home.social

Search

1000 results for “Logical_Error”

  1. The Red Dirt Audit

    The neon sign of the servo flickered against the vast, bruised sky of the Outback, casting a rhythmic, sickly green glow over the red dust. The Three Best Friends—Liam, Dax, and Dev—had been driving for ten hours, their old 4WD chockers with server-grade hardware and a beat-up esky full of lukewarm water. They were performing the ultimate hard yakka: tracking a digital ghost to a physical location.

    “Fair dinkum, this place is isolated,” Liam muttered, stepping out into the dry heat. He adjusted his glasses, his mind still racing with the content audit he’d been performing on the fly. He knew that to beat the Raven, they had to be beyond reproach. He had spent the drive ensuring their own documentation followed the most rigorous standards, providing informative, unique page titles for every log entry they created. He knew that for each web page, they needed a short title that described the content and distinguished it from others.

    Dax climbed out of the passenger seat, immediately checking his handheld light-meter. “She’ll be right, Liam,” he said, though his eyes were fixed on the servo’s flickering signage. Even here, Dax couldn’t stop being a designer. He noticed the signage lacked sufficient contrast between the foreground and background, a cardinal sin in his book. He knew that foreground text needs to have sufficient contrast with background colors to be readable for people like Elias or Lexie.

    The Terminal in the Dust
    Inside the servo, the air was thick with the smell of deep-fryer oil and diesel. In the back corner, next to a rack of faded bathers and fishing lure, sat a heavy, industrial-grade terminal. It was humming with a low-frequency vibration that made the floorboards rattle.

    “There it is,” Dev whispered. He moved toward the machine, his fingers already itching to check the code. “The Raven’s physical gateway.”

    Dev knew that to dismantle this, he would have to use appropriate mark-up for headings, lists, and tables to understand the machine’s hidden structure. He reached for the keyboard, but stopped. The screen was a nightmare of unnecessarily complex data blocks.

    “It’s a trap,” Dev said. “Look at the interface. They haven’t provided clear and consistent navigation options. There’s no site map, no search, just a single, pulsing cursor. It’s designed to make you feel lost”.

    Decoding the Raven’s Form
    A form suddenly popped up on the screen, demanding an administrative bypass code. It was a masterpiece of inaccessible design:

    The form elements did not include clearly associated labels.

    There were no instructions or guidance to help users complete the form.

    The input requirement for the date format was not described.

    The system used a CAPTCHA that was purely visual, with no audio alternative for someone like Lakshmi.

    “You little ripper,” Dax whispered, but not in a good way. “They’re using color alone to convey information here. The ‘Required’ fields are just red boxes with no asterisks or labels. If you can’t see that specific shade of red, you’re stuffed”.

    Liam stepped forward, his eyes narrowing. “I can fix the content. Dev, get me into the markup.”

    Dev bypassed the visual CAPTCHA by injecting a script that identified the non-text content through its metadata, though the Raven had tried to hide it. As the code bloomed across the screen, the trio saw the “Raven’s” true face. The “Shadow of the Raven’s Wing” was a script that intentionally removed the lang attribute from the html tag, making it impossible for screen readers to identify the primary language of the page.

    The Audit Begins
    “We need to audit this and flip it,” Liam commanded. “Dax, check the viewports.”

    Dax began testing how the page information presented in different sized viewports. He ensured that when font size was increased by at least 200%, the content didn’t clip or require horizontal scrolling. “The Raven’s site breaks at mobile sizes,” Dax reported. “It’s not responsive design; it’s a digital wall”.

    Liam focused on the text. He began rewriting the Raven’s cryptic error messages. Instead of saying “System Error 404-X,” he provided specific, understandable explanations and suggested corrections. He wrote in short, clear sentences and paragraphs, ensuring the information was as simple as possible for the context.

    Dev, meanwhile, was doing the hard yakka in the backend. He was ensuring that every interactive element was keyboard accessible, especially the custom-made buttons the Raven had hidden in

    tags. He used tabindex=”0″ to add those elements into the navigation order so they could receive focus.

    “I’m also adding WAI-ARIA to provide information on the function and state of these custom widgets,” Dev grunted. “The Raven used aria-expanded=”false” on elements that were clearly open. It was a deliberate attempt to confuse assistive technology”.

    The Raven Speaks
    Suddenly, the terminal’s speakers crackled to life. It was an audio-only file, a podcast-style message with no transcript provided.

    “They’re pulling a swifty,” Liam said, reaching for his headset. “They think because there’s no text, we can’t index the threat.”

    “No dramas,” Dev replied. He quickly ran a speech-to-text algorithm, creating a real-time transcript that included not just the spoken information, but also the important sounds—like the distant caw of a bird in the background.

    The transcript read: “You think you’re clever with your WCAG guidelines. But the desert doesn’t care about meaningful sequence. The sand doesn’t have a logical reading order. You’re carrying on like a pork chop in a world that has already moved past you”.

    The Counter-Strike
    The Three Best Friends didn’t flinch. They knew that providing easily identifiable feedback was the key to a successful interaction. They weren’t going to let the Raven’s unnecessarily technical language stop them.

    “Dev, use the progressive enhancement strategy,” Liam said. “Ensure the core functionality is available regardless of the technology the Raven is using to block us.”

    Dax added whitespace and proximity to the new interface they were building over the Raven’s ruins, making the relationships between the content more apparent. He styled the headings to group the related content, reducing clutter and making it easier for the next person who stumbled upon this servo to understand what was happening.

    As the sun began to rise over the Outback, the terminal finally let out a long, defeated beep. The “Shadow” was lifted. The form now had clearly associated labels for every control. The images had meaningful text alternatives. The link text was meaningful, describing exactly where the user would go next.

    “Good on ya, team,” Liam said, wiping sweat from his brow. “We just turned a ‘rejected status’ claim into a fully approved, accessible reality”.

    “But the Raven is still out there,” Dev reminded them, pointing to a set of coordinates that had just appeared on the screen, marked clearly with a descriptive label. “And it looks like the next stop is an abandoned opal mine.”

    Liam looked at his friends, then back at the esky. “Well, it’s going to be a long drive. But she’ll be right”.

    #art #bloganuary #bloganuary202401 #bloganuary202402 #bloganuary202403 #bloganuary202404 #bloganuary202405 #bloganuary202408 #bloganuary202409 #bloganuary202411 #bloganuary202416 #bloganuary202428 #books #cocktail #culture #curiosity #dailyprompt #dailyprompt1804 #dailyprompt1805 #dailyprompt1806 #dailyprompt1807 #dailyprompt1808 #dailyprompt1811 #dailyprompt1812 #dailyprompt1814 #dailyprompt1819 #dailyprompt1839 #dailyprompt1851 #dailyprompt1859 #dailyprompt1860 #dailyprompt1880 #dailyprompt1891 #dailyprompt1895 #dailyprompt1931 #dailyprompt1937 #dailyprompt1951 #dailyprompt1975 #dailyprompt1976 #dailyprompt1978 #dailyprompt1981 #dailyprompt1982 #dailyprompt1983 #dailyprompt1984 #dailyprompt1985 #dailyprompt1987 #dailyprompt1988 #dailyprompt1994 #dailyprompt2007 #dailyprompt2008 #dailyprompt2010 #dailyprompt2011 #dailyprompt2012 #dailyprompt2013 #dailyprompt2014 #dailyprompt2059 #dailyprompt2089 #dailyprompt2099 #dailyprompt2112 #dailyprompt2113 #dailyprompt2115 #dailyprompt2124 #dailyprompt2125 #dailyprompt2126 #dailyprompt2127 #dailyprompt2129 #dailyprompt2132 #dailyprompt2134 #dailyprompt2137 #dailyprompt2138 #dailyprompt2145 #dailyprompt2146 #dailyprompt2152 #dailyprompt2153 #dailyprompt2159 #dailyprompt2160 #dailyprompt2167 #digitalGhost #drinks #EmotionsFeelingsSundayPowerOfASmileMyLifeWithYouSOULCHEERFULNESSFEELINGSHOPETearsSometimesAKissIsAllYouNeedTheSilenceLifeSelfWords #Evernote #everyday #Facebook #facts #food #hiking #HISTORY #IFTTT #Instagram #Ireland #Irish #Island #kitchen #language #learning #noMatterHowBadIsTogetherWeCanWin #Outback #photography #pictures #Pinterest #RECIPES #social #SUMMERSIMOTHEUNDERWORLD #SUMMERSIMOSGLITTERWAR #technology #ThreeBestFriends #travel #TRENTINOALTOADIGE

  2. The Red Dirt Audit

    The neon sign of the servo flickered against the vast, bruised sky of the Outback, casting a rhythmic, sickly green glow over the red dust. The Three Best Friends—Liam, Dax, and Dev—had been driving for ten hours, their old 4WD chockers with server-grade hardware and a beat-up esky full of lukewarm water. They were performing the ultimate hard yakka: tracking a digital ghost to a physical location.

    “Fair dinkum, this place is isolated,” Liam muttered, stepping out into the dry heat. He adjusted his glasses, his mind still racing with the content audit he’d been performing on the fly. He knew that to beat the Raven, they had to be beyond reproach. He had spent the drive ensuring their own documentation followed the most rigorous standards, providing informative, unique page titles for every log entry they created. He knew that for each web page, they needed a short title that described the content and distinguished it from others.

    Dax climbed out of the passenger seat, immediately checking his handheld light-meter. “She’ll be right, Liam,” he said, though his eyes were fixed on the servo’s flickering signage. Even here, Dax couldn’t stop being a designer. He noticed the signage lacked sufficient contrast between the foreground and background, a cardinal sin in his book. He knew that foreground text needs to have sufficient contrast with background colors to be readable for people like Elias or Lexie.

    The Terminal in the Dust
    Inside the servo, the air was thick with the smell of deep-fryer oil and diesel. In the back corner, next to a rack of faded bathers and fishing lure, sat a heavy, industrial-grade terminal. It was humming with a low-frequency vibration that made the floorboards rattle.

    “There it is,” Dev whispered. He moved toward the machine, his fingers already itching to check the code. “The Raven’s physical gateway.”

    Dev knew that to dismantle this, he would have to use appropriate mark-up for headings, lists, and tables to understand the machine’s hidden structure. He reached for the keyboard, but stopped. The screen was a nightmare of unnecessarily complex data blocks.

    “It’s a trap,” Dev said. “Look at the interface. They haven’t provided clear and consistent navigation options. There’s no site map, no search, just a single, pulsing cursor. It’s designed to make you feel lost”.

    Decoding the Raven’s Form
    A form suddenly popped up on the screen, demanding an administrative bypass code. It was a masterpiece of inaccessible design:

    The form elements did not include clearly associated labels.

    There were no instructions or guidance to help users complete the form.

    The input requirement for the date format was not described.

    The system used a CAPTCHA that was purely visual, with no audio alternative for someone like Lakshmi.

    “You little ripper,” Dax whispered, but not in a good way. “They’re using color alone to convey information here. The ‘Required’ fields are just red boxes with no asterisks or labels. If you can’t see that specific shade of red, you’re stuffed”.

    Liam stepped forward, his eyes narrowing. “I can fix the content. Dev, get me into the markup.”

    Dev bypassed the visual CAPTCHA by injecting a script that identified the non-text content through its metadata, though the Raven had tried to hide it. As the code bloomed across the screen, the trio saw the “Raven’s” true face. The “Shadow of the Raven’s Wing” was a script that intentionally removed the lang attribute from the html tag, making it impossible for screen readers to identify the primary language of the page.

    The Audit Begins
    “We need to audit this and flip it,” Liam commanded. “Dax, check the viewports.”

    Dax began testing how the page information presented in different sized viewports. He ensured that when font size was increased by at least 200%, the content didn’t clip or require horizontal scrolling. “The Raven’s site breaks at mobile sizes,” Dax reported. “It’s not responsive design; it’s a digital wall”.

    Liam focused on the text. He began rewriting the Raven’s cryptic error messages. Instead of saying “System Error 404-X,” he provided specific, understandable explanations and suggested corrections. He wrote in short, clear sentences and paragraphs, ensuring the information was as simple as possible for the context.

    Dev, meanwhile, was doing the hard yakka in the backend. He was ensuring that every interactive element was keyboard accessible, especially the custom-made buttons the Raven had hidden in

    tags. He used tabindex=”0″ to add those elements into the navigation order so they could receive focus.

    “I’m also adding WAI-ARIA to provide information on the function and state of these custom widgets,” Dev grunted. “The Raven used aria-expanded=”false” on elements that were clearly open. It was a deliberate attempt to confuse assistive technology”.

    The Raven Speaks
    Suddenly, the terminal’s speakers crackled to life. It was an audio-only file, a podcast-style message with no transcript provided.

    “They’re pulling a swifty,” Liam said, reaching for his headset. “They think because there’s no text, we can’t index the threat.”

    “No dramas,” Dev replied. He quickly ran a speech-to-text algorithm, creating a real-time transcript that included not just the spoken information, but also the important sounds—like the distant caw of a bird in the background.

    The transcript read: “You think you’re clever with your WCAG guidelines. But the desert doesn’t care about meaningful sequence. The sand doesn’t have a logical reading order. You’re carrying on like a pork chop in a world that has already moved past you”.

    The Counter-Strike
    The Three Best Friends didn’t flinch. They knew that providing easily identifiable feedback was the key to a successful interaction. They weren’t going to let the Raven’s unnecessarily technical language stop them.

    “Dev, use the progressive enhancement strategy,” Liam said. “Ensure the core functionality is available regardless of the technology the Raven is using to block us.”

    Dax added whitespace and proximity to the new interface they were building over the Raven’s ruins, making the relationships between the content more apparent. He styled the headings to group the related content, reducing clutter and making it easier for the next person who stumbled upon this servo to understand what was happening.

    As the sun began to rise over the Outback, the terminal finally let out a long, defeated beep. The “Shadow” was lifted. The form now had clearly associated labels for every control. The images had meaningful text alternatives. The link text was meaningful, describing exactly where the user would go next.

    “Good on ya, team,” Liam said, wiping sweat from his brow. “We just turned a ‘rejected status’ claim into a fully approved, accessible reality”.

    “But the Raven is still out there,” Dev reminded them, pointing to a set of coordinates that had just appeared on the screen, marked clearly with a descriptive label. “And it looks like the next stop is an abandoned opal mine.”

    Liam looked at his friends, then back at the esky. “Well, it’s going to be a long drive. But she’ll be right”.

    #art #bloganuary #bloganuary202401 #bloganuary202402 #bloganuary202403 #bloganuary202404 #bloganuary202405 #bloganuary202408 #bloganuary202409 #bloganuary202411 #bloganuary202416 #bloganuary202428 #books #cocktail #culture #curiosity #dailyprompt #dailyprompt1804 #dailyprompt1805 #dailyprompt1806 #dailyprompt1807 #dailyprompt1808 #dailyprompt1811 #dailyprompt1812 #dailyprompt1814 #dailyprompt1819 #dailyprompt1839 #dailyprompt1851 #dailyprompt1859 #dailyprompt1860 #dailyprompt1880 #dailyprompt1891 #dailyprompt1895 #dailyprompt1931 #dailyprompt1937 #dailyprompt1951 #dailyprompt1975 #dailyprompt1976 #dailyprompt1978 #dailyprompt1981 #dailyprompt1982 #dailyprompt1983 #dailyprompt1984 #dailyprompt1985 #dailyprompt1987 #dailyprompt1988 #dailyprompt1994 #dailyprompt2007 #dailyprompt2008 #dailyprompt2010 #dailyprompt2011 #dailyprompt2012 #dailyprompt2013 #dailyprompt2014 #dailyprompt2059 #dailyprompt2089 #dailyprompt2099 #dailyprompt2112 #dailyprompt2113 #dailyprompt2115 #dailyprompt2124 #dailyprompt2125 #dailyprompt2126 #dailyprompt2127 #dailyprompt2129 #dailyprompt2132 #dailyprompt2134 #dailyprompt2137 #dailyprompt2138 #dailyprompt2145 #dailyprompt2146 #dailyprompt2152 #dailyprompt2153 #dailyprompt2159 #dailyprompt2160 #dailyprompt2167 #digitalGhost #drinks #EmotionsFeelingsSundayPowerOfASmileMyLifeWithYouSOULCHEERFULNESSFEELINGSHOPETearsSometimesAKissIsAllYouNeedTheSilenceLifeSelfWords #Evernote #everyday #Facebook #facts #food #hiking #HISTORY #IFTTT #Instagram #Ireland #Irish #Island #kitchen #language #learning #noMatterHowBadIsTogetherWeCanWin #Outback #photography #pictures #Pinterest #RECIPES #social #SUMMERSIMOTHEUNDERWORLD #SUMMERSIMOSGLITTERWAR #technology #ThreeBestFriends #travel #TRENTINOALTOADIGE

  3. The Red Dirt Audit

    The neon sign of the servo flickered against the vast, bruised sky of the Outback, casting a rhythmic, sickly green glow over the red dust. The Three Best Friends—Liam, Dax, and Dev—had been driving for ten hours, their old 4WD chockers with server-grade hardware and a beat-up esky full of lukewarm water. They were performing the ultimate hard yakka: tracking a digital ghost to a physical location.

    “Fair dinkum, this place is isolated,” Liam muttered, stepping out into the dry heat. He adjusted his glasses, his mind still racing with the content audit he’d been performing on the fly. He knew that to beat the Raven, they had to be beyond reproach. He had spent the drive ensuring their own documentation followed the most rigorous standards, providing informative, unique page titles for every log entry they created. He knew that for each web page, they needed a short title that described the content and distinguished it from others.

    Dax climbed out of the passenger seat, immediately checking his handheld light-meter. “She’ll be right, Liam,” he said, though his eyes were fixed on the servo’s flickering signage. Even here, Dax couldn’t stop being a designer. He noticed the signage lacked sufficient contrast between the foreground and background, a cardinal sin in his book. He knew that foreground text needs to have sufficient contrast with background colors to be readable for people like Elias or Lexie.

    The Terminal in the Dust
    Inside the servo, the air was thick with the smell of deep-fryer oil and diesel. In the back corner, next to a rack of faded bathers and fishing lure, sat a heavy, industrial-grade terminal. It was humming with a low-frequency vibration that made the floorboards rattle.

    “There it is,” Dev whispered. He moved toward the machine, his fingers already itching to check the code. “The Raven’s physical gateway.”

    Dev knew that to dismantle this, he would have to use appropriate mark-up for headings, lists, and tables to understand the machine’s hidden structure. He reached for the keyboard, but stopped. The screen was a nightmare of unnecessarily complex data blocks.

    “It’s a trap,” Dev said. “Look at the interface. They haven’t provided clear and consistent navigation options. There’s no site map, no search, just a single, pulsing cursor. It’s designed to make you feel lost”.

