Individual Economists

Bitcoin Crashes To Nov 2024 Lows Amid $1.5 Billion In Levered Liquidations

Zero Hedge -

Bitcoin Crashes To Nov 2024 Lows Amid $1.5 Billion In Levered Liquidations

In an otherwise quiet session - as one would expect for a Saturday, certainly the algos would - starting early this morning there has been concerted pressure to sell into the bitcoin spot price following yesterday's Warsh-inspired rout which repriced bitcoin from 88K to 84K, pressure which grew into a liquidation firehose just after 9am ET and especially at noon, when we saw massive algo-driven volumes hitting the bid.

The selling has pushed Bitcoin as low as $74,000 (it was almost at $100K last week), and is at the lowest price since Trump became president (the April 2025 liberation day low of $74k was just taken out).

The selloff has liquidated over $110 billion from the crypto market’s total value in the past 24 hours. 

While algos were the initial spark that prompted the selling, the target - as usual - were heavily levered longs: in the past 4 hours more than $1.5 billion in levered positions, mostly longs, were liquidated according to CoinGlass. For reference, on October 10, aka "Black Friday", about $19 billion in crypto leverage was liquidated.

The liquidations have been spread between both bitcoin and ether...

... with bitcoin fast approaching the most oversold on record.

Which doesn't mean that it can't be even more oversold: after all, the market is now convinced that Kevin Warsh will hike rates as soon as he can, which is why we warned that appointing Warsh would collapse Trump's crypto empire on very short notice.

That's precisely what is happening right now. 

The latest crash in a long series, adds to weeks of disappointment for Bitcoin, which has failed to respond to a series of market developments that previously would have supported the asset. The dollar weakened for much of January, but the move did little to lift sentiment in crypto markets; if anything bitcoin slumped alongside the dollar. Likewise, Bitcoin offered no meaningful response during gold’s rally to record highs, nor has it attracted inflows in the wake of gold and silver’s sharp reversal on Friday. 

Most notably, after tracking global liquidity injections by central banks for much of the past two years, bitcoin has become the only assets the drops the most liquidity central banks inject.

The big question now is that bitcoin briefly fell as low as $75K (and will likely revisit), what happens to Strategy's massive stash of 712.6 bitcoins which was acquired at an average price of $76,037: will Michael Saylor be forced to start selling?

Tyler Durden Sat, 01/31/2026 - 14:03

Federal Judge Refuses To Block Trump's ICE Surge In Minnesota

Zero Hedge -

Federal Judge Refuses To Block Trump's ICE Surge In Minnesota

Authored by Jacob Burg and Troy Mayers via The Epoch Times,

A federal judge on Jan. 31 denied Minnesota’s emergency request to block the Trump administration’s deployment of thousands of federal agents to the Twin Cities in a large-scale immigration enforcement operation.

In her ruling Saturday morning, U.S. District Judge Katherine Menendez wrote that the “Court must view Plaintiffs’ claims through the lens of the specific legal framework they invoke, and, having done so, finds that Plaintiffs have not met their burden... the motion is denied.”

She heard arguments from both the Department of Justice and attorneys representing Minnesota and its Twin Cities earlier this week, appearing somewhat skeptical of the district court’s authority over the separation of powers arguments the plaintiffs were advancing.

However, Menendez also probed the Justice Department’s intentions with Operation Metro Surge, the federal government’s deployment of more than 4,000 federal agents to Minnesota’s Twin Cities, and whether the Trump administration violated the 10th Amendment’s “anti-commandeering doctrine.”

That aspect of the 10th Amendment blocks the federal government from forcing state legislatures to pass laws or requiring state officials to administer a federal regulatory program.

Plaintiffs argued that the Trump administration’s actions amounted to a violation of Minnesota’s state sovereignty.

Minneapolis city attorney Brian Carter suggested that a letter Attorney General Pam Bondi sent to Gov. Tim Walz, a Democrat, was meant to coerce the state into ending its so-called “sanctuary” policies at the threat of continued deployment of federal agents.

Plaintiffs are asking the court to apply the 10th Amendment to block the Trump administration from “coercing the state into legislating” or using state resources to enact a “federal regulatory scheme,” Carter said.

In her letter, Bondi said Minnesota has “refused to enforce the law” and demanded that Walz “restore the rule of law, support ICE officers, and bring an end to the chaos in Minnesota,” share state data on Medicaid and food stamps programs, repeal state sanctuary policies, and hand over state voter rolls to the Justice Department.

The Justice Department said in court that the state laws in question, which the Trump administration argues shield illegal immigrants from detention and deportation, violate federal law.

Department of Justice attorney Brantley Mayers argued that if a state made drug trafficking legal, against the federal government’s drug statutes, it wouldn’t amount to a 10th Amendment violation if the “federal government responded by increasing the amount of boots on the ground.”

However, Menendez pressed the Justice Department on Bondi’s letter and asked how it’s not indicative of a “quid pro quo” agreement that would directly violate the 10th Amendment’s “anti-commandeering doctrine.”

The judge said that throughout the 10th Amendment cases discussed between plaintiffs and defendants, there’s “no question” that they amount to situations where the federal government tells a state it must do something specific to receive a grant or funding. She said in the current situation, the executive action may be “in the street” rather than on paper, but that doesn’t “put it beyond the reach of consideration.”

“Let’s imagine that Attorney General Bondi said, ‘We are here until you change your policies.’ Wouldn’t that violate the anti-commandeering principle?” Menendez asked.

Mayers said “not necessarily,” arguing that the “vacuum of federal law enforcement” from Minnesota’s policies has led to the “need for federal law enforcement” and suggested that does not create an “anti-commandeering problem from the outset” when the Trump administration announced the deployment.

Plaintiffs said a temporary restraining order blocking the president’s Operation Metro Surge was necessary to calm tensions in the streets between residents and federal agents, which reached an inflection point on Jan. 24 after a Border Patrol officer fatally shot a protester just weeks after a driver was shot and killed. Federal authorities have said the officers acted in self-defense.

“I think that this weekend demonstrated, in a terrifying way, that the current situation is absolutely untenable,” Minneapolis city attorney Sara Lathrop said.

“We do not deny that these are serious questions. These are difficult questions, but the relief that we need needs to be now in order to take down the temperature and allow those important questions to be answered.”

Tyler Durden Sat, 01/31/2026 - 14:00

The US Economy In A Nutshell: A Few Winners, Everyone Else Loses Ground

Zero Hedge -

The US Economy In A Nutshell: A Few Winners, Everyone Else Loses Ground

Authored by Charles Hugh Smith via OfTwoMinds blog,

Maybe this arrangement isn't as stable and sustainable as the winners imagine.

Here's the US economy in a nutshell: corporate/state concentrations of financial, market and political power are the winners, and everyone outside these fortresses is losing ground. The Wall Street Journal is generally viewed as pro-business, and so it's particularly striking when the WSJ published this:

The Economic Divide Between Big and Small Companies Is Growing: Economic fortunes of low- and high-income Americans are diverging--same pattern happening with companies. (WSJ.com)

--The growing divide between the fortunes of small and large businesses mirrors the divide that has emerged over the past year between low-income Americans and their high-income counterparts.

--Large, publicly traded companies in the S&P 500 saw net income increase by 12.9% in the third quarter, contrasting with faltering small-business profits.

--Small businesses are facing economic headwinds, including high inflation and cautious consumers, leading to job cuts; 120,000 jobs were shed in November.

In other words, the small circle of winners and the larger circle of those losing ground describes both households and enterprises: small businesses--lacking the concentrated financial / political power to exercise monopoly-cartel control of their market and protect their fiefdom by buying political influence--are in steep decline--and this is in "good times," i.e. the economy is expanding, not contracting in a recession.

As in the household sector, the winners are doing splendidly while everyone else loses ground. The media--controlled by the winners, of course--tout the winners as if they're the norm rather than the outliers in a winner take most economy.

The quasi-monopolies and cartels of Corporate America reign supreme: trillion-dollar valuations, soaring profits, unmatched political and market control. Small business, whose interests are diffuse and widely distributed, are reduced to tax donkeys struggling to pay soaring rent, wages, utilities and overhead costs without the market muscle of monopolies / cartels to force consumers to pay higher prices for degraded goods and services.

The top 10% of households are also doing extremely well, accounting for fully half of all consumer spending as their earnings, passive investment income and assets all bubble higher.

A few of these top earning households are blue-collar households with workers earning top pay due to scarcity of their skillsets, but most are working in the state / corporate sectors with the power to pay high wages and benefits regardless of what's happening to the bottom 90%.

While large corporations are adding employees, small businesses are shedding employees to survive.

Wage growth mirrors this asymmetric distribution: the post-pandemic stimulus trillions that boosted the mid and lower income workforce has reversed while wages for the top tier are rising.

The point here is that entities with financial, market and political power don't need a thriving bottom 90% to increase their dominance. They have no real need to care what's happening to the bottom 90%, as they can extract higher taxes, rents, subscriptions and prices while degrading the goods and services they provide because an economy dominated by monopolies and cartels is a TINA Economy: there is no alternative, as the world outside the monopolies and cartels is a barren landscape stripped of the functionality required to participate in the economy.

We're constantly assured an economy where the gains follow an extraordinarily asymmetric power-law distribution is a wondrous engine of sustainable growth that benefits everyone, but the facts don't support this fairy-tale PR promoted by the winners to placate those losing ground.

Maybe this arrangement isn't as stable and sustainable as the winners imagine.

*  *  *

My new book Investing In Revolution is available at a 10% discount ($18 for the paperback, $24 for the hardcover and $8.95 for the ebook edition). Introduction (free) Check out my updated Books and Films. Become a $3/month patron of my work via patreon.comSubscribe to my Substack for free
 

Tyler Durden Sat, 01/31/2026 - 12:50

Activist Judge Blocks Key Parts Of Trump EO On Verifying Citizenship To Vote

Zero Hedge -

Activist Judge Blocks Key Parts Of Trump EO On Verifying Citizenship To Vote

A federal judge on Friday blocked key provisions of President Trump's executive order that requires proof of US citizenship for voter registration. 

