The DNI Report: What is Missing?

seguridad national, espionage, contraespionage, contrainteligencia, c. constantin poindexter

It should come as no surprise in the current polarized political climate that certain threats to U.S. national security are omitted, some overly emphasized and others included but not give a more thorough review. Ironically (or perhaps not so ironically) the omissions and lack of more comprehensive address of certain threat are those very ones that are exacerbated by current Administration policies. The current DNI [unclassified version] contains no surprises, however there are some perils that decidedly lack the attention that they deserve. I’ll be brief.

The weaponization of artificial intelligence against the U.S. population poses and existential threat to the nation that we are not appropriately prepared for. The assessment identifies China’s AI capabilities in surveillance and disinformation, but underestimates the dangers posed by AI-generated disinformation and psychological operations targeting U.S. elections, civil cohesion, and trust in institutions. Synthetic media (deepfakes) at scale are unaddressed and present a very real menace. FIEs that excel in producing these fakes could fabricate major geopolitical incidents and/or falsely incriminate U.S. leaders. This is a “real-world crisis” scenario. Further, in our rush to load up our own AI capability, models trained on U.S. data pose an exposure to having them turned back against us in warfare, negotiation, or economic manipulation contexts. The DNI offers no significant discussion of how adversaries might use advanced LLMs and multi-modal AI to undermine decision-making at every level of our communities, from individual voters and first responders to senior policymakers.

There is a significant danger of the collapse of U.S. domestic infrastructure due to political paralysis and sabotage. The DNI identifies cyber threats to infrastructure (e.g., water, healthcare) however the report understates the systemic vulnerability of U.S. infrastructure to non-digital threats such as aged and neglected critical systems (e.g., bridges, power grids, water systems), and insider sabotage by ideologically motivated actors. White supremacist factionists and extremists like Timothy McVeigh come immediately to mind. Political paralysis and corruption that prevent modernization or resiliency efforts are the final ugly nail in the proverbial coffin. The loss of national security expertise as a result of wholesale firings/layoffs and the sidelining of individuals with decades of tradecraft and professional expertise based on party adherence are a very real threat. The assessment fails to meaningfully consider how polarization and our legislature’s unwillingness to work together are making the U.S. increasingly incapable of protecting or restoring its critical infrastructure after an attack or natural disaster. Don’t think for a moment that Chinese, Russian, Iranian and North Korean FIEs are failing to perceive these vulnerabilities that they can exploit.

Espionage, subversion and other nefarious covert operations against the U.S. and its interests via foreign investment and big-corporate influence are absent. There is really no excuse to omit identification and discussion of how “big money” has affected national security at every level, as even for a layperson is occurring in plain view. China’s cyber espionage and technology theft are addressed in depth, but why are foreign ownership of and influence in U.S. strategic sectors, including agriculture, pharmaceuticals, real estate near sensitive military sites and AI startups left alone? The use of shell corporations and fronting arrangements to embed operatives and proxies within sensitive sectors and policy circles is a serious threat as well. Strategic acquisition of distressed U.S. companies post-COVID by entities linked to FIEs are a mechanism and vehicles for subversion, espionage and sabotage. A brief look at our own history since the end of WWII reveals how these methods are effective and insidious, perhaps presenting a greater danger than cyber-attacks because they provide our adversaries to deep access, deniability and strategic gain that will serve them well for decades. Fragmenting and ‘bull in a china shop’ cancellation of funding paired with broken inter-agency oversight are extremely problematic.

Do better.

The Peril of Pentagon Orders Russian Cyber Defense ‘Stand Down’

cyber, cyber operations, cyber threat, espionage, counterespionage, counterintelligence, russia

It if doesn’t frighten you, it should. “The Trump administration has ordered the United States to end offensive cyber operations targeting Russia, . . . (US News, Mar. 2025) Russia, or more particularly the Russian FIE poses a grave threat to U.S. national security. Threats posed by this state-actor and its state-supported proxies are grave both in terms of capability and intent. Russia has consistently demonstrated its capacity to execute sophisticated cyber operations targeting governments, corporations, critical infrastructure and individuals. The perils are multi-dimensional, including espionage, cyber warfare (or “war in the grey”), information operations, subversion, ransoming and economic disruption. Examples of Russia’s malign and nefarious cyber activity are plethora however recently the U.S. and Ukraine seem to enjoy the brunt of Putin’s ire. Here are some points to consider:

1. State-Sponsored Cyber Warfare

  • Russia’s GRU Unit 74455, a/k/a “Sandworm” conducts offensive cyber operations, often targeting critical infrastructure the U.S., its allies and shared economic interests.
  • The 2017 NotPetya attack caused over $10 billion in global damages, hitting Maersk, FedEx, and other major commercial concerns. This agent was designed for penetration of a particular type of accounting software used in Ukraine. While not specifically targeting the U.S., the global fallout of NotPetya getting into the wild is instructive. In financial terms, it was among the greatest events of “collateral damage during war” ever recorded.
  • Russian hackers have targeted Ukraine’s energy sector repeatedly. They have demonstrated a clear ability to take down critical infrastructure. Evidence of Russian FIS’s penetration of U.S. utilities, likely in search of weakness to exploit or to leave ‘back doors’ for future exploitation, has also been detected. Notably, Dragonfly 2.0, a Russian state-sponsored hacking group (also known as Energetic Bear), successfully infiltrated U.S. energy sector systems, including nuclear power plants.

