engages in CNE against Russian military networks or CNA; or which itself derives and transmits targeting coordinates directly to the Ukrainian military would qualify. But those that merely provide the capability to do it, but sell it to Ukraine for them to use themselves probably <em>don&#8217;t</em>.</p><p>If you&#8217;re doing any of that and you haven&#8217;t already found yourself a lawyer, then first of all <em>yikes</em>, and second of all go and do that immediately.</p><p>But most cybersecurity companies are not close to meeting this standard, and are certainly much further away from meeting it than, say, the US Department of Defense and its many large defense contractors who are providing high volumes of material support to Ukraine across the spectrum, and who have still avoided crossing this line.</p><h2>Belligerent Nexus Standard</h2><p>This final standard is used to recognize that it&#8217;s possible to meet the <em>harm</em> and <em>directness</em> standards, but nevertheless still be clearly distinguishable from a combatant in the war. This is what the belligerent nexus standard is for. This standard requires that the action has to be directly connected to the war itself&#8212;it must have a nexus to one of the principal belligerents.</p><p>A good example of this is <em>self-defense</em>. A civilian who defends themselves&#8212;even lethally&#8212;against rape, looting, or attempted murder by occupation forces does not become a combatant of the other side; it does not remove that civilian&#8217;s IHL protected status in the war, even if the act otherwise meets the directness and harm thresholds discussed earlier.</p><p>Another example is that a civilian does not lose their ordinary IHL civilian status by being involved in ordinary criminality, such as a shoot-out with police. This may cause direct harms against the occupation force, but if this is occurring <em>tangential</em> to the conflict, then it falls to domestic criminal law (or more likely, occupation martial law) to resolve the issue; the civilian does not automatically lose their IHL protected civilian status because of it.</p><p>For the purposes of technology, cybersecurity (and other defense) companies outside of Ukraine, this standard is probably the least interesting. Their support to Ukraine will fail to meet the direct participant standard on the other two metrics long before we reach this one. But it is included for completeness.</p><h2>What about handling Ukrainian military data?</h2><p>Where life gets a bit more complicated is&#8212;as Zetter rightly calls out in her article&#8212;when companies store and process Ukrainian military data on their behalf. For example, if the Ukrainian military upload military registration forms into Microsoft Azure or Amazon AWS to keep it safe from physical attacks in Ukraine. For example, as Zetter notes in her piece:</p><blockquote><p>Likewise, if any Ukrainian data transferred to Microsoft and Amazon cloud servers during the current war includes Ukrainian military data, that infrastructure and the data stored on it could be considered a legitimate military target and draw attack from Russia. And if cloud providers are hosting the data of other customers on the same infrastructure, they could be affected by such an attack too.</p></blockquote><p>Let&#8217;s take a look at this question, and also the separate risk that Zetter doesn&#8217;t call out but we should interrogate anyway&#8212;whether handling Ukrainian military data might come with <em>personal</em> risks beyond the infrastructure itself to the foreign contractors handling it.</p><p>The question of what this means for the tech company is a bit complicated, because we need to distinguish what it means for the US <em>employees</em>, the US <em>datacenter,</em> and the Ukrainian military <em>data. </em>They are all different entities here.</p><p>Of these, the status of the data itself is relatively simple: Russia targeting it for destruction is basically fair game; it is a military object, even if it is a virtual one.</p><p>For the US employees of AWS or Azure, the question of whether they become a direct participant in the hostilities by helping Ukraine to store the data requires us to go back to the three principles described earlier. At a bare minimum, their involvement would fail the <em>directness </em>test, if not the other two as well. The storage or processing of Ukrainian military data does not, by itself, make them a direct participant in hostilities.</p><p>But just because the datacenter engineers retain their IHL civilian status doesn&#8217;t necessarily mean handling this data is completely safe. After all, if the data is a military object, can Russia attack the US datacenter that houses it?</p><p>In theory, maybe. In practice, no.</p><p>Here, LOAC requires Russia perform three tests: <em>necessity</em>, <em>proportionality</em> and <em>distinction</em> to determine if it&#8217;s lawful to attack the datacenter. The last of these is our <em>principle of distinction</em>, but Russia&#8217;s real problem here would come from the proportionality test. Getting into these in detail is too much for this article, so I&#8217;ll leave it for now, other than to say I think it would be a high&#8212;but not impossible&#8212;bar to meet, and would be highly fact-dependent. If it <em>did </em>meet them, then yes, in principle, it could lawfully attack the datacenter, even if doing so caused civilian collateral harms.</p><p>But while that might be the theoretical answer, in real life Russia is not going to launch missiles against the United States. And it&#8217;s <em>certainly</em> not going to do it just to destroy an Amazon or Microsoft datacenter. So the civilians working in the datacenter can all heave a big sigh of relief on that front. Not only will they not lose their civilian protected status, but also they&#8217;re also very unlikely to end up as civilian collateral for doing their jobs safe inside the United States or Europe either.</p><p>Cyberattacks are a more serious concern. Russia would be technically obliged to do a LOAC analysis on these too, although I doubt they would in practice. But supposing they would, targeting the Ukrainian military&#8217;s user accounts on AWS in order to delete the data would likely be permissible. It&#8217;d be an obvious thing to target, and I can think of no particularly strong reasons why it would be illegitimate as a target for the Russian military&#8212;even if I hope they would fail at it. </p><p>Targeting Amazon more broadly with, say, wipers to disrupt Amazon&#8217;s users beyond the Ukrainian military&#8217;s own data, gets a lot more messy. That once again gets into a long and fact-dependent argument over proportionality, given the volume of civilian co-located data that&#8217;s there. That conversation is too long to have here, other than to say I think that would be a very high barrier to meet and would be very fact-dependent.</p><p>But the important thing in all of this is that while interacting with Ukrainian military data has all sorts of ways that it might make your <em>networks </em>and <em>computers</em> outside of Ukraine a valid target for cyberattacks, it would not, by itself, make the civilian employees of the company direct participants in the hostilities.</p><p>That&#8217;s a really good thing. Because otherwise it&#8217;d get really messy for the US.</p><h2>If a US company or individual becomes a direct participant, could it drag the United States into war?</h2><p>In theory, maybe, in practice no.</p><p>Companies that are playing very close to the line do need to be careful not to step into the armed conflict themselves for a whole bunch of self-interested reasons. If you&#8217;re providing direct support to Ukraine in the forms of arms or logistics (whether physical or software-based), or CNE/CNA against Russia and don&#8217;t already have a legal team then (a) wtf are you doing and (b) get on that immediately.</p><p>But if you become a direct participant in the conflict does that drag your country into war with Russia?</p><p>No.</p><p>As Zetter mentions over at <em>Zero Day</em>, companies becoming direct participants do cause neutrality problems for the countries in which they reside. Michael Schmitt explains in the article:</p><blockquote><p>&#8220;If [the U.S.] allows Microsoft to engage in activities that are assisting the Ukrainians, Microsoft doesn&#8217;t violate neutrality, it&#8217;s a violation of the United States by permitting its territory to be used in an un-neutral manner,&#8221; says Schmitt. &#8220;The Russians have a legal right under international law&#8230;to prevent that from occurring.&#8221;</p></blockquote><p>It&#8217;s true. Although to be clear: I don&#8217;t think Microsoft is anywhere remotely close to meeting the threshold here.</p><p>But as Schmitt rightly calls out in Zetter&#8217;s article, the United States&#8217; neutrality in the war is based, in part, on the United States ensuring that its territory is not used to harbor belligerents attacking Russia&#8217;s territory. Failure to do so undermines the United States&#8217; neutrality in the conflict.</p><p>On this point, however, we need to be a bit careful in two regards. Firstly, the United States&#8217; neutrality is not <em>automatically</em> undermined just because a direct participant in hostilities attacks another country from inside of it. The United States can act to stop the ongoing attacks against Russia from its territory to maintain its neutrality. For example, Russia could alert the United States of the ongoing attacks coming from within the US, and the US could intervene to stop them through its own domestic criminal law powers. Those laws are purposely designed to ensure that the United States retains that capacity.</p><p>Only if the United States <em>failed</em> to do so&#8212;either because it was unwilling or unable&#8212;would Russia be able to credibly make the claim that the United States is no longer neutral in the conflict. </p><p>But again, this is not automatic. It would give Russia the <em>option</em> to cite it as a LOAC justification to declare war against the United States. But it certainly does not <em>oblige </em>Russia to declare war on the United States over it.</p><p>Direct hot war between Russia and the United States is extraordinarily unlikely. Both have gone to enormous lengths to avoid it. And while it&#8217;s true that events in war are complex and fast, and have an annoying habit of making fools out of predictors, at least on this, I think it&#8217;s a safe bet: The United States and Russia aren&#8217;t going to be &#8220;dragged&#8221; into war against their will by anyone or anything. And <em>definitely</em> not because a US cybersecurity or tech company just got out over their skis.</p><div><hr></div><p>If you enjoyed this post, feel free to share with others!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.pwnallthethings.com/p/no-tech-companies-and-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>If you&#8217;d like to receive future articles directly to your email in-box, you can subscribe for free or become a paid subscriber to help support my work if you find it valuable</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.pwnallthethings.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><em>Update: the piece has been updated to be more clear that Zetter did not write that foreign employees handling Ukrainian military data could become direct participants in the conflict; this article explores that possibility separately, not in response to Zetter&#8217;s article.</em></p>]]></content:encoded></item><item><title><![CDATA[The war will end with Diplomacy. But here's why it won't be soon.]]></title><description><![CDATA[Peace in this war isn't close. And premature calls for diplomacy push it further away. Instead, the West needs to provide credible public commitments to arm Ukraine, and long-term support to get peace]]></description><link>https://www.pwnallthethings.com/p/the-war-will-end-with-diplomacy-but</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/the-war-will-end-with-diplomacy-but</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Wed, 07 Dec 2022 23:21:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bg9q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bg9q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bg9q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png 424w, https://substackcdn.com/image/fetch/$s_!bg9q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png 848w, https://substackcdn.com/image/fetch/$s_!bg9q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png 1272w, https://substackcdn.com/image/fetch/$s_!bg9q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bg9q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2926048,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bg9q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png 424w, https://substackcdn.com/image/fetch/$s_!bg9q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png 848w, https://substackcdn.com/image/fetch/$s_!bg9q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png 1272w, https://substackcdn.com/image/fetch/$s_!bg9q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F152437fe-5e5c-462a-bc7a-2119eff2d0b2_3648x2736.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Photo: the Ukrainian Ministry of Foreign Affairs, still working late at night</em></figcaption></figure></div><p>You really don&#8217;t have to go far these days to hear a &#8220;helpful&#8221; tautology about the Russian war in Ukraine: all wars end in diplomacy. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>It&#8217;s a true, but banal statement by itself. But this statement is usually deployed to imply (or explicitly call for) something stronger: Ukraine&#8212;either on its own initiative, or with the United States and Europe twisting its arm&#8212;should urgently seek a ceasefire with Russia. Amazingly, this formulation sometimes even argues that the lack of visible diplomatic efforts by Ukraine or the United States to obtain said ceasefire is itself belligerent.</p><p>Alas, such views are getting louder, not quieter, and are increasingly escaping the political fringes. You can find it echoed across the entire Western hemisphere; not just from political elements on the American left and the right, but even from <a href="https://www.bbc.com/news/world-europe-63838215">senior voices</a> such as <a href="https://www.wsj.com/livecoverage/wsj-ceo-council-2022/card/gen-mark-milley-sees-time-for-potential-ukraine-peace-talks-drawing-closer-cRasVOOviatkoy0zIdlM">General Milley</a>, the Chairman of the US Joint Chiefs of Staff, as well as increasingly across Europe, including <a href="https://www.euractiv.com/section/global-europe/opinion/the-brief-macrons-diplomatic-plight/">from</a> <a href="https://www.nytimes.com/2022/12/04/world/europe/macron-security-guarantees-russia.html">senior</a> <a href="https://ukranews.com/en/news/898382-zelenskyy-discusses-with-scholz-implementation-of-ukraine-s-proposed-peace-formula">politicians</a> and diplomats there.</p><p>The problem with this line of reasoning is three-fold:</p><ol><li><p>It creates a false dichotomy between diplomacy and war. Put simply, modern war is fought about the <em>terms </em>of the peace, not for its own sake, and not all peace terms are equal or tolerable. Modern war might end with diplomats agreeing the terms, but those terms are a reflection of the battlefield reality, not vice-versa.</p></li><li><p>It gets the basic facts wrong: there&#8217;s a great deal of diplomacy occurring day-to-day involving thousands of diplomats from virtually all countries, including Ukraine, Russia, the United States, and Europe, as well as neutral countries&#8212;and most of that effort is on securing favorable terms in the eventual peace agreement, and offsetting the respective costs of the war for themselves and their allies in the interim.</p></li><li><p>The conditions for war-termination are nowhere near close; and moreover will not get close soon. A stable peace is almost certainly not achievable in the short-term under any plausible scenarios.</p></li></ol><p>These three observations lead us, ultimately, to two counterintuitive conclusions:</p><ol><li><p>Premature calls for negotiations have the counter-intuitive effect of making stable peace in the medium-term <em>slower</em> rather than faster.</p></li><li><p>Serious peace negotiations will be available only once Russia&#8217;s medium-term plan is concretely discredited (or is successful). That places a lower-bound on when serious peace negotiations will be available, unless Ukraine and the West credibly shows that (a) Russia&#8217;s medium-term build-up will be decisively defeated by Ukraine once deployed, and that (b) the West will not abandon Ukraine through the medium-to-long term. Critically, &#8220;<em>credibly show&#8221;</em> is much more than merely &#8220;<em>say&#8221;</em>. It requires concrete medium and long-term actions that are visible and credible in Moscow.</p></li></ol><p>Let&#8217;s expand on those each in turn.</p><div><hr></div><p>The root of the problem in the &#8220;diplomacy harder&#8221; narrative comes from the belief that war and peace are opposite binaries, which leads to the impression that all forms of peace are equivalent.</p><p>Under that mistaken assumption, it&#8217;s easy to get confused why Ukraine doesn&#8217;t seek a ceasefire immediately. After all, if all wars end in diplomacy, and diplomacy is all about concessions, then surely they might as well do some concessions to get some peace now, rather than keep the war going and do some concessions to get some peace later?</p><p>To understand why this is so abjectly wrong, it&#8217;s first important to dismantle the simplistic and wrong belief that anyone serious is <em>pro</em>-war. Nobody&#8212;at least outside of the criminally insane&#8212;wants war for its own sake. Wars are terrible. For everyone. They consume vast resources. They have unfathomable costs in terms of blood; gold; infrastructure; generational traumas; lost investments; partitioned markets; and long-term costs of physical and mental disability and care costs for victims and their families. </p><p>Those costs are obviously greatest for Ukraine, and they deserve the most sympathy in this conflict. But it&#8217;s important to remember that, while self-inflicted, the costs to Russia are large and real too. And not just them; countries outside of the geographic borders of the conflict have enormous the costs that affect the economic wellbeing of the United States, Europe, China, the Global South, and everyone else in between.