Signed on March 25, Executive Order 14248 directs the Election Assistance Commission to require in its national mail voter registration form that voters provide documentary proof of US citizenship, such as a passport. The order also directs federal officials to take measures to prevent illegal immigrants and other noncitizens from voting in federal elections. 

The commission, established by Congress in 2002, helps local officials administer elections. 

On Friday, 82-year-old US District Judge Colleen Kollar-Kotelly (Clinton) - who was previously presiding judge of the Foreign Intelligence Surveillance Court - ruled that provisions requiring citizenship verification "are inconsistent with the constitutional separation of powers and cannot lawfully be implemented."

Kollar-Kotelly said that the US Constitution "does not allow the President to impose unilateral changes to federal election procedures," insisting that the framers gave power over election rules "to the parts of our government that they believed would be most responsive to the will of the people: first to the States, and then, in some instances, to Congress."

"They assigned no role at all to the President," she added. 

She also struck down part of the executive order directing heads of various federal agencies to "assess citizenship" before giving the federal form to "enrollees of public assistance programs," adding that the National Voter Registration Act requires agencies to give said form to those receiving their services. 

The preliminary ruling applies to three separate lawsuits brought by plaintiffs; League of United Latin American Citizens, League of Women Voters Education Fund, and the Democratic Party.

About That Judge... Judge Colleen Kollar-Kotelly

Judge Kollar-Kotelly is an unabashed left-wing, pro-surveillance state, anti 2A activist. Her father worked in US foreign assistance programs in Mexico, Ecuador and Venezuela in the 1950s. In 2004, she issued a FISA court order allowing the NSA to continue spying on domestic metadata. In 2009 she issued a ruling blocking visitors to national parks from carrying concealed weapons, and in 2016 she denied a preliminary injunction against Washington DC's ban on concealed carry permits. In 2017, she blocked the enforcement of Trump's ban on transgenders in the military.

In 2024, Kollar-Kotelly sentenced a woman to 57 months in prison and three years of supervised released under the FACE Act for blocking access to an abortion clinic, and sentenced another woman (Paula Harlow) to two years in federal prison and 36 months of supervised release for the same thing. She also found a J6 protester, Dominic Box, guilty on six charges. Box was pardoned by Trump before he could be sentenced. 

Kollar-Kotelly notably criticized Trump over blanket pardons for those involved in the January 6th incident. 

More recently, she issued an order blocking the IRS from sharing taxpayer information with ICE.

Tyler Durden Sat, 01/31/2026 - 12:15

Over 185,000 Americans In The South Remain Without Power After Ice Storm

Zero Hedge -

Over 185,000 Americans In The South Remain Without Power After Ice Storm

Authored by Jacki Thrapp via The Epoch Times,

Over 185,000 Americans were without power nearly one week after a deadly winter storm swept through two-thirds of the country.

States that faced ongoing power outages included Mississippi, Tennessee, Louisiana, and Texas.

The northern part of Mississippi had the most outages with nearly 80,000 utility customers in the dark as of 5 p.m. ET.

Officials at the North East Mississippi Electric Power Association said they weren’t sure when the lights would be back.

“I’m not quite prepared to give a real good estimate of when you might get power,” General Manager Keith Hayward said in a Jan. 29 video posted on X.

Tennessee experienced the second largest number of outages in the United States. The majority of affected customers resided in the heart of Nashville.

Davidson County, which covers a section of Nashville, had over 60,000 people without power as of 5 p.m ET, which is 85 percent of the outages reported in the state.

Nashville Electric Service said that the ice storm was worse than they expected and added that the provider has never had to deal with damage from a system like Winter Storm Fern.

“When we look at the trees that have exploded, when we drive around the community and are still working to get this restoration done, we have to see how severe this was,” said Brent Baker, Nashville Electric Service chief operations officer during a press conference on Jan. 29.

The delays restoring power have caused multiple groups and agencies to step up and help residents impacted.

Soldiers with the Tennessee Army National Guard’s 212th Engineer Company were called out to the streets of Nashville to remove debris and assist with road clearance on Friday.

Churches in the area started booking hotel rooms for people without power.

Trees are coated with ice as over 200,000 people in the Nashville area woke up without power on Jan. 25, 2026. Jacki Thrapp/The Epoch Times

Louisiana had over 32,000 outages by 5 p.m. ET.

“I have been in Washington, D.C., working side by side with [federal and local officials] to secure the resources and support Louisiana needs,” Gov. Jeff Landry (R-La.) wrote in an X post on Jan. 30.

“With more severe winter weather hitting our state, I am cutting my trip short and heading home now to continue leading our response efforts on the ground. Please remember to stay safe and stay warm!”

The National Weather Service is predicting a widespread storm will slam the East again this weekend.

“A rapidly deepening storm centered just off the North Carolina coast Friday night through Saturday night will produce widespread heavy snow and wind from the southern Appalachians across the Carolinas and southern Virginia,” the agency posted on X Jan. 29.

Tyler Durden Sat, 01/31/2026 - 11:40

Connecticut School Cancels Event With Education Secretary Over Political Pressure

Zero Hedge -

Connecticut School Cancels Event With Education Secretary Over Political Pressure

Authored by Jonathan Turley,

We have long discussed how educators are instilling viewpoint intolerance in students from the earliest grades. The latest example is the cancellation of a visit to McKinley Elementary School in Fairfield, Connecticut, by Secretary of Education Linda McMahon.

The students had the opportunity to speak and interact with a cabinet member, but the school cancelled the event due to political opposition from parents.

Reports indicated that the visit, part of McMahon’s “History Rocks” tour in celebration of the 250th anniversary of the Declaration of Independence, was cancelled due to a campaign by parents.

The parents rose up after McKinley Principal Christine Booth wrote them saying that the school was

“proud to offer this unique opportunity and… unforgettable experience for our McKinley students. Students will enjoy a dynamic, interactive assembly that brings American history and civic learning to life through fun, game show style activities, hands-on participation, and even prizes. This high energy experience is designed to spark curiosity, celebrate our country’s story, and make learning memorable for our students.”

Fairfield Superintendent of Schools Michael Testani folded immediately under the political pressure rather than stand firm that the school is a place for different ideas and voices:

“Following this evening’s announcement about the Secretary of Education’s planned visit to McKinley on Friday, we heard from many families who expressed concerns and shared that they were considering keeping their children home. Due to these circumstances, the Secretary of Education’s visit to Fairfield has been canceled.”

Those “circumstances” were the combination of political pressure from parents and a lack of principle by school officials.

These parents and officials have taught these students a terrible lesson: they should not be exposed to opposing views or speakers.

They are raising a generation of speech-phobics that reflects their own intolerance and bias.

Tyler Durden Sat, 01/31/2026 - 10:30

MiB: Kate Burke, Allspring Global Investments, CEO

The Big Picture -

 

 

This week, I speak with Kate Burke, chief executive officer of Allspring Global Investments and director on the Board of Directors at Allspring Global Investments. The firm manages over $635 billion dollars primarily in fixed income (and equity) assets for institutions. About two-thirds of Allspring’s $635 billion is on its fixed income platform, which includes their liquidity (money market) business; equity is about 20% of the assets.

We discuss her career at AllianceBernstein, including the transition from Chief Talent Officer to CEO, and her move to Allspring. We also discuss her asset management philosophy, and the firm’s long term relationship with Wells Fargo, which is its largest client, with a focus on money market, defined benefits, and institutional management business.

A list of her current reading/favorite books is here; A transcript of our conversation is available here Tuesday.

You can stream and download our full conversation, including any podcast extras, on Apple Podcasts, SpotifyYouTube, and Bloomberg. All of our earlier podcasts on your favorite pod hosts can be found here.

Be sure to check out our Masters in Business next week with Bob Moser, CEO and founder of Prime Group Holdings, a private investor in unique real estate holdings. They created Prime Storage, one of the largest, privately-held self-storage brands in the world, with over 19 million rentable square feet of space and 255 locations across 28 states and the U.S. Virgin Islands. The firm has acquired over $10 billion in real estate assets.

 

 

 

Current Reading

 

 

 

The post MiB: Kate Burke, Allspring Global Investments, CEO appeared first on The Big Picture.

Latest Epstein Emails Reveal Bill Gates Slipped Wife Antibiotics For STD He Got From Russian Hookers

Zero Hedge -

Latest Epstein Emails Reveal Bill Gates Slipped Wife Antibiotics For STD He Got From Russian Hookers

Democrats thought that the firehose release of Epstein files would "finally" bring down Trump. Instead, not only is that not happening (one can argue the latest batch of docs further cements Trump's claim that he had distanced himself far enough from Esptein in recent decades as this admission from Epstein himself to his favorite scribe Michael Wolff reveals), but it is taking down Democratic "thought titans", each one bigger than the next: first it was Larry Summers, then Bill Clinton, now it's Bill Gates.

In what can only be described as the latest chapter in the never-ending saga of elite depravity, the DOJ coughed up over three million pages of Jeffrey Epstein's sordid files – a treasure trove of smut, scandal, and schadenfreude that puts the spotlight squarely back on billionaire vaccine-pusher and Microsoft mogul Bill Gates. Released on Friday, these documents include draft emails from Epstein to himself, painting a picture of Gates as a man entangled in extramarital escapades involving "Russian girls," desperate pleas for antibiotics to hide an STD from his then-wife Melinda, and even bizarre anatomical descriptions that no one asked for. Gates' camp, predictably, is screaming "fake news" from the rooftops, but let's dive into the dirt and see if this smells like another cover-up in the making.

According to the newly unsealed emails, drafted in July18, 2013 but unclear if ever sent, Epstein rants about Gates severing ties with him, accusing the tech titan of hypocrisy after allegedly benefiting from his seedy network. "To add insult to injury you then subsequently with tears in your eyes, implore me to please delete the emails regarding your std, your request that I provide you with antibiotics that you can surreptitiously give to Melinda, and the description of your penis," Epstein reportedly wrote in one typo-riddled tirade. He went on to claim he helped Gates "deal with consequences of sex with Russian girls," implying Epstein played pimp in these alleged trysts. The only question for the FBI: were they underage?