    Decoding the Raven’s Form
    A form suddenly popped up on the screen, demanding an administrative bypass code. It was a masterpiece of inaccessible design:

    The form elements did not include clearly associated labels.

    There were no instructions or guidance to help users complete the form.

    The input requirement for the date format was not described.

    The system used a CAPTCHA that was purely visual, with no audio alternative for someone like Lakshmi.

    “You little ripper,” Dax whispered, but not in a good way. “They’re using color alone to convey information here. The ‘Required’ fields are just red boxes with no asterisks or labels. If you can’t see that specific shade of red, you’re stuffed”.

    Liam stepped forward, his eyes narrowing. “I can fix the content. Dev, get me into the markup.”

    Dev bypassed the visual CAPTCHA by injecting a script that identified the non-text content through its metadata, though the Raven had tried to hide it. As the code bloomed across the screen, the trio saw the “Raven’s” true face. The “Shadow of the Raven’s Wing” was a script that intentionally removed the lang attribute from the html tag, making it impossible for screen readers to identify the primary language of the page.

    The Audit Begins
    “We need to audit this and flip it,” Liam commanded. “Dax, check the viewports.”

    Dax began testing how the page information presented in different sized viewports. He ensured that when font size was increased by at least 200%, the content didn’t clip or require horizontal scrolling. “The Raven’s site breaks at mobile sizes,” Dax reported. “It’s not responsive design; it’s a digital wall”.

    Liam focused on the text. He began rewriting the Raven’s cryptic error messages. Instead of saying “System Error 404-X,” he provided specific, understandable explanations and suggested corrections. He wrote in short, clear sentences and paragraphs, ensuring the information was as simple as possible for the context.

    Dev, meanwhile, was doing the hard yakka in the backend. He was ensuring that every interactive element was keyboard accessible, especially the custom-made buttons the Raven had hidden in

    tags. He used tabindex=”0″ to add those elements into the navigation order so they could receive focus.

    “I’m also adding WAI-ARIA to provide information on the function and state of these custom widgets,” Dev grunted. “The Raven used aria-expanded=”false” on elements that were clearly open. It was a deliberate attempt to confuse assistive technology”.

    The Raven Speaks
    Suddenly, the terminal’s speakers crackled to life. It was an audio-only file, a podcast-style message with no transcript provided.

    “They’re pulling a swifty,” Liam said, reaching for his headset. “They think because there’s no text, we can’t index the threat.”

    “No dramas,” Dev replied. He quickly ran a speech-to-text algorithm, creating a real-time transcript that included not just the spoken information, but also the important sounds—like the distant caw of a bird in the background.

    The transcript read: “You think you’re clever with your WCAG guidelines. But the desert doesn’t care about meaningful sequence. The sand doesn’t have a logical reading order. You’re carrying on like a pork chop in a world that has already moved past you”.

    The Counter-Strike
    The Three Best Friends didn’t flinch. They knew that providing easily identifiable feedback was the key to a successful interaction. They weren’t going to let the Raven’s unnecessarily technical language stop them.

    “Dev, use the progressive enhancement strategy,” Liam said. “Ensure the core functionality is available regardless of the technology the Raven is using to block us.”

    Dax added whitespace and proximity to the new interface they were building over the Raven’s ruins, making the relationships between the content more apparent. He styled the headings to group the related content, reducing clutter and making it easier for the next person who stumbled upon this servo to understand what was happening.

    As the sun began to rise over the Outback, the terminal finally let out a long, defeated beep. The “Shadow” was lifted. The form now had clearly associated labels for every control. The images had meaningful text alternatives. The link text was meaningful, describing exactly where the user would go next.

    “Good on ya, team,” Liam said, wiping sweat from his brow. “We just turned a ‘rejected status’ claim into a fully approved, accessible reality”.

    “But the Raven is still out there,” Dev reminded them, pointing to a set of coordinates that had just appeared on the screen, marked clearly with a descriptive label. “And it looks like the next stop is an abandoned opal mine.”

    Liam looked at his friends, then back at the esky. “Well, it’s going to be a long drive. But she’ll be right”.

    #art #bloganuary #bloganuary202401 #bloganuary202402 #bloganuary202403 #bloganuary202404 #bloganuary202405 #bloganuary202408 #bloganuary202409 #bloganuary202411 #bloganuary202416 #bloganuary202428 #books #cocktail #culture #curiosity #dailyprompt #dailyprompt1804 #dailyprompt1805 #dailyprompt1806 #dailyprompt1807 #dailyprompt1808 #dailyprompt1811 #dailyprompt1812 #dailyprompt1814 #dailyprompt1819 #dailyprompt1839 #dailyprompt1851 #dailyprompt1859 #dailyprompt1860 #dailyprompt1880 #dailyprompt1891 #dailyprompt1895 #dailyprompt1931 #dailyprompt1937 #dailyprompt1951 #dailyprompt1975 #dailyprompt1976 #dailyprompt1978 #dailyprompt1981 #dailyprompt1982 #dailyprompt1983 #dailyprompt1984 #dailyprompt1985 #dailyprompt1987 #dailyprompt1988 #dailyprompt1994 #dailyprompt2007 #dailyprompt2008 #dailyprompt2010 #dailyprompt2011 #dailyprompt2012 #dailyprompt2013 #dailyprompt2014 #dailyprompt2059 #dailyprompt2089 #dailyprompt2099 #dailyprompt2112 #dailyprompt2113 #dailyprompt2115 #dailyprompt2124 #dailyprompt2125 #dailyprompt2126 #dailyprompt2127 #dailyprompt2129 #dailyprompt2132 #dailyprompt2134 #dailyprompt2137 #dailyprompt2138 #dailyprompt2145 #dailyprompt2146 #dailyprompt2152 #dailyprompt2153 #dailyprompt2159 #dailyprompt2160 #dailyprompt2167 #digitalGhost #drinks #EmotionsFeelingsSundayPowerOfASmileMyLifeWithYouSOULCHEERFULNESSFEELINGSHOPETearsSometimesAKissIsAllYouNeedTheSilenceLifeSelfWords #Evernote #everyday #Facebook #facts #food #hiking #HISTORY #IFTTT #Instagram #Ireland #Irish #Island #kitchen #language #learning #noMatterHowBadIsTogetherWeCanWin #Outback #photography #pictures #Pinterest #RECIPES #social #SUMMERSIMOTHEUNDERWORLD #SUMMERSIMOSGLITTERWAR #technology #ThreeBestFriends #travel #TRENTINOALTOADIGE

  4. The Red Dirt Audit

    The neon sign of the servo flickered against the vast, bruised sky of the Outback, casting a rhythmic, sickly green glow over the red dust. The Three Best Friends—Liam, Dax, and Dev—had been driving for ten hours, their old 4WD chockers with server-grade hardware and a beat-up esky full of lukewarm water. They were performing the ultimate hard yakka: tracking a digital ghost to a physical location.

    “Fair dinkum, this place is isolated,” Liam muttered, stepping out into the dry heat. He adjusted his glasses, his mind still racing with the content audit he’d been performing on the fly. He knew that to beat the Raven, they had to be beyond reproach. He had spent the drive ensuring their own documentation followed the most rigorous standards, providing informative, unique page titles for every log entry they created. He knew that for each web page, they needed a short title that described the content and distinguished it from others.

    Dax climbed out of the passenger seat, immediately checking his handheld light-meter. “She’ll be right, Liam,” he said, though his eyes were fixed on the servo’s flickering signage. Even here, Dax couldn’t stop being a designer. He noticed the signage lacked sufficient contrast between the foreground and background, a cardinal sin in his book. He knew that foreground text needs to have sufficient contrast with background colors to be readable for people like Elias or Lexie.

    The Terminal in the Dust
    Inside the servo, the air was thick with the smell of deep-fryer oil and diesel. In the back corner, next to a rack of faded bathers and fishing lure, sat a heavy, industrial-grade terminal. It was humming with a low-frequency vibration that made the floorboards rattle.

    “There it is,” Dev whispered. He moved toward the machine, his fingers already itching to check the code. “The Raven’s physical gateway.”

    Dev knew that to dismantle this, he would have to use appropriate mark-up for headings, lists, and tables to understand the machine’s hidden structure. He reached for the keyboard, but stopped. The screen was a nightmare of unnecessarily complex data blocks.

    “It’s a trap,” Dev said. “Look at the interface. They haven’t provided clear and consistent navigation options. There’s no site map, no search, just a single, pulsing cursor. It’s designed to make you feel lost”.

    Decoding the Raven’s Form
    A form suddenly popped up on the screen, demanding an administrative bypass code. It was a masterpiece of inaccessible design:

    The form elements did not include clearly associated labels.

    There were no instructions or guidance to help users complete the form.

    The input requirement for the date format was not described.

    The system used a CAPTCHA that was purely visual, with no audio alternative for someone like Lakshmi.

    “You little ripper,” Dax whispered, but not in a good way. “They’re using color alone to convey information here. The ‘Required’ fields are just red boxes with no asterisks or labels. If you can’t see that specific shade of red, you’re stuffed”.

    Liam stepped forward, his eyes narrowing. “I can fix the content. Dev, get me into the markup.”

    Dev bypassed the visual CAPTCHA by injecting a script that identified the non-text content through its metadata, though the Raven had tried to hide it. As the code bloomed across the screen, the trio saw the “Raven’s” true face. The “Shadow of the Raven’s Wing” was a script that intentionally removed the lang attribute from the html tag, making it impossible for screen readers to identify the primary language of the page.

    The Audit Begins
    “We need to audit this and flip it,” Liam commanded. “Dax, check the viewports.”

    Dax began testing how the page information presented in different sized viewports. He ensured that when font size was increased by at least 200%, the content didn’t clip or require horizontal scrolling. “The Raven’s site breaks at mobile sizes,” Dax reported. “It’s not responsive design; it’s a digital wall”.

    Liam focused on the text. He began rewriting the Raven’s cryptic error messages. Instead of saying “System Error 404-X,” he provided specific, understandable explanations and suggested corrections. He wrote in short, clear sentences and paragraphs, ensuring the information was as simple as possible for the context.

    Dev, meanwhile, was doing the hard yakka in the backend. He was ensuring that every interactive element was keyboard accessible, especially the custom-made buttons the Raven had hidden in

    tags. He used tabindex=”0″ to add those elements into the navigation order so they could receive focus.

    “I’m also adding WAI-ARIA to provide information on the function and state of these custom widgets,” Dev grunted. “The Raven used aria-expanded=”false” on elements that were clearly open. It was a deliberate attempt to confuse assistive technology”.

    The Raven Speaks
    Suddenly, the terminal’s speakers crackled to life. It was an audio-only file, a podcast-style message with no transcript provided.

    “They’re pulling a swifty,” Liam said, reaching for his headset. “They think because there’s no text, we can’t index the threat.”

    “No dramas,” Dev replied. He quickly ran a speech-to-text algorithm, creating a real-time transcript that included not just the spoken information, but also the important sounds—like the distant caw of a bird in the background.

    The transcript read: “You think you’re clever with your WCAG guidelines. But the desert doesn’t care about meaningful sequence. The sand doesn’t have a logical reading order. You’re carrying on like a pork chop in a world that has already moved past you”.

    The Counter-Strike
    The Three Best Friends didn’t flinch. They knew that providing easily identifiable feedback was the key to a successful interaction. They weren’t going to let the Raven’s unnecessarily technical language stop them.

    “Dev, use the progressive enhancement strategy,” Liam said. “Ensure the core functionality is available regardless of the technology the Raven is using to block us.”

    Dax added whitespace and proximity to the new interface they were building over the Raven’s ruins, making the relationships between the content more apparent. He styled the headings to group the related content, reducing clutter and making it easier for the next person who stumbled upon this servo to understand what was happening.

    As the sun began to rise over the Outback, the terminal finally let out a long, defeated beep. The “Shadow” was lifted. The form now had clearly associated labels for every control. The images had meaningful text alternatives. The link text was meaningful, describing exactly where the user would go next.

    “Good on ya, team,” Liam said, wiping sweat from his brow. “We just turned a ‘rejected status’ claim into a fully approved, accessible reality”.

    “But the Raven is still out there,” Dev reminded them, pointing to a set of coordinates that had just appeared on the screen, marked clearly with a descriptive label. “And it looks like the next stop is an abandoned opal mine.”

    Liam looked at his friends, then back at the esky. “Well, it’s going to be a long drive. But she’ll be right”.

    #art #bloganuary #bloganuary202401 #bloganuary202402 #bloganuary202403 #bloganuary202404 #bloganuary202405 #bloganuary202408 #bloganuary202409 #bloganuary202411 #bloganuary202416 #bloganuary202428 #books #cocktail #culture #curiosity #dailyprompt #dailyprompt1804 #dailyprompt1805 #dailyprompt1806 #dailyprompt1807 #dailyprompt1808 #dailyprompt1811 #dailyprompt1812 #dailyprompt1814 #dailyprompt1819 #dailyprompt1839 #dailyprompt1851 #dailyprompt1859 #dailyprompt1860 #dailyprompt1880 #dailyprompt1891 #dailyprompt1895 #dailyprompt1931 #dailyprompt1937 #dailyprompt1951 #dailyprompt1975 #dailyprompt1976 #dailyprompt1978 #dailyprompt1981 #dailyprompt1982 #dailyprompt1983 #dailyprompt1984 #dailyprompt1985 #dailyprompt1987 #dailyprompt1988 #dailyprompt1994 #dailyprompt2007 #dailyprompt2008 #dailyprompt2010 #dailyprompt2011 #dailyprompt2012 #dailyprompt2013 #dailyprompt2014 #dailyprompt2059 #dailyprompt2089 #dailyprompt2099 #dailyprompt2112 #dailyprompt2113 #dailyprompt2115 #dailyprompt2124 #dailyprompt2125 #dailyprompt2126 #dailyprompt2127 #dailyprompt2129 #dailyprompt2132 #dailyprompt2134 #dailyprompt2137 #dailyprompt2138 #dailyprompt2145 #dailyprompt2146 #dailyprompt2152 #dailyprompt2153 #dailyprompt2159 #dailyprompt2160 #dailyprompt2167 #digitalGhost #drinks #EmotionsFeelingsSundayPowerOfASmileMyLifeWithYouSOULCHEERFULNESSFEELINGSHOPETearsSometimesAKissIsAllYouNeedTheSilenceLifeSelfWords #Evernote #everyday #Facebook #facts #food #hiking #HISTORY #IFTTT #Instagram #Ireland #Irish #Island #kitchen #language #learning #noMatterHowBadIsTogetherWeCanWin #Outback #photography #pictures #Pinterest #RECIPES #social #SUMMERSIMOTHEUNDERWORLD #SUMMERSIMOSGLITTERWAR #technology #ThreeBestFriends #travel #TRENTINOALTOADIGE

  5. Did you know there is an online forum for tabletop role-playing games that has been around since the late 70s, and which still is active and operating?

    Admittedly in a much diminished state than at it’s heyday.

    I don’t know if you ever heard the term Usenet before, and even if you did, if you don’t just connect it with data piracy. Because that’s what it is mostly used for nowadays.

    What it started out as were discussion forums.

    Back in the late 70s, after ARPANET had been created and email had been invented, a few programmers came up with an idea for an electronic bulletin board that could be read asynchronously. This was the time when computers still were only in big institutions like universities, big companies, and the military, and the whole idea was to create “a poor man’s ARPANET”. Connections between computers were rare and expensive , but possible. So these “news” started as a way to propagate articles and messages along servers that were not constantly connected to the internet. Some of the servers involved would only connect once a day to the network to transfer messages in and out (often at night because charges were lower then). A message might travel for multiple days before it reached all nodes in the network, and some of the earliest were messages about a nascent hobby popular among the people using this network: fantasy role-playing.

    From what I can see the first two messages on the brand new group net.games.frp were sent out on the 12th of January 1982.

    To give you an idea just how early this was: it was before the abbreviation RPG became common, people were still talking about Fantasy RolePlaying instead, so even today the group-names use the abbreviation FRP.

    It’s quite a fascinating system that over time has become ever more complex and popular, before the ascent of html, hyperlinks, and the world wide web pushed it into the seedy corners of the ‘net.

    Instead of having websites, Usenet is organized in newsgroups, and those groups are organized in hierarchies. There are the so called Big Eight that have a certain standard for group creation and posting (e.g. rec. for recreational topics, and comp. for topics concerning computers), and there are others, organized in one way or another (famously alt. which had lower standards for the creation of new groups).

    Messages are sent to one or more groups (crossposted), distributed around the network, and people respond to these posts. Interesting discussions and arguments ensue, people get angry, flame wars ensue, other people learn something new, weird in-jokes develop, stuff happens.

    All that can be read via archives, the biggest of which is Google Groups, which both is a boon and downfall of the service: Google purchased the old newsgroup archives of DejaNews back in the 90s, and integrated it in it’s Google Groups service. In a picture-perfect example of Embrace, Extend, Extinguish the users of Groups had a web interface that allowed them access to their old newsgroups, access to new groups that only existed on Google, but also allowed spammers to flood the connected newsgroups with loads of unmoderated spam. Spam that recently was quoted by them as a reason to cut the connection with Usenet, bringing this phase of the network to an end.

    But Usenet still is running, and most likely will be running as long as there are people willing to run servers for it. But the biggest Usenet servers nowadays are piracy servers that keep the text-part of the Usenet as more of an afterthought. At one point someone came up with a way to use the text-only format of Usenet in a way to distribute data that was binary, i.e. not purely text. And this took over most of the system.

    But I am not really interested in that and never was. What I am interested in are the fantasy roleplaying parts of that network.

    rec.games.frp.*

    I said that the forum has been running since the late 70s, but that’s not quite correct. The original structure of Usenet grew organically from the beginning. People were creating new groups when it suited them and it seemed logical. Which soon caused some hierarchies (specifically the net. hierarchy) to swell with groups that could barely be maintained. In a great upheaval in 1987 all the groups were renamed and restructured.

    Some old hands are still angry about it and will bitch about it for days. That also is Usenet.

    One can argue that the fantasy roleplaying group has existed since before that time. One also could argue that it only exists since 1987. Which still is older than the World Wide Web.

    Usenet is divided into hierarchies, and the frp-hierarchy is part of the rec. (recreation-hierarchy) and .games. sub-hierarchy.

    There are currently 11 .frp. groups in that hierarchy:

    rec.games.frp.dndof course… it’s the hierarchy for Dungeons and Dragons. Always one of the biggest topics of the whole FRP forums this one got it’s own group.rec.games.frp.miscfor basically all other kinds of discussions about roleplaying gamesrec.games.frp.cyberfor cyberpunk systems (e.g. Cyberpunk 2020 or Shadowrun). rec.games.frp.super-heroes for superhero gamesrec.games.frp.live-actionanything LARP goes here.rec.games.frp.announce announcements and news about products go hererec.games.frp.industryfor all kinds of discussions about the rpg industryrec.games.frp.storyteller yes, this was created when the World of Darkness was big enough to demand it’s own forumrec.games.frp.gurpsFor GURPS, this part was created because while never the most popular game, it’s fans flooded the main group with so many messages about builds that it was decided to give them their own place.rec.games.frp.advocacyall kinds of discussions about roleplaying games as such and how they work. This is where the Forge came from back in the dayrec.games.frp.marketI guess this is for selling stuff. I have literally never seen a message in there.