2. Cyber Espionage

  • Groups like APT29 (Cozy Bear) and APT28 (Fancy Bear), linked to Russian FIE have hacked into government agencies. They have repeatedly compromised U.S. official networks. The SolarWinds penetration in 2020 is instructive.
  • Ongoing efforts to steal classified or proprietary information from defense, aerospace, and technology sectors save Russia billions in research and development. From 2020 to 2021, Russian hackers compromised multiple U.S. defense contractors that provide support to the Department of Defense (DoD), U.S. Air Force, and Navy APT28 “Fuzy Bear” stole information related to weapon systems (including fighter jets and missile defense technologies, communications and surveillance systems, naval and space-based defense projects.

3. Election Interference & Disinformation

  • Russia has weaponized social media. Troll farms such as the Internet Research Agency and more rescently AI-home-cooked content spread disinformation and misinformation to masssive audiences.
  • Russian cyber actors hacked the DNC and Clinton campaign, leaking emails via WikiLeaks in efforts to subvert the U.S. political process.
  • Operation Project Lakhta was ordered directly by Vladimir Putin. This was a “hacking and disinformation campaign” to damage Clinton’s presidential campaign.
  • The Justice Department seized thirty-two internet domains used in Russian government-directed foreign malign influence campaigns (“Doppelganger”).

4. Ransomware & Financial Cybercrime

  • Russia harbors cybercriminal groups like Conti, REvil, and LockBit, which launch ransomware attacks on U.S. hospitals, businesses, and municipal corporations.
  • Many ransomware gangs operate with tacit Kremlin approval—as long as they don’t target Russian entities. For instance, REvil’s malware is designed to avoid systems using languages from the Commonwealth of Independent States (CIS), which includes Russia. This evidences a deliberate effort to steer clear of Russian entities.

5. Potential for Cyber Escalation

  • Russia has declared NATO and the West and its “main enemy”. The risk of cyber retaliation is real. Russia has the capability to conduct supply chain attacks, disrupt banking systems, and interfere with military communications.
  • In 2020, Russian state-sponsored cyber actors compromised the software company SolarWinds, embedding malicious code into its Orion network management software. This supply chain attack affected approximately 18,000 organizations, including multiple U.S. government agencies and private sector companies. This was a surveillance mechanism which allowed Russia to monitor internal communications and exfiltrate sensitive data from the software users.
  • In 2008 Russia deployed specialty malware (“Agent.btz“) which penetrated the U.S. Department of Defense’s classified and unclassified networks. The breach, considered one of the most severe against U.S. military computers, led to the establishment of U.S. Cyber Command to bolster cyber defenses.

Conclusion

The Russian cyber threat is persistent, evolving, and highly strategic. The West has cyber defenses and deterrence strategies in place (like sanctions and counter-hacking operations) however the current Administration’s order to terminate much of that effort cripple U.S. national security.

Quick to react to reporting of the DoD’s posturing, the Cybersecurity and Infrastructure Security Agency (CISA) tweeted, “CISA’s mission is to defend against all cyber threats to U.S. Critical Infrastructure, including from Russia. There has been no change in our posture. Any reporting to the contrary is fake and undermines our national security.” Comforting however the words of a confidential source within CISA present a different picture. “A recent memo at the Cybersecurity and Infrastructure Security Agency (Cisa) set out new priorities for the agency, which is part of the Department of Homeland Security and monitors cyber threats against US critical infrastructure. The new directive set out priorities that included China and protecting local systems. It did not mention Russia, . . . analysts at the agency were verbally informed that they were not to follow or report on Russian threats, even though this had previously been a main focus for the agency.” (Guardian, Mar. 2025)

Russia is one of our most aggressive cyber adversaries as well as being recongnized by most nations as a ‘cyber threat pariah’ (i.e., most vocally by NATO, the EU and the U.N.). Given the President’s position on Russia, it’s impossible to say that U.S. continues to harden critical infrastructure, surveil Russian FIE cyber efforts and accomplish effective countermeasures. Russia’s offensive cyber capabilities will remain a major security challenge for the foreseeable future. The question is, are we willing to handicap our efforts to meet our adversaries with robust cyber capability or simply turn our heads away.