Epstein, ever the aggrieved party in his own mind, positions himself as the jilted enabler who got Gates out of jams, only to be ghosted when the heat got too hot. "I have been caught up in a severe marital dispute between Melinda and Bill," he laments in another note, adding that Gates asked him to partake in "things that have ranged from the morally inappropriate to the ethically unsound" and "potentially over the line into illegal." This comes amid Epstein's supposed resignation from roles tied to the Gates Foundation and BG3, Gates' think tank.

And what's this?

A spokesperson for Gates didn't mince words in response: "These claims – from a proven, disgruntled liar – are absolutely absurd and completely false." Fair enough, but let's not forget Gates has been tap-dancing around his Epstein ties for years. He once called those dinners with the pedophile financier a "huge mistake" in a 2021 CNN interview, downplaying them as mere fundraising schmoozes.

Flashback to our 2019 exposé: "Bill Gates Was Much Closer To Jeffrey Epstein Than He Initially Let On," where we detailed Gates' flights on Epstein's infamous 'Lolita Express', yes, after Epstein's 2008 conviction for soliciting a minor. Then there was "Why Did Bill Gates Fly On Epstein's 'Lolita Express' After Pedophile's Prison Stint?" And who could forget this 2023 bombshell: "Bill Gates 'Blackmailed' By Jeffrey Epstein Over Affair With Russian Bridge Player," revealing Epstein's alleged leverage over Gates' fling with Mila Antonova, a young Russian card shark introduced by none other than Epstein himself. That story tied into reports of Epstein paying for Antonova's coding classes, only to later dangle the affair as blackmail fodder when Gates balked at a shady investment scheme.

Bill Gates

The Russian angle keeps popping up like a persistent virus, no pun intended. In our 2021 piece "'Furious' Melinda Gates Warned Bill Over Jeffrey Epstein Escapades," we highlighted how Melinda was reportedly livid about Bill's cozying up to Epstein, with meetings starting as early as 2011 and contributing to their 2021 divorce. Fast-forward to last year's "Go Talk To Bill Gates About Me": How JP Morgan Enabled Jeffrey Epstein's Crimes, Snagged Netanyahu Meeting," which exposed Epstein name-dropping Gates to JPMorgan execs as a reference, further entangling the billionaire in Epstein's web of influence-peddling.

This latest DOJ dump - which also drags in figures like former UK ambassador Lord Peter Mandelson (Epstein allegedly sent money to his husband post-prison), Prince Andrew (invited to the Palace amid fresh dirt), and even photos of Epstein hobnobbing with Trump, Clinton, and Gates - feels like the establishment's reluctant confession booth. Deputy AG Todd Blanche announced the release more than a month after a December 19, 2025, deadline set by the Epstein Files Transparency Act, with much of it redacted or already public. But the Gates emails? Fresh meat for the conspiracy mill.

As we noted in "There Is No Epstein List, But We Got Names," the real scandal isn't a mythical "client list" - it's the web of enablers and elites who skated free. Gates' name keeps surfacing alongside heavyweights like Ehud Barak, Les Wexner, and Glenn Dubin, all fingered in past allegations. And let's not overlook our recent "Never-Before-Seen Photos Inside Jeffrey Epstein's Creepy Mansion," which included a framed $1 bill scrawled with Gates' handwriting: "I was wrong!" – prophetic, perhaps?

And while in "A Contrarian Take On The Epstein Case," we questioned whether the whole blackmail ring was overhyped, these new emails suggest otherwise: Epstein wasn't just a pervert; he was a grudge-holding chronicler of the powerful's peccadilloes. Gates may dismiss this as the ravings of a "disgruntled liar," but in the face of this new 'release' added to his history with Epstein, the denials ring hollow.

The question remains: How much longer can Gates play the philanthropist card - or rather how much longer will the world allow him to - while his Epstein skeletons keep rattling? Even Larry Summers was forced to exit polite society stage left after his batch of revelations hit last year.

As markets digest this elite drama, keep an eye on Microsoft stock – because if there's one thing we've learned, it's that scandals like these have a way of infecting even the bluest of blue chips. Stay tuned; this rabbit hole just got deeper.

Tyler Durden Sat, 01/31/2026 - 09:56

Don Lemon Arrested By Federal Authorities Over Minnesota Church Protest

Zero Hedge -

Don Lemon Arrested By Federal Authorities Over Minnesota Church Protest

Update: 1535ET: Lemon has been charged with two counts, according to the unsealed grand jury indictment:

COUNT 1: 18 U.S.C. § 241 - Conspiracy Against Right of Religious Freedom at Place of Worship

COUNT 2: 18 U.S.C. § 248(a) (b), § §2(a) - FACE Act: Injure, Intimidate, and Interfere with Exercise of Right of Religious Freedom at a Place of Worship.

*  *  *

Former CNN anchor Don Lemon was arrested by federal authorities late Thursday night on charges that he violated federal law when he entered the Cities Church in St. Paul, Minnesota and shoved a microphone in people's faces to livestream reactions after activists stormed the church on Jan. 18. 

The protesters, chanting "ICE Out!" - interrupted services because one of its pastors is also an official with Immigration and Customs Enforcement (ICE).

Lemon originally faced charges related to allegedly violating federal laws protecting religious exercise/houses of worship (e.g., the FACE Act or 18 U.S.C. § 241 conspiracy to deprive civil rights) by interfering with the church service.

Lemon's attorney, Abbe Lowell, said his client was taken into custody by federal agents Thursday night in Los Angeles while he was covering the Grammy awards. He is expected to make his first court appearance there. 

Lemon insists that while he was tipped off ahead of time about the demonstration, he did not know they would disrupt the service.

"Don has been a journalist for 30 years, and his constitutionally protected work in Minneapolis was no different than what he has always done," said Lowell. "The First Amendment exists to protect journalists whose role it is to shine light on the truth and hold those in power accountable."

The DOJ originally sought to charge eight people over the incident, including Lemon, citing a law that protects people seeking to participate in a service in a house of worship - however a magistrate judge whose wife reportedly works in AG Keith Ellison's office only approved charges against three people, rejecting the evidence against Lemon and others as insufficient. 

Despite the denials, a federal grand jury returned an indictment against Lemon. Looks like the party is over, for now. 

Tyler Durden Sat, 01/31/2026 - 09:28

Neil Young Encounters The Most Boomer Leftist Problem Imaginable

Zero Hedge -

Neil Young Encounters The Most Boomer Leftist Problem Imaginable

Authored by Steve Watson via Modernity.News,

Aging rocker Neil Young has encountered perhaps the most boomer of leftist boomer issues, and of course it’s all President Trump’s fault.

He can no longer use his ancient flip phone because orange man bad.

In a rambling post on his website, Young details his epic struggle to ditch Verizon service, convinced that every dollar he spends fuels a “Trump Fascist regime.”

It’s peak boomer leftist TDS paranoia, where everyday consumer choices somehow morph into grand acts of resistance.

Young kicks off his diatribe with the revelation that his flip phone bears the Verizon logo. “Mornin’ folks….It’s a new day….a big day for my Flip phone. I noticed it says VERIZON on it. Of course I can’t use a Verizon phone. Verizon is a supporter of TRUMP with big $!” he writes, as if discovering a hidden swastika etched into the device. 

He floats the idea of switching to T-Mobile, only to immediately shoot it down. “I’m going to see if I can just drop Verizon and move to T-Mobile,” he muses, before adding, “But wait….T-MOBILE donated to TRUMP’s Ballroom, which has gone from 200 million to 400 million suddenly. Where is that money going? There is no accounting. So T-Mobile is apparently out.” 

The “ballroom” obsession is particularly unhinged; Young fixates on the White House renovation project, questioning “What favors? What companies are donating? Why?” as if uncovering a vast conspiracy. 

The absurdity escalates when Young realizes he’s typing on an Apple computer. “HEY THIS IS AN APPLE COMPUTER!—— I have to stop and re-assess. No more upgrades! That feeds Apple, Apple supports ‘The Regime’ with donations,” he exclaims.

He even calls his business manager mid-rant to halt any future Apple spending, decrying CEO Tim Cook for “kissing ass” at a White House event. 

Young then threatens to sue Apple if his computer stops working without upgrades, expressing a desire to cling to current versions of Pages and FaceTime because he likes them as they are and doesn’t want them to change.

It’s a hilarious snapshot of boomer tech illiteracy colliding with political zealotry—refusing modern conveniences to own the MAGA crowd.

Young ties it all back to his broader crusade, referencing a list of companies “backing the Fascist Trump Regime” on his website’s editorial page. 

“One by one, I am cancelling all contact with each of them. This is not easy, but the alternative – me giving money I got from you, for my music, to the Regime that backed the illegal killings of two Americans. That can’t happen,” he declares.

Young’s rants are getting more and more loony. As we previously covered, he pulled his music from Spotify in 2022 to protest Joe Rogan’s supposed “COVID disinformation,” only to slink back two years later when the pandemic froth died down.

Rogan mocked him mercilessly: “Great to know you got some ethics.” 

Now, Young’s Trump fixation has seeped into his music too—his recent songs obsess over the former president, and one of his latest videos is bizarrely fixated on White House renovation footage, as seen in this clip where he rails against the ballroom like it’s Watergate 2.0.

Young ends his post pondering his record label, Warner Brothers, hinting at more boycotts to come. “I’ll keep you posted folks,” he signs off, as if anyone’s waiting breathlessly for updates on his flip phone saga. 

Trump Derangement Syndrome has turned Young into a caricature, boycotting his way into irrelevance. Meanwhile, real Americans are focused on freedom, not phantom fascist ballrooms. 

If Young wants to live in the Stone Age to spite conservative Americans, that’s his prerogative—but it’s a stark reminder of how the left’s obsessions with Trump blind them to actual threats to freedom like tech censorship and surveillance overreach.

Your support is crucial in helping us defeat mass censorship. Please consider donating via Locals or check out our unique merch. Follow us on X @ModernityNews.

Tyler Durden Sat, 01/31/2026 - 09:20

Iran Hits Back At EU: Designates European Armies As 'Terrorist Entities'

Zero Hedge -

Iran Hits Back At EU: Designates European Armies As 'Terrorist Entities'

Iran is saying two can play at the West's game: on Friday the secretary of Iran's Supreme National Security Council blasted the EU's decision to designate the Islamic Revolutionary Guard Corps (IRGC) as a "terrorist organization," warning that Europe's own militaries would now be viewed through the same lens.