    Most of these lay fallow right now, with me and a few others being the only ones posting there every once in a while. I do have to admit part of it is because I don’t want to lose the that part of ttrpg history to a random deletion request for non-use.

    Other TTRPG groups

    The main hierarchies are not the only ones. Most normal Usenet servers carry at least the Big Eight, but most also carry others. The big other hierarchy is alt. (…definitely not named for Anarchists, Lunatics, and Terrorists, all evidence to the contrary…), which makes it easier to create groups. This means there are a few other groups here that might be of interest, if they ever would get someone to post in them. Their structure though is not as organized as the ones in the Big 8.

    alt.games.frp.adnd-utilabout utilities for playing ADnD. I would say, a general groups for RPG utilities.alt.games.adndfor ADnD. I am not sure why this exists, maybe because the main one was too stodgy, or it was created because someone thought ADnD was sufficiently different than DnD to warrant it’s own groupalt.games.earthdawn for Earthdawn. Remember Earthdawn?alt.games.x-files.rpg For the X-Files RPG. Remember that?alt.games.whitewolfI guess a group for White Wolf games, which is also already covered in rec.games.frp.storytelleralt.games.tolkien.rpga group about playing in Tolkien’s Middle-Earth

    There are also local and language dependent groups around. Many languages and regions have their own hierarchies for exchanges between locals and/or in other languages.

    uk.games.roleplaygroup for roleplaying in the UKde.rec.spiele.rpg.miscgeneral group for discussions of RPGs in German z-netz.freizeit.rollenspiele.dsa originally this was an Echo in a mailbox network, by now z-netz. is a small alternative German Usenet hierarchy. This particular one about Das Schwarze Auge/The Dark Eyepl.rec.gry.rpgPolish-language group es.rec.juegos.rolSpanish-language groupse.spel.rollspelSwedish-language groupdk.fritid.rollespilDanish-language group fr.rec.jeux.jdfFrench-language groupit.hobby.giochi.gdrItalian-language grouphr.rec.igre.rpgHungarian-language groupaus.games.roleplayAustralian group

    There are more, some of which I might not even find that easy because they are not on the servers I frequent (not all servers carry all groups) or are so specialized they might not be of interest to anyone but locals (e.g. saar.rec.rollenspiele exists, but I doubt many people in Saarland (the smallest of Germany’s federal states) still know Usenet exists)

    Ok, ok, but how do you actually ACCESS this Usenet thingy?

    That’s a bit more difficult, but not much. It used to be ISPs were all running their own news servers, this was actually the REASON you might want internet access as a private person, but that isn’t the case anymore. Google Groups is also going away, so that’s not a real option.

    An easy way to check out what is being talked about on the FRP-hierarchy is campaignwiki.org/news. This server makes it possible to read and post on his own small server via a web-interface. The server is only running roleplaying-related groups, including the global FRP-hierarchy, and a few local ones that do not get carried in many other places.

    Another way to access it via web browser is via web gateways. There are a few around, e.g. NovaBBS. There are a few of those around, but they might not carry all the groups (NovaBBS e.g. only rec.games.frp.dnd and .misc, because those are the ones with most activity).

    The proper way to use it is of course by getting an account on a news server and adding it to your feed reader of choice. True hardcore users use terminal-based readers like tin or Gnus, but many Email programs like Mozilla Thunderbird allow you to subscribe to newsgroups.

    But where do you get a news server?

    Well, there are multiple free options (these are all technically text-only, although a few have some basic binary groups that allow pictures):

    campaignwiki.org/news(Switzerland) very small server, focused on ttrpg groups, also has simple web-portalEternal September(Germany) popular free access server with wide range of groupsI2PN2simple text serverNovaBBStext server, as mentioned above also has web-portalSolani(Germany) serverdotsrc(Denmark) focused on Danish usersAgency News(New Zealand) serverChmurka(Poland) basic server focused on Polish usersCSIPHbasic serverOpen News Network(Germany) focused on German usersGegeweb(France) focused on French usersHispagatos(Spain) focused on Spanish usersPasdenom(France) focused on French usersNNTP4(Germany) basic server

    Most of these have instructions on how to connect on their websites.

    Note: This is a redo of an article I wrote 13 years ago. Originally I thought I could just let that one stand like that, but just briefly reading through it I noticed things had changed dramatically in some areas. So I rewrote the whole thing from scratch.

    Rate this:

    https://gmkeros.wordpress.com/2024/01/12/the-oldest-ttrpg-forum-on-the-net/

    #dnd #dsa #newsgroup #newsserver #RolePlayingGame #Roleplaying #rpg #thunderbird #ttrpg #Usenet

  6. Secrets of Techhood

    Secrets of Techhood

    A collection of hard-won wisdom from the trenches of technology work

    After decades building software, leading teams, and watching organisations succeed and fail, certain patterns emerge. The same mistakes get repeated. The same insights get rediscovered. The same hard-learned lessons get forgotten and relearnt by the next generation.

    This collection captures those recurring truths—the kind of wisdom that comes from doing the work, making the mistakes, and living with the consequences. These aren’t theoretical principles from academic papers or management books. They’re the practical insights that emerge when life meets reality, when teams face real deadlines, and when software encounters actual users.

    The insights come from diverse sources: legendary systems thinkers like W.E. Deming and Russell Ackoff, software pioneers, quality experts, organisational psychologists, and practising technologists who’ve shared their hard-earned wisdom. What unites them is practical relevance—each aphorism addresses real challenges that technology professionals face daily.

    Use this collection as a reference, not a rulebook. Read through it occasionally. Return to specific aphorisms when facing related challenges. Share relevant insights with colleagues wrestling with similar problems. Most importantly, remember that wisdom without application is just interesting trivia.

    The technology changes constantly, but the fundamental challenges of building systems, working with people, and delivering value remain remarkably consistent. These truths transcend programming languages, frameworks, and methodologies. They’re about the deeper patterns of how good technology work gets done.

    Invitarion: I’d love for readers to suggest their own aphorisms for inclusion in this collection. Please use the comments, below.

    The Aphorisms

    It’s called software for a reason.

    #SOFT

    The ‘soft’ in software reflects its fundamental nature as something malleable, changeable, and adaptive. Unlike hardware, which is fixed once manufactured, software exists to be modified, updated, and evolved. This flexibility is both its greatest strength and its greatest challenge. The ability to change software easily leads to constant tweaking, feature creep, and the temptation to fix everything immediately. Yet this same flexibility allows software to grow with changing needs, adapt to new requirements, and evolve beyond its original purpose.

    Learning hasn’t happened until behaviour has changed.

    #BEHAVIOR_CHANGE

    Consuming tutorials, reading documentation, and attending conferences is information absorption. True learning in tech occurs when concepts become internalised so deeply that they alter how problems are approached. Data analysis learning is complete when questioning data quality and looking for outliers becomes instinctive. Project management mastery emerges when breaking large problems into smaller, manageable pieces happens automatically.

    Change hasn’t happened unless we feel uncomfortable.

    #UNCOMFORTABLE

    Real change, whether learning a new technology, adopting different processes, or transforming how teams work, requires stepping outside comfort zones. If a supposed change feels easy and natural, you’re just doing familiar things with new labels. Genuine transformation creates tension between old habits and new ways of working.

    The work you create today is a letter to your future self—create with compassion.

    #FUTURE_SELF

    Six months later, returning to a project with fresh eyes and foggy memory is jarring. The folder structure that seems obvious today becomes a confusing maze tomorrow. The clever workflow that feels brilliant now frustrates that future self. Creating work as if explaining thought processes to a colleague makes sense—because that’s what’s happening across time.

    Documentation is love made visible.

    #VISIBLE_LOVE

    Good documentation serves as an act of kindness towards everyone who will interact with the work, including one’s future self. It bridges current understanding and future confusion. When processes are documented, decisions explained, or clear instructions written, there’s an implicit message: ‘I care about your experience with this work.’ Documentation transforms personal knowledge into shared resources.

    Perfect is the enemy of shipped, and also the enemy of good enough.

    #SHIP_IT

    The pursuit of perfection creates endless cycles of refinement that prevent delivery of value. Hours spent polishing presentations that already communicate effectively could address new problems or serve unmet needs. Yet shipping imperfection carries risks too—reputation damage, user frustration, or technical debt. Sometimes ‘done’ creates more value than ‘perfect’, especially when perfect never arrives.

    Every problem is a feature request from reality.

    #REALITY_REQUEST

    Issues reveal themselves as more than annoying interruptions—they’re signals about unconsidered edge cases, incorrect assumptions, or untested scenarios. Each problem illuminates gaps between mental models of how things work and how they actually work in practice. When users struggle with an interface, they’ve submitted an unspoken feature request for better design.

    The best problem-solving tool is a good night’s sleep.

    #SLEEP_SOLVE

    The brain processes and consolidates information during sleep, revealing solutions that remained hidden during conscious effort. Challenges that consume hours of focused attention resolve themselves in minutes after proper rest. Sleep deprivation clouds judgement, reduces pattern recognition, and obscures obvious solutions.

    Premature optimisation is the root of all evil, but so is premature pessimisation.

    #BOTH_EVILS

    Whilst rushing to optimise before understanding the real bottlenecks is wasteful, it’s equally dangerous to create obviously inefficient processes under the banner of ‘we’ll fix it later.’ Don’t spend days perfecting workflows that run once, but also don’t use manual processes when simple automation would work just as well.

    Your first solution is rarely your best solution, but it’s always better than no solution.

    #FIRST_BEATS_BEST

    The pressure to find the perfect approach immediately creates analysis paralysis. First attempts prove naïve, inefficient, or overly complex, yet they provide crucial starting points for understanding problem spaces. Working solutions enable iteration, refinement, and improvement.

    A complex system that works is invariably found to have evolved from a simple system that worked. A complex system designed from scratch never works and cannot be patched up to make it work.

    #GALLS_LAW

    John Gall’s Law captures a fundamental truth about how robust systems come into being. They aren’t architected in their final form—they grow organically from working foundations. The most successful large systems started as simple, functional prototypes that were gradually extended.

    The hardest parts of tech work are naming things, managing dependencies, and timing coordination.

    #THREE_HARDS

    These three fundamental challenges plague every technology professional daily. Naming things well requires understanding not just what something does, but how it fits into the larger system and how others will think about it. Managing dependencies is difficult because it requires reasoning about relationships, priorities, and changes across multiple systems or teams.

    Feedback is not personal criticism—it’s collaborative improvement.

    #COLLABORATIVE_FEEDBACK

    When colleagues suggest changes to work, they’re investing their time and attention in making the outcome better. They’re sharing their knowledge, preventing future issues, and helping with professional growth. Good feedback is an act of collaboration, not criticism.

    People will forgive not meeting their needs immediately, but not ignoring them.

    #ATTEND_NEEDS

    Users, stakeholders, and colleagues understand that resources are limited and solutions take time. They accept that their need might not be the highest priority or that the perfect solution requires careful consideration. What damages relationships is complete neglect—not making any effort, not showing any care, not demonstrating that their concern matters. People can wait for solutions when they see genuine attention being paid to their situation. The difference between delayed action and wilful neglect determines whether trust grows or erodes. Attending to needs doesn’t require immediate solutions, but it does require genuine care and effort.

    How you pay attention matters more than what you pay attention to.

    #ATTENTIATIONAL_FEEDBACK

    The quality of attention transforms both the observer and the observed. Distracted attention whilst multitasking sends a clear message about priorities and respect. Focused, present attention—even for brief moments—creates connection and understanding. When reviewing code, listening with genuine curiosity rather than hunting for faults leads to better discussions and learning. When meeting with stakeholders, being fully present rather than mentally composing responses changes the entire dynamic. The manner of attention—rushed or patient, judgmental or curious, distracted or focused—shapes outcomes more than the subject receiving that attention.

    Caring attention helps things grow.

    #CARING_GROWTH

    Systems, teams, and individuals flourish under thoughtful observation and nurturing focus. When attention comes with genuine care—wanting to understand, support, and improve rather than judge or control—it creates conditions for development. Code improves faster when reviewed with constructive intent rather than fault-finding. Team members develop more rapidly when mistakes are examined with curiosity rather than blame. Projects evolve more successfully when monitored with supportive interest rather than suspicious oversight. The difference between surveillance and stewardship lies in the intent behind the attention.

    The best work is work you don’t have to do.

    #NO_WORK

    Every process created needs to be maintained, updated, and explained. Before building something from scratch, considering whether an existing tool, service, or approach already solves the problem pays off. The work not done can’t break, doesn’t need updates, and never becomes technical debt.

    Every expert was once a beginner who refused to give up.

    #REFUSE_QUIT

    Experience and expertise aren’t innate talents—they’re the result of persistence through challenges, failures, and frustrations. The senior professionals admired today weren’t born knowing best practices or troubleshooting techniques. They got there by continuing to learn, experiment, and problem-solve even when things felt impossibly difficult.

    Your ego is not your work.

    #EGO_WORK

    When others critique work, they engage with output rather than character. Suggestions for improvement, identified issues, or questioned decisions focus on the work itself, not personal worth. Work can be improved, revised, or completely replaced without diminishing professional value.

    Testing is not about proving a solution works—it’s about showing where the work is at.

    #STATUS_REPORT

    Good testing reveals current status rather than validating perfection. Tests illuminate what’s functioning, what’s broken, what’s missing, and what’s uncertain. Rather than serving as a stamp of approval, testing provides visibility into the actual state of systems, processes, or solutions.

    The most expensive work to maintain is work that almost functions.

    #ALMOST_BROKEN

    Work that fails obviously and consistently is easy to diagnose and fix. Work that functions most of the time but fails unpredictably is a maintenance nightmare. These intermittent issues are hard to reproduce, difficult to diagnose, and mask deeper systematic problems.

    Changing things without understanding them is just rearranging the furniture.

    #FURNITURE_MOVE

    When modifying systems, processes, or designs without adequate understanding of how they currently work, there’s no way to verify that essential functionality has been preserved. Understanding serves as a foundation for meaningful change, giving confidence that modifications improve things rather than just moving problems around.

    Version control is time travel for the cautious.

    #TIME_TRAVEL

    Document management systems and change tracking tools let experimentation happen boldly because previous states can always be restored if things go wrong. They remove the fear of making changes because nothing is ever truly lost. Radical reorganisations, experimental approaches, or risky optimisations become possible knowing that reversion to the last known good state remains an option.

    Any organisation that designs a system will produce a design whose structure is a copy of the organisation’s communication structure.

    #CONWAYS_LAW

    Conway’s Law reveals why so many software architectures mirror the org charts of the companies that built them. If you have separate teams for frontend, backend, and database work, you’ll end up with a system that reflects those boundaries—even when a different architecture would serve users better.

    Question your assumptions before you question your code.

    #ASSUMPTIONS_FIRST

    Most problems stem not from implementation errors but from incorrect assumptions about how systems work, what users will do, or how data will behave. Assumptions about network reliability, that users will provide valid input, that third-party services will always respond, or that files will always exist where expected become embedded in work as implicit requirements that aren’t tested or documented.

    The problem is always in the last place you look because you stop looking after you find it.

    #LAST_PLACE

    This humorous observation about troubleshooting reflects a deeper truth about problem-solving methodology. Issues are searched for in order of assumptions about likelihood, starting with the most obvious causes. When problems are found, searching naturally stops, making it definitionally the ‘last’ place looked.

    Your production environment is not your testing environment, no matter how much you pretend it is.

    #PROD_NOT_TEST

    Despite best intentions, many teams end up using live systems as their primary testing ground through ‘quick updates,’ ‘minor changes,’ and ‘simple fixes.’ Production environments have different data, different usage patterns, different dependencies, and different failure modes than development or testing environments.

    Every ‘temporary solution’ becomes a permanent fixture.

    #TEMP_PERMANENT

    What starts as a quick workaround becomes enshrined as permanent process. The ‘temporary fix’ implemented under deadline pressure becomes the foundation that other work builds upon. Before long, quick hacks become load-bearing infrastructure that’s too risky to change.

    The work that breaks at the worst moment is always the work you trusted most.

    #TRUSTED_BREAKS

    Murphy’s Law applies strongly to technology work. The elegant, well-tested system that generates pride will find a way to fail spectacularly at the worst possible moment. Meanwhile, the hacky workaround that needed fixing will run flawlessly for years. Confidence leads to complacency, which creates blind spots where unexpected failures hide.

    Always double-check the obvious.

    #DOUBLE_CHECK

    Paranoia is a virtue in technology work. Even when certain about how a system works, validating assumptions, checking inputs, and considering edge cases remains worthwhile. Systems change, dependencies update, and assumptions that were true yesterday are not true today.

    Notes are not apologies for messy work—they’re explanations for necessary complexity.

    #EXPLAIN_COMPLEXITY

    Good documentation doesn’t explain what the work does but why it does it. It explains business logic, documents assumptions, clarifies non-obvious decisions, and provides context that can’t be expressed in the work itself. Notes that say ‘process these files’ are useless, but notes that say ‘Account for timezone differences in date processing’ add valuable context.

    The fastest process is the process that never runs.

    #NEVER_RUN

    Performance optimisation focuses on making existing processes run faster, but the biggest efficiency gains come from avoiding work entirely. Can expensive calculations be cached? Can results be precomputed? Can unnecessary steps be eliminated? The most elegant solution is recognising that certain processes don’t need to execute at all under common conditions.

    The systems that people work in account for 95 per cent of performance.

    #DEMING_95

    W.E. Deming’s insight: Most of what we attribute to individual talent or effort is determined by the environment, processes, and systems within which people operate. If the vast majority of performance comes from the system, then improving the system yields far greater returns than trying to improve individuals within a flawed system.

    Individual talent is the 5 per cent that operates within the 95 per cent that is system.

    #DEMING_5

    Deming’s ratio explains why hiring ‘rock stars’ to fix broken systems fails, whilst putting competent people in well-designed systems consistently produces exceptional results. A brilliant programmer in a dysfunctional organisation will struggle, whilst an average programmer in a good system can accomplish remarkable things. The 5% individual contribution becomes meaningful only when the 95% system component enables and amplifies it.

    Unless you change the way you think, your system will not change and therefore, its performance won’t change either.

    #CHANGE_THINKING

    John Seddon’s insight cuts to the heart of why so many improvement initiatives fail. Teams implement new processes, adopt new tools, or reorganise structures whilst maintaining the same underlying assumptions and beliefs that created the original problems. Real change requires examining and challenging the mental models, assumptions, and beliefs that shape how work gets designed and executed.