Pause and Reflect, . . . How do we get to fascism?

Reflect

Pause and reflect as this can happen here. The following passage from our esteemed colleague Wayne Michael Hall highlights a critical lesson. “Still, people didn’t believe it could get too bad; Germany was highly educated, and a cultural epicenter after all, home to Goeth, Schiller, Mozart, Beethoven, Wagner, Rilke and Hegel, among other great minds. It wasn’t until the night of the broke glass, Kristallnacht, when Goebbles and Hitler turned their nazi stormtroopers loose to murder, plunder, imprison and destroy Jews and their property that the nazi state’s bureaucracies, occupied by the wrong people and focused in the wrong direction, allowed the beast loose and with it came ferocity and savagery on a scale rarely seen. Then, the alternatives for the oppressed, primarily Germany’s Jews, became quite limited, particularly for people with little money. Soon the only alternative became to “go with the flow” and hope for the best. Their collective wills acquiesced because they saw no other alternatives. This too, would pass, they thought. The giant nazi nation-state run by powerful bureaucracies, brought home to the Jews of Germany and to homosexuals, communist, mentally disabled people, gypsies or anyone deemed non-Aryan what the the beast turned loose could be capable of doing to humanity; as the destroyer of alternatives and a destroyer of hope and, ultimately, mankind. By the time the German people fully understood the bureaucracy’s evil ways, it was too late to do anything. All of the feasible alternatives had been closed off by the nazi bureaucracy which had seeped into every nook and cranny of society. The beast’s masters at work in the bureaucracies faced no punishment and did not take responsibility for their actions, until they lost the war. Even then, most of them did not feel the pangs of guilt for the crimes that they conducted, even those people going to the gallows at the Nuremburg Trials except for one person, . . . Albert Speer. The beast had gone mad and the result was World War II; fifty million dead, including six million Jews murdered in death camps, hundreds of concentration camps, disrupted and dislocated people all over the world, and misery and pain to innocent men, women and children. Visit Yad Vashem in Jerusalem and the Holocaust Museum in Washington, D.C, sometime to get an education in what the beast is capable of doing.” (Hall, 2018)

The lesson is self-explanatory however I will leave you with these thoughts, thoughts that I perceive as prescient and instructive.

The Illusion of Immunity in Advanced Societies

Germany’s cultural and intellectual milestones were perceived as a safeguard against barbarity, yet they failed to prevent the descent into Nazism. In 2025, similarly advanced societies may assume they are immune to tyranny due to their democratic traditions, legal frameworks, or cultural sophistication. The frightening fact is that full faith in those qualities foments complacency, making it easier for authoritarian tendencies to take root. The erosion of civil liberties, normalization of hate speech, and consolidation of power under populist leaders are illustrative.

Bureaucracies as Tools of Oppression

The Nazi state weaponized its bureaucracies to enforce policies of exclusion and extermination, embedding discrimination into every level of German government and society. Politicized bureaucracies, misused A.I. and social media, or systems designed to exclude marginalized groups can and will serve as instruments of oppression. Discriminatory immigration policies, surveillance abuse, or gerrymandering to entrench power are clear examples.

The Role of Scapegoating and Polarization

The Nazis targeted Jews, LGBTQ+ individuals, Romani people, mentally handicapped and others, creating the perception of “enemies within: to consolidate power and distract from economic or political failings. Statements like “enemy of the people”, is characteristic. Political leaders may use similar tactics, scapegoating minority groups or political opponents to inflame their base and distract from systemic issues like economic inequality, inlusion, civil rights abuses or climate crises.

The Destroyer of Hope and Alternatives

The lack of viable options for Germany’s oppressed populations made resistance seem futile, forcing many to surrender or flee. Systemic disenfranchisement, disinformation, the restriction of voting rights or peaceful demonstration similarly erode hope and stifle dissent, leaving vulnerable populations without alternatives.

The Danger of Inaction and the Cost of Ignorance

Germans as a whole underestimated the threat of Nazism until it was too late. Apathy and denial allowed Hitler to consolidate power unchallenged. Right now, democracies face homogeneous risks if citizens fail to recognize or act against the encroachment of authoritarianism, misinformation and disinformation campaigns driven by unregulated social media platforms, and restrictions on civil freedoms. In the presence of silence and inaction, harmful ideologies to take root and flourish.

