Now that the God-Emperor is organizing his cabinet, let us give thanks to Kek and review some of the challenges facing us.
By challenges I don’t mean, for example, Trump’s recent disavowal of the AltRight which while a tactical inconvenience is also an opportunity for more exposure than Hillary’s ground-zero denunciation of us.
Rather, I want to focus on truly critical and existential challenges — challenges that if not addressed could cripple our movement or sink it altogether.
Let’s start with email, shall we?
And no, I’m not even remotely kidding.
Could Donald Trump have been elected without WikiLeaks having published the emails from Hillary’s hacked email server?
How about the second trove of emails the NYPD found on Anthony Wiener’s laptop that forced the FBI to reopen the investigation before the election?
Those emails and the damning revelations of corruption, degeneracy, and lying that flowed from them put Hillary’s campaign on its heels in a downward and defensive spiral from which it never recovered.
How could Hillary and her team have treated their communications security so stupidly and cavalierly?
I don’t frankly know or care. Hillary, Podesta, and (((Weiner))) all violated the Iron Law of Information Security: Privacy or Convenience . . . Pick One.
The hubris of Hillary and her team led them to choose convenience. Had they simply bothered to learn and use readily available encryption tools, none of their hacked emails would have been readable or useful to any of their enemies, e.g., WikiLeaks and us.
Pause and ponder that for a minute. If just a handful of people had simply bothered to secure their emails, Hillary and Co. would now be selecting their cabinet and claiming a mandate to proceed with our extinction.
Our enemies won’t make the same mistake again. That was a one-time gift from Kek.
Our nascent movement can ill afford even a single such blunder.
It’s absolutely critical our movement’s activists, leaders, and fellow travelers understand the following uncomfortable but irrefutable black-pill truth:
We all live in a real-time surveillance state the likes of which has never existed before. A surveillance state whose breadth and scope would have made Hoover’s FBI, East Gemany’s Stasi, and Stalin’s KGB positively green with envy.
If you’ve not gotten the memo from the revelations from Snowden, WikiLeaks, Manning, and many others, let’s recap so everyone understands how 21st century surveillance works in the current year.
Ready? Here goes:
Every phone call
Every bank wire
Every PayPal use
Every Facebook post
Every Amazon purchase
Every Google search
Every Use of your Credit/Debit Card
Every “Your favorite electronically-mediated transaction here”
that you and I make is now captured and stored indefinitely in massive databases that can be searched, collated, and analyzed in real-time by the NSA, its foreign partners, and corporate proxies.
Over half of all Americans have already had their facial photo profiles added to these databases without their knowledge or consent. Once in the photo databases, your photo alone can be used to learn everything about you.
Do not doubt this. Early in my career I attended a classified demonstration of facial recognition software. A Polaroid group photo of all attendees was taken and scanned into the software. The photos from attendee security badges were then scanned in turn. The software quickly and impressively located each attendee in the group photo from their badge photo. That was 1987 on a PC with a million times less computing power than my smartphone. Today’s facial recognition software can find you in a busy airport, a crowded street, a large sports stadium, or a huge political rally in seconds – along with countless others.
Where’s Waldo? is not a game the modern surveillance state loses very often these days.
And it would be beyond foolish to think Trump’s election will mean the surveillance state apparatus will necessarily be in friendlier hands for the next 4-8 years and not used against us. If WikiLeaks has demonstrated anything it’s the certainty that “deep state” partisans, SJWs, or reactionaries can and will use the government apparatus to embarrass, thwart, or destroy us.
Therefore, until such time as we come to power and control the surveillance apparatus, we must treat the surveillance state as the hostile enemy it is.
We must begin immediately to take responsibility for securing our own communications and data from the prying eyes of all our real and potential enemies.
We must treat the security of our information as critical and essential to our future victory — because it is.
If we don’t, failure won’t be just an option — it will be a certainty.