    People are not our greatest asset—it’s the relationships between people that are our greatest asset.

    #RELATIONSHIPS

    Individual talent matters, but the connections, communication patterns, and collaborative dynamics between team members determine success more than any single person’s capabilities. The most effective teams aren’t composed of the most talented individuals, but of people who work well together and amplify each other’s strengths.

    A bad system will beat a good person every time.

    #BAD_SYSTEM

    Individual competence and good intentions can’t overcome fundamentally flawed processes or organisational structures. When systems create conflicting incentives, unclear expectations, or impossible constraints, even capable people struggle to succeed. Good people in bad systems become frustrated, whilst average people in good systems accomplish remarkable things.

    You can’t inspect quality in—it has to be built in.

    #BUILD_IN

    Quality comes from improvement of the production process, not from inspection. Good systems prevent defects rather than just catching them. The most effective quality assurance focuses on improving how work gets done, not on finding problems after they occur.

    The righter we do the wrong thing, the wronger we become. Therefore, it is better to do the right thing wrong than the wrong thing right.

    #ACKOFF_WRONG

    Russell Ackoff’s insight highlights that effectiveness (doing the right things) must come before efficiency (doing things right). Becoming more efficient at the wrong activities compounds the problem. Focus first on whether you should be doing something before worrying about how well you do it.

    Efficiency is doing things right; effectiveness is doing the right things.

    #DRUCKER_DISTINCTION

    Peter Drucker’s classic distinction reminds us that there’s little value in optimising processes that shouldn’t exist in the first place. The greatest risk for managers is the confusion between effectiveness and efficiency. There is nothing quite so useless as doing with great efficiency what should not be done at all.

    The constraint determines the pace of the entire system.

    #CONSTRAINT

    In any process or organisation, one bottleneck limits overall performance regardless of how fast other parts operate. Optimising non-constraint areas looks productive but doesn’t improve system output. Finding and focusing improvement efforts on the true constraints provides the greatest leverage for overall performance gains.

    Innovation always demands we change the rules.

    #CHANGE_RULES

    When we adopt new approaches that diminish limitations, we must also change the rules that were created to work around those old limitations. Otherwise, we get no benefits from our innovations. As long as we obey the old rules—the rules we originally invented to bypass the limitations of the old system—we continue to behave as if the old limitations still exist.

    In God we trust; all others bring data.

    #TRUST_DATA

    Decisions improve when based on evidence rather than assumptions, but data alone doesn’t guarantee good choices. Numbers mislead as easily as they illuminate, especially when they reflect measurement artefacts rather than underlying realities. Data provides a foundation for discussion and decision-making, but wisdom comes from interpreting that data within context.

    Every bug you ship becomes ten support tickets.

    #FAILURE_DEMAND

    John Seddon’s ‘failure demand’ reveals how poor quality creates exponential work. When you don’t get something right the first time, you generate cascading demand: customer complaints, support calls, bug reports, patches, and rework. It’s always more expensive to fix things after customers find them than to prevent problems in the first place.

    Technical debt is like financial debt—a little helps you move fast, but compound interest will kill you.

    #TECH_DEBT

    Strategic shortcuts can accelerate delivery when managed carefully. Taking on some technical debt to meet a critical deadline or test market assumptions is valuable. But unmanaged technical debt accumulates interest through increased maintenance costs, slower feature development, and system brittleness.

    The best code is no code at all.

    #NO_CODE

    Every line of code written creates obligations—debugging, maintenance, documentation, and ongoing support. Before building something new, the most valuable question is whether the problem needs solving at all, or whether existing solutions already address the need adequately. Code that doesn’t exist can’t have bugs, doesn’t require updates, and never becomes technical debt.

    Start without IT. The first design has to be manual.

    #START_MANUAL

    Before considering software-enabled automation, first come up with manual solutions using simple physical means, like pin-boards, T-cards and spreadsheets. This helps clarify what actually needs to be automated and ensures you understand the process before attempting to digitise it.

    Simple can be harder than complex—you have to work hard to get your thinking clean.

    #CLEAN_THINKING

    Achieving simplicity requires understanding problems deeply enough to eliminate everything non-essential. Complexity masks incomplete understanding or unwillingness to make difficult choices about what matters most. Simple solutions demand rigorous thinking about core requirements, user needs, and essential functionality.

    Design is how it works, not how it looks.

    #FUNCTION_FORM

    Visual aesthetics matter, but they serve the deeper purpose of supporting functionality and user experience. Good design makes complex systems feel intuitive, reduces cognitive load, and guides users towards successful outcomes. When appearance conflicts with usability, prioritising function over form creates better long-term value.

    Saying no is more important than saying yes.

    #SAY_NO

    Focus emerges from deliberately choosing what not to do rather than just deciding what to pursue. Every opportunity accepted means other opportunities foregone, and attention is always limited. Organisations that try to do everything accomplish nothing well. Strategic success comes from identifying the few things that matter most and declining everything else.

    Organisational effectiveness = f(collective mindset).

    #COLLECTIVE_MINDSET

    The effectiveness of any organisation is determined by the shared assumptions, beliefs, and mental models of the people within it. Technical solutions, processes, and structures matter, but they’re all constrained by the underlying collective mindset that shapes how people think about and approach their work.

    Technologists who dismiss psychology as ‘soft science’ are ignoring the hardest variables in their systems.

    #HARD_VARIABLES

    Technical professionals gravitate toward problems with clear inputs, logical processes, and predictable outputs. Psychology feels messy and unquantifiable by comparison. But the human elements—motivation, communication patterns, cognitive biases, team dynamics—determine whether technical solutions succeed or fail in practice.

    Code review isn’t about finding bugs—it’s about sharing knowledge.

    #KNOWLEDGE_SHARE

    Whilst catching defects has value, the real benefit of code reviews lies in knowledge transfer, spreading understanding of the codebase, sharing different approaches to solving problems, and maintaining consistency in coding standards. Good reviews help prevent knowledge silos and mentor junior developers.

    All estimates are wrong. Some are useful.

    #USEFUL_WRONG

    Software estimates are educated guesses based on current understanding, not commitments or predictions. They’re useful for planning, prioritising, and making resource allocation decisions, but they shouldn’t be treated as contracts or promises. Use them as tools for discussion and planning, and remember that their primary value is in helping make better decisions.

    Security is not a feature you add—it’s a discipline you practise.

    #SECURITY_DISCIPLINE

    Security can’t be bolted on after the fact through penetration testing or security audits alone. It must be considered throughout design, development, and deployment. Security is about creating systems that are resistant to attack by design, not just finding and fixing vulnerabilities after they’re built.

    Your users will break your software in ways you never imagined—and they’re doing you a favour.

    #USERS_FAVOUR

    Real users in real environments expose edge cases, assumptions, and failure modes that controlled testing misses. They use your software in contexts you never considered, with data you never anticipated, and in combinations you never tested. Each break reveals gaps in your mental model of how the system should work.

    Refactor before you need to, not when you have to.

    #REFACTOR_EARLY

    Continuous small refactoring prevents code from becoming unmaintainable. When you’re forced to refactor, you’re already behind and under pressure, which leads to rushed decisions and compromised quality. Build refactoring into your regular development rhythm, not as crisis response.

    If you can’t measure it breaking, you can’t fix it reliably.

    #MEASURE_BREAK

    Systems need observable failure modes through monitoring, logging, and alerting. Without visibility into system health and failure patterns, you’re debugging blindly and fixing symptoms rather than root causes. Good monitoring tells you not just that something broke, but why it broke and how to prevent it from happening again.

    Knowledge sharing is not cheating—it’s collaborative intelligence.

    #COLLABORATIVE_INTEL

    Technology work has always been collaborative, and online communities represent the democratisation of knowledge sharing. Looking up solutions to common problems isn’t cheating—it’s efficient use of collective wisdom. The key is understanding the solutions found rather than blindly copying them.

    Error messages are breadcrumbs, not accusations.

    #BREADCRUMBS

    Error messages aren’t personal attacks on competence—they’re valuable clues about what went wrong and how to fix it. Good error messages tell a story about what the system expected versus what it encountered. Learning to read error messages carefully and use troubleshooting data effectively is a crucial skill.

    Collaboration is not about sharing tasks—it’s about sharing knowledge.

    #SHARE_KNOWLEDGE

    The value of collaborative work isn’t in the mechanical division of labour—it’s in the knowledge transfer, real-time feedback, and shared problem-solving that occurs. When professionals collaborate effectively, they share different perspectives, catch each other’s mistakes, and learn from each other’s approaches.

    The most important skill in technology is knowing when to start over.

    #START_OVER

    Abandoning problematic systems or processes and starting fresh proves more efficient than continuing to patch existing work. When complexity accumulates beyond economical improvement, when foundational assumptions prove flawed, or when requirements shift dramatically, fresh starts offer better paths forward.

    Remember: Every expert was once a disaster who kept learning.

    Further Reading

    Ackoff, R. L. (1999). Re-creating the corporation: A design of organizations for the 21st century. Oxford University Press.

    Conway, M. E. (1968). How do committees invent? Datamation, 14(4), 28-31.

    Deming, W. E. (2000). Out of the crisis. MIT Press. (Original work published 1986)

    Drucker, P. F. (2006). The effective executive: The definitive guide to getting the right things done. HarperBusiness. (Original work published 1967)

    Gall, J. (2002). The systems bible: The beginner’s guide to systems large and small (3rd ed.). General Systemantics Press. (Original work published 1975)

    Marshall, R. W. (2021). Quintessence: An acme for software development organisations. Falling Blossoms.

    Seddon, J. (2019). Beyond command and control. Vanguard Consulting.

    #ACKOFFWRONG #ALMOSTBROKEN #ASSUMPTIONSFIRST #ATTENDNEEDS #ATTENTIATIONALFEEDBACK #BADSYSTEM #BEHAVIORCHANGE #BOTHEVILS #BREADCRUMBS #BUILDIN #CARINGGROWTH #CHANGERULES #CHANGETHINKING #CLEANTHINKING #COLLABORATIVEFEEDBACK #COLLABORATIVEINTEL #COLLECTIVEMINDSET #CONSTRAINT #CONWAYSLAW #DEMING5 #DEMING95 #DOUBLECHECK #DRUCKERDISTINCTION #EGOWORK #EXPLAINCOMPLEXITY #FAILUREDEMAND #FIRSTBEATSBEST #FUNCTIONFORM #FURNITUREMOVE #FUTURESELF #GALLSLAW #HARDVARIABLES #KNOWLEDGESHARE #LASTPLACE #MEASUREBREAK #NEVERRUN #NOCODE #NOWORK #PRODNOTTEST #REALITYREQUEST #REFACTOREARLY #REFUSEQUIT #Relationships #SAYNO #SECURITYDISCIPLINE #SHAREKNOWLEDGE #SHIPIT #SLEEPSOLVE #SOFT #STARTMANUAL #STARTOVER #STATUSREPORT #TECHDEBT #TEMPPERMANENT #THREEHARDS #TIMETRAVEL #TRUSTEDBREAKS #TRUSTDATA #UNCOMFORTABLE #USEFULWRONG #USERSFAVOUR #VISIBLELOVE

  7. The Everywhere Insiders 6: Gaza Aid, Iran’s Nuclear Program, and Global Diplomatic Challenges

    Author(s): Scott Douglas Jacobsen

    Publication (Outlet/Website): The Good Men Project

    Publication Date (yyyy/mm/dd): 2025/07/09

    Irina Tsukerman is a human rights and national security attorney based in New York and Connecticut. She earned her Bachelor of Arts in National and Intercultural Studies and Middle East Studies from Fordham University in 2006, followed by a Juris Doctor from Fordham University School of Law in 2009. She operates a boutique national security law practice. She serves as President of Scarab Rising, Inc., a media and security strategic advisory firm. Additionally, she is the Editor-in-Chief of The Washington Outsider, which focuses on foreign policy, geopolitics, security, and human rights. She is actively involved in several professional organizations, including the American Bar Association’s Energy, Environment, and Science and Technology Sections, where she serves as Program Vice Chair in the Oil and Gas Committee. She is also a member of the New York City Bar Association. She serves on the Middle East and North Africa Affairs Committee and affiliates with the Foreign and Comparative Law Committee. She argued that Gaza aid site deaths result from broader insecurity and militant interference, not U.S. distribution, cautioning against politicizing humanitarian efforts. On Iran, she noted that the likely relocation of uranium stockpiles under intelligence watch complicates nonproliferation. Discussing regional unrest, she warned of Russian impunity and criticized the selective application of the UN Charter. She lauded Israel’s internal war crimes probe, questioned Trump’s diplomatic and financial tactics, condemned Southeast Asian torture networks, and urged focus on substantive solutions.

    Scott Douglas Jacobsen: UN Secretary-General António Guterres has criticized a U.S.-backed humanitarian aid initiative in Gaza, reportedly describing it as “inherently unsafe.” This criticism followed incidents where civilians were killed at aid distribution points in the Gaza Strip. According to AP News, Guterres linked the danger not directly to the aid initiative itself but to the broader insecurity and lack of coordination around humanitarian access in Gaza, where ongoing conflict and airstrikes have endangered civilians.

    Irina Tsukerman: Civilian deaths at aid sites were not directly caused by the distribution initiative but rather by the broader security situation—particularly the conduct of warring parties. Hamas has been accused of undermining various aid efforts, sometimes through interference or by asserting control over distribution. There have also been reports, including from Israeli and U.S. sources, that Hamas has confiscated aid or interfered with its delivery.

    Despite these challenges, the U.S. and Israel have cooperated to deliver millions of aid packages to Gaza. Initially, many of these efforts were successful, including airdrops and the construction of a temporary maritime pier by the U.S. military. However, these efforts have faced logistical difficulties, including damage to the dock and reports of aid not reaching civilians due to chaos on the ground and potential interference from local factions.

    One controversial element of Israel’s broader strategy has included attempts to support or arm local factions that could act as rivals to Hamas. These efforts, which some sources describe as covert or indirect, aim to weaken Hamas’s grip. However, critics argue that empowering local militias or clans—some of whom may be secular but authoritarian and violent—risks replacing one problematic actor with another. Historical accounts suggest that Hamas initially gained political traction in Gaza in part because many residents distrusted the existing factions tied to the Fatah-led Palestinian Authority, who were widely seen as corrupt or ineffective.

    The main issue, then, is the conflation of humanitarian and political objectives. By blending aid delivery with attempts to reshape local power structures, the initiative became vulnerable to political manipulation. This gave Hamas both the motive and the justification to intervene.

    Guterres’s criticism may reflect frustration with the breakdown of neutrality in humanitarian delivery. However, critics argue that his comments risk misplacing blame—targeting a relatively successful U.S.-led aid effort rather than the militant interference that disrupted it. There is also concern that some UN-affiliated agencies in Gaza have been compromised or politicized over time, which complicates coordination.

    It is fair to criticize elements of Israeli Prime Minister Benjamin Netanyahu’s political strategies. However, one must also acknowledge that certain aspects of the aid initiative were practical—until political entanglements and local militant control undermined them.

    As for recent developments related to Iran and the movement of uranium following Israeli airstrikes, Reuters has reported that Iran has threatened retaliation over the assassination of senior IRGC commanders and military strikes targeting its regional proxies. There have also been concerns in Washington about Iran’s nuclear program. However, there is no verified public report stating that the U.S. moved Iranian uranium after airstrikes, nor that President Trump warned Iran to relocate its stockpiles ahead of strikes. These claims appear to conflate multiple timelines or rely on unofficial sources.

    What is known is that Iran continues to enrich uranium beyond the limits set by the now-defunct Joint Comprehensive Plan of Action (JCPOA). U.S. officials are closely monitoring these developments. Discussions in Congress include possible additional sanctions or deterrence measures in response to Iranian escalation.

    But you have to admit—once you give the Iranians advanced warning, of course, they are going to move their uranium stockpiles. The question is: where did they go? These trucks carrying enriched uranium cannot just vanish. They have to be somewhere. If the uranium was relocated, and it most likely was, then that new location is probably known—at least partially—by intelligence agencies, as it has been under discussion for some time. So why has there been no initiative to intercept it before it was moved so deep underground that there is now practically no chance of recovering it?

    This also means that Iran could potentially restart its nuclear program almost immediately without needing to wait for reconstruction or to retrieve buried stockpiles from damaged sites like Fordow or Natanz. All of this creates a highly intractable situation. The U.S. is attempting to bring Iran back to the negotiating table. But without conditions that prevent Iran from continuing its nuclear development covertly, those negotiations are likely to fail. Iran currently has no incentive to negotiate, as it believes it still holds strategic leverage.

    And now it might. If Iran has managed to preserve or relocate even part of its uranium, the threat remains. Furthermore, if some of the recent intelligence is correct—that Iran was closer to developing a nuclear weapon than previously thought—then it is possible that components or even completed weapons were smuggled out of the country before these discoveries were made public. Iran has had longstanding exchanges with China, Oman, North Korea, and various non-state actors. It is conceivable that nuclear materials, or even fully assembled devices, could have been moved alongside other weapons, oil, or gas shipments.

    In such a scenario, Iran may not need to build a new weapon on its soil; it could have outsourced the final stages of production or even stored weapons abroad, perhaps in North Korea. This would mean Iran has retained a strategic deterrent without openly violating its commitments in a traceable way. While these possibilities remain speculative, they are not being discussed widely in public discourse. Yet the implications are profound: incomplete strikes that leave Iran’s leadership intact and its infrastructure only partially damaged may serve as motivation for Tehran to accelerate its nuclear ambitions. It could even lead to a weapons test shortly if Iran believes the geopolitical window is closing.

    Jacobsen: The United Nations’ peacekeeping chief, Jean-Pierre Lacroix, has stated that the conflict in Sudan is beginning to impact the Central African Republic. This was highlighted following an attack on a UN peacekeeper. What are your thoughts on the potential for this conflict to expand regionally? And if it does, what are the appropriate international responses to prevent escalation?

    Tsukerman: I don’t expect a large-scale confrontation in the immediate future. The tensions have not yet reached that threshold. However, the fact that there is already spillover—and that incidents like attacks on UN peacekeepers are occurring—shows that destabilization efforts are underway. These are not isolated accidents. There are actors, including Russia and regional factions, who benefit from instability and may be encouraging it.

    The more Russia sees no consequences for its actions elsewhere, the more it is emboldened to provoke unrest in additional regions—just because it can. This creates a dangerous precedent. We are already seeing troubling signs: for instance, former President Trump has publicly pushed to end U.S. funding for democracy-promoting initiatives abroad. That means Russian dissidents, Ukrainian civil society groups, and other vulnerable actors are losing critical support.

    Additionally, there is a reported recommendation from the White House to end investigations into Russian war crimes in Ukraine. If that happens, it further signals to Moscow and others that international norms are optional. Such policies not only weaken Western influence but embolden authoritarian regimes to act without fear of accountability.