"The European Union certainly knows that… the armies of countries that have participated in the European Union's recent resolution against the Islamic Revolutionary Guard Corps are considered terrorist entities," Ali Larijani wrote in a post on X. He added bluntly: "Therefore, the consequences of that shall be borne by the European countries that undertook such an action."

NurPhoto

However, there's probably nothing in the way of European military assets for the Islamic Republic to sanction, so this 'action' by Tehran will remain largely symbolic. Iran does have assets held in various places of Europe though.

EU foreign ministers agreed on Thursday to formally classify the IRGC as a "terrorist organization" and urged member states to implement the designation without delay - after a few longtime holdouts flipped.

Among those recently changing their stance include France, Spain, and Italy - but apparently the recent deadly protests, and Trump's pressure, had an impact.

One bit of irony is that the West has over the past year removed its designation of Syria's Hayat Tahrir al-Sham (HTS), after Jolani took over Damascus. HTS is literally the founding al-Qaeda group in Syria.

The IRGC stands accused by the West of directing Iran's crackdown of domestic unrest, after economic-driven protests took over town and city streets this month. 

Thousands died, but Iran officials have pointed to armed saboteurs being mixed in among the peaceful demonstrators, leading to mayhem and a high death toll.

The United States, Canada, and Australia had already blacklisted the IRGC, while Germany and the Netherlands have for years pressed the rest of the EU to follow suit.

But Tehran sees the Guard Corps as part of, or also chief safeguard of the nation's security and military. It is envisioned as 'protecting' the 'Islamic Revolution' since 1979. In the past, some countries even gave top IRGC officials diplomatic credentials.

Tyler Durden Sat, 01/31/2026 - 08:45

Muslim Leaders In Italian City Demand Removal Of Plastic Pig From Deli Shop Window

Zero Hedge -

Muslim Leaders In Italian City Demand Removal Of Plastic Pig From Deli Shop Window

Via Remix News,

A plastic pig displayed in the window of a newly opened delicatessen on the Piazza dei Signori in the Italian city of Padua has triggered a local controversy after a senior representative of the city’s Muslim community called for its removal, arguing that it is offensive and inappropriate.

The pig, placed in the window of the deli Mortadella… e Non Solo, is used to advertise the shop’s sandwiches and cured meats, which are primarily made from pork.

According to Il Giornale, Salim El Mauoed, the regional vice president of Padua’s Muslim community, urged both the shop’s owners and local authorities to intervene, describing the display as “in bad taste” and offensive to Muslims who pass through the area.

There is no legal basis requiring the business to remove the display.

The pig imagery is a central part of the shop’s branding and appears not only in the window but also in its logo, promotional materials, and merchandise shared publicly on social media.

El Mauoed’s request has drawn criticism from some politicians and residents, who argue that it amounts to interference with lawful commercial activity and undermines the principle of civil coexistence.

They contend that living together in a pluralistic society necessarily involves accepting visible expressions of different cultures, religions, and dietary traditions, particularly when those expressions are neither targeted nor discriminatory.

Il Giornale reports that some members of the local Muslim community believe symbols seen as contrary to Islamic religious precepts should be avoided in shared urban spaces.

Others, however, have warned that removing a legal and commonplace commercial symbol risks establishing a precedent in which religious objections could reshape long-established customs and everyday practices.

The newspaper also notes that the deli employs Muslim staff, some of whom have publicly defended the display, saying the plastic pig simply reflects the nature of the business and is not intended to offend anyone.

The pig remains on display for now.

Read more here...

Tyler Durden Sat, 01/31/2026 - 08:10

Ukraine Moves To Purge Dostoevsky & Tolstoy From Public Mention

Zero Hedge -

Ukraine Moves To Purge Dostoevsky & Tolstoy From Public Mention

In the latest escalation of Ukraine's cultural purge and targeting of all things Russian, Ukraine's Institute of National Memory has this month formally branded the famed classic Russian authors Fyodor Dostoevsky and Leo Tolstoy as vectors of "Russian imperial propaganda".

This has included a call from the body which operates under the Cabinet of Ministers of Ukraine for all streets, monuments, and public institutions bearing their names be wiped from the map.

Image via Union of Orthodox Journalist-Ukraine

According to Interfax, commenting on the ruling, "the assignment of their names to geographical objects, names of legal entities and objects of property rights, objects of toponymy, as well as the establishment of monuments and memorial signs in their honor in Ukraine was the embodiment of Russification - Russian imperial policy aimed at imposing the use of the Russian language, promoting Russian culture as superior compared to other national languages ​​and cultures, displacing the Ukrainian language from use, and narrowing the Ukrainian cultural and information space."

In a January 20 statement, the Institute of National Memory's 'expert commission' claimed the literary legacy of both writers is "directly connected to the glorification of Russian imperial policy." The Ukrainian officials also asserted there are signs of "Ukrainophobia" in their books.

The move was met with complete silence in Western media, and the story has gone almost completely overlooked, despite Dostoevsky and Tolstoy having long been widely studied and appreciated across the globe, and in American colleges, literary programs, theaters - and among common avid readers.

Their works, from The Brothers Karamazov to the massive War and Peace have done much to shape Western culture and higher education in the 150 years of the works' existence. 

And yet the Ukrainian government-linked institute now claims the historic prominence of Dostoevsky and Tolstoy across Ukraine was not because it is literary art with universal appeal, but somehow part of a long-running Russification campaign designed to marginalize the Ukrainian language and culture.

Ukraine has in essence just labeled two of the world's greatest historical authors, which far pre-date both the modern Russian Federation and Soviet Union of the 20th century, as 'propaganda'.

The following is an actual line from the original Interfax report: "The head of the UINP, Oleksandr Alferov, states that local authorities need to check the names of their streets with these lists."

Tyler Durden Sat, 01/31/2026 - 07:35

Next-Level Spying: How China Read The West's Wiretaps For Years

Zero Hedge -

Next-Level Spying: How China Read The West's Wiretaps For Years

Authored by Shanaka Anslem Perera via Substack,

The four trillion dollars in institutional capital positioned for stable UK-China relations rests on an assumption that died in a Chengdu server room sometime around 2019. The assumption is that espionage between major powers operates within understood boundaries, that telecommunications infrastructure is contested but not compromised, that the surveillance systems Western governments built to watch their citizens cannot be turned around to watch them. The assumption has been falsified. What follows is the complete mechanism of how China’s Ministry of State Security achieved persistent access to the private communications of three British Prime Ministers’ closest advisers, the phones of a US President-elect, and the wiretap systems that were supposed to catch them doing it. The positioning implications are immediate. The framework is permanent.

On January 26, 2026, The Telegraph disclosed that Chinese hackers had penetrated right into the heart of Downing Street, compromising mobile communications of senior officials across the Johnson, Truss, and Sunak administrations. The story was buried on page seven, treated as a technology curiosity. It was, in fact, a solvency event for the Western intelligence alliance. Not because phones were hacked, which happens, but because of how they were hacked: by weaponizing the very surveillance infrastructure that Western governments mandated for their own intelligence agencies. The Communications Assistance for Law Enforcement Act in the United States and the Investigatory Powers Act in the United Kingdom require telecommunications carriers to build backdoors into their networks for court-ordered wiretapping. Chinese state hackers found those backdoors. And walked through them.

The intelligence value is almost impossible to overstate. For approximately four years, operators linked to the MSS’s Chengdu bureau had the capability to see not just who British officials were calling, but whom the FBI was investigating, which Chinese operatives were under surveillance, what the United States knew about Beijing’s activities, and when counterintelligence was getting close. They could geolocate millions of individuals. They could record phone calls at will. They compromised the surveillance of their own surveillers, achieving the counterintelligence equivalent of reading the other side’s playbook while the game was in progress.

What follows is the institutional playbook. The positions are already being built.

The Backdoor That Swung Both Ways

The story of Salt Typhoon is not fundamentally a story about hacking. It is a story about architecture. Specifically, it is a story about what happens when governments mandate that their surveillance systems include single points of failure, then assume those points will only fail in their favor.

In 1994, the United States Congress passed the Communications Assistance for Law Enforcement Act, requiring telecommunications carriers to design their networks with built-in capabilities for government wiretapping. The law emerged from FBI concerns that digital switching technology would render traditional surveillance impossible. CALEA’s solution was elegant in its naivety: force every carrier to build a standardized interface through which law enforcement could access communications pursuant to court order. The interface would be secure because it would be secret, protected by access controls, audited by compliance regimes. No adversary would find it because no adversary would know to look.

Twenty-two years later, the United Kingdom enacted the Investigatory Powers Act 2016, colloquially known as the Snooper’s Charter. It went further than CALEA, mandating that technology companies retain communications data and provide access mechanisms for intelligence agencies. The architecture was the same: centralized access points designed for authorized users, protected by the assumption that authorized users would be the only ones using them.

Salt Typhoon was the adversarial audit that the system failed.

The Chinese operators did not need to hack individual phones, which would have been noisy and detectable. They did not need to intercept communications in transit, which would have required breaking encryption. They hacked the wiretap system itself. Once inside the CALEA infrastructure at AT&T, Verizon, and Lumen Technologies, they had access to everything the FBI had access to: call metadata showing who contacted whom and when, geolocation data derived from cell tower triangulation, the actual content of unencrypted calls and texts, and most devastatingly, the database of active surveillance requests. They could see whom the United States government was watching. They could see if they themselves were being watched.

The vulnerability was not a bug in the architecture. It was the architecture.

For decades, cryptographers and privacy advocates warned that there is no such thing as a backdoor only good guys can use. A vulnerability is a vulnerability. If it exists, a sufficiently motivated and resourced adversary will find it. The NSA and GCHQ and FBI dismissed these warnings as theoretical, academic, disconnected from operational reality. Law enforcement’s access needs are legitimate. But Salt Typhoon demonstrated empirically that the risks of mandated backdoors extend to everyone, including the governments that mandated them.