What should we observe? What must we see to stop authoritarianism in its tracks? Leaders who consolidate power and any cost, undermine judicial independence, attack the free press, appoint unqualified cronies to senstive judicial, defense and intelligence positions, threaten member of their own political parties with banishment should they dare to “take sides” against the “leader”. These actions echo the bureaucratic centralization and propaganda tactics used by the Nazis. Surveillance tools, artificial intelligence, and digital platforms can be weaponized to track “the enemy withing”, spread disinformation and deepen societal divisions. THESE are the tools of modern bureaucracies of mass control. Efforts to restrict voting rights, limit freedom of assembly, limiting the free press by threatining the revocation of FCC licenses, lawsuits against or flagrant harassment of newspapers, and discriminatioin against specific groups will appear to be incremental but snowball into systemic oppression. The inability to address global crises like climate change, pandemics, commerical trade controversies or geopolitical conflicts can lead to mass displacement, economic collapse, and extremism, mirroring the chaos of the interwar period that fueled the rise of the Nazis.

Involuntary Addiction Treatment Works

carlyle poindexter charitable foundation, constantin poindexter, masters thesis, rehabilitation, addiction;

The article in the Sunday edition, “Addiction Treatment Can Work Even When It’s Not Voluntary”, provides a well-supported argument for mandatory addiction treatment. To date, the sparse peer-reviewed work conducted on compulsory treatment has been antagonistic to the idea. “Given the potential for human rights abuses within compulsory treatment settings, non-compulsory treatment modalities should be prioritized by policymakers seeking to reduce drug-related harms.” (“The Effectiveness of Compulsory Drug Treatment”, A Kamarulzaman, et al., Dec. 2015) Newer evidence shared by Satel and Sabet in their article contradicts the cited work. Further, it fails to contemplate nearly a century of history of involuntary commitments for a multitude of reasons. The theory that drug addiction is a disease and that those who suffer from addiction should not face the danger of “consequences” has unfortunately taken hold. As a community we began to accept responsibility for the negative personal choices of our fellow Americans, viewing challenges such as the drug scourge as our failure as a society rather than bad personal choices. Decriminalization of very dangerous narcotics is the most recent manifestation of this. Addiction researchers should broaden their focus to include case studies of mental health wholly unrelated to drugs. Severe mental illness, referred to before it became an insensitive and politically incorrect term (“crazy”), would be a good start. There is a corollary, an issue which forms part of our public discourse on almost a daily basis, . . . gun violence.

Before the notorious mafia murders during prohibition and post-prohibition, any adult citizen could walk into a gun store and legally purchase any type of firearm available. It was very rare to hear of a mass shooting, children murdered by their classmates or any other horrific act with a firearm outside of the criminal underworld. Passage of the NFA in 1938, the GCA in 1968, and various state gun control regimes emerged however the increase in gun violence continued to grow. The commonsense observation, immediately applicable to the compulsory treatment question, is that we used to “lock up crazy.” Simplistically, an individual walking down the street arguing with an imaginary person in the 1940s or 1950s would likely have found him or herself the guest of a psychiatric institution. Within the context of the gun violence question, the Sandy Hook Elementary School shooter Adam Lanza may have been deprived of the opportunity to commit his heinous act.

Before the 1960s cultural revolution and posterior changes in public opinion about personal responsibility for one’s behavior, involuntary commitment was prevalent. Advances in pharmaceutical science from the 1950s forward supported the theory that a “pill” was the magical bullet, further eroding the view that involuntary commitment was a necessary evil. The courts likewise offered little help to the supporters of commitment. The 1975 case of O’Connor v. Donaldson is instructive. It represented a change in the justifying criteria for commitment from a broader test to that of almost exclusively one of the dangers that an individual presents to society. Writing for Psychiatry (Edgemont Journal), Doctors Megan Testa and Sara West wrote, “Through interviews of mothers of individuals with mental illness, Copeland learned that current civil commitment criteria force relatives to watch their loved ones go through progressive stages of psychiatric decompensation before they can get them any help at all.” (“Civil Commitment in the United States”, Megan Testa, MD and Sara G. West, MD, Oct 2010, Psychiatry) The court-imposed restrictions on involuntary commitment exacerbated the problem.

The curtailment of involuntary treatments, whether it be for drug addiction or mental illness, has impaired our ability as a society to address some of the gravest challenges to our safety as well as the happiness and well-being of those addicts and mentally ill. Authors Sally Satel and Kevin Sabet’s article on mandated treatment is prescient and the involuntary commitment question merits renewed attention.

The Challenge of Spying on China

spy, spies, espionage, counterespionage, intelligence, counterintelligence,carlyle poindexter, constantin poindexter

The WSJ article on Wednesday (Challenge of Spying on China) is a sad reminder of the United States Intelligence Community’s apparent failure to accomplish any broad covert or clandestine penetration of the People’s Republic of China (PRC) in recent history. The lack of HUMINT human intelligence sources (HUMINT) with meaningful access and placement deprives us of insight into Chinese decision making, immediate strategic threat intelligence and perhaps more importantly, gravely impairs U.S. offensive counterintelligence operations.