</p><p>This might come as a controversial statement, but it&#8217;s true and important nonetheless&#8212;so bear with me. <em>Nobody serious wants war</em>. Not even Putin. Putin isn&#8217;t having a war with Ukraine out of some abstract love of war for its own sake. He wants peace too. The thing is that he wants peace <em>on his terms</em>.</p><p>Ukraine and its allies fight back too not out of some pro-war sentiment, but because of what those terms <em>mean</em>. Living under constant bombardment is an all-encompassing nightmare, felt viscerally by everyone in Ukraine&#8212;from towns and villages near the frontlines in the East, in Kyiv itself, right through to places far in Western Ukraine. Everyone suffers from it. And there isn&#8217;t a soldier, or civilian, or general, or politician in the whole of Ukraine or the West who wouldn&#8217;t rather it all just went went away.</p><p>But living in a country at war is not the only way to experience violence and a life of terror. Yes, in some trivial sense, Ukraine could end the war tomorrow. It could submit an unconditional surrender and be rapidly subordinated by Russia. That would be peace in an extremely trite sense: the air-raid sirens would go quiet. The explosions in the distance would stop. But the <em>terms </em>of that peace would be more terrible than the war, at least to most Ukrainians.</p><p>To Westerners who have only ever known peace in stable democratic countries this concept can be admittedly hard to fathom. So, to help, let me give you an extreme example as a reference point. Imagine being teleported into a prison camp in North Korea&#8212;not as an American or European prisoner where you know your home country is reliably fighting for your release, but as a North Korean prisoner, abandoned to your fate. </p><p>In that camp you would have, in some extremely trivial sense, a &#8220;peaceful&#8221; life. You would hear no air-raid sirens. No missile strikes would hit your camp. But it would not be a tolerable existence, nor one free of terror and violence. Moreover, you can imagine that the knowledge that nobody is fighting to come and liberate you might make you feel <em>worse</em> about your condition; the &#8220;peace&#8221; would serve only to defeat any hope you might have of future liberation or freedom from your fate.</p><p>The reason this is important is that peace is not a simple binary concept, and modern wars are fought over the <em>terms </em>of the peace that comes afterwards. So yes, it is true in some trivial sense that all wars end in diplomacy. But it&#8217;s not a useful or insightful statement in its own right. Everyone wants peace; to argue otherwise is to fight a strawman.</p><p>The question is&#8212;and has always been&#8212;peace <em>on what</em> <em>terms</em>.</p><div><hr></div><p>The second problem with the &#8220;diplomacy harder&#8221; narrative is it gets the basic facts wrong: there&#8217;s a great deal of diplomacy occurring day-to-day with a view to ending the war as quickly as possible and mitigating its harms in the meantime. This diplomacy involves literally thousands of diplomats from across the globe, including diplomats from Ukraine, Russia, the United States, and Europe. </p><p>That diplomacy might not be in the <em>form </em>you expect&#8212;but that doesn&#8217;t mean diplomats are not working flat-out to secure that eventual peace and mitigate the harms in the meantime.</p><p>The diplomacy comes in a variety of forms&#8212;from alliance management in NATO and the EU; brokering access to NGOs like the ICRC, UN, and IAEA to dangerous regions; shepherding votes through multilateral organizations like the UN; managing cases in international criminal justice organizations; arms shipments; prisoner exchanges; financial and humanitarian aid; the Grain Deal and access to shipping in the Black Sea; implementing and managing sanctions; refugee flow management; permanent and interim deals to offset energy crises; private articulation of red-lines to avoid non-conventional escalation&#8212;you name it. There&#8217;s no shortage of diplomacy taking place, and all of it&#8217;s about ending the war sooner, and reducing harms in the meantime so that support for Ukraine can continue into the medium-term.</p><p>This might not be diplomacy in the form of drafting a peace agreement, but that&#8217;s only because the conditions for war-termination are not yet available nor negotiable; not because diplomats are sitting on their hands. When a sustainable peace becomes an option, diplomats will absolutely seize it; if anything, fighting between themselves to be gain credit for helping achieve that eventual historic moment.</p><div><hr></div><p>The third problem with the &#8220;diplomacy harder&#8221; narrative is that it makes a dangerous mistake about the basic circumstances under which war termination conditions occur, both in the general case and in this specific war.</p><p>The obstacle to a stable peace between Russia and Ukraine lies in their currently-opposite views about their respective prospects over the long-term. Ukraine has had several undeniable recent successes on the battlefield, and sees these as likely to continue into both the medium and long-term.</p><p>By contrast, Russia is convinced that its recent losses are temporary; that it will turn the tide over the medium-term; and that it will eventually come to dominate Ukraine over the long-term. </p><p>Importantly, it doesn&#8217;t matter which one <em>you</em>&#8212;or any expert&#8212;think is correct. What matters is that both Russia and Ukrainian leadership currently see a viable path to their respective maximalist visions of their own successes: Ukraine believes it can and will liberate its territory back to its internationally-recognized borders; Russia still believes it can and will fully subordinate Ukraine.</p><p>Objectively one (or both) of them is wrong. But whichever it is, this question will not be resolved through debate or negotiation by diplomats in a conference room. It will instead have to be resolved in reality. And that means finding out who is right through soldiers fighting on the battlefield.</p><p>This point might sound obvious, but countries are generally uninterested in negotiating peace terms when they think they are just on the cusp of a breakthrough success on the battlefield. That&#8217;s because they think the breakthrough will permit more favorable terms if the peace is settled later rather than negotiating for terms right now. So if you&#8217;re wondering why Ukraine is pushing back on the idea of peace negotiations, and why Russia is not pushing hard for them either yet, this is why.</p><p>That&#8217;s a problem for anyone expecting an imminent stable peace agreement. Not to put too fine a point on it, but stable peace will not be achievable until one or the other sees its vision of the future crash on the rocks of the battlefield reality.</p><p>It is helpful at this point to try and understand <em>why </em>Russia believes it will win in the long-term from their perspective. It&#8217;s more than mere denialism or a lack of quality information being transmitted to Russian leadership&#8212;although both probably also play a role. Rather, Russia&#8217;s sincere belief in its eventual success comes down to two central pillars: First, a belief in its ability to reconstitute its force in the medium-term, and secondly a belief that the West will abandon Ukraine in the medium-to-long term.</p><p>On the first of these, Russia&#8217;s force reconstitution efforts are via a range of measures, including (at least) the mobilization of its own population; rebuilding its long-range precision munition capacity through Iranian and domestic drone production and repurposing cruise missiles from its own enormous strategic nuclear force; recovery, acquisition, and repurchase of ammunition and equipment from long-term storage and from and countries like North Korea; the subordination of the Belarusian armed forces under Russian military command to threaten or actually invade Ukraine; the potential mobilization of Belarus too; through co-opting prisoner and conscript soldiers into long-term military service; and from large-scale industrial mobilization to build additional munitions.</p><p>These efforts may or may not be successful. But be careful: what matters for the prospects of Russian ceasefire negotiations here is not what <em>you </em>or some group of western military experts believe to be the case. What matters is that Russian leadership sincerely believes<em> </em>it. At least at the moment.</p><p>The second pillar of Russian strategy relies on the sincere belief that Ukraine&#8217;s allies will abandon it out of a combination of apathy, domestic cost-aversion, and eventual dwindling or ending of military support to Ukraine. Russia believes that it can manage domestic unease and economic costs far longer than the West can, and that Western support will eventually dissipate. Moreover, they believe that their own diplomatic and propaganda efforts will accelerate this process in the West. In Russia&#8217;s view, as Western support dwindles, Ukraine&#8217;s military successes will begin to unwind, and they will then be able to overpower Ukraine.</p><p>Again, it doesn&#8217;t matter if <em>you </em>believe this will happen. It matters that <em>they</em> believe it.</p><p>Once you see that these are the two key pillars of the current Russian strategy, it enables you to spot two conclusions; both perhaps a little unintuitive.</p><p>The first conclusion is that neither Russia nor Ukraine is interested in negotiating a long-term stable peace at the moment. But Russia <em>is </em>interested in a short-term one. Their plans are based in the medium and long-term, and a short-term ceasefire would aid them substantially in the period before those medium-term plans deliver. It would stem their battlefield losses while their force-reconstitution efforts continue, and allow them to resume the conflict later under more favorable conditions to them. This gives them enormous incentives to pretend to be interested in a long-term peace agreement, while ensuring that if any such peace-agreement does occur, that it is easily sabotaged so they can continue the war when they are ready.</p><p>For the same reason, <a href="https://www.telegraph.co.uk/world-news/2022/11/15/ukraine-one-holding-peace-deal-macron-scholz-know-says-sergei/">Russia is also incentivized to play the victim of &#8220;Ukrainian and US belligerence&#8221;</a>; promoting propaganda in public and private that a peace-deal would be available, <a href="https://www.aa.com.tr/en/politics/moscow-has-no-preconditions-for-peace-talks-with-ukraine-senior-diplomat/2732648">if only Ukrainians and the United States would allow it</a>. If the West were to fall for this propaganda and twist Ukraine&#8217;s arm into a peace deal, Russia would absolutely sign one. But it would be temporary&#8212;a few weeks or months at best&#8212;and come at a cost to Ukraine by denying them the ability to press their current advantage. Instead, Ukraine would be forced to resume the conflict later when Russia breaks the ceasefire, but on Russian terms with a reconstituted force, not on their own terms against a depleted force now.</p><p>The second conclusion is equally counterintuitive: that premature calls for negotiation reinforces the belief in Moscow that Western support is already atrophying, and that Ukraine&#8217;s allies are already scrambling for an exit. That has the (ironic) effect of helping Putin make the case internally that with a bit more patience, Russia will be able to resume the fight at full force, enabling them to reverse recent Ukrainian gains, and push onwards to a full subjugation of Ukraine in the long-term.</p><p>In other words, premature calls for negotiation make Russia <em>more </em>confident in their strategy to defeat Ukraine, which in turn makes a stable peace agreement <em>less </em>likely, not more.</p><div><hr></div><p>Unfortunately, the Russian war in Ukraine will not end until the Russian plan meets reality&#8212;either through success in subjugating Ukraine, or through failure on the battlefield. If it fails, Russia will then have two options: to change strategy, or to get serious about a long-term peace-agreement with its neighbor.</p><p>What that means in practice is that Ukraine&#8217;s allies looking for a long-term stable peace between Ukraine and Russia need to target those two pillars of the Russian strategy head-on, in order to speed-up the realization in Moscow that it won&#8217;t work. In other words, the West needs to support Ukraine at a level that will defeat Russia&#8217;s ability to overwhelm it through force-reconstitution, and to provide visible and credible commitments that the West is willing to support Ukraine through the long-term too.</p><p>It&#8217;s tempting to think that&#8217;s basically &#8220;more of the same&#8221; of what we&#8217;re already doing. </p><p>It&#8217;s not.</p><p>The Western strategy needs to demonstrate <em>long-term </em>commitments, as opposed to its current strategy of providing necessary&#8212;but also ad-hoc and short-term&#8212;tranches of equipment and materiel support every few months. It means not just providing more equipment and ammunition, but also visibly and loudly increasing the <em>capacity</em> to produce equipment over the long-term too. </p><p>To put that another way, the West needs to perform credible commitments about it support in the long-term of this war. That is, thinking not just about support in early 2023, but about what support in 2024 and 2025 look like too, and pre-committing for it.</p><p>It also means spending less time&#8212;<a href="https://www.express.co.uk/news/world/1704419/germany-Olaf-Scholz-peace-russia-ukraine-war-vladimir-Putin">particularly in Germany</a> and elsewhere in Europe&#8212;projecting the hope that the war will end soon and all the ways life will get back to normal once it does, and instead spend more time on long-term commitment planning for Ukraine. As a specific concrete example of this, the EU can and should set up a permanent group to plan out and begin the long-term process for Ukraine&#8217;s eventual EU-integration, thereby demonstrating a long-term commitment by the EU to Ukraine&#8217;s future; and a future outside of Russian subordination.</p><p>In America, it also means thinking through the hard questions about what happens when Ukraine gets close to its internationally-recognized borders, where cutting off Russian supply lines will require Ukraine to begin systematically and regularly attacking positions inside Russia <em>proper</em> to secure them, as well as industrial planning to ensure that supplies including ammunition do not run low in the medium and long-term. In other words, demonstrating&#8212;and not just saying&#8212;that the US is thinking about the long-term future of this conflict, and demonstrating that Russia&#8217;s two strategies will fail.</p><p>Ironically, the more the West provides credible commitments to Ukraine&#8217;s military success, the less likely it is that those commitments will turn out to be necessary. That&#8217;s because loudly signaling that Western support will be there for the long-term, will make it harder for Moscow to stick with its current strategy. </p><p>If the West can <em>credibly demonstrate</em> that this strategy will fail, Moscow will have to pivot to a new strategy, or come to the negotiating table. But if it does not&#8212;or if the West once again fools itself into thinking that forceful words are the same as credible commitments&#8212;then Moscow will not believe them, and instead test its strategy on the battlefield&#8212;a substantial and avoidable cost to Ukraine and its Western supporters compared with showing the strategy as likely to fail through visible commitments.</p><p>Either way, only once that strategy fails will Russia be forced to come up with a new approach or to come back to the negotiating table to look for a stable peace agreement. Once it does, Ukrainian diplomats, with the assistance of diplomats across the world, will have an opportunity to negotiate for a long-term peace agreement with Russia and achieve a peace that lasts.</p><p>But until then, the tautology that &#8220;all wars end with diplomacy&#8221; isn&#8217;t helping anyone get there.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Russia is spying on Telegram chats in occupied Ukrainian regions. Here's how.]]></title><description><![CDATA[Thanks to a Ukrainian in occupied Kherson, we now know how Russian occupiers are using Telegram to surveil Ukrainians &#8212; and how dangerous its design flaws are.]]></description><link>https://www.pwnallthethings.com/p/russia-is-spying-on-telegram-chats</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/russia-is-spying-on-telegram-chats</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Fri, 02 Dec 2022 23:21:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/h_600,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last month, <a href="https://www.washingtonpost.com/world/2022/11/18/kherson-resistance-partisans-russia-occupation/">a story broke in the Washington Post</a> about &#8220;stay behind&#8221; operations by Ukraine in then-occupied Kherson. The story discusses Ihor, a Ukrainian in Kherson, who was in communication with a Ukrainian special forces officer in Ukrainian-controlled Mykolaiv called &#8220;Smoke&#8221;. Ihor, with help from Smoke, helped perform sabotage and espionage operations behind enemy lines.</p><p>At one point, Ihor was captured and tortured by Russian occupation forces for 11 days. Russia eventually released Ihor, but tried to use him to capture other partisans in the area. To do this, they instructed him to provide screenshots of all of his further interactions with Smoke, under threat of death if he didn&#8217;t comply. Thanks to some ingenuity and prior planning, Ihor was able to secretly tip-off Smoke to defeat this Russian plan, and survived to tell the tale after Kherson was later liberated by Ukrainian forces.</p><p>Ihor&#8217;s story&#8212;and the stories of others like him&#8212;is one of extraordinary bravery in extremely dangerous conditions. But his interview with the Washington Post reveals something more: it reveals that Russia was actively surveilling Telegram chats as part of their counterinsurgency operations in occupied Ukraine. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.pwnallthethings.com/subscribe?"