The irony approaches the unbearable. As Salt Typhoon was being discovered in late 2024, the UK government was pressuring Apple to weaken iMessage encryption under the Investigatory Powers Act. The argument was the same one that produced CALEA: law enforcement needs access, and carefully controlled access can be kept secure. Apple reportedly disabled certain features for UK users rather than comply. At precisely the same moment, as The Telegraph would later reveal, Chinese operators were reading communications from the heart of Downing Street through the access points the UK government had mandated.

The technical community has a name for this: the security paradox. Systems designed to enable surveillance become targets for adversary surveillance. The more access points you create for your own agencies, the more attack surface you expose to foreign agencies. The debate between security and privacy was always a false binary. The real tradeoff was between surveillability by your government and surveillability by everyone’s government.

Salt Typhoon collapsed that tradeoff into a single devastating data point.

The Kill Chain That Cannot Be Killed

Understanding what happened requires understanding how telecommunications networks actually function, not how they appear in policy documents.

A modern telecom network is not a monolithic system but a layered architecture spanning edge devices that connect to the public internet, core routing infrastructure that moves packets between networks, administrative systems that manage configurations and access, billing and customer data platforms, and lawful intercept systems that process surveillance requests. Each layer has its own attack surface. Salt Typhoon targeted the layer that matters most: the edge devices that control everything else.

The primary intrusion vector was a pair of vulnerabilities in Cisco IOS XE, the operating system running on millions of enterprise routers and switches worldwide. CVE-2023-20198, with a perfect 10.0 CVSS severity score, allowed an unauthenticated remote attacker to create an administrator account with Level 15 privileges, the highest access level on Cisco devices. CVE-2023-20273 enabled command injection that elevated those privileges to root access on the underlying Linux operating system. Chain them together and an attacker can create a god-mode account on any exposed Cisco device, then execute arbitrary code with full system control.

The vulnerabilities were disclosed in October 2023. Cisco issued patches. Many telecommunications operators delayed patching due to operational constraints that made rapid remediation nearly impossible.

This dynamic is not incompetence, though it resembles incompetence. Telecommunications infrastructure operates under pressures that create structural patch delays. These networks run 24 hours a day, 365 days a year. Downtime is measured in lost revenue and regulatory penalties. Patching a core router requires scheduling maintenance windows, testing updates in lab environments, coordinating with interconnected carriers, and accepting the risk that the patch itself introduces instability. For many operators, the calculation becomes: known theoretical vulnerability versus certain operational disruption. They chose the theoretical vulnerability. Salt Typhoon chose them.

Recorded Future’s Insikt Group documented the campaign exploiting over one thousand Cisco devices globally between December 2024 and January 2025. But the truly alarming finding was that attackers also exploited CVE-2018-0171, a vulnerability in Cisco Smart Install that had been patched seven years earlier. Some devices in critical telecommunications infrastructure had not been updated since 2018. The attack surface was not the frontier of zero-day exploitation. It was the accumulated technical debt of an industry that treated security as a cost center.

Once inside, Salt Typhoon deployed a sophisticated persistence mechanism designed to survive exactly the remediation attempts carriers would eventually undertake. The primary implant, documented by Trend Micro researchers under the name GhostSpider, operated entirely in memory without touching disk, evading traditional antivirus that scans for malicious files. It used DLL hijacking to execute within the context of legitimate processes, bypassing application whitelisting. Communications with command-and-control servers were encrypted and disguised as normal HTTPS traffic, blending with legitimate web activity.

The deeper persistence came from Demodex, a kernel-mode rootkit that modified the Windows operating system at its lowest level. Demodex hooked into system calls to hide its own processes, network connections, and registry entries from administrators running diagnostic commands. An operator investigating a compromised system would see nothing amiss because the rootkit was filtering what they could see. The malware achieved what the cybersecurity industry calls god-mode persistence: invisibility so complete that the only certain remediation is physical hardware replacement.

On Cisco devices specifically, the attackers exploited the Guest Shell, a Linux container environment designed for running legitimate management scripts. By injecting malicious code into this trusted container, they achieved persistence that survived standard reboots and even operating system reimaging. The infection lived below the level that normal administrators could access. It was not hiding in the house. It had become part of the foundation.

The operational sophistication extended to exfiltration. Salt Typhoon deployed a custom tool called JumbledPath that enabled packet capture across multiple network hops while simultaneously clearing logs and disabling logging along the capture path. They could intercept traffic without leaving forensic evidence of the interception. They modified Access Control Lists on compromised switches to explicitly permit their command-and-control IP addresses, ensuring their backdoors remained reachable even as security teams updated firewall rules. They created Generic Routing Encapsulation tunnels to route stolen data through compromised infrastructure, making the exfiltration appear as legitimate network traffic.

According to Cisco Talos analysis, the average dwell time before discovery was 393 days. One environment showed attackers maintaining presence for over three years. Three years of access to telecommunications infrastructure that carries the communications of governments, corporations, and private citizens. Three years of watching the watchers.

Inside the Chengdu Hacker-for-Hire Marketplace

Attribution in cyber operations is notoriously difficult. Attackers route through compromised infrastructure in multiple countries, use commodity malware available to any buyer, and deliberately plant false flags suggesting different national origins. The intelligence community has learned hard lessons about premature attribution.

Salt Typhoon attribution does not suffer these ambiguities. It is among the most thoroughly documented cases of state-sponsored cyber operations in the public record.

The US Treasury Department sanctioned Sichuan Juxinhe Network Technology Co., Ltd. on January 17, 2025, identifying it as a Chengdu-based cybersecurity company with direct involvement in the Salt Typhoon cyber group. The language was unusually specific for a sanctions designation, which typically uses more cautious phrasing. Treasury stated that the Ministry of State Security has maintained strong ties with multiple computer network exploitation companies, including Sichuan Juxinhe. The implication was unmistakable: this was not a rogue actor tangentially connected to Chinese intelligence. This was an MSS operation executed through contractor infrastructure.

Chengdu has emerged as the primary hub of China’s offensive cyber contractor ecosystem, a distinction it shares with no other Chinese city to the same degree. The reasons are structural. Sichuan University and Chengdu University of Information Technology produce a steady pipeline of computer science graduates with the technical skills offensive operations require. The provincial government offers tax incentives for high-tech enterprises that attract cybersecurity firms. The MSS’s Chengdu bureau has historically been aggressive in recruiting and contracting local talent. The result is a geographic concentration of capability that the intelligence community has tracked for over a decade.

Sichuan Juxinhe is not an isolated entity but part of an interconnected ecosystem. Treasury’s designation also referenced Beijing Huanyu Tianqiong Information Technology Co., Ltd. and Sichuan Zhixin Ruijie Network Technology Co., Ltd. as associated entities. These firms share corporate registration patterns, overlapping personnel, and technical infrastructure in ways that suggest coordinated rather than independent operation.

The ecosystem became dramatically more visible in February 2024, when over five hundred internal documents from i-SOON (Sichuan Anxun Information Technology Co., Ltd.) appeared on GitHub in one of the most significant leaks of Chinese cyber operations ever recorded. The documents revealed a hacker-for-hire marketplace where private firms bid on government contracts to compromise specific targets. Price lists showed costs for different levels of access. Marketing materials advertised tools for hacking Twitter, Gmail, WeChat, and Telegram. Target lists included governments in India, Thailand, Vietnam, South Korea, and NATO member states. The operational picture was unmistakable: China’s cyber espionage apparatus operates significantly through private contractors who compete for MSS and PLA business.

The i-SOON leak provided a Rosetta Stone for understanding how Salt Typhoon operates. Domain registration patterns used by i-SOON matched those observed in Salt Typhoon infrastructure. Malware families overlapped. The corporate relationship between i-SOON and other Chengdu firms explained how capabilities and targeting information might flow between ostensibly separate entities.

The UK government reached the same conclusion. On December 9, 2025, Foreign Secretary Yvette Cooper announced sanctions against Integrity Technology Group and Sichuan Anxun Information Technology (i-SOON) for activities against the UK and its allies that impact our collective security. The 13-nation joint advisory released in August 2025 explicitly attributed the campaign to MSS-linked private contractors, co-signed by agencies from the United States, United Kingdom, Australia, Canada, New Zealand, Germany, Japan, and five other nations.

The evidence supporting attribution is overwhelming: convergent technical indicators across multiple intelligence services, targeting patterns aligned with MSS priorities rather than financial motivation, sanctions from two G7 governments naming specific companies, a leaked document trove revealing operational details, and multi-national intelligence consensus among powers with no incentive to coordinate false attribution.

Chinese Foreign Ministry spokesperson Guo Jiakun dismissed the allegations as unfounded and irresponsible smears and slanders, claiming China stands against hacking and fights such activities in accordance with the law. Chinese state media advanced the counter-narrative that Salt Typhoon accusations represent US efforts to secure congressional appropriations rather than genuine intelligence findings. The Global Times characterized the accusations as a farce of US smear tactics against China.

These denials represent diplomatic necessities. They do not survive contact with the documented evidence.

The Crown Jewels: Three Prime Ministers’ Inner Circles Exposed

The targeting profile of Salt Typhoon reveals strategic intent far beyond conventional espionage.

In the United States, nine telecommunications carriers have been confirmed compromised: Verizon, AT&T, T-Mobile, Lumen Technologies, Spectrum (Charter Communications), Consolidated Communications, Windstream, Viasat, and at least one additional unnamed provider. Senator Mark Warner, chairman of the Senate Intelligence Committee, characterized it as the worst telecom hack in our nation’s history. The scope comparison is instructive. SolarWinds, the Russian supply chain compromise discovered in December 2020, affected approximately 18,000 organizations with deep penetration of roughly 100. Salt Typhoon compromised over 200 companies across 80 countries.

The data accessed falls into two categories with very different strategic implications.

The first category is bulk metadata: call detail records showing who contacted whom, when, and for how long, plus geolocation data derived from cell tower connections. Former Deputy National Security Advisor Anne Neuberger confirmed that attackers gained capabilities to geolocate millions of individuals. Metadata reveals patterns invisible in content alone. If a senior Treasury official calls a specific BP executive three times in one night before a North Sea oil announcement, Beijing knows the policy shift before the Cabinet does. Mapping communication networks reveals the actual decision-making structure of governments, which often differs substantially from organizational charts.