    All of this is signalling to Russia that it can commit war crimes, provocations, invasions, and acts of aggression with impunity. Suppose Moscow can get away with a direct, full-scale invasion of a sovereign country like Ukraine. In that case, smaller-scale proxy attacks will likely proliferate. That is basic geopolitical logic. Russia’s aim appears to be creating as many flashpoints and destabilizing incidents as possible, forcing the U.S. and its allies to spread their attention thin—monitoring too many regions at once. This reduces the ability to respond effectively to any one crisis and weakens global coordination.

    Jacobsen: The U.S. has recently threatened to boycott the upcoming UN Development Finance Summit. What are your thoughts?

    Tsukerman: There has been much inflammatory rhetoric surrounding that summit. It is no secret that Trump has little regard for multilateral international gatherings, especially those organized by the UN. He has had longstanding issues with the UN—some of which involve its perceived interference with U.S. sovereignty, particularly when it comments on or critiques U.S. constitutional matters.

    However, Trump’s more profound concern is the growing influence of China in these international arenas. He wants the United States to maintain dominance without contributing more financially, yet is simultaneously frustrated that other powers—especially China—are using diplomacy, lobbying, and funding to advance their influence in the vacuum left by the U.S. retreat.

    So, now, the U.S. is attempting to withdraw, hoping that other countries will follow or that the absence of American participation will delegitimize the summit. The U.S. still holds a permanent veto at the Security Council, but walking away from other UN platforms only diminishes its soft power and influence.

    And that is the irony: by not offering viable alternatives or engaging bilaterally with summit participants, the U.S. ultimately isolates itself. It is not setting up new channels, building alternative coalitions, or pursuing a replacement strategy. It is simply boycotting—thereby appearing more like a spoiler than a global leader.

    Jacobsen: The UN Charter is now marking its 80th anniversary. Secretary-General Guterres has warned against countries engaging with the UN in a “à la carte” fashion—selectively adhering to Charter obligations. He cited violations tied to multiple conflicts. While it is unclear whether he referred to historical, ongoing, or both kinds of breaches, the criticism seems valid in all three cases. What are your reflections on this anniversary and the selective adherence to the Charter?

    Tsukerman: It is painfully apparent that the UN and other international organizations are falling short of their founding missions—especially in the realm of human rights. With the global rise in authoritarianism and widespread human rights abuses, many of the Charter’s commitments now feel hollow.

    States responsible for gross violations of human rights are not being sanctioned or isolated; instead, they are welcomed at international gatherings, given platforms, and in some cases—such as with permanent members of the Security Council—granted veto power. That creates a system in which enforcement is nearly impossible.

    When we mark anniversaries like the 80th anniversary of the UN Charter, it is primarily symbolic. Such milestones only hold weight if the member states genuinely uphold the values they signed on to. Selective engagement, or “à la carte” adherence, undermines the entire structure. If countries only follow the rules when it suits them, the system collapses into moral relativism and strategic opportunism.

    The fact that selective treatment of international law and standards occurs is, from a practical standpoint, not surprising. Of course, states will cherry-pick the benefits that benefit them and push their agendas when given the opportunity. That is precisely where international consensus is supposed to function—where other member states and institutional partners are expected to hold each other accountable. But they do not. The disparity across nations is so stark that it is astonishing that any human rights are respected at all, anywhere.

    What is needed is a clear and enforceable human rights charter. But enforcement begins at the national level before it can be applied internationally. And frankly, without mechanisms to hold global powers like China and Russia accountable—both of whom routinely use their positions on the UN Security Council to block scrutiny of their own human rights violations—it is challenging to envision meaningful global enforcement.

    These powers often collaborate within the Security Council to prevent serious consequences for their actions. Without structural reforms or independent enforcement mechanisms, international human rights law becomes performative. At present, it risks becoming a global punchline.

    Jacobsen: Reuters recently reported that Amnesty International and others uncovered 53 scam compounds operating out of Cambodia. These centers reportedly traffic and torture victims, including children, to run global cyber fraud schemes. Any thoughts?

    Tsukerman: Honestly, I should be more shocked than I am. The proliferation of scam networks in certain parts of Southeast Asia is not a new phenomenon. What is new—and truly alarming—is the evidence that these criminal enterprises are increasingly partnering with human traffickers and other organized crime groups to expand their operations.

    Why target children? First, because they can. Children are vulnerable, easily manipulated, and powerless. Second, it is significantly more challenging for authorities to investigate or prosecute such abuses, especially in areas where corruption is rampant or law enforcement is complicit. Third, there are well-established trafficking networks in the region that can easily supply these criminal syndicates with child victims.

    Why torture them? Because these groups are utterly ruthless. People often underestimate the severity of financial fraud, but these operations are not bloodless crimes. Victims are usually elderly, isolated, or vulnerable individuals who are deprived of their life savings. These groups also engage in ransomware, extortion, and blackmail. There have been suicides linked to their scams, and many victims lose their homes, pensions, or basic livelihoods.

    So, the objectives are predatory, and the methods are equally brutal. Unfortunately, prosecution is difficult. First, because these operations are transnational, requiring cooperation among countries with vastly different legal systems, political agendas, and law enforcement capabilities. Second, because many of the details of how these groups operate have only recently come to light, they had long operated in near-total secrecy.

    While the existence of such scams in Southeast Asia has been known for years, how they function—the forced labour, the torture, the human trafficking pipeline—has only recently begun to be exposed in full detail. That exposure is critical if international law enforcement is ever going to catch up.

    There has been a fundamental lack of attention, lack of resources, and low prioritization when it comes to tackling these transnational scams and trafficking networks. In addition, there is a clear deficit in training and preparedness for this type of complex, hybrid criminal activity. Now that these operations have crossed into open physical violence and abductions, perhaps the international response dynamic will shift. But it should not have taken this long.

    Jacobsen: Israeli forces have reportedly launched an internal war crimes investigation concerning the deaths of 500 civilians in Gaza. Any thoughts on this?

    Tsukerman: That is a very encouraging sign. It is precisely what should happen when credible allegations of grave violations are raised. The fact that Israel is conducting a self-policing investigation shows that the mechanisms of accountability are functioning, at least to some extent.

    Yes, one can—and should—criticize certain government officials or political leaders for using inflammatory rhetoric that may contribute to a dehumanizing environment. However, the rule of law requires that credible allegations are investigated and, where warranted, punished. That is the mark of a functioning democracy and an ethical military code of conduct.

    I hope that some of Israel’s harshest critics in the region take this as a lesson—not just as an opportunity to issue more condemnations. Instead, they should focus on adopting similar transparency and internal accountability mechanisms. Criticism is easy. Facing international and domestic pressure while investigating your actions is much harder—and that is what Israel is doing here.

    Jacobsen: Shifting to another topic, Australia’s defense outlays are about 2.0% of GDP, with a forecast to reach 2.33% only by 2033–34. As you know, NATO’s minimum spending guideline is 2%. Canada, by comparison, remains around 1.4% and is projected to reach 2% in the coming year. What are your thoughts on Australia’s case and the broader implications of this American pressure?

    Tsukerman: Australia faces its own set of unique security challenges, with China representing the most significant concern. While I do not believe China will launch a direct attack on Australia shortly, asymmetric threats—like cyber warfare, influence campaigns, and economic coercion—are real and growing. Australia needs to be prepared for these contingencies, which are part of NATO’s evolving doctrine.

    Moreover, Australia is a crucial ally in the Indo-Pacific and a member of strategic alliances like AUKUS and the Quad. With mounting instability in the region, it is in everyone’s interest that Australia is well-resourced and strategically positioned.

    That said, this issue is not just about raw budget numbers. Spending 2% of GDP is a baseline, but what truly matters is how that money is used—whether it is being invested in modernization, joint operations capacity, cyber defence, intelligence, and other force multipliers. Budgetary compliance alone does not guarantee security or alliance strength. Strategic clarity and efficient use of funds are just as important.

    Correctly allocating a defence budget means more than just hitting a spending target. It requires ensuring that deliveries are made on time, that procurement processes are transparent and efficient, and that priorities are coordinated with allies in a way that addresses shared strategic challenges. All of these factors matter just as much as the actual size of the budget.

    Simply throwing money at a problem does not guarantee responsible use. It often leads to the opposite. The U.S. Department of Defence, for example, has one of the most significant budgets in the world. Yet, it has consistently failed audits and has persistent issues with oversight, inventory tracking, and cost control. This shows that even with near-unlimited funding, mismanagement is possible—and, in some cases, systemic.

    Jacobsen: One of the significant developments this week was a minor update to the investigation into strikes in Gaza. Prime Minister Netanyahu has publicly denied claims that Israeli forces were ordered to shoot Palestinians seeking aid. Strikes reportedly continue to impact aid convoys and distribution points. So, the core issue remains the distinction between inadvertent harm and deliberate targeting. Any thoughts?

    Tsukerman: I have not seen any verified evidence that supports the claim of a deliberate shoot-to-kill order against civilians seeking aid. Most of these allegations come from anonymous sources unwilling to go on record or from individuals who are openly opposed to the war effort and Israeli military conduct. That does not automatically invalidate their concerns, but it does raise red flags about reliability and motive.

    There is a crucial distinction between legitimate critiques—such as concerns over proportionality, civilian safety, or strategic missteps—and fabricating or exaggerating claims to score political points. Some of these reports, in my view, may cross that line. When people insert intent where there is no clear evidence, they undermine the credibility of real, evidence-based human rights monitoring.

    Suppose these accusations are being made solely to bolster a political case without the backing of forensic data or credible firsthand testimony. In that case, we risk turning war crimes allegations into tools of political warfare—rather than instruments of justice. That can inflame tensions, damage prospects for peace, and create misinformation that further destabilizes the region. It is crucial to demand transparency and accountability from all sides—but also to uphold rigorous standards of evidence in how these allegations are reported and evaluated.

    Jacobsen: I would like to bring up one last issue—Trump’s recent comments criticizing negotiations with Canada. This seems to be getting very little coverage. What are your thoughts?

    Tsukerman: Yes, that’s the elephant in the room. Trump’s remarks were not only dismissive but also based on a bizarre justification. He claimed that the breakdown in negotiations was due to Canada’s proposal to tax large tech companies—many of which are based in the United States.

    Look, it is entirely reasonable to disagree over taxation and digital trade policies. But walking away from broader diplomatic and economic talks over a specific tax proposal—especially one that is being considered or adopted by several democratic nations—is disproportionate and counterproductive.

    It sends a message that the U.S. is unwilling to engage in difficult but necessary negotiations with close allies. And it weakens the kind of cooperation that is needed to address global challenges—whether in trade, defence, climate, or digital regulation. Canada has consistently been a constructive partner in multilateral forums. Undermining that relationship over a policy disagreement risks not only damaging bilateral ties but also eroding the broader credibility of U.S. diplomacy.

    The problem is that Trump has framed the dispute as some nefarious, ill-intentioned attack on Americans by the Prime Minister and the Canadian government. That is so absurd that it is hard to know where to begin. There is no logical reason why the talks should have collapsed over what was, in essence, a standard policy disagreement. That is precisely why such negotiations exist—to resolve these differences.

    If a policy gap exists, the next step is to work out compromises—introduce a give-and-take model or create a new structural framework to meet the goals of both parties. Instead, it appears that the administration either lacked the creativity to move forward constructively or never intended to negotiate in good faith in the first place. Perhaps Trump, now that the Iran issue has faded somewhat, felt the need to return to this anti-Canada narrative as a distraction from domestic challenges.

    There are ongoing crises at home—from legal troubles to economic uncertainty—and posturing against a neighbour like Canada might seem, to him, like an easy win for his political base. He may resume the talks at a later date. Still, suppose he continues to treat every reasonable disagreement as an existential threat. In that case, he will rapidly alienate traditional allies and lose valuable diplomatic capital.

    This is incredibly self-destructive behaviour. Turning minor disagreements into full-scale diplomatic breakdowns erodes trust, credibility, and the long-term ability to negotiate anything meaningful.

    Jacobsen: On a different note, Reuters has reported that a UAE-based fund purchased $100 million worth of Trump’s “World Liberty Coins,” a cryptocurrency initiative associated with his brand. Do you have thoughts on this?

    Tsukerman: I mean, let us be honest—it is not a massive sum for the UAE. They spend significantly more on arms, infrastructure, and influence-building globally. But the optics here are blatant. It is a strategic move to curry favour with Trump. The logic seems to be: if other governments and actors are buying access and goodwill through symbolic or frivolous means, why not them, too?

    Unfortunately, we are witnessing what appears to be open bribery. These cryptocurrencies have no demonstrable utility or value in global markets. Yet, they are being bought in bulk—not as an investment, but as a means to gain favour. That is the core issue: Trump has created an ecosystem in which foreign states feel empowered to participate in pay-to-play schemes with virtually no oversight.

    This is not about diplomacy or even soft power. It is about personal enrichment in exchange for political leverage. That creates an immediate and dangerous conflict of interest between Trump’s role as a private businessman and his potential or actual role as head of state. This is behaviour that would be outright illegal under most standard interpretations of conflict-of-interest law.

    In a functioning democracy with adequate enforcement mechanisms, something like this would be prohibited entirely. There would be immediate investigations. But the current political climate allows him to get away with behaviour that, under normal circumstances, would be grounds for serious legal action. It is not just unethical—it is potentially criminal.

    This is an impeachable offence. But until the Democrats retake Congress, I do not see anyone making such a move—or even seriously raising the argument in public.

    Jacobsen: Anything else worth bringing up?

    Tsukerman: Mamdani’s election by the Democrats in New York. 

    Jacobsen: Let’s do Mamdani. He got elected—what are your initial thoughts?

    Tsukerman: Mamdani’s election is significant, but what is troubling is how Republicans are handling it. They are focusing heavily on his alleged religious identity, framing it in a way that makes him seem like a threat. In doing so, they are turning him into a sympathetic figure for many observers, even those who might disagree with him on policy. By reducing everything to religious insinuations, they’re undermining legitimate critique and giving him political cover.

    Instead of dismantling Mamdani’s hypocrisy and lack of political substance—his performative rhetoric, his privileged background, and his shallow understanding of complex policy issues—his critics are going after his alleged religious identity. That is a strategic mistake. He will not bring socialism; he will profit from socialist talking points while maintaining personal privilege. That is the argument they should be making. He is yet another political opportunist using ideological branding to build a platform. He is, frankly, a scammer.

    Jacobsen: Any final thoughts for this week?

    Tsukerman: Yes. There are severe issues in play right now. Unfortunately, many prominent figures seem more interested in hijacking these discussions—turning procedural matters into personal soapboxes, dramatizing secondary concerns, and diverting attention from the urgent issues that need resolution. That is the real takeaway from this week’s events: manufactured controversy continues to eclipse real solutions.

    Jacobsen: Irina, thank you as always. 

    Last updated May 3, 2025. These terms govern all In Sight Publishing content—past, present, and future—and supersede any prior notices.In Sight Publishing by Scott Douglas Jacobsen is licensed under a Creative Commons BY‑NC‑ND 4.0; © In Sight Publishing by Scott Douglas Jacobsen 2012–Present. All trademarksperformancesdatabases & branding are owned by their rights holders; no use without permission. Unauthorized copying, modification, framing or public communication is prohibited. External links are not endorsed. Cookies & tracking require consent, and data processing complies with PIPEDA & GDPR; no data from children < 13 (COPPA). Content meets WCAG 2.1 AA under the Accessible Canada Act & is preserved in open archival formats with backups. Excerpts & links require full credit & hyperlink; limited quoting under fair-dealing & fair-use. All content is informational; no liability for errors or omissions: Feedback welcome, and verified errors corrected promptly. For permissions or DMCA notices, email: [email protected]. Site use is governed by BC laws; content is “as‑is,” liability limited, users indemnify us; moral, performers’ & database sui generis rights reserved.

    #geopoliticalStrategy #HumanRights #HumanitarianAid #NationalSecurity #NuclearProliferation

  8. Back in my blog post about Securing the Google SIP Stack, I did say I’d look at re-enabling SIP in Android-12, so with a view to doing that I tried building and booting LineageOS 19.1, but it crashed really early in the boot sequence (after the boot splash but before the boot animation started). It turns out that information on debugging the android early boot sequence is a bit scarce, so I thought I should write a post about how I did it just in case it helps someone else who’s struggling with a similar early boot problem.

    How I usually Build and Boot Android

    My builds are standard LineageOS with my patches to fix SIP and not much else. However, I do replace the debug keys with my signing keys and I also have an AVB key installed in the phone’s third party keyslot with which I sign the vbmeta for boot. This actually means that my phone is effectively locked but with a user supplied key (Yellow as google puts it).

    My phone is now a pixel 3 (I had to say goodbye to the old Nexus One thanks to the US 3G turn off) and I do have a slightly broken Pixel 3 I play with for experimental patches, which is where I was trying to install Android-12.

    Signing Seems to be the Problem

    Just to verify my phone could actually boot a stock LineageOS (it could) I had to unlock it and this lead to the discovery that once unlocked, it would also boot my custom rom as well, so whatever was failing in early boot seemed to be connected with the device being locked.

    I also discovered an interesting bug in the recovery rom fastboot: If you’re booting locked with your own keys, it will still let you perform all the usually forbidden fastboot commands (the one I was using was set_active). It turns out to be because of a bug in AOSP which treats yellow devices as unlocked in fastboot. Somewhat handy for debugging, but not so hot for security …

    And so to Debugging Early Boot

    The big problem with Android is there’s no way to get the console messages for early boot. Even if you enable adb early, it doesn’t get started until quite far in to the boot animation (which was way after the crash I was tripping over). However, android does have a pstore (previously ramoops) driver that can give you access to the previously crashed boot’s kernel messages (early init, fortunately, mostly logs to the kernel message log).

    Forcing init to crash on failure

    Ordinarily an init failure prints a message and reboots (to the bootloader), which doesn’t excite pstore into saving the kernel message log. fortunately there is a boot option (androidboot.init_fatal_panic) which can be set in the boot options (or kernel command line for a pixel-3 which can only boot the 4.9 kernel). If you build your own android, it’s fairly easy to add things to the android commandline (which is in boot.img) because all you need to do is extract BOOT/cmdline from the intermediate zip file you sign add any boot options you need and place it back in the zip file (before you sign it).

    Unfortunately, this expedient didn’t work (no console logs appear in pstore). I did check that init was correctly panic’ing on failure by inducing an init failure in recovery mode and observing the panic (recovery mode allows you to run adb). But this induced panic also didn’t show up in pstore, meaning there’s actually some problem with pstore and early panics.