Moving beyond the obvious difficulties with HUMINT operations within the PRC, reminiscent of the Cold War hostile operational environments, the Intelligence Community is overdue for a paradigm shift in human asset recruitment methodology. For the better part of the last century, the United States Intelligence Community relied on a steady flow of “walk-ins”, volunteers from opposing foreign intelligence services or governments that offered their countries’ secrets. Intelligence officers enjoyed a large degree of success based on a fairly global perception that Americans were the “good guys”, representatives of the land of fairness, equality and justice, qualities that stood in stark contrast to the ruthless and despotic republics from whence they came. Unfortunately, the mystique has faded leaving outsiders to wonder if the values that we promote to the world are nothing more than a hypocritical farce. Mass diffusion of the “Big Lie” throwing fair elections into question, an attempted coup d’etat by an outgoing president, and military involvement under highly questionable intelligence assessments erode the view once held that the United States is the “shining beacon to the oppressed”.

Chinese citizens enjoy a better standard of living than at any time in China’s history. China can rightfully boast that it is a world power and its population can justifiably be proud of its progress. Personal financial success and pride in country promote loyalty. That there is no broad internal rejection of onerous mass surveillance, social credit controls and ethnic cleansing as is the case with the Uyghurs, is a testament to the PRC’s ability to deny facts, deceive its population and prevent the import of non-PRC approved “truths” about freedom and justice within China. The Chinese cultural tendency to identify with the collective rather than the individual is likewise amplified by the PRC’s massive social control machine, with opposing or antagonistic perspectives effectively blocked by the Great Firewall or simply drowned out of public discourse by the volumes of Party-approved propaganda. The PRC’s strategy has created an environment that is more resistant to traditional intelligence recruitment techniques such as economic coercion, ideology exploitation and ego-stroking. Chinese intelligence service recruiters lean on the cultural affinity of ethnically Chinese living in the United States to turn them into spies, coerce them by alluding to what might become of their families living in China or deploy the time-tested technique of guanxi to achieve intelligence asset recruitments. United States intelligence officers do not enjoy a parallel or equivalent.

FBI Director Wray stated, “We’ve now reached the point where the FBI is opening a new China-related counterintelligence case about every 10 hours.” The threat is grave and our twentieth-century countermeasures, techniques and tradecraft are not appropriate for what many in the Intelligence Community deem the greatest threat to United States national security. Retooling, reimagining the intelligence recruitment cycle and modernizing the way that we approach the recruitment of sources is imperative.

Iran Cyber Operations Target Utility Infrastructure

cyber, cyber operations, espionage, counterespionage, counterintelligence, cyber defense, CISA, countermeasures, constantin poindexter

Per the U.S. Cybersecurity and Infrastructure Security Agency (CISA), “Since at least November 22, 2023, these IRGC-affiliated cyber actors have continued to compromise default credentials in Unitronics devices. The IRGC-affiliated cyber actors left a defacement image stating, “You have been hacked, down with Israel. Every piece of equipment ‘made in Israel’ is CyberAv3ngers legal target.” The victims span multiple U.S. states. The authoring agencies urge all organizations, especially critical infrastructure organizations, to apply the recommendations listed in the Mitigations section of this advisory to mitigate the risk of compromise from these IRGC-affiliated cyber actors.” (CISA, 12/01/2023)

The penetrations were aimed at critical utilities, in the extant case of U.S. water and water waste treatment infrastructure. Per CISA, “Beginning on November 22, 2023, IRGC cyber actors accessed multiple U.S.-based WWS facilities that operate Unitronics Vision Series PLCs with an HMI likely by compromising internet-accessible devices with default passwords. The targeted PLCs displayed the defacement message, “You have been hacked, down with Israel. Every equipment ‘made in Israel’ is Cyberav3ngers legal target.” The Water and Wastewater Systems Sector (Water Sector) underpins the health, safety, economy, and security of the nation. It is vulnerable to both cyber and physical threats.” The warning is instructive. The fallout from a successful compromise of public water systems can be severe. Andrew Farr warns, “The imagination can run wild with worst-case scenarios about what a threat actor could do to a water system, but Arceneaux explains that sophisticated actors could hack a system and manipulate pumps or chemical feeds without the utility even knowing they were in the system. They could also create a water hammer that could lead to cracked pipes or release untreated wastewater back into a source water body. What if that happens [to a water system] in a medium or a big city? Maybe it’s only for a few hours, but it could go on for a few days or weeks, depending on how extensive the damage is.” (Farr, WF&M, 04/11/2022) Darktrace reports the very real consequence of a successful water system compromise. “Earlier this month, cyber-criminals broke into the systems of a water treatment facility in Florida and altered the chemical levels of the water supply.” (Matthew Wainwright, Darktrace) If potable water delivered to consumers contains dangerous contaminants or improper balances of the “good” chemicals blended to the product (fluoride, chlorine, chloramine, etc.), it can cause negative health effects. Gastrointestinal illness, nervous system damage, reproductive system damage, and chronic diseases such as cancer are very real risks associated with the same.