><span>Subscribe now</span></a></p><p>Telegram&#8217;s security has long been called into question by the information security community. There&#8217;s lots of aspects of how it is built that don&#8217;t make sense from a security perspective. But so far, there&#8217;s never been any good evidence that it&#8217;s been exploited by the Russian security services in practice.</p><p>Until now.</p><p>Ihor&#8217;s story is particularly amazing because it doesn&#8217;t just reveal <em>that </em>Russian forces are surveilling Telegram chats. It also gives us a good hint as to <em>how</em>.</p><p>It even tells us what Russia <em>wasn&#8217;t </em>doing&#8212;at least in the narrow case of Ihor. And it reveals how at least one other major and well-known security defect in Telegram&#8212;ones that have been left open <em>on purpose</em> by Telegram&#8212;would very likely have led to Ihor&#8217;s death if Russian occupation forces had been only slightly more competent and successfully exploited them.</p><p>There&#8217;s no evidence here that Telegram knew or helped Russia exploit any of these defects. But that doesn&#8217;t let Telegram off the hook either. The two defects that Russia didn&#8217;t exploit&#8212;but which would have led to Ihor&#8217;s death had the Russian forces chosen to use them&#8212;are both well known to Telegram; they&#8217;ve been described before, and Telegram has inexplicably and intentionally chosen not to fix them. </p><p>All three of these defects exist in Telegram only because of its steadfast refusal to adopt or correct their application&#8217;s security&#8212;a big contrast to virtually every other mainstream encrypted chat app.</p><p>If you take away just one thing from this post, let it be this: Telegram is not safe to use as a chat or call app. It nearly cost Ihor his life. Ukrainians&#8212;and frankly everyone else too&#8212;should find another encrypted application for chats and calls. A good choice would be something like WhatsApp, but Apple&#8217;s iMessage or Signal are also good choices if your contacts are also using those.</p><p>So without further ado, here&#8217;s the story of Telegram, its dangerous lack of security, and how the Russians were exploiting it in occupied Kherson.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X-T7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X-T7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg 424w, https://substackcdn.com/image/fetch/$s_!X-T7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg 848w, https://substackcdn.com/image/fetch/$s_!X-T7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!X-T7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X-T7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg" width="1000" height="592" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:592,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!X-T7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg 424w, https://substackcdn.com/image/fetch/$s_!X-T7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg 848w, https://substackcdn.com/image/fetch/$s_!X-T7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!X-T7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F77936a09-f055-40fb-886d-6d074270dac7_1000x592.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Telegram: a quick history and primer</strong></h3><p>Telegram is a major social networking and communications app that is extremely popular in Eastern Europe, including in both Russia and Ukraine. Before the war, more than 80% of all smartphones in Ukraine had it installed, and it has <a href="https://www.businessofapps.com/data/telegram-statistics/">over 550 million monthly active users worldwide</a>.</p><p>Telegram&#8217;s founder is the Russian-born billionaire Pavel Durov, who made his name founding <em>Vkontakte</em>&#8212;essentially a Russian Facebook. He founded Telegram in Russia in 2013, just a year before being forced out from <em>Vkontakte</em> by people he described as &#8220;Putin&#8217;s cronies&#8221;. According to him, that departure was caused by his refusal to hand over Vkontakte&#8217;s data about Ukrainian protestors during the 2014 Euromaidan. Durov later left Russia and now lives in Dubai and holds UAE citizenship, where Telegram is now based.</p><p>Telegram has had run-ins with the Russian government on several occasions. In 2018, Telegram was blocked in Russia for two years. When <a href="https://interfax.com/newsroom/top-stories/69083/">Roskomnadzor</a>&#8212;the Russian media regulator&#8212;<a href="https://interfax.com/newsroom/top-stories/69083/">announced that Telegram would be unblocked in Russia</a>, it referenced an agreement with Telegram&#8217;s founder to cooperate with Russian authorities, although did not provide specifics:</p><blockquote><p>We positively assess the readiness of the Telegram founder to counter terrorism and extremism. With the consent of the Russian Prosecutor General's Office, Roskomnadzor is withdrawing the requirement that access to the Telegram messenger service be blocked.</p></blockquote><p>This year Telegram had another close call with the regulator. On October 29, Telegram&#8217;s website interface was briefly <a href="https://meduza.io/en/news/2022/10/30/roskomnadzor-blocks-telegram-domain-t-me">blocked</a> again, though the ban was <a href="https://tass.com/society/1529661">lifted</a> shortly afterwards.</p><p>Telegram&#8217;s popularity comes from its duality as both a chat and an information broadcast medium. In its &#8220;broadcast&#8221; mode, where it operates conceptually a little like Twitter, users subscribe to &#8220;channels&#8221; to receive messages blasted out by the channel owner. The range of channels is large. You can subscribe to Russian, Ukrainian, or other official channels, as well as news sites, military groups, open-source intelligence aggregators, influencers, companies, and so on. This feature has been a lifeline for Ukrainians both in Ukraine and abroad by helping citizens keep up with the rapidly moving events and alerts throughout the conflict.</p><p>Telegram is also a chat application. In this mode, Telegram operates like WhatsApp, Signal, or iMessage, allowing users to create message groups, or one-to-one chats with an individual contact, who can then exchange chats, files, pictures, or hold audio and video calls.</p><p>By default, Telegram&#8217;s chats are not end-to-end encrypted, meaning that Telegram&#8217;s engineers can access their content via Telegram&#8217;s servers.</p><p>One-to-one chats (and calls) can also be &#8220;upgraded&#8221; to use Telegram&#8217;s custom-built end-to-end encryption by choosing to communicate via &#8220;secret chats&#8221;. This encryption has been criticized by specialists because Telegram&#8217;s algorithm can&#8217;t be easily proven secure in the way that the encryption in most comparable chat apps can. That&#8217;s a saga that&#8217;s too long to go into here, other than to say that Telegram&#8217;s response to those concerns never satisfied the information security community or encryption specialists, and it continues to cause concern.</p><p>But despite these concerns about Telegram&#8217;s security and its regular run-ins with the Russian security services, Telegram remains widely used in Ukraine, in large part because it is easy to dismiss the security concerns as theoretical, because of the importance of its broadcast functionality as an invaluable news source, and because of Telegram&#8217;s assertions that its security hasn&#8217;t been broken in practice.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Z2lu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Z2lu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!Z2lu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!Z2lu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!Z2lu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Z2lu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:910383,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Z2lu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!Z2lu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!Z2lu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!Z2lu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4951d517-66e5-47c8-96e5-3ded36004d73_1200x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Ihor meets Smoke in central Kyiv. Photo credit: Ed Ram for The Washington Post</em></p><div><hr></div><h3><strong>The surveillance of Ihor</strong></h3><p>To understand how the Russian forces were breaking Telegram in occupied Kherson, we need to look at two key paragraphs in the <a href="https://www.washingtonpost.com/world/2022/11/18/kherson-resistance-partisans-russia-occupation/">Washington Post</a>&#8217;s story:</p><blockquote><p>For months, [Ihor and Smoke] kept up a coded communication over the Telegram messaging app. Sometimes Ihor would be asked to help pinpoint locations from which the Russians were firing artillery. Other times, he sent the man, who asked to be called Smoke, the positions of Russian troops, armored vehicles and ammunition stocks.</p><p>&#8230;</p><p>Because Ihor was still in communication with Smoke, who was based outside in nearby Ukrainian-controlled Mykolaiv, the Russians released him and said they would be monitoring any text exchanges between the two. They asked for Ihor to send screenshots of their conversation any time there was an update &#8212; and threatened his life if he did not cooperate.</p></blockquote><p>There&#8217;s three claims in here that tell us about the surveillance of Ihor:</p><ol><li><p>Ihor and Smoke were communicating via Telegram</p></li><li><p>Ihor had to send screenshots of their conversation any time there was an update</p></li><li><p>Russia was able to monitor all text exchanges between Ihor and Smoke</p></li></ol><p>The first of these two statements tells us <em>that </em>Ihor and Smoke were communicating via Telegram. The second tells us <em>how</em>. In Telegram, secret chats don&#8217;t just employ Telegram&#8217;s end-to-end encryption technology, they also instruct the phone&#8217;s operating system to stop the user taking screenshots of the private chat screen.</p><p>That means either Ihor and Smoke were communicating via ordinary Telegram chats, or alternatively, someone disabled the anti-screenshot technology inside Telegram so that Ihor could take screenshots of their &#8220;secret chat&#8221; conversations.</p><p>There&#8217;s good reasons to think Ihor and Smoke were using normal chats, and not secret chats. Disabling the phone&#8217;s anti-screenshot technology in secret chats is somewhat involved. It would require that the Russian occupation forces jailbreak Ihor&#8217;s phone and install malware to circumvent the anti-screenshot technology in the phone&#8217;s operating system. </p><p>That&#8217;s possible, but it&#8217;s also unlikely. It would have been obvious to Ihor, and he didn&#8217;t mention this fact when talking to the Washington Post when discussing his communications with Smoke.</p><p>Moreover, had Russian forces installed malware on Ihor&#8217;s phone, it wouldn&#8217;t have been necessary to ask Ihor to take screenshots and relay them; they could have instead used the malware to take screenshots directly and relay them quietly back to the Russian occupation forces. That would have allowed the Russian forces to give Ihor his phone back without alerting him to the fact that his conversations with Smoke were now under surveillance.</p><p>That means the most likely case is that Russian forces did not proactively install malware on Ihor&#8217;s phone, did not circumvent the anti-screenshot technology in Telegram, and instead what happened here is just that Ihor and Smoke&#8217;s communication was via normal (and not &#8220;secret&#8221;) one-to-one Telegram chats.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.pwnallthethings.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>What type of surveillance did Russia employ?</h3><p>We can learn something else from those three statements in the Washington Post article. Let&#8217;s recap:</p><ol><li><p>Ihor and Smoke were communicating via Telegram</p></li><li><p>Ihor had to send screenshots of their conversation any time there was an update</p></li><li><p>Russia was able to monitor all text exchanges between Ihor and Smoke</p></li></ol><p>The last two of the statements by the Russian forces appear, at least at first glance, to be in contradiction with each other: how can it be that Russian soldiers were monitoring all text exchanges between Ihor and Smoke, and yet still needed Ihor to send screenshots of the conversations?</p><p>There&#8217;s three possibilities that resolve this apparent contradiction.</p><p><strong>Possibility 1: Russia was lying when it said it was monitoring their text exchanges</strong></p><p>In this theory, the Russian forces&#8217; claim &#8220;we are monitoring all text exchanges&#8221; was a bluff; the Russian soldiers had no means to monitor the text exchanges between Ihor and Smoke, but told him this anyway in the hope that Ihor would be so afraid for his life that he would willingly send screenshots of his messages without deception or omissions. </p><p>But this theory is unlikely: it would be a personal risk for the Russian soldiers and officers involved if Ihor detected the bluff.</p><p>To understand why, remember that Ihor was detained as a Ukrainian saboteur operating in occupied Kherson. These saboteurs were directly undermining the occupation, as well as assassinating senior regime and military officials, and spotting targets for the Ukrainian military to destroy. All of this was happening in the most important theatre of the Russian war in Ukraine at the time&#8212;one that Putin himself was personally invested in.</p><p>Releasing Ihor back into occupied Kherson knowing that he was in contact with Ukrainian special forces, and simply hoping that Ihor would comply with their demands without deception or omissions would be a huge risk for the Russian soldiers. Had Ihor detected the bluff, he would have been able to communicate freely with Smoke without surveillance and feed the Russian forces deceptive information.</p><p><strong>Possibility 2: Russia was monitoring the content of their text exchanges but asked Ihor to send screenshots anyway</strong></p><p>Here, the theory is that Russia was monitoring all text exchanges <em>including message content</em>, but required Ihor to (redundantly) send screenshots of their conversations anyway.</p><p>This theory isn&#8217;t quite as absurd as it sounds. Doing so would serve two purposes. First, it would act as a &#8220;source validation&#8221; technique, allowing Russia to quickly work out if Ihor was acting deceptively towards them. Secondly it would hide Russia&#8217;s signals intelligence capability by hiding this fact from Ihor, us, and quite likely even the Russian soldiers on the ground from figuring out Russia&#8217;s ability to read Telegram messages <em>without </em>needing screenshots.</p><p>Telegram&#8217;s flaws mean we can&#8217;t rule this theory out decisively. But there&#8217;s two reasons why it&#8217;s unlikely at least in this case.</p><p>The first of these is straightforward. Operationally, it&#8217;s preferable for targets of surveillance to be unaware of it. If Russia did have full content of Ihor and Smoke&#8217;s messages without needing Ihor&#8217;s help, it would make more sense for them to keep Ihor in the dark about this fact by not asking him for screenshots and hoping he didn&#8217;t suspect his chats were being surveilled.</p><p>The second reason is hidden elsewhere in the article:</p><blockquote><p>Ihor didn&#8217;t even know the first name of the person who contacted him. The man said he was a member of Ukraine&#8217;s Special Operations Forces and wanted to know if Ihor was interested in helping fight the Russians occupying his city of Kherson.</p><p>&#8230;</p><p>But Smoke and Ihor had agreed on a subtle code that could act as a warning &#8212; for example, responding to a message with &#8220;ok&#8221; instead of &#8220;all right.&#8221;</p></blockquote><p>This tells us two important facts. First, <em>all</em> of Ihor and Smoke&#8217;s communications were online&#8212;and almost certainly entirely via Telegram. The two met when Kherson was already occupied, and they were on opposite sides of the frontlines. In other words, they didn&#8217;t meet in person until Kherson was later liberated.</p><p>Secondly it tells us that Ihor and Smoke agreed on a covert &#8220;tip-off&#8221; code early in their interactions. That covert code was later used by Ihor to alert Smoke that their communications were under surveillance after Ihor&#8217;s arrest.</p><p>If Russian forces had the full content of Ihor and Smoke&#8217;s messages, they would have seen Ihor and Smoke&#8217;s early discussions about their tip-off code, and would have seen Ihor later using it. Had they done so, they would have known immediately of Ihor&#8217;s deception, and likely executed him for it. That means&#8212;at least in this case&#8212;they almost certainly didn&#8217;t have access to those earlier messages.</p><p>So how can it be that Russia didn&#8217;t have access to Ihor and Smoke&#8217;s message content, but also had their communications under surveillance?</p><p>The answer&#8212;as is often the case in signals intelligence&#8212;is <em>metadata</em>.</p><p><strong>Possibility 3: Russia was monitoring communications metadata of Ihor and Smoke&#8217;s communications.</strong></p><p>A better theory is that Russia was monitoring the <em>fact of </em>text communications between Ihor and Smoke, but not the message content directly. In other words, they were accessing chat metadata. </p><p>What that means is that when Smoke sent a message to Ihor, Russia would know <em>that </em>the message was sent, but not <em>what</em> the message said. They needed Ihor to forward them screenshots to obtain the message content.</p><p>This theory fits the facts of this case relatively well. But it&#8217;s one thing to know <em>that </em>Russia is intercepting communications metadata. It&#8217;s a whole other thing to know <em>how</em>.</p><p>Unsurprisingly, the article doesn&#8217;t answer this directly for us. Ihor wouldn&#8217;t know, and in all likelihood, the soldiers interrogating Ihor wouldn&#8217;t either. That information would likely be closely held by specialist intelligence officers working further away from the frontlines.</p><p>But thanks to Ihor&#8217;s starting point, we can spot a defect in Telegram that matches this theory exactly.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.pwnallthethings.