    Security is the problem (as usual)

    The actual problem turned out to be security (as usual): The pixel-3 does encrypted boot panic logs. The way this seems to work (at least in my reading of the google additional pstore patches) is that the bootloader itself encrypts the pstore ram area with a key on the /data partition, which means it only becomes visible after the device is unlocked. Unfortunately, if you trigger a panic before the device is unlocked (by echoing ‘c’ to /proc/sysrq-trigger) the panic message is lost, so pstore itself is useless for debugging early boot. There seems to be some communication of the keys by the vendor proprietary ramoops binary making it very difficult to figure out how it’s being done.

    Why the early panic message is lost is a bit mysterious, but unfortunately pstore on the pixel-3 has several proprietary components around the encrypted message handling that make it hard to debug. I suspect if you don’t set up the pstore encryption keys, the bootloader erases the pstore ram area instead of encrypting it, but I can’t prove that.

    Although it might be possible to fix the pstore drivers to preserve the ramoops from before device unlock, the participation of the proprietary bootloader in preserving the memory doesn’t make that look like a promising avenue to explore.

    Anatomy of the Pixel-3 Boot Sequence

    The Pixel-3 device boots through recovery. What this means is that the initial ramdisk (from boot.img) init is what boots both the recovery and normal boot paths. The only difference is that for recovery (and fastboot), the device stays in the ramdisk and for normal boot it mounts the /system partition and pivots to it. What makes this happen or not is the boot flag androidboot.force_normal_boot=1 which is added by the bootloader. Pretty much all the binary content and init rc files in the ramdisk are for recovery and its allied menus.

    Since the boot paths are pretty radically different, because the normal boot first pivots to a first stage before going on to a second, but in the manner of containers, it might be possible to boot recovery first, start a dmesg logger and then re-exec init through the normal path

    Forcing Re-Exec

    The idea is to signal init to re-exec itself for the normal path. Of course, there have to be a few changes to do this: An item has to be added to the recovery menu to signal init and init itself has to be modified to do the re-exec on the signal (note you can’t just kick off an init with a new command line because init must be pid 1 for booting). Once this is done, there are problems with selinux (it won’t actually allow init to re-exec) and some mount moves. The selinux problem is fixable by switching it from enforcing to permissive (boot option androidboot.selinux=permissive) and the mount moves (which are forbidden if you’re running binaries from the mount points being moved) can instead become bind mounts. The whole patch becomes 31 insertions across 7 files in android_system_core.

    The signal I chose was SIGUSR1, which isn’t usually used by anything in the bootloader and the addition of a menu item to recovery to send this signal to init was also another trivial patch. So finally we have a system from which I can start adb to trace the kernel log (adb shell dmesg -w) and then signal to init to re-exec. Surprisingly this worked and produced as the last message fragment:

    [ 190.966881] init: [libfs_mgr]Created logical partition system_a on device /dev/block/dm-0[ 190.967697] init: [libfs_mgr]Created logical partition vendor_a on device /dev/block/dm-1[ 190.968367] init: [libfs_mgr]Created logical partition product_a on device /dev/block/dm-2[ 190.969024] init: [libfs_mgr]Created logical partition system_ext_a on device /dev/block/dm-3[ 190.969067] init: DSU not detected, proceeding with normal boot[ 190.982957] init: [libfs_avb]Invalid hash size:[ 190.982967] init: [libfs_avb]Failed to verify vbmeta digest[ 190.982972] init: [libfs_avb]vbmeta digest error isn't allowed[ 190.982980] init: Failed to open AvbHandle: No such file or directory[ 190.982987] init: Failed to setup verity for '/system': No such file or directory[ 190.982993] init: Failed to mount /system: No such file or directory[ 190.983030] init: Failed to mount required partitions early …[ 190.983483] init: InitFatalReboot: signal 6[ 190.984849] init: #00 pc 0000000000123b38 /system/bin/init[ 190.984857] init: #01 pc 00000000000bc9a8 /system/bin/init[ 190.984864] init: #02 pc 000000000001595c /system/lib64/libbase.so[ 190.984869] init: #03 pc 0000000000014f8c /system/lib64/libbase.so[ 190.984874] init: #04 pc 00000000000e6984 /system/bin/init[ 190.984878] init: #05 pc 00000000000aa144 /system/bin/init[ 190.984883] init: #06 pc 00000000000487dc /system/lib64/libc.so[ 190.984889] init: Reboot ending, jumping to kernel

    Which indicates exactly where the problem is.

    Fixing the problem

    Once the messages are identified, the problem turns out to be in system/core ec10d3cf6 “libfs_avb: verifying vbmeta digest early”, which is inherited from AOSP and which even says in in it’s commit message “the device will not boot if: 1. The image is signed with FLAGS_VERIFICATION_DISABLED is set 2. The device state is locked” which is basically my boot state, so thanks for that one google. Reverting this commit can be done cleanly and now the signed image boots without a problem.

    I note that I could also simply add hashtree verification to my boot, but LineageOS is based on the eng target, which has FLAGS_VERIFICATION_DISABLED built into the main build Makefile. It might be possible to change it, but not easily I’m guessing … although I might try fixing it this way at some point, since it would make my phones much more secure.

    Conclusion

    Debugging android early boot is still a terribly hard problem. Probably someone with more patience for disassembling proprietary binaries could take apart pixel-3 vendor ramoops and figure out if it’s possible to get a pstore oops log out of early boot (which would be the easiest way to debug problems). But failing that the simple hack to re-exec init worked enough to show me where the problem was (of course, if init had continued longer it would likely have run into other issues caused by the way I hacked it).

    https://blog.hansenpartnership.com/debugging-android-early-boot-failures/

    #00 #01 #02 #03 #04 #05 #06 #android #androidBoot #androidDebugging #androidVerifiedBoot #AVB #lineageos

  9. Trauma, Tech, and COVID Are Stalling Child Development

    Author(s): Scott Douglas Jacobsen

    Publication (Outlet/Website): The Good Men Project

    Publication Date (yyyy/mm/dd): 2025/06/03

    Leena Weaver and Traci Glover, child mental health experts behind Healing Children, LLC. Drawing on over fifty years of combined experience, they explain how foundational developmental needs—such as emotional regulation, trust, and safe relationships—are increasingly disrupted by technology and trauma. The COVID-19 pandemic and excessive screen time have caused a two-year emotional lag in many children. Weaver and Glover emphasize balancing empathy with accountability, using trauma-informed, developmentally appropriate strategies. Their Healing Environment framework helps children progress through stalled stages of emotional growth, fostering resilience and maturity through consistent boundaries, adult attunement, and meaningful relational support.

    Scott Douglas Jacobsen: Today, we are joined by Leena Weaver and Traci Glover, seasoned child mental health professionals with over fifty years of combined experience as school psychologists and counselors. Their organization, Healing Children, LLC, supports children’s emotional, behavioural, and psychological well-being.

    They promote children’s mental health by offering practical tools rooted in neuroscience and trauma-informed care. Their Healing Environment framework emphasizes relationships, boundaries, empathy, and adult self-regulation to build resilience and foster healthy development. Leena and Traci are dedicated to equipping parents and educators with practical strategies for supporting children facing trauma, entitlement, and emotional dysregulation. Their expertise is shared through their blogs, podcasts, and professional consultation services.

    Thank you so much for joining me today—I truly appreciate it. Drawing on your decades of school experience, what are children’s perennial, fundamental needs? And, with the rise of social media and the Internet, are there any newer needs that must be addressed—either by adding new supports or limiting specific influences?

    Leena Weaver: Let’s take the first one and return to the second. Does that sound good? So, what do children need at a foundational level?

    One key thing we emphasize with both children and educators is a developmental lens. We often reference models like Erik Erikson’s stages of psychosocial development and other frameworks that describe how children build a sense of self and social-emotional maturity over time.

    For example, children need to develop basic trust in their caregivers in infancy. This depends on consistent, nurturing care that meets physical and emotional needs. That early sense of security becomes the foundation for all later development.

    As they move into toddlerhood and early childhood, children explore independence and learn about boundaries, emotional regulation, and develop cause and effect thinking. They start to recognize that while they are loved and valued, there are limits that keep them safe. These lessons are taught through relationships with emotionally attuned adults who model self-regulation and enforce boundaries calmly and consistently.

    By the time they reach school age, children should ideally have experienced enough stability and attunement to view the world as a safe and predictable place where adults are trustworthy, and emotions can be named, understood, and managed. This foundation supports the development of resilience, self-control, and social competence.

    In short, children need:

    • Emotionally available caregivers
    • Predictable and safe environments
    • Clear, compassionate boundaries
    • Adults who model and teach emotional regulation
    • Developmentally appropriate expectations

    All of this lays the groundwork for healthy development in both school and life.

    These are the boundaries: we’re consistent with our follow-through. We have fun with our children. We spend time with them—that whole relational piece. And that relational piece also supports learning how to build relationships with peers.

    It helps with language development, supports delayed gratification, and teaches one to wait for things. All of those are critical skills. Now, if you talk about technology entering parenting, these are the areas where we’re seeing concerns. One, kids are not having as many face-to-face interactions.

    Children are not making eye contact with their parents because the parents are often on their devices. Eye contact is critical—for dopamine release which is the chemical that aids in bonding. That back-and-forth in relationships, the give-and-take, is missing. With video games, for instance, it’s all instant gratification. You don’t have to share. You don’t have to take turns. 

    Scott: Keep going, Leena. You’re doing great. But I’ll add that we also see parents and kids on their devices, which means they’re not interacting with each other or peers.

    Weaver: Exactly. And without those peer interactions, kids are not learning essential social skills like compromise, cooperation, and working through conflict.

    One of the things we’re seeing in schools with the increased use of technology is that kids—even those coming into kindergarten—do not know how to play with other children. They don’t know how to share or wait their turn.

    Their emotional regulation is so underdeveloped that classrooms are being disrupted by extreme temper tantrums—outbursts that, developmentally, they should have been supported through at age two. At that age, with attuned parenting, children typically learn emotional regulation, how to accept the word “no,” and how to follow the rules with growing independence.

    When we discuss teenagers and social media, we see even more issues. Teenagers are naturally supposed to take healthy risks—it is part of their developmental role.

    Teens grow by taking risks—asking someone out on a date, trying out for a team, joining a play, pursuing an art competition, etc. —and these are all healthy risks. We want to encourage those.

    What we want to discourage are unhealthy risks—like substance use or unsafe sexual behaviour. Those can be damaging. However, the overuse of technology and social media can lead kids to withdraw from real-world experiences that teach courage, social skills, and emotional resilience.

    What we’re finding with social media is that kids are not getting together in person as much as they used to. It’s more screen time and less face-to-face interaction. They’re not taking the healthy social risks that naturally come with in-person conversations—like speaking spontaneously without being able to type it out, delete it, and rephrase it.

    Because so much of communication now is filtered and edited, it removes those opportunities for social growth and confidence-building.

    Kids are more hesitant to take healthy risks because everything can be recorded or captured in a photo or video. They fear that anything they do or say could be widely shared or used against them. So, the psychological cost of social interaction has increased.

    That’s why, as parents, it’s essential to understand what our kids need emotionally in those early years—to help them build emotional regulation, trust, and a sense of safety. They need to experience healthy parental authority and learn what it means to do what is asked within age-appropriate boundaries. This sets them up to establish healthy boundaries with others later on.

    And it starts with the basics: less screen time and more play. Parents must spend real time with their children—playing games, engaging in turn-taking and sharing, and building that relational foundation. That’s where social skills are learned.

    Parents must have honest conversations about healthy technology use in the teenage years. I’m reading a book called Boundaries, written by a psychologists Drs. Henry Cloud and John Townsend. It includes an entire chapter on setting healthy boundaries with technology for adults and children.

    It’s about teaching kids how to use technology as a tool for connection rather than disconnection. When tech is used to avoid uncomfortable situations or emotions, or as a substitute for authentic interaction, it often leads to more loneliness rather than less.

    We’re seeing a rise in suicidal ideation, even among young children. When something goes wrong—social rejection, academic failure, or conflict—they sometimes go straight to the thought: “My life is over.” They lack the emotional skills to ride those waves.

    Yes. They don’t realize that those are normal ups and downs of life. Social media portrays everything as perfect—everyone’s smiling, hands in the air, having a great time. So when they experience pain, they think something is wrong with them rather than understanding it as part of the human experience.

    Jacobsen: So, if we’re looking at these developmental stages, and we’re seeing increased emotional dysregulation in children—impacting classroom environments—then this is not just an emotional concern, but an educational one. If a child is having a major outburst in the classroom, the entire class can lose a day of learning. That’s not just correlated—it’s directly connected to how much emotional development kids miss.

    Especially in North America, where many of these apps, algorithms, and devices were adopted early and widely. How much emotional development are kids losing in these environments? And how much education are we losing simply because students cannot learn due to frequent emotional crises in class?

    So how much emotional development are we losing—and then, how much education are we losing—in the children who are especially behind in emotional maturity?

    Traci Glover: That’s such an interesting question. 

    Weaver: Children are about two years behind developmentally. And when you talk with teachers—and even in our work doing training with educators—that’s a consistent observation. I did a book study with my teachers, and the consensus was that kids are around two years behind, both academically and emotionally, but especially emotionally.

    And that emotional delay has a direct impact on academics. You see five-year-olds acting like three-year-olds and fifth-graders behaving like third-graders. So, instead of fifth graders developing mature peer relationships and resolving conflicts, they’re still tattling, struggling to solve social problems, and lacking the self-regulation expected at that age.

    From what we see in classrooms—and in the data we gather in our practice—there’s a strong pattern of emotional delay.

    Some of that, of course, is due to COVID, but during the pandemic, most children were also immersed in electronic devices rather than social environments. That lack of real-world interaction stalled their emotional growth.

    Academically, the picture is more complicated. COVID disrupted formal education in significant ways. We clearly lost several academic years depending on the age group and access to consistent learning. However, emotional development is a strong predictor of academic recovery.

    Children with strong emotional regulation tend to have better frustration tolerance—they understand that learning involves effort and discomfort. They can work through setbacks and persevere. Those are the kids who tend to make better academic gains.

    Glover: By contrast, in our emotionally disturbed programs, we often see kids who are two to three years behind academically because their emotional dysregulation disrupts their ability to engage in learning at all.

    Many of those children have Individualized Education Plans (IEPs) and are classified as having emotional or behavioural disabilities. Some are placed in special programs, while others remain in general education with support.

    What we found in one of our internal studies was that many of these kids had experienced trauma, and emotionally, they were stuck at the age when the trauma occurred. So you might have a 10-year-old who, emotionally, is functioning like a two-year-old. That’s the kind of behaviour we’re dealing with.

    Weaver: If you zoom out, though, and look across the board—even outside special programs—you’ll see this same two-year developmental lag in most children, especially in schools that rely heavily on technology-based teaching post-COVID.

    Jacobsen: So there are nuances in how that developmental gap appears—but you’re suggesting what amounts to a kind of flat emotional tariff—pardon the metaphor—a steady two-year lag across age levels?

    And from what you’re saying, that gap starts early and… stays there. So, that raises the following question: at what point does this developmental “freezing” happen?

    So, when you say a five-year-old is functioning like a three-year-old, and they’ve lost those two years—does that developmental lag stay unless it’s addressed? Or are there conditions under which kids can catch up?

    Glover: Oh yes. Kids can catch up. Emotional development is highly responsive to the right interventions.

    It starts with understanding development. You would think that, as educators, we’d all be great at applying developmental psychology—but in practice, we often forget. We teach it in our undergraduate and graduate programs, then enter the world of work and sometimes stop applying it as actively as we should.

    Erik Erikson was clear: We all must move through each psychosocial stage. At every stage, we’re supposed to learn something important—we’re meant to develop a key skill or sense of self—and only then do we move on to the next stage.

    If we don’t have supportive, caring adults around us—and if we don’t experience appropriate boundaries when we act out or engage in unhealthy behaviours—we stay stuck at that stage. We don’t move forward developmentally until the right supports are in place.

    You can see this in adulthood, too. Leena and I have done exercises in our classes where we look at before-and-after interviews of celebrities who went through addiction and recovery. When you watch them during active addiction and then again in sobriety, it’s like watching two different people. There’s real developmental change.

    That’s because substance abuse often freezes emotional development at the point when drug use begins. So if someone started using at age 15, they might still be emotionally functioning at that level—even into their 30s—until they start moving through those stages again in recovery.

    So yes—people can progress, and they do every day. But if they don’t have boundaries around inappropriate behaviour, and they’re not receiving appropriate support, they’re unlikely to move forward developmentally.

    That’s what we see in many of the children we work with—particularly those in emotionally disturbed programs or those receiving intensive behavioural support in schools. They are often developmentally stuck—emotionally operating well below their age.

    But once they start receiving the appropriate boundaries and consistent support, you begin to see them move forward—they start progressing through Erikson’s stages again. You really can get stuck at any stage.

    Weaver: For example, Erikson’s first stage is Trust vs. Mistrust, which is infancy. The core task is learning whether the world is safe and whether caregivers are reliable. If children don’t develop trust, they remain in mistrust, and their behaviours reflect that.

    If I don’t trust the world or the people around me, I feel I have to protect myself—which might mean I lie, steal, or cheat. I’m operating from a mindset of “no one’s going to meet my needs but me.”

    But if I learn to trust my caregiver, I move into the next stage: Autonomy vs. Shame and Doubt. That’s toddlerhood. I start learning to care for myself a little—like toileting, choosing clothes, saying “no.” I began to understand that I was separate from my parents.

    If autonomy develops within healthy boundaries, the child moves into Initiative vs. Doubt. That’s preschool age. Then later, around school age, it’s Industry vs. Inferiority. At that stage, the child should develop a sense of competence—that they can do things and succeed in the world.

    But if they don’t reach that sense of industry, they can feel inferior—and then apathy starts to take hold. They stop trying. They give up. They disengage.

    Erikson’s stages cover the lifespan—from birth until death. And yes, a person can get stuck at any stage.

    We see it all the time. For example, we have children stuck on Trust vs. Mistrust and others stuck on Autonomy vs. Shame and Doubt.

    You also see adults stuck in the Identity vs. Role Confusion stage—the key developmental task of adolescence. Something may have happened at that point in their lives—trauma, instability, lack of support—and they never fully developed a stable sense of identity. So they stay in that confused, searching place, not knowing who they are or their role.

    Some of the celebrities we’ve studied seem to be stuck in Industry vs. Inferiority. They constantly try to prove themselves because they never developed a secure sense of competence. And that drive for validation can sometimes mask deep feelings of inadequacy.

    And then you have external factors that interfere with development—technology, drugs and alcohol, trauma, bullying, grief, divorce, even the death of a parent. All of these can cause someone to get stuck on a stage.

    Yes, you can get stuck anywhere on the developmental path. Let’s take a child who’s emotionally two years behind. If they were supposed to be learning specific social skills in third grade, but they missed that due to COVID isolation, then they’re still displaying third-grade behaviours by fifth grade. That’s because they never had the chance to practice and internalize those skills when they mattered developmentally.