CISA cyber defense model of the “brute force” methodology deployed by IRGC operatives may be viewed at MITRE.

Strategic-Level Management, Smaller is Better

constantin poindexter, carlyle poindexter, research, Operation Bayonet, covert action, covert operation

I read an interesting article in the Wall Street Journal today, a book review of “Emperor of Rome”, by Mary Beard. While the piece focused on the untimely demise of many of the caesars, there was a short but instructive comment. “Emporer of Rome is spiced with striking comparisons. The Roman Empire functioned with about 95% fewer senior personnel than the Han Dynasty that ruled at the same time in China.” (Kyle Harper, WSJ, 10/22/2023) This small anecdote reads as if it had been a surprise finding, that a small Roman leadership circle was a Black Swan and that it bends preconceived notions about the necessity of large networks of government instrumentalities to manage an empire as large as Rome’s. It is a fallacy that large enterprises require the support of large bureaucracies. Quite to the contrary. In strategic-level management, smaller is better.

Organizational dynamics and bureaucracy are Geoffrey M. Bellman’s forté. In his work, The Consultant’s Calling, “he explains why an organization is only capable of performing to a certain level of mediocrity. Organizational structure is essential to conducting business in a modern complex society. Bellman relates that organizations are: large, awkward, and unwieldy. Usually, organizations don’t work very well because they don’t fit the human creatures who work in them. Organizations as we have built them are more mechanical than ‘organical’… we have built awkward hierarchical structures with boxes and lines connecting them. We have created structures modeled after machines–mechanistic, sharply defined, and inflexible–that force their moving human parts to act like machines too. Such organizations do not work very well … even when everything is finely in tune … there are significant difficulties.” (Bellman, 2001) The author’s commentary is prescient and instructive.

There is a ‘real world’ case study that illustrates well the concept of “smaller is better”. A master’s thesis authored by Alexander B. Calahan, COUNTERING TERRORISM: THE ISRAELI RESPONSE TO THE 1972 MUNICH OLYMPIC MASSACRE AND THE DEVELOPMENT OF INDEPENDENT COVERT ACTION TEAMS (Calahan, 1995) provides an excellent argument. “The important aspect of operating within organizations and systems is that by its very nature, it incorporates a predetermined limitation of success. As long as the mission operates under the constraints dictated by the organization’s structure, policies, regulations and management philosophies, it will only obtain a finite predetermined level of success. Bureaucratic processes are rigid and restrict decentralized authority and the ability to work at a continued fast and fluid pace. Government agencies must live within regulations that do not allow interpretation or flexibility for unique circumstances. Bellman related that organizations are sharply defined and do not allow flexibility. Philip K. Howard, The Death of Common Sense (1995), further demonstrates how this is magnified in government agencies: Government acts like some extraterrestrial power, not an institution that exists to serve us….It almost never deals with real-life problems in a way that reflects an understanding of the situation….Our regulatory system has become an instruction manual. It tells us and the bureaucrats exactly what to do and how to do it. Detailed rule after detailed rule addresses every eventuality, or at least every situation lawmakers and bureaucrats can think of. Is it a coincidence that almost every encounter with government is an exercise in frustration? In the decades since World War II, we have constructed a system of regulatory law that basically outlaws common sense. Modern law, in an effort to be self-executing, has shut out our humanity….The motives were logical enough: Specific legal mandates would keep government in close check and provide crisp guidelines for private citizens. But it doesn’t work. Human activity can’t be regulated without judgment by humans. Government cannot accomplish anything when multiple procedures are required for almost every decision. Process is a defensive device; the more procedures, the less government can do. Which is more important: the process or the result?” The author and his cited references are correct. Large bureaucratic organizations cannot support a dynamic operation that must think and act “on the fly”.

Calahan’s case study is an analysis of Operation Bayonet, an assassination mission in response to the massacre of Israeli Olympians and their coaches. The Mossad fielded two teams to accomplish the operation, one under strict headquarters control (“Lillehammer”) and the other (“Avner”) under none. The former was a disaster and the latter and ALMOST perfect success. The failed operation had many flaws but the most salient argument is the “micromanagement” one. Per Calahan, “However, the failure is more attributable to attempting to conduct an operation beyond the capabilities of the political bureaucracy. The officers in Lillehammer had more than adequate training and skills; however, the organization forced them to abandon proven tradecraft procedures to accomplish the assassination of Salameh under unreasonable tactical conditions. X allowed political pressure to dictate the pace of the operation beyond what he knew was reasonably necessary for success within the bureaucracy.” (Calahan, 1995)

The successful operation enjoyed an autonomy that ultimately achieved the operation’s objective. ” . . . Avner’s team was designed outside the political realm of the Mossad. Avner’s team would not institute shortcuts bowing to political influences that might jeopardize the success of the mission. Quality operations demand quality people involved and quality planning from the outset. The Mossad team members understood that they would operate in a covert capacity until the successful completion of the mission or the team was no longer able to operate intact due to injuries or deaths. They were to remain a cohesive unit. The unit learned and understood each others’ skill, abilities, and limitations, planning and operating accordingly.” (Calahan, 1995) Small, tight and capable teams with more “hands off” oversight was key.