The second category is targeted content interception. Fewer than 100 individuals had actual call content and text messages directly compromised, but those individuals included Donald Trump, JD Vance, and senior staff from the Harris campaign during the 2024 presidential election. Congressional staff from the House China Committee, Foreign Affairs Committee, Armed Services Committee, and Intelligence Committee were accessed in breaches detected in December 2025, according to the Financial Times. The targeting was not random. It was surgical.

The United Kingdom penetration, disclosed by The Telegraph on January 26, 2026, reached right into the heart of Downing Street. The National Cyber Security Centre confirmed observing a cluster of activity targeting UK infrastructure since 2021. Aides to Prime Ministers Boris Johnson, Liz Truss, and Rishi Sunak had their communications compromised across a three-year period that included the COVID-19 pandemic response, the Ukraine war’s escalation, and critical UK-China trade negotiations.

Whether the Prime Ministers’ personal devices were directly compromised remains publicly unclear. The distinction may matter less than it appears. In a telecom network intrusion, attackers do not need to compromise individual devices. They compromise the network itself, intercepting communications as they transit carrier infrastructure. The Prime Minister’s phone may have been perfectly secure. The calls it made were not.

The strategic timing compounds the damage. The 2021-2024 window included decisions on Huawei’s role in UK 5G infrastructure, the AUKUS security pact formation, Hong Kong sanctions policy, and bilateral trade negotiations with Beijing. Chinese intelligence had real-time visibility into British decision-making during discussions where China’s interests were directly at stake. The information asymmetry is staggering.

Australia was similarly targeted. ASIO Director-General Mike Burgess confirmed in November 2025 that Salt Typhoon attempted to access Australia’s critical infrastructure, including telecommunications networks. Canada experienced confirmed breach of at least one unnamed telecom in February 2025. The campaign extended beyond the Five Eyes core: a South African provider was reportedly compromised via Cisco platforms, Southeast Asian telecoms detected new malware variants, and European telecommunications organizations identified intrusion attempts as late as October 2025.

The counterintelligence implications are the most damaging aspect, though the least publicly discussed.

By accessing CALEA systems, Salt Typhoon operators could see the database of active wiretap requests. They knew whom the FBI was investigating. If MSS operatives in the United States were under surveillance, Beijing could pull them out before arrests occurred. If FBI investigations were approaching sensitive Chinese assets, Beijing could warn them. If counterintelligence operations were building cases against Chinese technology companies or influence operations, Beijing could see the evidence accumulating.

This is the counterintelligence nightmare: your surveillance apparatus becomes the adversary’s intelligence source. The FBI was not just failing to catch Chinese spies. It was showing China exactly where to find its exposed spies before the FBI could catch them.

The Hidden Correlation That Risk Models Never Saw

Systems approaching critical transitions exhibit a distinctive signature that financial risk models systematically miss. Surface metrics remain stable while underlying pressure accumulates. Correlations appear benign precisely because the stress is building uniformly across connected components. Then the transition happens not gradually but all at once, in a cascade that propagates faster than response mechanisms can activate.

The physics of phase transitions describes the phenomenon with precision. Water remains liquid as it cools, molecules slowing gradually, temperature dropping predictably. Then at exactly zero degrees Celsius, the system reorganizes instantaneously into a crystalline structure. The transition is discontinuous. Nothing in the gradual cooling predicted the sudden restructuring.

Salt Typhoon’s propagation through global telecommunications followed this pattern. The Global Cyber Alliance documented 72 million attack attempts from China-origin IP addresses against telecommunications infrastructure worldwide between August 2023 and August 2025. The number is not the important part. The distribution is. Rather than concentrating on a few high-value targets, the campaign probed systematically across the entire internet-facing surface of telecom networks in 80 countries. When one vector failed, others succeeded. The attack percolated through the network of networks, finding paths of least resistance through unpatched devices, legacy systems, and accumulated technical debt.

The 80-country spread was not a bug or scope creep. It was the exploitation of network topology itself. Telecommunications providers interconnect through peering relationships, shared vendors, inherited trust, and common infrastructure. Compromising one provider creates pivot points into connected providers. The attackers did not need to breach 80 countries independently. They needed to breach enough nodes that cascade dynamics carried the compromise further.

Financial risk models trained on historical correlations would have seen nothing unusual in the period before disclosure. Telecom stocks moved with normal volatility. Cybersecurity spending followed typical budget cycles. The correlation stability that risk managers found reassuring was measuring the pressure building uniformly, not the probability of release.

The parallel to credit markets before 2008 is instructive though imprecise. Mortgage-backed securities showed stable correlations because they were all exposed to the same underlying risk. The stability was the warning, not the comfort. When housing prices turned, the correlation snapped to one and everything moved together. The diversification that looked protective turned out to be concentration disguised.

Salt Typhoon exposed a similar hidden correlation in critical infrastructure. The assumption was that a breach of Verizon had no implications for BT, that American vulnerabilities were American problems, that European telecoms operated in a separate risk regime. The assumption was wrong. The same Cisco devices run everywhere. The same CALEA architecture creates the same vulnerability everywhere its analogues exist. The same contractor ecosystem targets everyone with the same tooling. The diversification across carriers and jurisdictions was illusory. They were all one network.

Five Eyes Fractures Under Pressure

The Five Eyes intelligence alliance, comprising the United States, United Kingdom, Canada, Australia, and New Zealand, represents the deepest and most institutionalized intelligence-sharing arrangement among Western democracies. Its origins in World War II signals intelligence cooperation have evolved into comprehensive collaboration on technical collection, analysis, and counterintelligence. Salt Typhoon tested this architecture as nothing has since its formation.

The initial response demonstrated the alliance’s coordination capabilities. The December 2024 Enhanced Visibility and Hardening Guidance for Communications Infrastructure was the first joint Five Eyes response to the breach. The August 2025 advisory expanded to 13 nations, co-sealed by 22 agencies attributing the campaign to specific Chinese companies with unprecedented multinational consensus. The coordination was real and consequential.

But the fractures were also visible.

UK officials pointedly stated that had American regulations matched British standards, we would have found it faster, we would have contained it faster. The criticism was technically accurate. The UK’s Telecommunications Security Act 2021 imposed security obligations on carriers that exceed CALEA requirements. But the same UK government pursuing those regulations was simultaneously pressuring Apple to weaken encryption under the Investigatory Powers Act, replicating exactly the architectural vulnerability that Salt Typhoon exploited. The internal contradiction was not resolved so much as ignored.

The regulatory divergence reflects deeper philosophical disagreements that Salt Typhoon intensified without settling. The FBI and CISA’s December 2024 recommendation that Americans use end-to-end encrypted messaging applications represented an extraordinary acknowledgment that carrier networks cannot be trusted. Yet both agencies have historically sought encryption backdoors for law enforcement access. The cognitive dissonance remained unaddressed: advocating for encryption to protect against foreign adversaries while seeking to weaken encryption for domestic law enforcement.

The FCC’s regulatory response exemplified the policy incoherence. In January 2025, the Commission proposed mandatory cybersecurity requirements including role-based access controls, multi-factor authentication, and vulnerability patching for telecommunications carriers. Then-Chairwoman Jessica Rosenworcel stated: In light of the vulnerabilities exposed by Salt Typhoon, we need to take action. In November 2025, the reconstituted FCC voted 2-1 to revoke those rules. Chairman Brendan Carr argued for an agile and collaborative approach over regulatory mandates. Commissioner Anna Gomez dissented: This FCC today is leaving Americans less protected than they were the day this breach was discovered.

The Cyber Safety Review Board investigation, established to provide an authoritative post-mortem on Salt Typhoon, was terminated in January 2025 when the incoming administration dismissed all members before their investigation concluded. The official lessons learned process stopped before identifying lessons.

Intelligence sharing itself became contested. Reports emerged in 2025 that DNI Tulsi Gabbard barred sharing certain intelligence with Five Eyes partners. While some former officials characterized concerns as faux outrage, noting that withholding occurs routinely, others warned of a chilling effect on critical intelligence sharing at precisely the moment coordination mattered most.

From a Chinese perspective, as expressed by state media and diplomatic channels, the sanctions and coordinated Western response represent political escalation that unnecessarily heightens tensions and contradicts stated commitments to engagement. Beijing has consistently framed the accusations as evidence of anti-China bias in Western intelligence assessments rather than legitimate security concerns.

Salt Typhoon revealed that even the world’s most sophisticated intelligence alliance, facing the world’s most aggressive cyber adversary, operates with fundamental coordination failures, regulatory incoherence, and philosophical contradictions that compound rather than contain the damage.

Why Hardware Must Replace Software

The most alarming aspect of Salt Typhoon is not what happened but what continues to happen.

CISA Executive Assistant Director Jeff Greene stated plainly: We cannot say with certainty that the adversary has been evicted, because we still don’t know the scope of what they’re doing. Senator Maria Cantwell’s December 2025 assessment was equally stark: Telecom companies infiltrated in the attack have failed to prove the Chinese hackers have been eradicated from their networks.

AT&T and Verizon announced in January 2025 that they had successfully expelled the attackers from their networks, with Mandiant providing independent verification. The claims met immediate skepticism from government officials and security experts. The skepticism has not been resolved. When Senator Cantwell demanded documentation, the carriers could not provide evidence that Chinese hackers had been fully removed.

The technical reasons for persistent access are well understood.

Salt Typhoon’s persistence mechanisms, including GRE tunnels on network devices, Demodex kernel rootkits, and modified authentication server configurations, can survive standard remediation procedures. The attackers’ average dwell time of 393 days before detection, with some environments compromised for over three years, demonstrates operational security sufficient to reestablish access even after apparent eviction. If the attackers anticipated discovery, they likely created backup persistence mechanisms that remediation teams have not found.