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zVWx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zVWx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!zVWx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!zVWx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!zVWx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zVWx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1294464,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zVWx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!zVWx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!zVWx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!zVWx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c9e8f7-139e-4ca1-8c81-b87c36aa8a8c_1200x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The detention facility where Ihor was held by Russian occupation forces. Photo credit: Ed Ram for The Washington Post</em></p><div><hr></div><h3>Tracking Telegram chats with metadata</h3><p>To understand how this flaw works, we need a little bit of background into Telegram&#8217;s &#8220;<em>MTProto</em>&#8221;<em> </em>encryption algorithm.</p><p>Telegram&#8217;s MTProto is used for both normal chats as well as secret ones. The only difference is which encryption keys are used. Secret chats use keys held by the person&#8217;s device. Normal chats use keys held by Telegram&#8217;s servers.</p><p>Telegram&#8217;s MTProto takes a chat message, encrypts it into an encrypted box, and labels it with a bit of metadata which isn&#8217;t encrypted. A diagram of how that works is shown below&#8212;it&#8217;s taken from Telegram&#8217;s own description of their protocol. But despite looking complicated, it&#8217;s not as difficult to understand as it looks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JwdO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JwdO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png 424w, https://substackcdn.com/image/fetch/$s_!JwdO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png 848w, https://substackcdn.com/image/fetch/$s_!JwdO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png 1272w, https://substackcdn.com/image/fetch/$s_!JwdO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JwdO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png" width="780" height="748" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/c4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:748,&quot;width&quot;:780,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:187419,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!JwdO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png 424w, https://substackcdn.com/image/fetch/$s_!JwdO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png 848w, https://substackcdn.com/image/fetch/$s_!JwdO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png 1272w, https://substackcdn.com/image/fetch/$s_!JwdO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4421653-b60e-45db-bb4d-a20a5c81efbc_780x748.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here, the original message is up in the bracket at the top right. MTProto&#8217;s algorithm processes this message into an encrypted form, shown in the bottom right in blue. MTProto then adds two additional pieces of metadata, shown in the bottom left in gray. </p><p>One of these pieces of metadata is called <em>auth_key_id</em>. The other is called <em>msg_key</em>. </p><p>I&#8217;ve labelled &#8220;auth_key_id&#8221; in red&#8212;this is our culprit.</p><p>Here&#8217;s how the spec describes <em>auth_key_id</em>:</p><blockquote><p>[The auth key ID is] a 64-bit <em>key identifier</em> (that uniquely identifies an <em>authorization key</em> for the server as well as the <em>user</em>)</p><p>&#8230;</p><p>The first thing a client application must do is create an authorization key which is normally generated when it is first run and almost never changes.</p></blockquote><p>Let&#8217;s unpack what that means.</p><p>When Telegram runs for the first time, it creates a secret key called the &#8220;authentication key&#8221;. For now, it doesn&#8217;t matter what it does. What matters is that this key has an associated unique number&#8212;essentially a &#8220;name&#8221;&#8212;called &#8220;<em>auth_key_id</em>&#8221;.</p><p>This key and its associated <em>auth_key_id </em>are created when the app first installs and stays the same until you delete or reinstall the Telegram app. All chats, whether secret or normal, are sent using MTProto messages, and all of them send this <em>auth_key_id</em> along with the encrypted message. The message itself might be encrypted, but <em>auth_key_id</em> is not. Anyone monitoring the network communication can see it.</p><p>From the perspective of someone monitoring Internet traffic&#8212;something the Russian government is well known to do&#8212;this <em>auth_key_id </em>functionally operates as a unique user ID. In the language of signals-intelligence, it can be used as a &#8220;SIGINT selector&#8221;.</p><p>Let me explain what that means, from the perspective of the Russian government occupation forces.</p><p>Suppose you&#8217;re the Russian government, and are performing large-scale interception of Internet traffic from all users in an occupied region. As part of that operation, you watch for all Telegram messages. Any time you see one, you store it into a big database. These messages might be encrypted, but the <em>auth_key_id </em>part of each of these messages is not. The Russian government doesn&#8217;t need to do anything special to view them.</p><p>At some point during the occupation, Russian forces arrest Ihor, and spot that Telegram messages to his device use a specific <em>auth_key_id</em>. It&#8217;ll be some number like, say, 718.</p><p>After letting Ihor go, you spot another Telegram message traversing the Internet in the region that also uses the same <em>auth_key_id </em>value of 718. That means Ihor is receiving a message. If Ihor fails to send a screenshot shortly afterwards, you know he&#8217;s hiding messages from you, and is defying the orders to regularly send screenshots of all of his communications.</p><p>It&#8217;s important to note that this issue is a feature of MTProto itself. It affects Telegram&#8217;s secret chats as well as normal chats. Leaking it gave the Russian occupation forces specific information to keep track of Ihor after his release. </p><p>Other end-to-end encrypted messaging apps like Signal, WhatsApp, and iMessage, are more careful, and try to avoid sending specific communications metadata like this directly across the Internet with every message. Ihor&#8217;s surveillance was uniquely enabled by his use of Telegram.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0KOJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0KOJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png 424w, https://substackcdn.com/image/fetch/$s_!0KOJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png 848w, https://substackcdn.com/image/fetch/$s_!0KOJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png 1272w, https://substackcdn.com/image/fetch/$s_!0KOJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0KOJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png" width="1456" height="937" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:937,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2239815,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0KOJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png 424w, https://substackcdn.com/image/fetch/$s_!0KOJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png 848w, https://substackcdn.com/image/fetch/$s_!0KOJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png 1272w, https://substackcdn.com/image/fetch/$s_!0KOJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd96810c2-9a13-46ff-beac-50df67fc7bef_2285x1470.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Photo: Tank traps line the streets of Kyiv near the beginning of the invasion</em></p><div><hr></div><h3>Russian forces weren&#8217;t decrypting Ihor&#8217;s messages. <br>But they could have.</h3><p>Perhaps the most surprising thing about Ihor&#8217;s interview is that it also reveals what the Russian occupation forces in the region <em>weren&#8217;t </em>doing. Specifically, they almost certainly weren&#8217;t accessing the content of his messages directly, instead relying on Ihor to send them screenshots.</p><p>That&#8217;s something of an amazing conclusion, because it turns out that Telegram&#8217;s flaws mean Russia <em>could </em>have done so. In fact they could have done so in multiple distinct ways. But the Russian occupation forces neglected to do so&#8212;at least in Ihor&#8217;s case. </p><p>Ihor is extremely lucky they didn&#8217;t, because he probably would not have survived otherwise.</p><p>The reason we can make that conclusion is because of Ihor&#8217;s tip-off to Smoke. Ihor met Smoke via Telegram and pre-agreed how Ihor would covertly alert Smoke if their communications fell under surveillance. Ihor later used that method to tip-off Smoke after his arrest by Russian forces.</p><p>If Russia had successfully decrypted and read all of Ihor and Smoke&#8217;s messages, it would have been possible for them to read this earlier agreement, and spotted Ihor&#8217;s deception.</p><p>Russia&#8217;s failure to read Ihor and Smoke&#8217;s historic Telegram chats is a testament to Russian incompetence, not to Telegram&#8217;s security. There&#8217;s two different ways that Russia could have exploited to obtain all of these messages. </p><p>Both of those ways are known to Telegram.</p><p>Both have been intentionally left open.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xsfv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xsfv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png 424w, https://substackcdn.com/image/fetch/$s_!Xsfv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png 848w, https://substackcdn.com/image/fetch/$s_!Xsfv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png 1272w, https://substackcdn.com/image/fetch/$s_!Xsfv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xsfv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png" width="1456" height="541" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:541,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xsfv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png 424w, https://substackcdn.com/image/fetch/$s_!Xsfv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png 848w, https://substackcdn.com/image/fetch/$s_!Xsfv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png 1272w, https://substackcdn.com/image/fetch/$s_!Xsfv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F044e46b7-c537-47ac-ad58-b0e8dec41329_2882x1071.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Photo: a train leaves for Kherson, shortly after its liberation by Ukrainian forces</em></p><div><hr></div><h3>Getting full content via Telegram&#8217;s servers</h3><p>Telegram&#8217;s chats are not end-to-end encrypted <em>by default</em>. Users must &#8220;opt-in&#8221; to using secret chats to get this benefit. That&#8217;s different to comparable chat applications like Signal, WhatsApp, and iMessage-to-iMessage chats. In those applications, messages are always end-to-end encrypted. It just happens quietly in the background regardless of your settings.</p><p>When chats are not end-to-end encrypted, it means that the content of the messages are visible to the servers in the middle&#8212;in this case Telegram&#8217;s servers. We know that Ihor&#8217;s chats with Smoke were not <em>secret chats</em> because the Russian occupation forces demanded screenshots of his messages, and he was able to comply. But that also means that Ihor&#8217;s messages with Smoke were not end-to-end encrypted. Their communications could have been intercepted directly via Telegram&#8217;s servers.</p><p>Russian occupation forces <em>could</em> have got access to those messages in several different ways. They could have done it with Telegram&#8217;s assistance: a secret agreement to turn over some or all messages in exchange for money, or influence, to avoid a threat, or out of a sense of patriotism. But they could also do it secretly without Telegram&#8217;s knowledge by hacking Telegram&#8217;s servers and taking it directly. Or by planting insiders at Telegram to steal those messages without asking.</p><p>That didn&#8217;t happen in Ihor&#8217;s case. But that&#8217;s not to say that the Russian government doesn&#8217;t in other cases. It also doesn&#8217;t mean Telegram doesn&#8217;t have agreements with different Russian security service agencies that these particular Russian occupiers just didn&#8217;t know about and didn&#8217;t use.</p><p>For other encrypted chat applications, it&#8217;s easy to rule out such agreements, hacking, and insider threats. But because of Telegram&#8217;s inexplicable decision to make chats not encrypted by default, we can&#8217;t rule that out here.</p><p>Counterintuitively, giving users the option to opt-in to end-to-end encryption is really bad for user security even when&#8212;or perhaps <em>especially</em>&#8212;when they need it most. This is perhaps one of the greatest example of why. It&#8217;s hard to dream up an example of a chat that is <em>more</em> sensitive than an actual insurgency operation behind enemy lines. Ihor&#8217;s life literally depended on the security of his chats.</p><p>It was an error by both Ihor and Smoke to use normal chats and not secret ones. But it&#8217;s an error that was only possible thanks to Telegram. Had Ihor and Smoke chosen virtually any other encrypted chat application, the opportunity for that error would never have existed in the first place; their chat would have just been end-to-end encrypted without asking.</p><div><hr></div><h3>Getting full content via device access</h3><p>Ihor and Smoke screwed up by using normal chats and not secret chats. But if Russia was slightly competent, using secret chats wouldn&#8217;t have saved Ihor anyway: Telegram&#8217;s end-to-end encryption isn&#8217;t enough.</p><p>To understand why, let&#8217;s look at this very revealing paragraph in the MTProto specification:</p><blockquote><p>The protocol's principal drawback is that an intruder passively intercepting messages and then somehow appropriating the authorization key (for example, by stealing a device) will be able to decrypt all the intercepted messages post factum. This probably is not too much of a problem (by stealing a device, one could also gain access to all the information cached on the device without decrypting anything)</p></blockquote><p>This paragraph is talking about why MTProto&#8217;s cryptography doesn&#8217;t have two properties known in cryptography as <em>forward secrecy</em> and <em>perfect forward secrecy</em>. Telegram is explaining why it doesn&#8217;t matter that their protocol doesn&#8217;t use them.</p><p>[Update] Curiously this paragraph is at odds with other statements elsewhere in the official documentation. According to Telegram, MTProto <em>does </em>use perfect forward secrecy <a href="https://core.telegram.org/api/end-to-end/pfs">for secret chats</a> in its official client, and <em><a href="https://core.telegram.org/api/pfs">can</a> </em>use it for normal chats. Telegram does not explain this apparent contradiction in their specification.</p><p>But let&#8217;s take Telegram&#8217;s specification at face value, and that loss of an authorization key would allow retrospective decryption of messages. What would this mean?</p><p>The point of this cryptographic property is to protect encrypted messages in the event that a device key is stolen. Device keys can be stolen by hacking into the phone remotely, or by physically extracting them directly from the device forensically.</p><p>Telegram&#8217;s paragraph says that it &#8220;probably doesn&#8217;t matter&#8221; that its cryptography doesn&#8217;t have this property. According to them, if a device is stolen, all of the prior messages can probably be accessed anyway.</p><p>The problem with Telegram&#8217;s hand-waving here, though, is that this scenario is exactly the one Ihor faced. When Ihor was arrested, Russian occupation forces gained access to his device. They will have certainly have read all of the messages he had previously exchanged with Smoke that were still available on the device.</p><p>But here&#8217;s the thing: we also know that those were only <em>some </em>of the messages Smoke and Ihor had previously exchanged. That&#8217;s because Ihor and Smoke had previously discussed their way of secretly alerting each other if their communication became compromised&#8212;something which Ihor later did. Russian forces were fooled, which means they didn&#8217;t read those earlier messages.</p><p>If the Russian forces had been a bit more competent, they could have used this flaw in Telegram to read those earlier messages and to detect and punish Ihor&#8217;s deception. In fact, this flaw would have let the Russian occupiers decrypt <em>all </em>of Ihor&#8217;s messages&#8212;including secret and self-deleting messages&#8212;as well as all messages that he sent to Smoke after his detention without needing Ihor to send them screenshots.</p><p>All Russia needed to do to exploit this flaw was to extract the authorization key from Ihor&#8217;s device. That key, according to Telegram&#8217;s own documentation, would have allowed Russia to go back to their big database of all intercepted Telegram communications and to decrypt all of the ones belonging to Ihor. That would reveal not just copies of all the Telegram chats on Ihor&#8217;s phone, but also all the ones he&#8217;d subsequently deleted. It would decrypt all of his normal chats and calls.</p><p>Telegram&#8217;s decision to not consistently use this cryptographic property in <em>all </em>messages stands in contrast to all other major encrypted chat applications. If Ihor had instead used WhatsApp, Signal, or iMessage, this risk would simply never have existed.</p><p>To be sure, regardless of which encrypted app they used, Russian forces could (and would) have compelled him to open his phone and show them the messages <em>on the device</em>, but there would be simply no way to view the messages deleted from the device prior to his detention: the cryptography would guarantee it.