“Walmart CEO Doug McMillon calls it “a villain.” Berkshire Hathaway vice chair Charlie Munger says its tentacles should be treated like “the cancers they so much resemble.” Jamie Dimon, the CEO of JPMorgan Chase, agrees that bureaucracy is “a disease.” These leaders understand that bureaucracy saps initiative, inhibits risk taking, and crushes creativity. It’s a tax on human achievement.” (Hammel and Zanini, HBR, 2018) In the covert operation subject of Calahan’s case study, as in the private corporate sector, smaller is better. So did the Roman caesars manage the empire with a small leadership cadre by design, eschewing the idea that large bureaucracies were necessary to the state, or was their design utilitarian, i.e., keep your enemies close? Either way, the Emperor of Rome has apparently stumbled on one of the most important observations on successful management of a team, . . . a lesson for leadership when strategic planning.

The Problem of Truth Decay

disinformation, truth, decay of truth, constantin poindexter, carlyle poindexter research masters

In a particularly timely and instructive work, Doug Irving of the RAND Corporation offers insight on how pernicious the “decay of truth” is to our security, and more to the point our adhesion to one another as Americans with common goals, hopes and dreams.

Writes Irving, “You could walk up to most Americans and ask them, ‘What are our national interests?’ and there would actually be a lot of agreement,” said Williams, the associate director of the International Security and Defense Policy Program at RAND. “Now, how do we achieve those national interests? There are lots of legitimate views about that—but Truth Decay makes it harder for people to have a reasoned debate. Partisanship and political self-interest get pushed to such an extreme that there is no middle ground where compromises, let alone consensus, can be achieved.” (RAND, 2023). The “middle ground” to which Irving refers is the foundation of a fair democratic system. Our democracy works when parties are able to share, discuss and at times fiercely debate differences of policy opinion. I stress here the word, “opinion”, because we observe currently a broad coalition of citizens that accept unqualified and un-vetted opinions as truths. “A new NPR/Ipsos poll finds that 64% of Americans believe, . . . that “voter fraud helped Joe Biden win the 2020 election” — a key pillar of the “Big Lie” that the election was stolen from former President Donald Trump. (NPR, 2022). It is a FACT that voter fraud is almost non-existent, and that the few cases of voter fraud are so insignificant that they cannot affect the outcome of a national election. Voter fraud is a myth.

Per Irving, “The poll found that support for false claims about election fraud and the January 6th attack have been remarkably stable over time. For example, one-third of Trump voters say the attack on the Capitol was actually carried out by “opponents of Donald Trump, including antifa and government agents” — a baseless conspiracy theory that has been promoted by conservative media since the attack, even though it has been debunked.” (RAND, 2023) The lie continues to be frighteningly persistent, only on the right. I am not shooting down some of the very important (and valid) policy positions that the Republican coalition hold. In fact, I do agree with some of them. My problem is with the lies, the disinformation propagated by the right and their engagement in disinformation activities that would make Goebbels blush. The problem here is compounded by the observation of disinformation effectiveness among our adversaries. “China, Russia, and other adversaries already know this. They have weaponized disinformation—seeding the internet with rumors and conspiracy theories in the panicked early days of COVID-19, for example. That helped slow the response and almost certainly cost lives. But it also makes it harder to hold up American democracy as a model for the world.” (RAND, 2023)

Circling back to my point about vigorous debate, how an argument over policy points improves the health of our democracy, the debate must be based on a shared set of objective facts. One CANNOT engage in legitimate debate when one side lies, and lies almost all of the time. Further, the lies are reinforced by a group of conservative media that keep otherwise well-intentioned citizens inside of an information bubble that repeats falsehoods ad infinitum. Fox, OAN, Breitbart, the Daily News and others are the chief offenders, Fox, was most recently ordered to pay nearly $800 million for, . . . lying. What is the solution? How do we get back to caring about one another, or more to the point, caring about the health of our democracy? Irving offers some prescient advice.