Read the rest here and consider subscribing

Tyler Durden Sat, 01/31/2026 - 07:00

10 Weekend Reads

The Big Picture -

The weekend is here! Pour yourself a mug of Danish Blend coffee, grab a seat outside, and get ready for our longer-form (surprisingly arts & entertainment oriented) weekend reads:

23 Ways You’re Already Living in the Chinese Century: The robotics explosion. The energy revolution. The cultural takeover. It’s everything you wanted for the United States—but done better in China. (Wired)

The Cult of Costco: Its consistency is its superpower. (The Atlantic)

Can Department Stores Ever Be Fun Again? Saks Fifth Avenue’s bankruptcy filing has revived debates about how these once celebrated shopping emporiums can regain their luster. (New York Times)

The Harry Potter Generation Needs to Grow Up: You don’t see this with fiction like “The Lord of the Rings” or “The Chronicles of Narnia.” Sales of those books may rise and fall in response to new film or TV adaptations, but those franchises aren’t bound to a particular generation in the way that Harry Potter is bound to the millennials. (New York Times)

By All Measures: Our problems are too vast, our distance from them too great. How do we navigate our derangement of scale? (Longreads)

Are You Enjoying Our Linguine? How American tourists took over everything. (The Dial)

How Hackers Are Fighting Back Against ICE: ICE has spent hundreds of millions of dollars on surveillance technology to spy on anyone—and potentially everyone—in the United States. It can be hard to imagine how to defend oneself against such an overwhelming force. But a few enterprising hackers have started projects to do counter-surveillance against ICE, and hopefully protect their communities through clever use of technology. (Electronic Frontier Foundation)

There is No Proto-Dragon: The Illusion of Fictional Taxonomy: Ask not what a dragon does, but what a dragon is. (Typebar Magazine)

Defining Moments in TV History You’ve Probably Never Heard About: Many of the most-important events have slipped from our collective memories. But their impacts live on. (Wall Street Journal)

The Search for Alien Artifacts: Is Coming Into Focus From surveys of the pre-Sputnik skies to analysis of interstellar visitors, scientists are rethinking how and where to look for physical traces of alien technology. (Wired)

Be sure to check out our Masters in Business interview this weekend with Kate Burke, CEO of Allspring Global Investments a global asset manager with more than 600 billion dollars in assets under advisement. She is also a director on the firm’s board. Previously, she was at AllianceBernstein as COO/CFO.

 

GS survey: Half of investors plan to increase exposure to hedge funds

Source: Wall Street Journal

 