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SGZL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SGZL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png 424w, https://substackcdn.com/image/fetch/$s_!SGZL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png 848w, https://substackcdn.com/image/fetch/$s_!SGZL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png 1272w, https://substackcdn.com/image/fetch/$s_!SGZL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SGZL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png" width="1456" height="1095" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1095,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3017813,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SGZL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png 424w, https://substackcdn.com/image/fetch/$s_!SGZL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png 848w, https://substackcdn.com/image/fetch/$s_!SGZL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png 1272w, https://substackcdn.com/image/fetch/$s_!SGZL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67d669ae-df34-4aaf-8844-1c76bdcf3bbe_2212x1664.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Photo: a tank trap in Kyiv, painted in the colors of the Ukrainian flag</em></p><h3>Telegram&#8217;s flaws put everyone at risk. It&#8217;s time to switch</h3><p>Ihor was extremely brave in his actions behind enemy lines. But he was also extremely lucky. He and Smoke made a minor screw-up by using normal chats and not secret chats&#8212;an error that is only possible in Telegram because chats are not end-to-end encrypted by default. </p><p>Russia could have used this error to extract their communications from Telegram&#8217;s servers, detect Ihor&#8217;s deception, and execute him for it. For some reason they didn&#8217;t here. At least not in this case.</p><p>Had Russian forces done this, Ihor&#8217;s tip-off to Smoke would have been detected, and he likely would not have survived to see his city liberated by Ukrainian forces.</p><p>Russia instead relied on a <em>third</em> defect in Telegram to surveil communications metadata between Ihor and Smoke, allowing them to watch Ihor&#8217;s communications and to ensure he sent them screenshots of his chats with Smoke.</p><p>All three of these issues exist only because of Telegram&#8217;s choice to leave their app insecure. The two most serious of these flaws are well-known to Telegram&#8217;s engineers&#8212;they chose to not fix them on purpose.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Did you enjoy this story? If so, subscribe now to get future posts delivered directly into your inbox</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Ihor&#8212;and others like him&#8212;placed their personal safety in the hands of Telegram, and Telegram repeatedly let them down. And it&#8217;s important to remember that just because Russia did not exploit all of these <em>in this case</em>, there&#8217;s no way to know if the Russian government has exploited these flaws in other cases before, nor any guarantee they will not do so in future. </p><p>Had they exploited them in this case, Ihor would be dead, and we&#8217;d never know this was the reason why.</p><p>The long-story short is that it&#8217;s not safe to use Telegram for chats and calls. Anywhere. For anyone. But <em>especially </em>in Ukraine.</p><p>WhatsApp, iMessage, and Signal all take user security far more seriously, and proactively fix security issues when they arise. Had Ihor and Smoke used any of these apps, all three of these defects would never have been available for Russian forces to exploit.</p><p>It&#8217;s also important to switch even if you&#8217;ve got nothing to hide. If Ukrainian saboteurs in an occupied region are the only ones using, say, Signal or WhatsApp, that itself becomes a red flag for Russian occupiers. Other people need to switch too in order to let those who need the security blend in with everyone else.</p><p>Ihor survived due to Russian incompetence, not Telegram&#8217;s security. Or to put it in the immortal words of one Ukrainian soldier, &#8220;<a href="https://www.youtube.com/watch?v=-QuGNa3osg4">we&#8217;re very lucky they&#8217;re so fucking stupid</a>&#8221;. It&#8217;s become almost an informal motto of the entire war.</p><p>But he, and others, shouldn&#8217;t have had to rely on Russian incompetence to be safe. Telegram promised them communications security. Ihor trusted his life to it. </p><p>Only thanks to sheer luck and Russian incompetence he didn&#8217;t pay the ultimate price for doing so.</p><p>Use Telegram for subscribing to channels, or broadcasting your own messages if you want. But for your own safety, and the safety of others, use a different app for chat and calls.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em>Correction: an earlier version of this post stated that Telegram does not have perfect forward secrecy on any chats. The official Telegram client <a href="https://core.telegram.org/api/end-to-end/pfs">does use perfect forward secrecy for secret chats</a> with a key updating on a one-week period (or every 100 messages). Non-secret chats <a href="https://core.telegram.org/api/pfs">can, but are not obliged</a>, to use perfect forward secrecy; Telegram clients are not required to use it, nor is a minimum key-rotation period required.</em></p>]]></content:encoded></item><item><title><![CDATA[Twitter was special. But it's time to leave]]></title><description><![CDATA[Tweets were always short-lived. Turns out Twitter was too.]]></description><link>https://www.pwnallthethings.com/p/twitter-was-special-but-its-time</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/twitter-was-special-but-its-time</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Sun, 20 Nov 2022 06:32:21 GMT</pubDate><content:encoded><![CDATA[<p>If you&#8217;re terminally online&#8212;and let&#8217;s be honest, if you&#8217;re reading this you are&#8212;you&#8217;ll know all about Twitter&#8217;s new management. </p><p>For a whole year Twitter and Musk&#8217;s &#8220;will they / won&#8217;t they&#8221; dance both online and in the courts provided no shortage of commentators voicing their concerns on how it would go, with many urging people to leave for other platforms.</p><p>Until the deal closed, I expected this to be just a fad.</p><p>I don&#8217;t anymore.</p><p>It&#8217;s no big secret that I&#8217;m not a big fan of Elon. He&#8217;s a massive blowhard. But if I&#8217;m honest, I&#8217;ve never had any love for Twitter&#8217;s previous owners either. Let&#8217;s be real. Jack was also extremely weird, using his position to push hobby-horse features that nobody in their right mind actually wanted (remember NFT profile pictures? Twitter Moments? Fleets?). At the same time, basic functionality often went <em>years</em> waiting for some attention from Twitter engineers. </p><p>The site has always been a mess.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Hey folks! Matt here. If you enjoyed this post, please become a paid subscriber so I can spend more time writing here!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p>So for a long time, I was very skeptical of people arguing that Musk&#8217;s unique awfulness would motivate an exodus. It&#8217;s always been popular to hate on the hellsite, and folks come and go&#8212;both individually and as groups&#8212;but in practice it rarely makes a dent, and folks stick around.</p><p>The reason why folks stayed was always pretty simple: Twitter is&#8212;or I suppose <em>was</em>&#8212;well, <em>Twitter</em>. There was nothing else quite like it.</p><div><hr></div><p>I first joined the bird site back in mid 2011. I wrote a couple of tweets, and, finding it entirely strange and unlikeable, promptly left.</p><p>18 months or so later, I gave it another go. But this time, for a reason: to join in a conversation happening between a few experts that&#8212;generously&#8212;perhaps 50 or so people in the whole world actually cared about. The conversations were delightfully wonky, and pretty soon I was hooked. A Q&amp;A with world experts that never ended and didn&#8217;t require getting invited to a conference halfway round the world? And for free? What a deal!</p><p>And not just one group of experts either! I could jump straight from a wonky discussion on intelligence reform straight over to a group of cybersecurity professionals diving into the absurd minutiae of breaking into computers using a complex vulnerability. Just a click away, a discussion would be sparking up between preeminent lawyers and constitutional scholars on the latest development in some case that had hidden but important ramifications, and before you could look away, suddenly a group of defense and foreign policy experts would be discussing the latest developments on the international stage, with all the details you should be paying attention to as it unfolds.</p><p>Everywhere you looked there was tiny groups of experts deeply immersed in their Thing&#8482;, and you were free to watch and learn, as well as ask questions and participate as you choose.</p><p>Twitter was also great for those of us who, until then, were massive news junkies.</p><p>Almost without trying, the <em>good </em>bits of every newspaper&#8212;the bits you used to have to wade through a whole newspaper to see&#8212;would get pushed to you directly as they went live. And unlike the news sites themselves, you could just directly ask the journalists about the article. If you were lucky, they&#8217;d reply. Even if you weren&#8217;t, there&#8217;s a good chance someone else would.</p><p>But that might be why people came&#8212;it&#8217;s why I did. But it&#8217;s not why people <em>stayed</em>. </p><p>The sticking power of the bird app was that nobody ever stayed in their lane. You might follow someone for their insights on a topic you&#8217;re interested in, but once you did, you&#8217;d often get a series of little glimpses far deeper into all the other aspects of their life too. You&#8217;d meet the whole human, not just the suit.</p><p>Where else can you see a law professor, feared and admired for their impeccable intellect and encyclopedic knowledge of separation-of-powers freely admit staying up all night to wait for the latest Taylor Swift album to drop? </p><p>What fiction author could, in their wildest surge of creativity, dream up a cybersecurity journalist, having just filed his scoop interviewing the head of NSA, who pivots nearly immediately into a friendly fight with a parody red panda account&#8212;an account who famous sleeps half the year and tweets about his heartfelt love of fries&#8212;who responds by photoshopping him into some pictures with the former Deputy Attorney General based on a six-year old in-joke that maybe the two are related?</p><p>There was no platform on Earth quite like it.</p><p>That&#8217;s what Twitter <em>is</em>. Or at least, what it <em>was</em>. A collection of haphazard groups, not just of experts, but of <em>people</em>. Glorious, glorious people with all the edges and whistles, and career changes, and marriages, and kids, and vacations, and dad jokes. It is the office watercooler during the day; the conference &#8220;hallway-track&#8221; during events; the Sunday barbeque social on the weekend.</p><p>This is the thing that the new ownership of Twitter never seemed to fully grasp: Twitter&#8217;s value was never about <em>engagement </em>or <em>technology</em> or <em>checkmarks</em>. Its value is not found in its code or the servers on which it resides, or in the 24-by-24 pixel seal of approval granted opaquely by whomever at Twitter thought an account happened to be noteworthy in real life. </p><p>The engine that drove Twitter was the <em>people</em>. Nothing more. Nothing less.</p><div><hr></div><p>Twitter has certainly had its ups and downs over the years, and&#8212;at least from my perspective&#8212;began to degrade in value long before the current management took over. The reason boils down to algorithmic engagement-farming. A lot of that, if we&#8217;re honest, is the fault of the &#8220;quote tweet&#8221;. It&#8217;s hard to resist dunking on someone being wrong on the internet, particularly if they&#8217;re spectacularly wrong in an impressively pompous way. Who doesn&#8217;t want to point and laugh at the fool?</p><p>But the dunks come with a cost. Everyone who follows you now sees the fool too. And, human that they are, are inclined to issue their own dunk too. The quote tweet manufactured the concept of a Twitter &#8220;main character&#8221;; a person so wrong that everyone in the world would quickly know of it.</p><p>For a while, this seemed mostly harmless to everyone&#8212;at least apart from the main character themselves, who would have to go hide in a hole to live out their shame. Every few days a new main character would emerge for a few hours, but for the rest of us that was mostly fine. A bit of a laugh the first time you saw it, even if it got a bit tired by the 50th time you see a half-hearted dunk on some poor idiot who tweeted today&#8217;s Dumb Thing.</p><p>Originally the &#8220;main character&#8221; would last for a day and be gone by tomorrow. And having got the dunk out of the way, everyone would continue as before, using the site as that permanent watercooler / conference-hallway track that made it the world&#8217;s foremost discussion chamber.</p><p>Alas, after a while, people with no shame realized they could be the main character <em>on purpose</em>, continuously seeking the thrill or profit of the attention it gave them.</p><p>The run-up to the 2016 election saw this exploited in spectacular fashion by the former president. Trump discovered early on that he could tweet obnoxious things and collect enormous amounts of free attention, and, having no shame or self-reflection, <em>enjoyed it</em>. Worse, the more outrageous the tweet, the more attention it got.</p><p>The attention he collected off the back of it is a major part of why he won the Republican primary, much to the astonishment of the establishment Republican candidates who, at least then, understood that being obnoxious on purpose or having a basic inability to engage with reality was not, on the whole, the way to be elected.</p><p>During Trump&#8217;s administration Twitter became far more dangerous. Trump wielded his account insanely dangerously&#8212;bypassing any internal discussion by competent advisors or executive branch officials prior to tweeting out new government policy straight from the hip. He became a one-man executive branch; the whole US government lurching from side-to-side at massive policy changes announced without even a cursory attempt to check that they were workable or safely implementable beforehand.</p><p>It&#8217;s no exaggeration to say that Twitter made Trump substantially more dangerous than he otherwise would have been, and that his use of it substantially destabilized the government during his administration.</p><p>But although Trump was a serial &#8220;main character&#8221;, as president he was unlike the all main characters who went before: he was fundamentally unavoidable. He was, after all, the President; logging off didn&#8217;t change that fact.</p><p>During that whole administration, right up until the riot at the Capitol, Twitter users looked on. Some in horror. Some for the spectacle. Some out of glee. There might not have been much of substance to <em>say</em>&#8212;the questions being debated were mostly fundamental rather than nuanced&#8212;but it was hard not to look on into the abyss. </p><p>And that abyss was more than happy to stare back, serving ads at every eyeball staring in.</p><div><hr></div><p>The removal of the president from the two offices that interested him most&#8212;the presidency and his twitter account&#8212;gave the platform new life. The hellsite was still a shadow of its earlier days, sure, but finally began to reemerge as a somewhat more healthy medium for serious communication.</p><p>And then Elon bought it.</p><p>Since his purchase of the bird site, Musk has shown no interest in preserving any aspect of the site that made it previously healthy or tolerable. In the three weeks he has been at the helm he has run the site pretty much as Trump ran his administration: entirely from the hip, without listening to competent advisors, and with policies issued on a whim by tweet. He has became the master of his site; no longer just an influential account, but the permanent main character of the whole platform; using his control to showcase his abject disregard for the site&#8217;s users or the health of the platform at large.</p><p>The death knell for Twitter was probably the colossal debt the purchase attached to Twitter. With interest payments to the tune of $1bn or more a year, the future of the site itself depends on obtaining colossal new sources of revenue. In practice, that means Musk needs to rinse a sizable fraction of all Twitter users for cash to pay down those bills. The Twitter Blue fiasco is essentially that&#8212;but don&#8217;t be fooled: the pay-for checkmarks drama might get a lot of the airtime, but the real killer for the site is the as-yet unimplemented decision to bury content and conversations from non-paying members of Twitter. It&#8217;s not here yet, but when it arrives soon it&#8217;ll all but guarantee the collapse of the micro-communities of experts and small content creator bubbles that made the site worthwhile.</p><p>Today&#8217;s announcement that former President Trump&#8217;s account will be back is just another step in the same vein. Despite the &#8220;free speech&#8221; rhetoric, it&#8217;s really just about <em>engagement farming. </em>Some people will love Trump&#8217;s tweets. Others will hate them. But Elon doesn&#8217;t really care so long as you pay to talk about it and watch ads as you do. Whatever it takes to cover the debt interest payments.</p><p>The site itself will now devolve into the spectacle of not one but <em>two</em> permanent main characters, relentlessly broadcast into your eyes, no matter how little you care about the vacuous awfulness of either.</p><p>But here&#8217;s the thing: neither Trump nor Musk have much relevance off the platform itself, in stark contrast to Trump&#8217;s dominance of the platform during his administration. Now you really can just log off and they&#8217;ll go away. Trump isn&#8217;t president; Musk is CEO only of his own companies.</p><p>I&#8217;m not the only one to notice. With Musk sucking the oxygen out of Twitter, the conversations are quickly moving elsewhere; mostly to Substack and to Mastodon.</p><p>I came to Twitter for the people and the conversations, but the new management has driven most of them away. There&#8217;s not much left on Twitter for me beyond the spectacle, and that was never a high value proposition for me.