    In Erikson’s model, you must master a stage before moving on to the next one. To give a more concrete example, kids learn basic things like sharing and taking turns in kindergarten and first grade.

    Glover: By third and fourth grade, kids understand they can’t control their friends. They realize: “Even if I do everything right, my friends still have their minds and choices.” By reaching fifth and sixth grade, most children have accepted that reality and are working on more complex social skills, like navigating group dynamics, collaboration, and peer influence.

    But we’re seeing now that fifth graders are still operating at a third-grade level—trying to control their peers, getting upset when their friends don’t comply, and struggling with basic autonomy in relationships.

    Weaver: And that’s mainly due to the lack of social interaction during COVID and the continued reliance on technology, which doesn’t provide kids with face-to-face relational experiences.

    Jacobsen: So it’s a delayed developmental effect. Devices are designed to be habit-forming—so even when COVID restrictions were lifted, the behavioural patterns continued.

    So would you, as experts, expect a lagging curve? In other words, even though COVID has declined in prominence, the habitual tech use persists—and probably remains above baseline.

    The algorithms behind many of these platforms are built to promote compulsive use—dopamine-driven design. So yes, COVID-19 created the context, but the technology created lasting habits.

    Glover: We haven’t seen comprehensive data on long-term post-COVID screen use, but from what we observe in schools, kids are still using tech more than they did pre-pandemic—even if not at the same intensity as during lockdown.

    That’s precisely what we’re seeing.

    I do not hear about it quite as much now, but I think parents have become more aware of the concerns around technology. Do I still have kids who play video games? Sure, but it’s nothing like what it was in the early 2000s.

    I’ve noticed some improvement in that area at my school, and part of it is that there’s now much more information available to parents. They’re learning how to set boundaries at home. That’s been my experience with technology. What about yours?

    Weaver: I still work with kids who are highly, highly addicted to technology. A lot of it comes down to parent training. I was in a meeting not too long ago where we held a session with parents, and we provided the parent research on the addictive nature of tech. Her son struggles to socialize outside of talking about video games—he doesn’t know how to relate in other contexts.

    That said, I’ve seen some hopeful signs recently. Our kindergartners this year came in with stronger social skills than we’ve seen in the past few years. And it’s because they were babies during COVID. So, by the time they reached kindergarten, they had had a couple of years post-lockdown for social development.

    Glover: During the height of COVID, those children were infants—and they probably received more direct time with parents, especially if the parents were working from home. That may have resulted in more face-to-face interaction during those crucial early years.

    So we might see better emotional regulation in that group—not because COVID had no effect, but because their developmental window overlapped with heightened parental involvement. Yes, but to be clear—we don’t have data on that yet. That’s just an observation and professional hypothesis at this point.

    Jacobsen: Right—and even if it is just opinion, it is still expertise-based and, therefore, more likely to be accurate than random speculation.

    Glover: We sometimes forget that kids have many needs. They’re a lot of work—but they’re also so much fun. They’re all different. But if we want to see them emotionally regulated, they must go through those developmental stages of maturity. The adults around them must know how to manage their emotions. Parenting is hard. Some kids are just harder than others. Some push buttons more. Temperament plays a role. Abilities vary.

    That’s where Leena and I come in—when we’re working in schools—we emphasize that it truly takes a team. It does take a village. When dealing with significant behavioural challenges, we must work collaboratively with parents and school staff to develop the most effective plan.

    Weaver: And I’m trying to think more specifically about your question regarding technology’s role in this dynamic. Some kids with the most frequent temper tantrums at school also spend much unsupervised time on technology at home. They haven’t learned emotional regulation, so we teach them those foundational skills at school.

    We’re walking them through the temper tantrum stage at age seven or eight because they didn’t learn earlier that those behaviours won’t work to get what they want.

    Unfortunately, when they go home, many are handed devices. Parents may not be seeing the tantrums at home because technology is being used as a behaviour management tool—a digital pacifier, in some cases.

    Glover: I’m thinking of several current cases. At my school, we have many families where both parents work, or it’s a single-parent household, or the child lives with grandparents—sometimes because the parents are incarcerated or struggling with substance use.

    And you see a broad spectrum. Even under challenging circumstances, some of those kids are incredibly sweet and resilient—primarily when the grandparents or guardians are engaged and set clear boundaries.

    Others carry deep anger about what they’ve gone through—which is entirely understandable. However, they can still thrive if they have engaged adults at school who care about them and hold them accountable.

    I had one student with major behavioural challenges and temper tantrums. He bounced between his parents—each taking turns being in jail—so his home life was precarious. But at school, he had structure, consistency, and adult support. He did well in high school, came back to visit us later, and thanked us for what we did for him.

    So it’s not about having a perfect home environment. It’s about having at least one or two adults—at home or school—who genuinely care, set appropriate boundaries, and hold kids accountable for their behaviour.

    In our Healing Environment framework, we use the “house” model. It helps us assess what the child already has in place, what’s missing, and what they need to move through these developmental stages.

    When we put those pieces in place—consistent relationships, boundaries, empathy, accountability, etc.—we’ve seen kids make incredible progress.

    Jacobsen: Would you say that socioeconomic status is a more significant factor? Or is it more about the stability and engagement of the parental unit—whether it’s a single parent, grandparents, or dual-income household?

    Glover: You can have families with money; the kids are still a mess. If there’s no accountability, and the child’s every want is fulfilled without expectations, that can lead to profound immaturity. We’ve seen some of the most entitled kids come from high-income households, and they often have more behavioural problems than children from homes experiencing economic hardship.

    Weaver: So it depends. Socioeconomic factors can matter if the family is in crisis because the entire system is in survival mode. In those cases, it’s harder for parents to meet emotional needs when they struggle to meet basic needs.

    Glover: But as Leena said, we’ve seen just as many issues—or sometimes more—from privileged families, where entitlement, lack of boundaries, and lack of accountability lead to emotional immaturity.

    Poverty can be traumatizing. Not knowing if there will be food on the table, not knowing if you’ll be able to stay in your home—those are enormous stressors for a child. And it’s even harder because kids can’t do anything about it. It’s completely out of their hands. Then, on top of that, they’re watching their parents struggle and feel stressed, which adds another emotional burden.

    What’s interesting, though, is that sometimes those experiences can mature children. Some kids want to help and contribute, and in doing so, they develop a strong sense of responsibility.

    But there’s also a flip side. Those kids can become parentified—meaning they take on adult roles too early. When they do become adults, they sometimes try to reclaim the childhood they missed. That can lead to difficulties like substance use or reckless behaviour.

    So you can have parentified children who become incredibly responsible adults, holding jobs, maintaining marriages, and raising families. But you can also have parentified children who grow up with unresolved trauma and fall into destructive coping mechanisms. It depends. It’s complex.

    People are complex. It’s never one-size-fits-all. But what’s important is recognizing that poverty is stressful and can profoundly affect children. That’s what schools need to understand so that we can meet those kids with empathy and support and help families access the resources they need.

    Weaver: One thing Traci does well—and it’s so powerful—is helping kids find meaning in their struggles. She helps them reflect on their learning from difficult situations, supporting emotional maturity.

    Finding purpose in adversity is a big part of resilience. If a child has a parent who is abusive or dealing with addiction, and the situation isn’t severe enough to trigger child protection services, we can still help that child learn something from it. What are you learning from this? How can you become a stronger, wiser, more self-aware adult?

    Or, if a child is growing up in poverty, we can help them reflect on the strengths they’re building—resourcefulness, compassion, grit. When they start to see that what they’re going through now might help them later in life, it changes their narrative from hopelessness to growth.

    To help them find meaning in their struggle, we adults must understand that the struggle is real. We must name, acknowledge, and help them process it.

    Glover: I’ve worked with students whose parents struggled with addiction. When they go home, they don’t know what version of their parent they’ll get: someone angry and volatile or calm and affectionate. And sometimes the situation isn’t “bad enough” for CPS to intervene—it’s not overt abuse, but it’s precarious.

    So these kids are learning how to navigate unpredictable relationships. And what they often don’t realize is that they’re gaining a skill that many of their peers won’t have to learn until adulthood.

    We help them understand: Yes, what you’re going through is hard. But you’re also developing emotional tools that will serve you in the future. And that can be transformative. Because when you’re in that moment—when you’re just trying to survive—it’s easy for a child to believe: “My life is always going to be like this.”

    And it’s not just about learning coping skills—it’s also about helping them see that they’re developing strengths that many of their peers, who grew up in more stable environments, might not even understand. That gives kids a sense of hope.

    Yes, and that hope helps them mature. It gets them thinking: What am I going to do for myself? What kind of life do I want? How will I create that?

    Because ultimately, kids are their own person. Regardless of their background, they will grow up and have to make decisions. They’ll make mistakes, and they’ll make some great choices, too. Our goal is for them to honestly know their strengths and weaknesses and how to navigate life effectively.

    That way, they can hold a job, maintain healthy relationships, and build the kind of life they want. As a counselor, that’s what I’m aiming for.

    Jacobsen: So, let’s say a child has been diagnosed with something, or you understand there’s an environmental trauma at play—like substance misuse, absentee parenting, or aggression. I grew up in a home with alcoholism. Eventually, my father left, and it became a single-parent household. There were moments of instability and conflict. 

    Yes, we see these types of developmental arcs all the time—how childhood experiences impact stress regulation, emotional responses, and even physiological patterns, like elevated cortisol levels.

    These things often register below conscious awareness, but they still shape a child’s ability to handle stress. And I want to distinguish something: it’s one thing to understand a child’s trauma, but quite another to have that understanding harden into an identity. It can become a “trauma anchoring,” where the past becomes a perpetual excuse for current behaviour.

    So how do you strike that balance—between acknowledging trauma and providing support, while still teaching accountability and consequences for behavior?

    Weaver: One of the key things we teach in our classrooms is the difference between empathy and sympathy.

    Because what you’ve described—where trauma becomes a blanket excuse—can happen when people mistake sympathy for empathy. Sympathy says: “Poor you, let me let this slide because you’ve suffered.” Empathy says: “What you’ve been through is awful, and I see you—but I still expect you to be accountable for your choices.”

    Empathy says: “What you’ve been through is horrible and unfair—but I believe in you. I believe you can overcome it.” Sympathy, on the other hand, says: “It’s awful. I feel sorry for you so I will lower my expectations.”

    One of the most important things we emphasize with educators and parents is maintaining expectations with understanding. Yes, they might need more support—like counseling or accommodations—but there still has to be accountability for behaviour. Support and accountability are not mutually exclusive.

    Let me give you an example. I worked with a first-grade student whose story is heartbreaking. She was born while her mother was in jail, lived with her father until age four, and then was placed with her mother once she was released. Later, it came to light that the father had been sexually abusing her from infancy.

    That child experienced extensive trauma—being removed from the only caregiver she knew, then sent to live with someone who was essentially a stranger, albeit her mother. She’s now in a more stable home with her mother and her mother’s partner, but the psychological impact of those early years was profound.

    Naturally, she began lying, stealing, and cheating—because, from her perspective, she had to survive. That was how she protected herself. But shaming her wasn’t going to change anything. So we used a team-based approach to support her.

    We read our children’s book with her (Raising Babies by Traci Glover and Leena Weaver). It uses animal characters to explore the difference between cared-for and neglected animals. That helped her begin to externalize her experience and reflect.

    I told her, “For a child who has gone through what you’ve been through, lying, stealing, and cheating are normal behaviours. That’s how kids survive trauma. But if you continue to do these things, it will hurt your heart.”

    And we explained that to her in a developmentally appropriate way—because she was in first grade. That language helped her understand that her actions, while once protective, were now hurting her emotionally.

    She still believed that what her father did to her was her fault. She said, “I shouldn’t have let him do that to me.”

    Glover: And that’s so common. Children almost always internalize blame for abuse or trauma.

    Jacobsen: Is that partly due to ego diffusion or a lack of self-other differentiation? Does the child see the parent as an extension of themselves?

    Weaver: It’s also what Bessel van der Kolk and others refer to when discussing the body keeping the score. The nervous system absorbs and mimics other people’s emotions. And developmentally, if you believe it’s your fault, then you can control it. That creates a kind of psychological safety—even if it’s not rational.

    Glover: It’s also tied to the development of conscience. Kids are learning to internalize behaviour, which is necessary for moral and emotional growth. Taking responsibility is how we mature. But trauma, divorce, instability—these experiences can cause kids to over-internalize, meaning they take responsibility for things they shouldn’t.

    That’s where counseling plays a key role. It helps kids learn what is their responsibility and what is someone else’s. That’s the boundary work we do in therapy.

    Weaver: We worked on that exact concept with this particular child. I told her, “You were a baby. It wasn’t your fault.” That truth is going to take time to sink in.

    Meanwhile, we set up her environment for success. We reduced opportunities to lie, steal, and cheat by structuring her world more tightly. And we paired that structure with clear, consistent consequences—not punishments, but natural and logical consequences.

    It didn’t take long for her to progress. First, we increased communication with home so she knew that school and home talked daily. You can set up simple systems with schools to make this happen. The key was that she knew her parents and the school staff were aware of her behaviour and working together.

    That added structure and boundaries were essential for her. She wasn’t ready for the same freedom as other first graders. For example, we ensured she wasn’t alone in the cubby area because, in those moments of isolation, she was more likely to steal.

    We didn’t frame it as punishment. We framed it as: “What do you need to feel safe?” When she did steal—let’s say an eraser—her consequence was to bring back two erasers or to do something kind for the person. There was accountability, but it was done in a way that aligned with her trauma history.

    Glover: That’s how we work with children who have trauma-based behaviours: we don’t lower expectations, but we tailor the support. Because here’s the key—she can’t heal from trauma if she’s allowed to engage in harmful behaviour without accountability.

    If she learns she can manipulate the adults—even subconsciously—it sends a message that if her abuser returns, we wouldn’t be strong enough to protect her from the abuser because she was able to manipulate us. That’s not safe. She needs the adults in her life to be wise enough to set boundaries and sensitive enough to recognize that her behaviours stem from a painful experience. It’s that balance of empathy and accountability.

    Weaver: When she sees that the adults around her are strong enough to keep her safe and that they believe she can meet appropriate expectations, she begins to feel secure. That’s when maturity and growth happen.

    Glover: What we don’t want—and this is a growing concern—is for children to take on trauma as an identity. We’re hearing this more often from teenagers: “I’m depressed,” “I’m anxious,”—not, “I’m experiencing depression or anxiety.”That distinction matters.

    Weaver: Yes, we want them to recognize their struggles, but we don’t want them to become the struggle. Because if that identity takes hold, they stay stuck.

    Jacobsen: And that extends beyond youth. You see this in public life, too—when someone behaves poorly, and it becomes public discourse, the diagnosis gets used to excuse the behaviour. It’s not limited to first-person experiences.

    Glover: It’s a societal pattern.

    Jacobsen: Thank you both.

    Weaver: Thank you—take care!

    Glover: Have a great day!

    Jacobsen: Excellent. Thank you so much. You too.

    Last updated May 3, 2025. These terms govern all In Sight Publishing content—past, present, and future—and supersede any prior notices.In Sight Publishing by Scott Douglas Jacobsen is licensed under a Creative Commons BY‑NC‑ND 4.0; © In Sight Publishing by Scott Douglas Jacobsen 2012–Present. All trademarksperformancesdatabases & branding are owned by their rights holders; no use without permission. Unauthorized copying, modification, framing or public communication is prohibited. External links are not endorsed. Cookies & tracking require consent, and data processing complies with PIPEDA & GDPR; no data from children < 13 (COPPA). Content meets WCAG 2.1 AA under the Accessible Canada Act & is preserved in open archival formats with backups. Excerpts & links require full credit & hyperlink; limited quoting under fair-dealing & fair-use. All content is informational; no liability for errors or omissions: Feedback welcome, and verified errors corrected promptly. For permissions or DMCA notices, email: [email protected]. Site use is governed by BC laws; content is “as‑is,” liability limited, users indemnify us; moral, performers’ & database sui generis rights reserved.

    #EmotionalReadiness #GraduationStress #mentalHealth #ParentalSupport #teenResilience

  10. Iridescent Alchemyst @iridescentalchemyst.wordpress.com@iridescentalchemyst.wordpress.com ·

    The Twelve Universal Laws

    February 24, 2022

    Ashley Marie

    *this post has been modified from it’s original version and was republished on 8/1/2024 with new and improved graphics!

    Perhaps you feel lost? Confused?

    Uncertain of your place in the world, and why you are here?

    Maybe your life seems like a constant series of ‘one step forward, two steps back.’ You make plans, and even though you try your hardest, something always goes wrong. Every day there are new hurdles, and the growing frustration that you feel inside tells you something isn’t quite right. 

    Maybe that is why you ended up here, on this blog post, looking for answers.

    You probably have heard of the Law of Attraction. It’s possible you have even read the book, The Secret, that elevated the concept into the mainstream.

    The Secret is a great book about the Law of Attraction. Get your copy on Amazon! *paid link

    Unfortunately, the book and its bandwagon of positive affirmers have seriously neglected to inform followers that The Law of Attraction is just one of twelve Universal Laws that govern all of creation.

    The 12 Universal Laws
    • History of the Laws
    • THe Laws and Synchronicity
    • The Laws of the Universe
      • Law of Divine Oneness
      • Law of Vibration
      • Law of Action
      • Law of Cause and Effect
      • Law of Compensation
      • Law of Attraction
      • Law of Perpetual Transmutation
      • Law of Relativity
      • Law of Polarity
      • Law of Rhythm
      • Law of Gender
    • Embrace the Laws
    • A Closer Look

    History of The Laws

    This is not newly discovered information. Documentation of these laws, and lists similar to this one, have been found in cultures all around the world. Historians argue they originate from Ancient Egyptian culture. After studying the Hermetic Principles, it is easy to see how they are a very likely foundation for the 12 Universal Laws as I have listed below.

    Even older than Ancient Egypt, the earliest recording of similar universal concepts can be traced back to ancient Hawaii. An ancient Hawaiian healing practice known as Ho’oponopono focuses on forgiveness and spiritual cleansing, which are two very important underlying themes in this list.

    The Laws and Synchronicity

    I first came across the list of Universal Laws as I was writing my book. This was a dark period in my life indeed. As I began to incorporate them in my day to day life, I began to notice strange coincidences happening more and more frequently. Now I realize those coincidences are called synchronicities.

    Synchronicities are signs from the divine realm that you are on the right path, that you are coming into alignment with your true purpose. Embracing these laws and adapting thoughts and behaviors to reflect them opens the door for the true essence of magick.

    The Laws of the Universe

    The greatest tools I can give you are those that make you stop and think about whether or not you are living in alignment with your true self.

    I love this quote from Socrates!