“The U.S. Intelligence Community, the U.S. Department of Homeland Security, and other government agencies are already investing in efforts to swat down misinformation and disinformation before they take hold. Efforts to strengthen media literacy and civics education in school could also help strengthen the public against Truth Decay, especially on questions of national security.” (RAND, 2023) Irving and others are not the first to offer this partial solution. I would humbly add here that our youth, grade schoolers would be well-served by the inclusion of coursework on disinformation and its nefarious effects on all of us. The technique is called “inoculation”, work that much like a vaccine provides our kids with some basic defense mechanisms to internal and external attempts to subvert our system. Estonia includes media literacy work in their grade school curriculums, thus there is precedence. Further work on the RAND strategy might include the same.

I recommend a full read of Irving’s piece on RAND’s blog.

Cannabis Approval is Compassionate

cannabis, cannabinoid, marijuana, surety one, suretyone.com, constantin poindexter, carlyle poindexter

My professional life is largely spent in the insurance and financial services sector as CEO of Surety One, Inc., a national surety bond general agency. One of the classes of bond business that we write is for cannabis enterprises. While I tend to leave each individual’s particulars to him or herself, I have spent some not-insignificant time thinking about the availability of cannabis and whether that access is a social ill or a social good. Like any reasonable person, I would rather that the driver of my children’s school bus, my airline pilot, my brain surgeon, etc., not smoke pot, I am overwhelmingly convinced that legalization and de-scheduling of cannabis is the “right thing to do”. I’m not advocating for the use, misuse or abuse of any substance however there is a group of people that most certainly benefit from our compassionate approval of marijuana products for them.

The debate over the legalization of medical cannabis has gained significant momentum, not only in the U.S. but across the globe. Advocates argue that allowing medical cannabis is not just a matter of legality but also a question of compassion. One of the most compelling arguments for legalizing cannabis is its ability to alleviate pain and suffering in patients with chronic and debilitating illnesses. For individuals battling conditions such as cancer, multiple sclerosis, epilepsy, and chronic pain, conventional treatments might not always be effective or come with severe side effects. Medical cannabis, with its natural pain-relieving properties, can offer a ray of hope and relief, giving these patients a chance to improve their quality of life.

Medical cannabis, particularly cannabidiol (CBD), has shown promise in reducing the frequency and severity of epileptic seizures. For children and adults suffering from severe forms of epilepsy, such as Dravet syndrome or Lennox-Gastaut syndrome, medical cannabis can be a lifeline. By allowing access to this alternative treatment, governments can demonstrate compassion for those living with these debilitating conditions.

Mental health conditions such as anxiety, depression, and PTSD, affect millions of people. Traditional pharmaceutical interventions do not work for everyone and may lead to dependency and/or adverse side effects. Medical cannabis, especially strains with higher CBD content has been shown to have anxiolytic and mood-stabilizing effects. Legalizing medical cannabis provides patients with another option in their pursuit of mental well-being, promoting a compassionate approach to mental health care. This point alone is particularly prescient given the number of psychiatric professionals that have been sounding the alarm about emotional stress and its manifestations, especially among our military veterans.

For patients facing terminal illnesses or end-of-life care, medical cannabis can provide a comforting and compassionate touch. It can alleviate pain, improve appetite, and offer a sense of peace, allowing these individuals to spend their remaining days with greater comfort and dignity.

The compassionate aspect of legalizing medical cannabis extends beyond the realms of law and policy. It’s about recognizing the suffering of patients battling various medical conditions and providing them with access to a potential source of relief and hope. By embracing the legalization of medical cannabis, governments can show empathy, understanding, and a commitment to the well-being of their citizens. Moreover, it sends a powerful message that compassion and evidence-based care should guide our approach to healthcare, ultimately fostering a more inclusive and empathetic society. I stand by my decision to have my business enterprise support my view on this, as likewise I stand by the millions of my fellow human beings suffering from debilitating, painful infirmities.

Teaching, a Wonderful Opportunity for Personal Growth

teaching, teacher, instructor, constantin poindexter, carlyle poindexter

This was an awesome training program. Teaching is a most noble form of “paying it forward”. Pre-K through high school level, the impact that a mentor, a kind and patient guide, is immeasurable. “Teachers are the agents of the future. Will our world be populated by people ready and able to meet that future as creative and critical thinkers; as wise, compassionate and knowledgeable citizens; as skilled and motivated solutionaries within their professions? The answer to this question lies with teachers. More than any other profession, teaching has the power to create a healthy, just, and peaceful world (or not). It has the ability to seed our society with informed, caring and engaged citizens (or not). It has the capacity to inspire lifelong learning and a passion for knowledge, understanding, and innovation (or not). Is there anything more important than this?” (Zoe Weil, Common Dreams, 2011) With Zoe, I must concur.

You might choose to teach part-time, substitute or full-time, for pay or not as your conscience and need may be. Regardless, I recommend this or similar series to anyone with interest.

“Society grows when men plant trees, the shade of which they know that they will never live to enjoy.”