</p><p>So, for my part, I&#8217;ll be moving on. My account will still exist, and I&#8217;ll perhaps use it to share posts from here, to help people migrate elsewhere, or to keep up with the increasingly few people I care about still on the platform. Instead, I&#8217;ll be posting in long-form here (subscribe!), and my short-form takes will live on over at <a href="https://mastodon.social/@Pwnallthethings">Mastodon</a> instead. If you want to join me there, <a href="https://twitter.com/pwnallthethings/status/1593396595101417476">here&#8217;s a thread I wrote</a> about how to setup your account at Mastodon and find the people you used to follow on the bird site over there too.</p><p>It&#8217;s a sad thing to see the platform die in a blaze of angry tedium. But it is what it is. As more people leave, its value declines; as its value declines, more people leave. There&#8217;s already a critical mass of interesting people on Mastodon now; something that was never true before. And you don&#8217;t owe Twitter anything. You can just leave.</p><p>After all, tweets were always an ephemeral medium.</p><p>So perhaps it is apt if the platform is too.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Hey folks! Matt here. If you enjoyed this post, please become a paid subscriber so I can spend more time writing here!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Polish missile strike: what do we know so far?]]></title><description><![CDATA[What do we know about the Polish missile strikes so far?]]></description><link>https://www.pwnallthethings.com/p/live-polish-missile-strike-what-do</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/live-polish-missile-strike-what-do</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Wed, 16 Nov 2022 02:50:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Qymh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fpbs.substack.com%2Fmedia%2FFhnhNlkXwAA3mYB.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This post is about a current event: I&#8217;ll update this post as we go with some of the official statements and better-informed early analyses of we know about the explosion on Tuesday in Poland.</em></p><p>Last update: Wednesday 1252 ET</p><h2>Context and missile strikes inside Ukraine</h2><p>The strike on Poland took place within the context of a massive series of strikes against Ukraine, which appear to have been primarily targeting power and associated critical infrastructure in Ukraine. Russia has been attacking Ukrainian power infrastructure in earnest since approximately April, with a marked increase in attacks since October 10, shortly after a change of military leadership inside Russia and very shortly after the attack on the Crimean Kerch bridge. </p><p>At this point it seems certain that Russia has a top-level objective of disabling power infrastructure across the entire country. Ukraine&#8217;s Deputy Minister for Energy stated that <a href="https://www.linkedin.com/posts/demchenkov_energy-power-engineers-activity-6998393726272192512-UX27/?utm_source=share&amp;utm_medium=member_ios">today&#8217;s attack is the largest-scale shelling of the energy system in Ukraine since the beginning of the war</a>.</p><p>Tuesday&#8217;s attack involved <a href="https://www.facebook.com/GeneralStaff.ua/posts/pfbid0CJCe33EJrD9HjaE9FNdrpq398y3fg1RmQxMdYkj4UVnYmZJcCsnWYMMsatpD4RpCl">approximately 100 Kh-101 and Kh-555 cruise missiles</a> and at least 10 drones, the largest mass-attack since October 10. Ukraine claims to have shot down 73 of these missiles and all of the drones.</p><p>The attacks <a href="https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-november-15?utm_source=dlvr.it&amp;utm_medium=%5Btwitter%5D&amp;utm_campaign=%5Brogue_corq%5D">may have been planned as a response to Zelensky&#8217;s planned speech at the G-20 summit</a>.</p><p>Not just Kyiv was hit: <a href="https://www.youtube.com/watch?v=BvRyoIAVhtk">many other cities were left without power</a>. Kyiv, Rivne, Zhytomyr, Lviv, Khmelnytskyi, Dnipropetrovsk, Poltava, Vinnytsia, Odesa, Kirovohrad, Cherkasy, Volyn, and Kharkiv regions were all hit, with partial or total power outages in many areas. </p><p>Reporting and pictures show many of these cities and regions without power. </p><p>For example, in Kyiv:</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/ChristopherJM/status/1592551577805803521&quot;,&quot;full_text&quot;:&quot;Here&#8217;s what Kyiv looks like this evening after Russia&#8217;s latest missile barrage targeting energy infrastructure. Half of the Ukrainian capital &#8212; a city of nearly 4 million people &#8212; is without power. &quot;,&quot;username&quot;:&quot;ChristopherJM&quot;,&quot;name&quot;:&quot;Christopher Miller&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Tue Nov 15 16:14:18 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FhnhNlkXwAA3mYB.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/mDdvKIkH00&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:423,&quot;like_count&quot;:915,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>In Lviv:</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/WarintheFuture/status/1592689734542770176&quot;,&quot;full_text&quot;:&quot;3/ At the same time, the Russians had been executing a large missile attack on multiple cities across <span class=\&quot;tweet-fake-link\&quot;>#Ukraine</span>, including the western city of Lviv. &quot;,&quot;username&quot;:&quot;WarintheFuture&quot;,&quot;name&quot;:&quot;Mick Ryan, AM&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Nov 16 01:23:18 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FhpdLmhVIAA1lDv.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/3610BXTaP1&quot;,&quot;alt_text&quot;:null},{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FhpdLmhVsAAKK7F.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/3610BXTaP1&quot;,&quot;alt_text&quot;:null},{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FhpdLoOUYAEazq0.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/3610BXTaP1&quot;,&quot;alt_text&quot;:null},{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FhpdLqHVEAA1WYv.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/3610BXTaP1&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:17,&quot;like_count&quot;:177,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>In Kharkiv:</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/IrynaVoichuk/status/1592554720799117312&quot;,&quot;full_text&quot;:&quot;A symbolic photo from <span class=\&quot;tweet-fake-link\&quot;>#Kharkiv</span>, where now most of the city is without electricity. Ukraine will prevail, russia will lose - this is an axiom. &quot;,&quot;username&quot;:&quot;IrynaVoichuk&quot;,&quot;name&quot;:&quot;Iryna Voichuk&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Tue Nov 15 16:26:48 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FhnkE8eXwAA8ofo.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/eZzpRspkW1&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:249,&quot;like_count&quot;:1276,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><h2>The strike in Poland</h2><p><a href="https://www.gov.pl/web/dyplomacja/komunikat-w-zwiazku-z-wezwaniem-ambasadora-federacji-rosyjskiej-do-msz">According to the Polish government</a>, the strike took place at 15:40 local time in the village of Przewod&#243;w in the Hrubiesz&#243;w poviat in the Lubelskie Voivodship, killing two Polish citizens.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hYvQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hYvQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hYvQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hYvQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hYvQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hYvQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg" width="960" height="598" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:598,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Local reports said two people died in the village of Przewodow, close to the border with Ukraine&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Local reports said two people died in the village of Przewodow, close to the border with Ukraine" title="Local reports said two people died in the village of Przewodow, close to the border with Ukraine" srcset="https://substackcdn.com/image/fetch/$s_!hYvQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hYvQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hYvQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hYvQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ea3354-a2df-4f31-b877-dc01f55227e5_960x598.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JRFG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JRFG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp 424w, https://substackcdn.com/image/fetch/$s_!JRFG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp 848w, https://substackcdn.com/image/fetch/$s_!JRFG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp 1272w, https://substackcdn.com/image/fetch/$s_!JRFG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JRFG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp" width="1280" height="820" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/eaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:820,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:50694,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JRFG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp 424w, https://substackcdn.com/image/fetch/$s_!JRFG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp 848w, https://substackcdn.com/image/fetch/$s_!JRFG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp 1272w, https://substackcdn.com/image/fetch/$s_!JRFG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feaa51c61-e9d1-4b62-b4a5-be61149914a8_1280x820.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Map graphic of impact site inside Ukraine via BBC News</em></p><h2>Who fired it?</h2><p>On this question, Poland and NATO allies are being cautious.</p><p><strong>Some open-source analysis</strong> of the debris suggests that the debris is from an S-300 missile. </p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/AricToler/status/1592607123598344193&quot;,&quot;full_text&quot;:&quot;If it is an S-300 in Poland, it's probably Ukrainian air defense that went off course -- which makes sense with the huge onslaught of Russian barrages today and UA SAM interceptions. Russia has used S-300's for ground-to-ground strikes, but that'd be really far for them to use it &quot;,&quot;username&quot;:&quot;AricToler&quot;,&quot;name&quot;:&quot;Aric Toler&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Tue Nov 15 19:55:02 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{&quot;full_text&quot;:&quot;A certain resemblance to a part of a motor section of 5V55-series missiles used with S-300 SAM systems here. In that case, this may be the remains of a Ukrainian AD missile, or perhaps that plus the cruise missile it intercepted. \n\nHowever this is NOT AN ID AT THIS TIME. Brb. https://t.co/HN4VzhHW9V&quot;,&quot;username&quot;:&quot;CalibreObscura&quot;,&quot;name&quot;:&quot;C&#7424;&#671;&#618;&#665;&#640;&#7431; O&#665;s&#7428;&#7452;&#640;&#7424;&quot;},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:122,&quot;like_count&quot;:333,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>This type of missile is common in Ukranian air-defense systems, although it can also be used for ground-to-ground launched attacks. The location is very far from Russia, making that more unlikely. It <em>could </em>have been fired from inside Belarus&#8212;Russia has done missile strikes from there against Ukraine in the past&#8212;but it&#8217;s perhaps less likely.</p><p>Note that Polish and US radar defense systems should be able to concretely determine where the missile was launched from; we will not have to rely on guesswork on this question for long.</p><p> </p><p><strong>The Polish government</strong> is being cautious. The Polish MFA says the missile strike was &#8220;<em>Russian made</em>&#8221;, although that doesn&#8217;t say specifically that the missile was fired by Russia. Polish President Duda is even more cautious, saying &#8220;we do not have any conclusive evidence at the moment as to who launched this missile... it was most likely a Russian-made missile, but this is all still under investigation at the moment&#8221;</p><p>Update: the Polish president has said</p><blockquote><p>From the information that we and our allies have, it was an S-300 rocket made in the Soviet Union, an old rocket and there is no evidence that it was launched by the Russian side. It is highly probable that it was fired by Ukrainian anti-aircraft defense</p></blockquote><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/prezydentpl/status/1592835668426002433?t=u4nI3AE8U8D_hIrNRssXPQ&amp;s=19&quot;,&quot;full_text&quot;:&quot;Prezydent <span class=\&quot;tweet-fake-link\&quot;>@AndrzejDuda</span>: Nic nie wskazuje na to, &#380;e by&#322; to intencjonalny atak na Polsk&#281;. Najprawdopodobniej by&#322;a to rakieta produkcji rosyjskiej typu S-300. Nie mamy w tej chwili dow&#243;d na to, &#380;e by&#322;a to rakieta wystrzelona przez stron&#281; rosyjsk&#261;. [1/2]\n\n&#128205;<span class=\&quot;tweet-fake-link\&quot;>@BBN_PL</span>&quot;,&quot;username&quot;:&quot;prezydentpl&quot;,&quot;name&quot;:&quot;Kancelaria Prezydenta&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Nov 16 11:03:11 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:314,&quot;like_count&quot;:1739,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p><strong>The Ukrainian government</strong> is saying the missile was fired by Russia. Ukrainian Foreign Minister Kuleba goes further, saying that any suggestion that it was a Ukrainian air-defense system is a conspiracy theory.</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/DmytroKuleba/status/1592632386751434752&quot;,&quot;full_text&quot;:&quot;Russia now promotes a conspiracy theory that it was allegedly a missile of Ukrainian air defense that fell on the Polish theory. Which is not true. No one should buy Russian propaganda or amplify its messages. This lesson should have been long learnt since the downing of <span class=\&quot;tweet-fake-link\&quot;>#MH17</span>.&quot;,&quot;username&quot;:&quot;DmytroKuleba&quot;,&quot;name&quot;:&quot;Dmytro Kuleba&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Tue Nov 15 21:35:25 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:2600,&quot;like_count&quot;:12188,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>Ukranian President Zelensky says &#8220;I have no doubt that it was not our rocket.&#8221;</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://mobile.twitter.com/ChristopherJM/status/1592928556635471873&quot;,&quot;full_text&quot;:&quot;Zelensky live on state TV now refutes Western leaders' statements and prelim evidence  that missile which killed two in Poland was Ukrainian. \&quot;I have no doubt that it was not our missile or our missile strike. We have to participate in the investigation.\&quot; &quot;,&quot;username&quot;:&quot;ChristopherJM&quot;,&quot;name&quot;:&quot;Christopher Miller&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Nov 16 17:12:17 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:14,&quot;like_count&quot;:37,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{&quot;url&quot;:&quot;https://www.youtube.com/watch?v=CwQl49tDPTk&quot;,&quot;image&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/03f22948-ab26-4520-83c4-e663f53dcfe7_1280x720.jpeg&quot;,&quot;title&quot;:&quot;&#1058;&#1077;&#1083;&#1077;&#1082;&#1072;&#1085;&#1072;&#1083; &#1056;&#1072;&#1076;&#1072;. &#1055;&#1088;&#1103;&#1084;&#1080;&#1081; &#1077;&#1092;&#1110;&#1088;&quot;,&quot;description&quot;:&quot;&#1055;&#1088;&#1103;&#1084;&#1080;&#1081; &#1077;&#1092;&#1110;&#1088; &#1055;&#1072;&#1088;&#1083;&#1072;&#1084;&#1077;&#1085;&#1090;&#1089;&#1100;&#1082;&#1086;&#1075;&#1086; &#1090;&#1077;&#1083;&#1077;&#1082;&#1072;&#1085;&#1072;&#1083;&#1091; &#8221;&#1056;&#1072;&#1076;&#1072;&#8221;&#1044;&#1086;&#1083;&#1091;&#1095;&#1072;&#1081;&#1090;&#1077;&#1089;&#1100; &#1076;&#1086; &#1085;&#1072;&#1096;&#1080;&#1093; &#1089;&#1086;&#1094;&#1084;&#1077;&#1088;&#1077;&#1078;:https://www.facebook.com/radatvchannelhttps://www.instagram.com/tv_radahttps://tel...&quot;,&quot;domain&quot;:&quot;youtube.com&quot;},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p><strong>The US government</strong> is being cautious. <a href="https://twitter.com/mviser/status/1592698191774101506">President Biden</a> said, when asked on whether the missile was fired by Russia: &#8220;There is preliminary information that contests that. I don't want to say that till we completely investigate, but it is&#8212;it's unlikely, in the lines of the trajectory, that it was fired from Russia. But we&#8217;ll see.&#8221;</p><p>Be careful here too: note that <em>from</em> <em>Russia</em> and <em>by Russia</em> are slightly different.</p><p><a href="https://apnews.com/article/russia-ukraine-war-zelenskyy-kherson-9202c032cf3a5c22761ee71b52ff9d52">Three anonymous US government sources have told the AP</a> that preliminary US assessments suggested the missile was fired by Ukrainian forces at an incoming Russian one amid the crushing salvo against Ukraine&#8217;s electrical infrastructure Tuesday.</p><p><strong>Nato&#8217;s secretary general</strong> says that an investigation is continuing, but initial analysis suggests the explosion was &#8220;likely caused by a Ukrainian air defence missile fired to defend Ukrainian territory&#8221; against Russian missile attacks.</p><p></p><p><strong>The Russian government</strong> denies the attack, although there is ample evidence of them targeting Lviv, just 70km away from Przewod&#243;w. The MOD official response is given below (MFA also denied the attack at the UN, citing the MOD one):</p><blockquote><p>The statements of the Polish media and officials about the fall of "Russian" missiles in the Przewod&#243;w area is a deliberate provocation. No strikes were made against targets near the Ukrainian-Polish state border by Russian weapons. The fragments published in hot pursuit by the Polish media from the scene in the village of Przewod&#243;w have nothing to do with Russian weapons.</p></blockquote><h2>What was the target?</h2><p>It&#8217;s not 100% clear yet what the exact target was, but it&#8217;s unlikely the missile hit the correct target, given the lack of strategic value of the impact site.</p><p>The <a href="https://webkaart.hoogspanningsnet.com/index2.php#8/50.775/23.222">site of the explosion is close</a> to some of the main electricity connection points connecting the Ukrainian electricity grid to the Polish (and EU) grid. It is possible Russia intended to destroy this connection point, although obviously this is not yet confirmed.