Sign up for our reads-only mailing list here.

~~~

To learn how these reads are assembled each day, please see this.

 

The post 10 Weekend Reads appeared first on The Big Picture.

Indian Christians Facing Rising Persecution Look To America For Help

Zero Hedge -

Indian Christians Facing Rising Persecution Look To America For Help

Authored by Nathan Worcester via The Epoch Times (emphasis ours),

Amit recounted a familiar story for Christians in his region of India: pastors jailed; parishioners afraid to worship in public.

The situation, Amit said, is getting worse “day by day.”

Nuns from Mother Teresa's Missionaries of Charity community hold signs as they listen to a speaker during a demonstration against the tabling of the Protection of Right to Freedom of Religion bill in Bengaluru, India, on Dec. 22, 2021.Abhishek Chinnappa/Getty Images

Almost two millennia after St. Thomas the Apostle brought Christianity to the subcontinent, believers in northern India bear witness to a rise in persecution. Laws on religious conversion and physical attacks, including during the 2025 Christmas season, have driven fear into sanctuaries of love and faith.

Deepak, another Christian in northern India, said “there’s a lot of intimidation and harassment going on.”

He said Hindu radicals regularly “attack or disrupt [Christian] gatherings or go to mob violence.”

As a condition of speaking with The Epoch Times, both Amit, who has worked in Uttarakhand, and Deepak, who is based in Delhi, requested that their names and the details of their activities be anonymized out of fear of reprisal.

Statistics from the United Christian Forum, published on local website, The Wire, reflect an increase in violence against Christians in India in recent years. They documented 734 attacks targeting Christians in 2023. In 2024, that figure climbed to 834.

Genocide Watch, the Voice of the Martyrs, and other organizations have also chronicled anti-Christian trends in the country, in line with a similar pattern of growing violence against Muslims and other non-Hindu Indians.

Amit, Deepak, and others who spoke to The Epoch Times linked what is happening to the Bharatiya Janata Party (BJP), a political party that has ruled India since 2014 under Prime Minister Narendra Modi. They decried the influence of the Rashtriya Swayamsevak Sangh, a street-level Hindu nationalist group associated with the BJP.

Much of the organized, sometimes violent opposition to Christianity is concentrated in northern India, a BJP stronghold.

Nigel Barrett of the Conference of Catholic Bishops of India, the episcopal conference for India’s Latin Catholic bishops, told The Epoch Times in an email that “the persecution is not confined to northern India,” citing attacks in the western state of Rajasthan after it passed a conversion law, in the southern state of Karnataka, and elsewhere across the country.

India’s Prime Minister Narendra Modi waves to the crowd after filing his nomination from the temple town of Varanasi, India, on May 14, 2024. Rights groups report that much of the organized, sometimes violent opposition to Christianity is concentrated in northern India. Anindito Mukherjee/Getty Images

Henry Hiinii, another Indian Christian in Delhi, told The Epoch Times that “the governments are not doing much to help the Christian community” as it comes under attack.

The BJP and Rashtriya Swayamsevak Sangh did not respond to requests for comment from The Epoch Times.

Some Indian Christians and close observers hope President Donald Trump—the man who has pledged to save Christians worldwide—will respond.

Commissioner Stephen Schneck of the U.S. Commission on International Religious Freedom told The Epoch Times that the U.S. government should “issue targeted sanctions against Indian government officials and entities who participate in or tolerate egregious religious persecution of Christians, Muslims, and others.”

Escalating Hostility

Scott Bledsoe, who served as a pastor for 28 years, has visited India twice, cultivating relationships with Christians there. He said his latest visa to visit this past summer was denied.

Bledsoe told The Epoch Times he started to hear about anti-Christian persecution “in the last 10 years,” describing local mob violence against groups attempting to build churches.

Over the same period, major Christian nonprofits operating in the country faced setbacks and scrutiny, often tied to their receipt of money from abroad, including from the United States.

In 2017, Compassion International, a humanitarian organization headquartered in Colorado Springs, said it left India under pressure from the government.

The Missionaries of Charity, the group founded by Mother Teresa, sustained a serious blow in 2021, when it was barred from receiving foreign funding.

Deepak said these incidents are a bad sign for the homegrown Christian missionaries planting and nurturing small churches, including in unfriendly parts of the country.

“If you can go after them, then smaller organizations don’t have any chance,” he said.

A man moves chairs outside a small church in Kandhamal, India, on Sept. 19, 2018. In recent years, states across India have passed laws against forced conversion. Numerous Christians, accused of coercing people into accepting their faith, have been jailed under the statutes. John Fredricks/The Epoch Times

In recent years, states across India have passed laws against forced conversion and numerous Christians, accused of coercing people into accepting their faith, have been jailed under the statutes.

Some Christians believe the opposition even extends to a kind of low-level surveillance enforced by Rashtriya Swayamsevak Sangh and similar groups. Rashtriya Swayamsevak Sangh alone is estimated to have 4 million members nationwide.

There are spies and people that are always watching what you’re doing,” Deepak said.

He said some believers worry that singing a religious song in their own home could draw scrutiny from neighbors, leading to arrests and prosecution under forced conversion laws.

Deepak recounted a visit to a church where that fear meant services were kept very quiet.

I did a small devotion with them from the Bible and how the church was persecuted,” he said.

A wave of attacks on Christmas celebrations in late 2025, linked to the Rashtriya Swayamsevak Sangh and similar groups, renewed concerns about the safety and freedom of Christians in India.

Devotees light candles outside a church during Christmas Day celebrations in Amritsar, India, on Dec. 25, 2022. The plight of Indian Christians has drawn attention from U.S. political leaders, who cite controversial conversion laws and related mob violence. Narinder Nanu/AFP via Getty Images

“Christians are actually afraid to celebrate Christmas openly now,” Deepak said.

Amit said Christmas services were restricted in many parts of northern India.

Schneck described “a sharp increase in targeted attacks against religious minorities” over Christmas 2025.

Similar attacks have continued into the new year,” he said.

Amid rising tensions late last year, Modi attended a Christmas service at New Delhi’s Cathedral Church of the Redemption.

The Indian Christians who spoke with The Epoch Times, however, were skeptical of the sincerity of that gesture, attributing it to concerns over votes.

“It is disturbing to see limited official condemnation from the political authorities,” Barrett said.

However, a recent judicial decision on a conversion law drew praise from them.

In December 2025, judges on the Allahabad High Court ruled that merely preaching Christianity and distributing Bibles does not run afoul of a forced conversion statute in Uttar Pradesh, a heavily Hindu state in northern India.

Hiinii described the ruling as “good news” but said many people do not yet know about it.

A general view of the deserted Allahabad High Court in Allahabad, India, on March 22, 2020. In December 2025, judges on the court ruled that merely preaching Christianity and distributing Bibles does not run afoul of a forced conversion statute in Uttar Pradesh, a heavily Hindu state in northern India. Sanjay Kanojia/AFP via Getty Images American Response

The plight of Indian Christians has started to attract the attention of American political leaders.

In a Dec. 19, 2025, op-ed in The Hill, Rep. Glenn Grothman (R-Wis.) and U.S. Commission on International Religious Freedom leaders asked Secretary of State Marco Rubio to designate India as a Country of Particular Concern, a designation outlined in the International Religious Freedom Act. They cited its controversial conversion laws and the resultant mob violence.

A 2023 State Department report on religious freedom in India noted Christians’ concerns about those laws and their reports of harassment.

That same year, the U.S. Commission on International Religious Freedom held a forum on religious freedom in India.

Read the rest here...

Tyler Durden Fri, 01/30/2026 - 23:25

Thai Police Track Down 3 Children Suspected Of Lighting Homeless Man On Fire

Zero Hedge -

Thai Police Track Down 3 Children Suspected Of Lighting Homeless Man On Fire

Authorities in Thailand have located three children, ages nine to 15, who are suspected of setting a homeless man on fire under a bridge in Bangkok and recording the attack.

The victim, a 51-year-old man known as Karn, lives beneath the Ban Ma Bridge in the Prawet district, where he earns money by collecting recyclable materials. He said the incident happened while he was asleep, according to SCMP.

“I was sleeping under the bridge when I felt cold liquid being poured on me before flames erupted on my body,” Karn told reporters.

Witnesses in the area said the attack appeared unprovoked, supporting Karn’s claim that he had no connection to the suspects.

SCMP writes that police confirmed Thursday that the three minors have been identified, but their identities are being kept confidential under child protection laws. Investigators said the children could face charges including attempted murder and destruction of public property, after nearby infrastructure was damaged during the fire.

Video footage of the incident quickly spread online, drawing intense backlash. Many users demanded tougher punishment, with some calling for the suspects to be tried as adults or for their parents to be held legally responsible.

The case has renewed attention on violent incidents involving young people in Thailand. In August last year, three teenagers in Lampang were arrested for killing a disabled dog by setting it on fire in an abandoned building, though authorities never revealed the outcome.

That same month, a separate attack in Bangkok made international headlines when a Malaysian tourist couple was set ablaze by an unemployed man near a major shopping center.

The government later pledged to cover their medical expenses and provide compensation.

As investigators continue their work, the latest incident has sparked wider debate about youth behavior, accountability, and public safety in Thailand.

Tyler Durden Fri, 01/30/2026 - 23:00

Seven Reasons Not To Bomb Iran

Zero Hedge -

Seven Reasons Not To Bomb Iran

Authored by Josiah Lippincott via American Greatness,

By the time this piece publishes, the United States military might already have launched air strikes on Iran. Indeed, planes could be launching while I write this. Nevertheless, here is a list of seven reasons why our government should not intervene in the Middle East.

1) It has never gone well. That is unlikely to change now. In 1953, the CIA overthrew the elected government of Iran to help the British more easily extract oil. We then installed the Shah, whom lots of Persians didn’t like. That problem came to a head in 1979 with the Shah being deposed and the religious fundamentalists, led by the Ayatollah, coming to power. That was not a success story for the United States.

Then there are the horrific boondoggles in Iraq and Afghanistan, the lies that drew us into the First Gulf War (babies stabbed in incubators!), the Syrian civil war, the disastrous collapse of Libya after Obama’s airstrikes, the Arab Spring nonsense, and the intervention in Lebanon that led to 200 Marines getting killed. I could go on.

The American government has a long pattern of failure in the Middle East.

2) Iran is not a military threat to America. This will cause the DC establishment types to be upset, but it is true. Iran’s anger with America stems from the coup we staged there and the meddling in Iran’s near abroad. This relationship can be easily fixed by simply stopping our current policy of hostility to the regime in Iran and adopting a policy of simply ignoring the region.

This is the right policy towards Iran because the country is not a threat to us. Iran cannot militarily attack America. The Revolutionary Guard is not going to stage an amphibious landing on the Potomac. Iranian agents of subterfuge on American soil have been hapless fools, easily foiled.

Even if Iran develops nuclear weapons, nothing changes. Iran cannot nuke America without getting obliterated in return. Therefore, there is no incentive to use those nuclear weapons in an offensive fashion.

Pakistan, North Korea, Russia, and China are all “bad” powers that have nuclear weapons. They’ve never used these weapons for a reason—the price isn’t worth the gain. Nukes are an ace in the hole for national defense, but they don’t have offensive utility in a world of atomic parity.

3) Iran’s relationship to Israel is not our problem. Iran and Israel despise each other for reasons that are complex and not worth getting into here. Needless to say, this is not a problem for Americans. Lots of people on earth don’t like each other. This isn’t new. The best thing to do in these cases is to simply stay out. We ought not borrow trouble that has no bearing on our national interests.

Israel is a big boy country. The Israelis can solve their own problems. There is no need for the American taxpayer to be involved.

Much is made of the anti-Semitism of the Iranian regime, with the implication being that the Ayatollah will use nuclear weapons against Israel if he gets the bomb. This is fearmongering with no basis in reality. Israel, like America, has nuclear weapons. If Tel Aviv gets annihilated, then so will Tehran. There is simply no gain for the Iranians in that case. Moreover, there is absolutely zero reason for the United States to get mixed up in a potential nuclear standoff between any countries anywhere on earth.

To be frank, the leadership of Iran is no more insane, moralistic, or fanatical than the Israeli or American ruling classes. In fact, they seem to be less expansionist than our own DC meddlers, mostly due to the aged character of the Iranian ruling element. The American military-industrial complex is more ferocious about spreading gay sex, feminism, and “democracy” abroad than Iran is in spreading Shia Islam.

4) The Iranian struggle for freedom is not a concern of the American government. The Declaration of Independence says that the purpose of government is to secure the rights “to life, liberty, and happiness” of the American people.

The Iranian people, however we may feel at a personal level about their cause, are not Americans. They don’t pay taxes, don’t owe us loyalty, haven’t consented to being ruled by us, and we have not agreed to rule over them in turn.

Their problems are their problems. The American government serves the American people. The Iranians are not Americans. They don’t get to ask American taxpayers to give them money, weapons, and support.

If Americans privately want to support women’s liberation or whatever in Iran, they are welcome to do so, but that isn’t what tax money is for.

5) Tax money spent on bombing Iran would be more useful here at home. Let’s take a hard-headed view of the costs at stake here: every dollar we spend monkeying with the desert drama queens is a dollar we didn’t spend on something else here at home.

War does not “boost the economy” because all of the weapons used and all of the soldiers’ paychecks have to come from taxing the economy. Everything in life comes with tradeoffs. War is no different.

Americans shouldn’t pay for weapons to be used on causes that don’t serve their interests, and our primary interest is protection. Our government is supposed to protect our bodies and our property. We have real problems with this right now here at home. Much more needs to be done to make American communities safe and peaceful.

I care far more about violence and criminal mischief in Hillsdale, Michigan, than in Tehran. Lots of bad things happen every day all over the world. Our tax dollars should be used to solve problems here.

6) Intervention backfires. Wars for human rights and far-flung geostrategic “interests” are always boondoggles. The long-term effects are bad: we stoke resentment among the natives, offend local power players, get sucked into unintelligible complex regional problems, and bear the long-term costs of dealing with the fallout.

There is, thankfully, an easy way to avoid all these issues: just stay away. If individual Americans care about the Middle East, then they can choose to spend their own money and time messing around in the region.

Surely, if Americans really thought bombing Iran was a good idea, then they would be eagerly offering up money to mercenaries and resistance fighters to go in there and spread freedom. Since most Americans are not doing this willingly, why should they be forced to support these measures unwillingly with tax dollars? It doesn’t make sense.

7) The American government should adopt the golden rule out of self-interest. Americans would not like it if a foreign government decided to meddle in our internal affairs. If China or Russia announced that they were going to launch military operations against the American homeland because of police “brutality” waged by ICE against illegal migrants, there would be an enormous backlash. Even leftists might view this as going too far.

We expect other countries to mind their own business and to stay out of ours. We should do the same abroad. Our real interests are right here on our own soil.

Instead of going abroad in search of monsters to destroy, the American government should worry about problems here. The easiest way is to simply stay out of unnecessary conflicts. The opportunities for problems abroad are simply too great. The Middle East is a mess and one the American government has done more, over its history, to create than to solve.

Time to take a step back.

Tyler Durden Fri, 01/30/2026 - 22:35

"Leader Turned Follower": Lululemon's See-Through Legging Fiasco Exposes Brand Drift

Zero Hedge -

"Leader Turned Follower": Lululemon's See-Through Legging Fiasco Exposes Brand Drift

Lululemon Athletica has drifted from its core strength in premium, high-quality yoga pants, chasing trends and fast product cycles. Competitors such as Alo Yoga and Vuori are quickly taking market share, while Lululemon has seen quality lapses, culminating in the botched launch of its "Get Low" tights earlier this month.

Bloomberg reports that Chief Brand and Product Activation Officer Nikki Neuburger told hundreds of employees at a meeting last week and in a video shared with staff worldwide that customers were not wearing the new $108 Get Low tights correctly.

Neuburger said that customers who bought the new controversial leggings, which some customers claim were see-through and "not squat proof," must size up and wear skin-toned underwear before putting on Get Low tights.

Neil Saunders, managing director of GlobalData, was quoted by Bloomberg as saying that Neuburger's memo to staff blaming customers for the see-through tights fiasco must "honestly be a joke."

"You are selling a premium product, you shouldn't have to issue instructions to women on how to wear leggings because your product is defective," Saunders said.

Earlier this month, Lululemon pulled its new tights from its North America e-commerce website just days after launch, following an uproar on social media over claims that the leggings were see-through. But it re-introduced the tights to the online store about a week ago.

In response to the epic failure, founder Chip Wilson felt compelled enough to blast the Board in a social media post:

This is a new low for lululemon. Pulling back the "Get Low" product line after three days is clearly a total operational failure. This comes just 17 months after the failed launch of the "Breezethrough" leggings, a product line also discontinued for similar product flaws. I've believed that lululemon has lost its cool for some time, but it is now evident to me that the Company has completely lost its way as a leader in technical apparel. For years, lululemon's results (particularly in North America) have shown how the Company has struggled to deliver products that are compelling and beloved; now it is unable to simply deliver products that work.
Despite any finger pointing internally following this mishap, this is not the fault of any hard-working employees. This is the fault of the Board. It is clear that persistent failures like this are born out of this Board's lack of experience in creative businesses, disinterest in product development and quality, and focus on short-term, self-interested priorities. How could anyone reach a conclusion other than the Board continues to make decisions that are destroying the brand and the stock price?
What product quality testing did the Board review? How often does the Board review the product pipeline? Are leaders empowered to make the best product decision or simply pushed to the lowest cost decision?
I believe a leading Board would have a Brand Product Committee and have asked these questions.

For memory's sake, let's take another look at the Get Low line.

And one last time.

Meanwhile, Alo Yoga and Vuori are winning influencers and younger customers; Lululemon's attempts to follow that playbook have epically backfired. Year-to-date, shares are down 17%, below Covid lows.

Saunders said, "They've gone from being the leader in the category to, honestly, a bit of a follower."

Tyler Durden Fri, 01/30/2026 - 22:10

Pages