</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/sumlenny/status/1592616005851054080&quot;,&quot;full_text&quot;:&quot;Russian missiles hit Polish Przewodow directly at the electricity power line which connects the EU with Ukraine, close to Dobrotvirska power plant in Ukraine, an important energy hub. Map: courtesy of ENTSO-E, the EU organization of electricity network operators. &quot;,&quot;username&quot;:&quot;sumlenny&quot;,&quot;name&quot;:&quot;Sergej Sumlenny&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Tue Nov 15 20:30:19 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/Fhobz_lWQAAQxyO.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/VHNuuyph3A&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:3998,&quot;like_count&quot;:9888,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><h2>Polish Response</h2><p>So far, most of the diplomatic response has been internal-facing and alliance-management as Poland and NATO plan their next steps. But so far:</p><ul><li><p><a href="https://www.gov.pl/web/dyplomacja/komunikat-w-zwiazku-z-wezwaniem-ambasadora-federacji-rosyjskiej-do-msz">Poland has summoned the Russian ambassador</a></p></li><li><p>Poland convened the Council of Ministers Committee on National Security and Defense Affairs to discuss the incident.</p></li><li><p>Poland increased the readiness of its forces, including surveillance of its airspace, but Polish PM also called for calm: &#8220;I am calling on all Poles to remain calm in the face of this tragedy. We must exercise restraint and caution.&#8221;</p></li></ul><h2>NATO Article IV</h2><p>Poland has invoked Article 4 of the NATO treaty to trigger an urgent meeting of NATO permanent representatives. This will take place in Brussels on Wednesday.</p><p>Be careful not to confuse NATO Article IV with its Article V neighbor. Article IV is very simple. It&#8217;s full text is:</p><blockquote><p>The Parties will consult together whenever, in the opinion of any of them, the territorial integrity, political independence or security of any of the Parties is threatened.</p></blockquote><p>In this case, the sole function of Article IV is to summon the permanent representatives of NATO &#8212; the NATO ambassadors &#8212; to an urgent session to discuss the situation. It is a mechanism to begin an urgent conversation; it does not determine the outcome of that conversation. We&#8217;ll have to wait for Wednesday for that.</p><p>Update: NPR Journalist Teri Schultz is reporting that Poland may have withdrawn its request for an Article 4 meeting, but that the pre-arranged meeting of permanent representatives at 10am local time will go ahead anyway.</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/terischultz/status/1592787851321937922&quot;,&quot;full_text&quot;:&quot;UPDATE: Warsaw has withdrawn its request for a <span class=\&quot;tweet-fake-link\&quot;>#NATO</span> Article 4 meeting over the explosions that killed two people last night, per officials.\n\nNATO ambassadors will discuss the situation at their (already-scheduled) 10 am meeting; Sec Gen Stoltenberg will brief around 12:30. &quot;,&quot;username&quot;:&quot;terischultz&quot;,&quot;name&quot;:&quot;Teri Schultz&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Nov 16 07:53:10 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{&quot;full_text&quot;:&quot;JUST IN:\nPoland will ask #NATO for Article 4 consultations over the projectiles that landed on its territory and killed two people. \n\nThe meeting will likely take place already Wednesday morning.&quot;,&quot;username&quot;:&quot;terischultz&quot;,&quot;name&quot;:&quot;Teri Schultz&quot;},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:235,&quot;like_count&quot;:390,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><h2>Joint statement of NATO and G7 leaders</h2><p>World leaders who were unrelatedly at the G-20 summit in Bali have attended an emergency round-table meeting on the strike.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XHyv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XHyv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XHyv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XHyv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XHyv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XHyv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg" width="1456" height="604" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:604,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!XHyv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XHyv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XHyv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XHyv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0d3b066d-a469-4d1d-acc4-e884059dcc60_2591x1074.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Several world leaders attending the emergency round-table in Bali. Leaders in attendance from bottom left represent the EU Commission, Italy, Germany, France, Canada, US, UK, Spain, The Netherlands, Japan and the European Council. (US Secretary of State Blinken is also visible as a non-principal attendee).</em></p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/11/15/readout-of-the-meeting-of-nato-and-g7-leaders-on-the-margins-of-the-g20-summit-in-bali/">The Joint statement of NATO and G7 leaders at the G20 summit</a> in full:</p><blockquote><p>Today [Nov 15], the Leaders of Canada, the European Commission, the European Council, France, Germany, Italy, Japan, the Netherlands, Spain, the United Kingdom, and the United States met on the margins of the G20 Summit in Bali and released the following statement:   </p><p>We condemn the barbaric missile attacks that Russia perpetrated on Ukrainian cities and civilian infrastructure on Tuesday.</p><p>We discussed the explosion that took place in the eastern part of Poland near the border with Ukraine. We offer our full support for and assistance with Poland&#8217;s ongoing investigation. We agree to remain in close touch to determine appropriate next steps as the investigation proceeds.</p><p>We reaffirm our steadfast support for Ukraine and the Ukrainian people in the face of ongoing Russian aggression, as well as our continued readiness to hold Russia accountable for its brazen attacks on Ukrainian communities, even as the G20 meets to deal with the wider impacts of the war. We all express our condolences to the families of the victims in Poland and Ukraine.   </p></blockquote><h2>NATO Permanent Representatives Meeting</h2><p><strong>This occurred at 10am Brussels local time</strong> on Wednesday, followed immediately by a meeting of the military committee of the NATO alliance&#8212;tho be careful of overreading into the name of the committee here: it doesn&#8217;t mean a military response is likely.</p><p>NATO Secretary General Stoltenberg briefed the press, saying the investigation is ongoing, but initial analysis suggests the explosion was &#8220;likely caused by a Ukrainian air defence missile fired to defend Ukrainian territory&#8221; against Russian missile attacks. </p><h2>What&#8217;s next?</h2><p>We don&#8217;t know yet. We&#8217;ll now need to wait for NATO leaders and for forensics on the ground to give a better indication of the facts on the ground. But an initial consensus seems to be already emerging is that the missile was likely a misfire by Ukranian air defense systems in combating the massive cruise missile attack against Ukraine, and not an intentional strike on Poland by Russia. </p><p>It is very unlikely that under <em>any </em>scenario that Poland or NATO will engage Russia directly with conventional force. NATO has so far expressed extreme reluctance to do so, in no small part due to Russia&#8217;s massive strategic nuclear arsenal. While some commentators have made reference to NATO Article V (not to be confused with Article IV which was invoked), bear in mind that Article V is neither automatically invoked, nor automatic in response. There is no circumstance in which Poland or NATO will &#8220;accidentally&#8221; enter a direct conflict with Russia without (at minimum) substantial political will to do so, which, for good reason, is not there currently, and unlikely to change absent some very dramatic new events.</p><p>In my view, an <em>intentional </em>attack by Russia against Poland was always very unlikely. In much the same way that NATO is reluctant to engage Russia, Russia has also shown enormous reluctance to engage NATO (for basically the same reason). Moreover, Russia gave Poland and NATO no prior indication that they were planning an attack or signal against NATO or Poland, and immediately denied the attack, making it very unlikely that Russia was trying to send a &#8220;signal&#8221;.</p><p>Nevertheless, and regardless of whether the missile itself was fired by Russia or intentional, <strong>Poland and its allies are already clear: the explosion and loss of Polish life is Russia&#8217;s fault</strong>. This makes sense, because under virtually any conceivable scenario, the explosion would not have occurred but for Russia&#8217;s massive series of strikes against Ukraine. A response will therefore take place, but it far more likely to be in the form of additional military support to Ukraine, and not in the form of a direct intervention of any kind.</p><p>See, for example, the second paragraph in Wedneaday&#8217;s US national security council statement, which lays the blame squarely on Russia for the wider context that led to the explosion, if not the explosion in Poland itself:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vrIF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vrIF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png 424w, https://substackcdn.com/image/fetch/$s_!vrIF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png 848w, https://substackcdn.com/image/fetch/$s_!vrIF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png 1272w, https://substackcdn.com/image/fetch/$s_!vrIF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vrIF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png" width="1204" height="836" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:836,&quot;width&quot;:1204,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:112453,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vrIF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png 424w, https://substackcdn.com/image/fetch/$s_!vrIF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png 848w, https://substackcdn.com/image/fetch/$s_!vrIF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png 1272w, https://substackcdn.com/image/fetch/$s_!vrIF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef1959d-0d06-476a-abe4-57b1aba14713_1204x836.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h2>Beware contemporaneous but uncorrelated events</h2><p>Two other events happening in Ukraine that are major, but very likely uncorrelated.</p><p><strong><a href="https://apnews.com/article/biden-europe-congress-government-and-politics-bddc8fc02afcc2a072bbdd388dc1a658?taid=6373f4e2b9e4b40001bb409f">Biden asks Congress for $37.7bn package of support to Ukraine</a></strong></p><p>This was announced during the attacks in Ukraine but before the strike in Poland was reported. It is probably a meta-fund that the executive branch can draw down in tranches in the next year as a result of losing control of the House of Representatives. <a href="https://www.pwnallthethings.com/p/what-do-the-midterms-mean-for-us">I explain more over here</a> why I expected it, and what it will probably look like.</p><p><strong><a href="https://www.washingtonpost.com/national-security/2022/11/16/cia-director-burns-kyiv-missile-attack/">CIA Director Burns was in Kyiv at the time at the embassy</a></strong></p><p>This visit was unannounced, and likely uncorrelated. Burns was in the US embassy in Kyiv, Russia was attacking power infrastructure in Ukraine, and would be extraordinarily unlikely to attack US embassy property or senior US officials directly as part of this conflict.</p><p> </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What do the midterms mean for US support to Ukraine?]]></title><description><![CDATA[Not much. But here's what to watch for in the lame duck session.]]></description><link>https://www.pwnallthethings.com/p/what-do-the-midterms-mean-for-us</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/what-do-the-midterms-mean-for-us</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Wed, 09 Nov 2022 19:59:34 GMT</pubDate><content:encoded><![CDATA[<p>Last night, the United States held its midterm elections. Results are still coming in, so the exact outcome isn&#8217;t yet clear. It looks like Democrats did substantially better than expected, but there&#8217;s a good chance they&#8217;ll nevertheless lose control of the House of Representatives.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts to your inbox, subscribe below</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Republicans have been far less vocal in their support for US assistance to Ukraine than their Democrat counterparts, so what does the midterm mean if Republicans take control over the House? Does this mean an end to US support?</p><p>The short answer is &#8220;no&#8221;. </p><p>The longer answer is &#8220;no, but it&#8217;ll be more bureaucratically confusing than before&#8221;.</p><p>First things first, a quick primer. Why does the House matter at all? In the United States, legislation needs to pass both the House and Senate before being signed by the President into law. This is true of all legislation, but is most acute when it comes to <em>funding</em> (&#8220;appropriations&#8221;) and <em>reauthorization</em> bills. That is, paying for things and ensuring that certain pieces of legislation are renewed rather than hitting their timebomb provision and expiring. </p><p>Losing control of the House (or both House and Senate) will make the President&#8217;s life much harder, because Republicans will be able to withhold funding or attach conditions to government projects they don&#8217;t like, as well as holding government activities hostage that rely on legislation with a timebomb provision by threatening to let the legislation lapse.</p><p>After a US election, winners do not take their positions in Congress immediately. There&#8217;s a brief window where the previous Congress is still around: the so-called <em>lame duck session</em>. This means that whatever the exact outcome of the election will be, Democrats retain control of the House and Senate until the newly elected Congress is seated in January. It&#8217;s entirely normal to use these lame-duck sessions to pass key legislation in anticipation of the next Congress being more hostile to the President&#8217;s agenda.</p><p>My expectation is that the lame duck will focus on Electoral Act reform, a debt ceiling hike, a Ukraine assistance fund (perhaps via the Omnibus), and, depending on how off-the-rails Democrats think a Republican-controlled House will be by late next year, perhaps FISA 702-reauthorization as well. I expect that the government will come to deeply regret any of these which they, for whatever reason, fail to pass during the lame duck, when the consequences hit next year or the year after.</p><h2><strong>Electoral Count Act</strong> reform</h2><p>This isn&#8217;t a big national security topic, so I&#8217;ll keep this brief, but it&#8217;ll probably be the big thing discussed during the lame duck session. This is a response to the January 6 riots and fiasco during the counting of the electoral college votes after Biden was elected President. The reforms seek to clarify certain rules about how presidential votes are counted, and specifically that the vice-president has a purely administrative role in counting the votes.</p><h2>Debt Ceiling Hike</h2><p>The Debt-Ceiling is a US-specific weirdness that is designed to periodically force a public debate around the size of US debt by imposing a &#8220;ceiling&#8221; on how large the debt can be. Failing to affirmatively raise this ceiling causes most funding across the US government to abruptly end, causing all non-essential government activities to shut down and government employees to be &#8220;furloughed&#8221;. &#8220;Essential&#8221; activities continue, but this is defined relatively narrowly, ensuring widespread chaos if the ceiling is hit. If debt interest payments are also impacted, the collateral economic damage to the US will be enormous.</p><p>Over the past few years, Debt ceilings have been used as a way for minority parties to hold the government hostage and extract legislative concessions from the party in power. Democrats will presumably want to avoid this by affirmatively raising the debt ceiling during the lame duck.</p><p>If this fails, expect at least one debt-ceiling showdown, with the first one due to hit in late Spring to early Summer next year. </p><p>If that does happen, it&#8217;ll be enormously disruptive, but even then since most (but not all) Department of Defense activities are &#8220;essential&#8221;, a government shutdown won&#8217;t directly affect day-to-day support to Ukraine.</p><h2>Ukraine Assistance Fund</h2><p>It&#8217;s not a secret that public support for Ukraine is not entirely equal between the two main parties in the US. Democrats are, in the main, strongly supportive of assistance to Ukraine. Republicans are far more muted, or in some cases even openly critical of US support to Ukraine.</p><p>The perverse reason for this comes down to political incentives. It&#8217;s not that leading Republicans <em>actually </em>don&#8217;t support assistance to Ukraine. If anything, quite the reverse. Behind the scenes most are very supportive for a series of diverse reasons, ranging from a baseline desire to see Russia defeated, to wanting to support the underdog in a war of aggression, to genuine humanitarian reasons, through to entirely transactional observations like wanting assistance money to be spent in their own district as an economic stimulus.</p><p>But <em>publicly</em>, this isn&#8217;t the case. As the party in opposition, Republican talking points need to criticize Democrats in power, and US support to Ukraine provides them with an easy rhetorical weapon. The sums of money (<em>especially</em> on paper) look large, and particularly during a rough economic period it&#8217;s easy to win political points by saying the money is being spent on foreigners rather than Americans as a mechanism of creating voter resentment and collecting votes.</p><p>This leads to a relatively uncomfortable political situation where Republican leadership does genuinely support Ukraine assistance, but at the same time, wants to loudly oppose it.</p><p>To hedge against this and keep everyone happy, Democrats will likely want to pass an enormous appropriation for a Ukraine assistance &#8220;trust fund&#8221; that the President can draw down over the next year to fund as-yet-unknown tranches of military, financial, or humanitarian assistance. The number they choose here will be very large, but it&#8217;ll be functionally an upper-bound; the actual assistance will be defined during the tranches across the year as and when required. </p><p>In practice, this will probably be done via attachment to the Omnibus bill which needs to be passed later this year.</p><p>That will cover US assistance until the end of 2023, but what about afterwards? Will US support dry up in January 2024?</p><p>No.</p><p>This comes back to the fact that Republicans (at least Republican leadership) actually <em>does </em>support Ukrainian assistance, even if they find it politically useful to publicly oppose it at the same time. In practice what this means is that the Omnibus <em>next</em> year will do the same thing. Republicans will loudly complain, but quietly be happy that the assistance isn&#8217;t disrupted.</p><h2><strong>FISA 702 reauthorization</strong></h2><p>This one might just me getting on my hobby-horse, but Section 702 of the Foreign Intelligence Surveillance Act is set to expire in December 2023. That&#8217;s a long time away, but it&#8217;s also before the next election. It&#8217;ll need to be reauthorized either in the lame-duck session, or late next year during the next Congress.</p><p>Section 702 is one of the US intelligence community&#8217;s primary pieces of enabling legislation. It&#8217;s not an exaggeration to say that it is absolutely critical to the current functioning of the US IC. </p><p>Its last reauthorization, in 2019, was also an absolute car-wreck.</p><p>Section 702 has always been a bit controversial, and has serious nuanced criticisms from across the political spectrum, especially around law-enforcement access to 702-collected information that was originally collected for <em>intelligence </em>purposes, and which <em>collaterally</em> impacted the Fourth Amendment rights of a US person, but which is later repurposed into a <em>law-enforcement</em> investigation <em>of </em>that US person. This is a very complicated issue, but this is simply to say that there really are serious, nuanced, and good-faith discussions about 702 reform.</p><p>But the 702-reauthorization carwreck of 2019 was not about any of that. That saga centered on the then-raging discussion over FISA surveillance of Carter Page. But the surveillance of Page was conducted under FISA Title I, which has nothing whatsoever to do with Section 702, and Title I wasn&#8217;t going to expire. </p><p>Alas, sense did not prevail, and after 702 was reauthorized by Congress and sent to the president, the president, no doubt in response to misinformed TV punditry conflating 702 with Title I, tweeted his intention to veto it, causing all hell to break loose. Section 702 was later reauthorized, but not before lapsing for several days and causing collosal problems for the IC.</p><p>Whether or not 702 is reauthorized in this lame-duck essentially depends on whether Democrats believe they can avoid this cycle-of-stupid occurring in the next Congress. Passing it now would hedge against potential chaos late next year. Either way, I expect DOJ would prefer the issue is resolved now to ensure this key legislation doesn&#8217;t suffer the same fate that it did in 2019.</p><div><hr></div><p>There&#8217;s probably a lot of other stuff that will get pushed during the lame-duck session too&#8212;some more successful than others&#8212;but these are the four main things I&#8217;ll be looking for.</p><p>For Ukraine assistance in particular, the midterms are unlikely to change US support in any material way, but you&#8217;ll need to be a bit careful to not trip up over the way it is structured. The number passed in the Ukraine Assistance Fund will be large, but it won&#8217;t be a single tranche of support like previous iterations, but rather a trust fund providing an upper-limit dollar amount for all tranches of support next year. </p><p>Continuing support in 2024 will be a more difficult fight late next year, but ultimately I expect that to pass too without too much real difficulty, even if the rhetoric gets loud. </p><p>All in all, US support to Ukraine is likely to remain strong and well-funded, in terms of diplomatic assistance, military assistance, financial assistance, and humanitarian assistance right through the end of this presidential term in January 2025. </p><p>Beyond that? Who knows. But that&#8217;s a very long time into the future, and a lot will change before then. We&#8217;ll cross that bridge when we get there.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts to your inbox, subscribe below</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Is OpenSSL wide open?]]></title><description><![CDATA[Some quick thoughts about CVE-2022-3786 and CVE-2022-3602]]></description><link>https://www.pwnallthethings.com/p/is-openssl-wide-open</link><guid isPermaLink="false">https://www.pwnallthethings.com/p/is-openssl-wide-open</guid><dc:creator><![CDATA[Matt Tait]]></dc:creator><pubDate>Tue, 01 Nov 2022 19:33:19 GMT</pubDate><content:encoded><![CDATA[<p>If you&#8217;re in the weeds in cybersecurity, you&#8217;ll have heard over the past few days that there&#8217;s a critical OpenSSL vulnerability that needs to be patched. The details themselves were embargoed by widely expected to be listed as &#8220;critical&#8221;, leading to lots of speculation as to how bad the bug was, and cybersecurity teams scrambling to scan for vulnerable programs and prepare for an emergency patch.</p><p>Well, here we go. The details are out as <a href="https://www.openssl.org/news/secadv/20221101.txt">CVE-2022-3786 and CVE-2022-3602</a>. Unexpectedly both are now downrated to &#8220;high&#8221; severity. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>OpenSSL <a href="https://github.com/NCSC-NL/OpenSSL-2022/tree/main/software">also has an FAQ</a> on the two bugs with some additional details.</p><p>So what&#8217;s this all about?</p><h2>Vulnerable versions</h2><p>The vulnerabilities affect OpenSSL versions 3.0.0 through 3.0.6 inclusive. </p><p>Programs and systems using these versions of OpenSSL should upgrade to 3.0.7.  </p><p>If you are a system administrator and want to check your system and programs, you can use the tools and commands provided over at <a href="https://www.malwaretech.com/2022/11/everything-you-need-to-know-about-the-openssl-3-0-7-patch.html">MalwareTech.com</a>. </p><p>If you&#8217;re a normal user, there is not a lot for you to do, other than ensure that you regularly install updates when prompted by your software to do so.</p><h2>Is it being exploited in the wild?</h2><p>Not that anyone currently knows of.</p><p>The good news is that many routes to exploitation of these vulnerabilities are noisy, and will be relatively detectable. Detection may come from:</p><ul><li><p>Public certificate transparency logs at public certificate authorities may detect use of malicious public CA-signed certificates</p></li><li><p>Private federated certificate authority logs inside large companies may detect use of private federated CA-signed certificates</p></li><li><p>Network security devices may detect malicious certificates traversing the network</p></li><li><p>On-device security software may detect malicious certificates arriving on a server.</p></li></ul><p>Companies that do make heavy internal use of <em>mutual TLS authentication</em> are more at risk than others, particularly if they use unmonitored permissive private federated certificate authorities to manage certificates.</p><h2>Affected software</h2><p>A large (but necessarily incomplete) list of programs making use of vulnerable versions of OpenSSL can be found <a href="https://github.com/NCSC-NL/OpenSSL-2022/tree/main/software">here</a>.</p><h2>The vulnerabilities</h2><p>CVE-2022-3786 is a <em>linear stack overflow</em> vulnerability that occurs when parsing a TLS certificate after validation. This is a 4-byte overflow of a fixed stack buffer, with attacker control over the content of the four bytes.</p><p>CVE-2022-3786 is also a linear stack overflow vulnerability that occurs when parsing a TLS certificate after validation. This vulnerability however allows an attacker to choose how many bytes to overflow, but not the content of the overflow, which will always be the period (&#8216;.&#8217;) character.</p><p>In both cases, these are linear stack overflow vulnerabilities. In the worst case, these could allow an attacker to take full control over the running program, and from there, usually the whole device. That&#8217;s why these two vulnerabilities are rated as &#8220;high&#8221; by OpenSSL.</p><p>That said, the exact exploitability of the vulnerability is very context dependent. It depends on the exact processor architecture, compiler, compiler version, and compiler options as to whether a program using a vulnerable version of OpenSSL will actually be exploitable. </p><p>If the program has no basic compiler anti-exploit mitigations enabled and is <em>also</em> unlucky, it will be potentially exploitable with a worst-case scenario of system compromise. If the program is compiled with basic anti-exploit mitigations enabled (or is lucky) the attacker will only be able to use the vulnerably to force the TLS client or server to crash, potentially causing a denial of service condition.</p><h2>Triggering either bug requires a TLS certificate</h2><p>In both vulnerabilities, the bug is only reachable <em>after</em> certificate validation. In other words, the attacker will normally need to generate a malformed certificate and have it signed by a Certificate Authority the machine trusts in order to trigger the vulnerability at all.</p><p>Certificate Authorities (CAs) come in one of two flavors: <em>public CAs</em> and <em>corporate CAs</em> (federated private CAs). </p><p>Public Certificate Authorities are the big certificate companies on which most of the public internet relies&#8212;companies like LetsEncrypt or VeriSign. If an attacker wants a public certificate, they&#8217;ll need to create a malformed certificate request and get it signed by one of these big companies. That not only gives the CAs an opportunity to proactively and centrally deny the request, but also leaves a public audit trail for the CAs who operate public certificate transparency logs. </p><p>Companies that operate private federated CAs, such as big firms, governments and datacenters, might also run into problems with malicious certificates signed by the federated CA. Those certificates will be trusted only <em>within that federated domain</em>. These federated domains tend to be comparatively weakly managed, often with comparatively little validation or transparency of the certificates issued.</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/sleevi_/status/1587482903168122881&quot;,&quot;full_text&quot;:&quot;<span class=\&quot;tweet-fake-link\&quot;>@pwnallthethings</span> I wouldn&#8217;t put too much stock in (1), in that it assumes &#8220;public CAs&#8221;. The growth of federated private CAs (long common in the gov&#8217;t space, but resurging due to things like SPIFFE/SPIRE) make it interesting from the data center security side.&quot;,&quot;username&quot;:&quot;sleevi_&quot;,&quot;name&quot;:&quot;Ryan Sleevi&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Tue Nov 01 16:33:12 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:0,&quot;like_count&quot;:1,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>A second case also exists: some (very brave) programs will process the certificate even if the certificate validation hasn&#8217;t succeeded. In that case, the attacker won&#8217;t necessarily need a valid CA signature. This is a rare scenario, because one of TLS&#8217; core functions is to provide a secure <em>authenticated </em>channel between two computers, and engineers normally have no reason to try and manually override any part of the TLS authentication mechanism via code. Even so, it&#8217;s worth calling out that there are circumstances where the bug is reachable without a valid CA signature on the certificate, but it will likely be a small fraction of the overall software running the vulnerable versions.</p><h2>Does this affect TLS <em>servers</em>?</h2><p>Sometimes. Though it will be rare for HTTPS servers.</p><p>When a TLS client connects out to a TLS server, the default mode of operation is that the TLS server sends a TLS certificate as part of the set up of the encrypted channel. Once the TLS client knows the TLS server is legit, it can use its encrypted channel to send authentication information (like a password) to the TLS server directly. TLS servers don&#8217;t need a certificate from the client in order to form secure communication channels.</p><p>If your TLS server is configured in this (default) way&#8212;as the overwhelming majority of HTTPS servers are, for example&#8212;the TLS server never handles untrusted certificates from remote clients. The bug won&#8217;t be reachable, and so the program won&#8217;t be directly at risk from this vulnerability.</p><p>It is, however, possible to perform bi-direction authentication where both sides send each other certificates to validate the connection at both ends of the TLS layer itself. This is called <em>mutual authentication</em>. In this case, the TLS server will receive and handle a TLS certificate from the remote client. If that is a malformed certificate, the TLS server may be compromised, and patching is more important than for other TLS servers.</p><h2>Does this affect TLS <em>clients</em>?</h2><p>Yes.</p><p>In TLS, the client will always receive and process a TLS certificate from the server as part of the connection. If the server is malicious&#8212;either because the server itself was hacked, or because the attacker tricked the client into connecting to an attacker machine&#8212;then the TLS client will potentially be vulnerable to this code path.</p><p>While TLS clients are vulnerable, it does require connecting to an attacker&#8217;s TLS server (or the attacker first compromising the TLS server). This makes exploitation somewhat harder than would otherwise be the case with TLS servers, where mass-scanning and exploitation would otherwise be possible.</p><h2>The vulnerabilities will be very hard to exploit</h2><p>In both of these vulnerabilities, the underlying error is a <em>linear stack overflow</em>. This occurs because a fixed region of memory on the stack is allocated to hold data to write into, but the attacker can trick the program into writing past the end of this allocation, overwriting data intended for other purposes, corrupting that data.</p><p>The impact of the vulnerability therefore depends on what exactly is stored immediately after the vulnerable stack buffer. What exactly that is heavily dependent on how the program is compiled. It will change depending on which compiler is used, which version, what compiler options are specified, and what computer architecture (e.g. Intel or Arm) the program is being compiled for. </p><p>The OpenSSL community produces code, not program binaries, so here their &#8220;high&#8221; rating is based on the worst-case (rather than likely or best-case) scenario of how the program is compiled. But this means that the possibility of exploitation will itself be very target dependent.</p><p>If the exploit writer is lucky, the vulnerable OpenSSL code will be in a program compiled with no modern anti-exploit protection mechanisms enabled, and will be able to use the vulnerability to control some or all of a function return address, or other critical program data. That will allow them to surgically reorient program flow to run attacker-chosen instructions in an attacker-chosen sequence. In other words, to run the attacker&#8217;s program instead, taking full control of the vulnerable machine.</p><p>In programs that make use of the vulnerable OpenSSL code but are compiled with even basic anti-exploit protection mechanisms (in particular, <em>stack canaries</em>) the linear buffer overflow will corrupt a special guarded value, triggering a program abort. In this case, the attacker may be able to use the vulnerability to perform a denial of service attack on the vulnerable program, but not to fully compromise it.</p><p><a href="https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/">From the OpenSSL FAQ</a>, it appears that several organizations performed analysis on the vulnerabilities prior to disclosure and determined that <em>usually</em> stack protections are enabled, and even when they are not, the linear stack buffer overflow <em>usually </em>does not corrupt security-sensitive data. Even so, that doesn&#8217;t mean it never will. The only way to be sure is to take the time to upgrade and, while you&#8217;re at it, make sure programs use basic compiler security mitigations.</p><h2>How worried should I be?</h2><p>My view is that the circumstances and complexity of exploitation here will make this a relatively unattractive exploit for attackers to target. Companies should, of course, update vulnerable software. But exploitation will be costly and program-specific, if it takes place at all. </p><p>Internet-facing TLS servers running the vulnerable software versions that perform mutual authentication should be upgraded relatively quickly, as should mutual-authentication servers within datacenters, but otherwise cybersecurity folks should be careful not to over-emphasize these vulnerabilities to the exclusion of other, more immediate threats. Attackers will likely have better avenues to gain access.</p><p>Companies that <em>do </em>scan for programs making use of the vulnerable OpenSSL versions should request their respective vendors not just to release an updated version, but also insist that vendors compile new versions with compiler mitigations such as <em>stack canaries, address space layout randomization </em>and <em>control flow integrity </em>checks enabled. Vulnerabilities like this are substantially (if not always totally) mitigated through use of these mitigations, and they are nearly free for vendors to implement. Insisting on this now will protect against many future vulnerabilities of the same category, improving cybersecurity across the whole program.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.pwnallthethings.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">PwnAllTheThings is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>