    Each of the laws require you to reflect and analyze yourself to see how your thoughts and actions have contributed to your current situation. Mastering these concepts will help you unlock the secrets to success and live a happier life. Even just acknowledging them will start to make a difference in how you feel.

    That sounds pretty good right? Keep reading to learn more about each of these 12 universal laws, and how you can put them into action to work for you!

    1. Law of Divine Oneness 

    We are one with each other. We are one with the universe. 

    The Universal Law of Divine Oneness: We are one with each other. We are one with the Universe.

    This law is the foundational concept of interconnectedness upon which all the other laws are built. No matter if you think of “it” as God, Allah, Elohim, The Universe, Zero Point Energy, etc. we are all creations of one divine source. It makes no difference where you were born, how you were raised, or what you believe. We are all human, and beyond the physical body and senses, our souls are intertwined more than you could imagine!

    2. Law of Vibration

    Everything is made of energy that vibrates at frequencies. 

    The Universal Law of Vibration: Everything is in constant motion, vibrating at a specific frequency.

    Everything (every atom, object, and living thing) is in constant motion, vibrating at a specific frequency. Anything that exists in our universe, whether seen or unseen, when broken down into and analyzed in its purest and most basic form, consists of pure energy or light which resonates and exists as a vibratory frequency or pattern. All matter has its own vibrational frequency. In order to materialize something, you must first match the vibration of what you want. 

    3. Law of Action

    Action is essential.

    The Universal Law of Action: Action is Essential.

    It is not enough to simply focus your attention on a goal or a desire, you must take action! We must engage in actions that support our desires and dreams. You are not likely to find what you are looking for by sitting at home. This means accepting opportunities and offers as life presents them to you. Taking steps forward takes courage and wit, but it is worth the benefits that will come along from accepting things with a grateful heart.

    4. Law of Correspondence

    As above, so below. As within, so without. As with the universe, so with the soul.

    The Universal Law of Correspondence: As Above, So Below. As Within, So Without.

    Everything has a corresponding counterpart. Different levels of reality exist in the universe and we refer to these different levels as dimensions or planes. These planes- physical, mental, spiritual- exist in continuum. There is always a correspondence between the laws and phenomena of the various planes. Changes at one level affect all the other levels in the same fashion.

    What’s going on inside of us corresponds with our external circumstances. Your internal environment is a direct reflection of your external environment. There is a direct correspondence between what you think and feel on the inside, and what you experience on the outside.

    5. Law of Cause and Effect

    Every action has an equal and opposite reaction.

    The Universal Law of Cause and Effect. Every Action Has an Equal and Opposite eaction.

    Every thought, word, and deed is a Cause that vibrates out into the world, setting into motion a chain of events, creating in its wake Effects. Every cause has an effect, and every effect becomes the cause of something new.

    The choices we make, whether conscious or unconscious, are all causes that will produce a corresponding effect. All thoughts lead to words and words lead to behaviors or actions. All actions have consequences, as do all inactions. These consequences can be positive or negative, and this is based largely on the intention behind the actions.

    6. Law of Compensation

    What you sow is what you shall reap.

    The Universal Law of Compensation: What You Reap Is What You Sow.

    Eventually the vibratory energy sent out with our actions will return to its source, like the swing of a pendulum. Compensation is the visible effects of your deeds, but this does not only mean our physical actions. Our thoughts, emotions, and intentions also create compensation for us. All the effort you give, the actions you take, the things you think and say and do will all determine how you will be compensated. We receive exactly the reward or punishment we deserve.

    7. Law of Attraction

    That which is like, unto itself is drawn.

    The Universal Law of Attraction: That Which Is Like Unto Itself Is Drawn.

    You attract the things, events, and people into your life based on your overall energetic vibration. Our feelings, emotions, subconscious and conscious thoughts, beliefs, words, and actions all contribute to our vibrational frequency. Your habitual thought patterns and your dominant mental attitude determine your overall vibration.

    Where your attention goes, your energy flows. If you focus on the negatives in life, you will attract more negative. When you consistently maintain a positive outlook and a grateful attitude, you will attract more positive experiences.

    8. Law of Perpetual Transmutation

    Energy cannot be created or destroyed, only changed.

    The Universal Law of Perpetual Transmutation: Energy Cannot Be Created or Destroyed, Only Changed.

    Energy is constantly changing, transferring, or transmuting into something different. It is always in a state of motion. The energy of the universe is constantly changing into and out of form. It is flowing into our consciousness constantly, and we can transform this energy into whatever we choose to focus our thoughts on.

    All persons have within themselves the power to change the conditions of their lives. Higher frequencies transform lower frequencies. Whenever we have a thought, that is energy in our bodies becoming manifest. In order to bring this energy into reality, we must keep our thoughts and vibrations consistent.

    9. Law of Relativity

    Nothing in life has meaning, except for the meaning we give it.

    The Universal Law of Relativity: Your Perception Creates Your Reality.

    Everything in our physical world is only made real by its relationship or comparison to something. Therefore, everything is relative. Light only exists because we compare it to dark. Good can only exist if there is a ‘bad’ to compare it to. It is your judgment and perception that makes things look good or bad.

    10. Law of Polarity

    Opposites are identical in nature, but different in degree.

    The Universal Law of Polarity: Everything Has Its Poles, Its Pair of Opposites.

    Everything exists in dual nature in the physical and mental realms. Everything has its pole. The polar ends are both extremes of the same continuum. There is not one point where you can say one starts and the other begins, it is a full spectrum.

    You cannot have one side of the continuum without the existence of and potential for the opposite. Consider the dual outcomes when you flip a coin. The two sides may appear separate, but they are two inseparable sides of the same thing. When the coin is in the air, there is the potential for it to land heads up, or tails up.

    11. Law of Rhythm

    Everything moves to certain rhythms

    The Universal Law of Rhythm: Everything Flows, Out and In; Everything Has Its Tides; All Things Rise and Fall.

    These rhythms establish seasons, cycles, stages of development, patterns. Some say the energy of the Universe is like a pendulum, but recently science has proven the cycles of the universe are more like a spiral.

    The meaning you give to events in your life determine what you think and how you feel about them, which in turn creates another rhythm within your life. With this knowledge, you can reflect and determine whether you were the cause of a downward spiral, or was it just the natural rhythm?

    12. Law of Gender

    Everything in nature contains within itself feminine and masculine energies.

    The Universal Law of Gender. Everything In Nature Contains Feminine and Masculine Energies.

    Everything in nature is both male and female. Both are required for life to exist. The gender principles exist as feminine, or yin, and masculine, or yang energies. Yin energies are passive, receptive, intuitive, and soft. Yang energies, in contrast, are active, projective, logical, and hard.

    On the mental plane, the conscious mind is masculine and the subconscious mind is feminine. In order to unite these principles, you must understand that whether you are male or female, you hold both gender principles within. Every male has the components of female energy within his being, and every female has components of the male energy within her being. The key to harmonizing these principles is balance.

    Embrace the Laws

    These immutable Universal Laws should be used as guiding principles as you navigate life in today’s complex and chaotic world. Each of the laws teach you something about the big questions in life. When you have a greater understanding of them, you are able to see your own place in the world more clearly. Becoming aware of their influence will help lead to positive, long-lasting change in your life.

    It may sound far fetched right now, but I assure you that embracing these laws in your own life will open you up to a whole new world of possibilities. Many who have followed this path report feeling more confident and productive as they spend more time reflecting on themselves and learning their place in the world.

    A Closer Look

    The links below will take you to a closer examination of each of the Universal Laws in greater depth, and provide you with tips on how to embrace them in your own life!

    Law of Divine Oneness

    Law of Action

    Law of Cause & Effect

    Law of Attraction

    Law of Relativity

    Law of Rhythm

    Law of Vibration

    Law of Correspondence

    Law of Compensation

    Law of Perpetual Transmutation

    Law of Polarity

    Law of Gender

    Five Years.

    It’s coming up on the five year anniversary since I said goodbye to my children. It’s hard to believe. It doesn’t seem right, and I’ve had to count the years out on my fingers several times.

    2020. 2021. 2022. 2023… 2024.

    I have reflected on years past in previous posts, so if you are just tuning in, the links above will get you all caught up.

    This article will be long enough, because I could easily write a full blog post for each of the five pumpkins. That is exactly why I am breaking it up into parts.

    Five years of digging deep on child welfare and child abuse has brought about many revelations. About the system, the laws, the policies, the actual practices I saw and experienced personally, and the experiences of others around me… revelations about myself. These insights have shaped my views, changing some of them and reinforcing others.

    I want to keep it short and sweet, but I have a lot to points to make.

    Each pumpkin is like a themed chapter in a book that I wrote specifically for the intended audience. This holiday tradition and my efforts are dedicated to my children, in honor of the loss of our family. The only tradition that even comes close to bringing me joy like holidays used to.

    1. Pumpkin #5- Benton County DHS
      1. Good job!
      2. 1800% Increase
      3. Staff Turnover
      4. Viktor E Frankl
    2. Pumpkin #4- Child Welfare By The Numbers
      1. Assessment Findings
        1. False Allegations
        2. Mandatory Reporters
      2. Founded Abuse Categories
    3. Communities of Hope

    Pumpkin #5- Benton County DHS

    I love the dramatic effect of this shot that was taken in front of the Benton County DHS office as the sun was coming up.

    I usually only decorate four pumpkins- one each for me and the kids. This year, I added a fifth pumpkin.

    I realized that I had neglected to represent the fifth member of my former little family… the boys’ dad. And even though we were no longer together when the kids were taken from us, he is still family to me. And regardless of what happened in our past, I know how badly he is hurting. I know he struggles with grief.

    The same local office took not only our children, but all five of his children.

    His youngest child was adopted by a local family and is doing well from what I hear.

    His older two children were taken from their mother about a year after we started dating. They stayed with Scott’s sister for awhile, until the case worker decided his sister had too many children in her home.

    And granted it was complete chaos at times, but his sister was a good mother and it was a home filled with love. The kids were happy with their cousins! Which is a lot more than I could say about their maternal grandmother’s house, where they were placed next.

    Theirs is not my story to tell, but I can assure you that it was not a good situation, and those kids are still impacted by the separation from the only family they knew.

    The front of this pumpkin was a clear indication of the intended recipients: the men and women that work for Benton County DHS.

    Good job!

    In the picture above, you can barely make out the main message that I want them to get this year. Here’s a better shot.

    “Benton County DHS gave my sons to CHILD ABUSERS! GOOD JOB!”

    I won’t get into that here… you can read more about what I am referring to in my post “Do they read my letters?

    Below that, you can see another key point that I wanted to make: Largest jump in increased founded cases was 1994-1995… who started working there? The arrow that points to this statement came from…

    1800% Increase

    Between 1986 and 1995 1800% increase in founded abuse cases- Top 5 in the state!

    Between 1986 and 1995, Benton County had a 1800% increase in the number of founded abuse cases. That percentage put them in the top 5 in the state! But you won’t find those figures anywhere online. The online databases on the Iowa Department of Health and Human Services website only go back to 2015.

    By the grace of the Gods, I came across a publication in a dumpster a few years ago that reported the statistics BY COUNTY on indicators of child welfare in Iowa from 1986 to 1995. Very interesting information! I will have to dig a little bit to find the booklet, but I will update this article when I do.

    I made a spreadsheet with some of the statistics from that book, but again, I will have to do a little digging to find it, and I will update this article when I find it.

    Staff Turnover

    Average turnover rate statewide is 1.5 to 2 years.
    Benton County maintained several staff for 30+ years

    Like the pumpkin says, the average staff turnover rate statewide is 1.5 to 2 years. Benton County maintained several staff for 30+ years. That makes me wonder… why do they not have the same issue as other counties?

    VPD Officer Josh West made the comment to me once, “We got rid of all the bad ones.”

    I wish I could get my hands on the body cam footage from that day- a story for another time- but I promise you that is exactly what he said. I talked about a few of my favorites before… And it may be true that the “bad ones” are no longer in the Vinton office, but I found out that several of them were PROMOTED. It’s scary to think that their toxic, malicious mindset is now in a higher role amongst their ranks.

    Wouldn’t promoting them only serve tp reinforce and solidify in their minds the superiority they demonstrate in their words and actions?

    I hope they read this post… and when they do, I pray that they have the courage and conviction to look themselves in the mirror and ask themselves the following questions? And, just as importantly, I pray that they can answer them honestly and objectively.

    • Are they taking the same training that I have found all over the new Iowa DHHS website?
    • Are they getting the messages, now that they are coming from official channels? Messages about:
      • Substance misuse, relapse and recovery, and EVIDENCE BASED PRACTICE?
      • Faulty Sweat Patch Testing?
      • Stigmatizing and hurtful language?
      • LIVED EXPERIENCES?
      • Trauma-focused care?
      • Abuse PREVENTION > Crisis management?
    • How are they doing at adjusting the mindset and the culture in their office?
    • If they are just taking this training themselves, how are they teaching this new mindset to the staff that are new to the job?
    • How are they working to educate the public about the errors of their ways?
    • Having served in the forefront as leaders in a movement that has victimized struggling families, whether intentional or not… how are they working to lead our communities in the right direction?

    Viktor E Frankl

    The last message on pumpkin #5 is a quote from Dr. Viktor E Frankl. Dr. Frankl was a Jewish Austrian psychiatrist, and one of the earlier arrivals to Auschwitz. After surviving the horrors of the concentration camp, he went on to write dozens of books, including Man’s Search for Meaning (*paid link).

    Jim and I recovered a copy from a dumpster a couple years ago. It is where I found the following quote, and I cannot emphasize enough- the book is a MUST READ! In fact, I would insist that Frankl’s book become part of a mandatory reading list for the same professionals that are held to mandatory reporter training.

    In the book’s 184 pages, Dr. Frankl shared details about his time at Auschwitz. He describes the horrors of humanity with bone chilling simplicity, summing up his analysis of the psychologies that surrounded him and outlining the basis of his life changing theory of logotherapy with insightful clarity.

    “The one thing you cannot take away from me is the way I choose to respond to what you do to me.” Viktor E Frankl

    Those are some POWERFUL words from the Doctor! The wisdom in those words give me strength when I find myself reliving the events that led up to the wrongful termination of my parental rights… more on that a little later in this post.

    Pumpkin #4- Child Welfare By The Numbers

    The fourth pumpkin features statistics from the annual report Child Welfare By the Numbers (download link for 2023 report) from the Iowa Department of Health and Human Services. I have been watching these statistics very closely, and just today I downloaded and reviewed every report going back to 2012.

    I hope the staff at Benton County DHS take a minute to read this blog post, because I doubt they are interpreting the results the same way that I do. And I don’t just analyze them from my own perspective. I can understand one’s skepticism, but judging by some of the jaw-dropping comments people have made, I seriously doubt anyone bothers to take other perspectives into account as thoroughly.

    2023 Child Welfare #s The pie charts show 1) the breakdown of unconfirmed, confirmed, and founded reports; 2) the breakdown of founded abuse types

    It doesn’t look like the department saw fit to share the total number of reports made to the hotline this year, but I can guess from the results of years past that a majority of them were accepted. The criteria they use is listed in Iowa Code 175.22(1)

    Any report made to the department which alleges child abuse, as defined in Iowa Code section 232.68, or constitutes a complaint that a child is a child in need of assistance, as defined in Iowa Code section 232.2(6), shall be accepted for assessment.

    I will go more in-depth with the actual definitions in just a bit. And that criteria sounds legit, right? I would’ve thought so too…

    Assessment Findings

    Of the 32,857 reports that met the criteria for assessment, there were 26,613 child abuse assessments conducted.

    • 18,674 (70%) of child abuse assessments resulted in a finding of “not confirmed
      • Not confirmed child abuse assessments involved 18,239 unique children
    • 1,459 (6%) of child abuse assessments resulted in a finding of “confirmed” abuse
      • “Confirmed” abuse means that the abuse was minor and isolated and not likely to reoccur; and the perpetrator is not placed on the child abuse registry
      • Confirmed child abuse assessments involved 1,828 unique children
    • 6,480 (24%) of child abuse assessments resulted in a finding of “founded” abuse
      • Founded child abuse assessments involved 8,632 unique children

    My point in showing the assessment findings is this: SEVENTY PERCENT of the reports made to the hotline were NOT CONFIRMED. This means that almost 19,000 reports were made that were potentially a complete waste of the department’s time, energy, and resources.

    Because trust me, these men and women are trained to look for every bit of evidence they can find so they can prove that the parents are abusing their children. They don’t want to miss something and end up with their name in the next headline about how DHS messed up- and I can’t fault them for that in itself.

    And when they walk in the door believing that the allegations are true- that you are abusing your children- any and everything they see and hear is interpreted through that lens.

    This classic book was part of the curriculum when I was growing up, now it is a BANNED BOOK!

    False Allegations

    I can personally speak from experience, and I have the documentation to prove it… there are some petty bitches (men and women alike) out there that make false allegations to DHS. This type of people are guilty of committing a simple misdemeanor according to Iowa Code § 232.75(3), but they aren’t referred to the county attorney for criminal charges until

    “the department receives more than three reports that identify the same child as a victim of child abuse or the same person as the alleged abuser of a child, or which were made by the same person, and the department determined the reports to be entirely false or without merit.”

    It would be interesting to see the statistics on how often that actually happens… Versus how many are listed as not confirmed.

    And since the caller’s identity is protected, someone that has been falsely accused has little ground to stand on when they attempt to defend themselves.

    Whatever happened to our “right to face our accuser?”

    Turns out that 6th amendment confrontation clause really only applies to criminal court proceedings, initially only at the FEDERAL level. “That all changed after the Fourteenth Amendment was passed in 1866, which subsequently made the right to confrontation applicable to both state and federal courts.” (Aron, 2021).

    …but it still doesn’t apply to the branch of district court known as juvenile, or family court.

    Regardless, if you are someone that calls in to the child abuse hotline because you are:

    • mad at your ex (READ: a spiteful or vengeful petty bitch)
    • fw some dude that has a girlfriend (READ: a jealous petty bitch)
    • an outsider looking in (READ: an ignorant petty bitch)

    If any of those descriptions apply to you… Then YOU are a big part of the problem here!! And you need to

    GROW THE F*CK UP!!!!

    Because really, you are not just hurting that other person… you are hurting the child involved. AND (this is important!) anything you say about someone else reflects back on you.

    Let me be clear on this point… NOBODY is “winning!!” And you aren’t “getting on their good side.” CHILD PLEASE!

    The child protective workers do not care about any of the adults in the situation… They care about your children. They think you are guilty of abusing children, and they will tell you whatever you want to hear to keep you talking. FACTS!

    If you are feeling triggered about what you just read, I’m gonna go ahead and guess you’ve been there before. On one side, or the other… Or maybe you’ve even been on both sides of the accusations.

    Do us all a favor…. do yourself a favor, and check out the information packet I put together called: PROTECT YOUR FAMILY

    Protect Your Family by Ashley Meredith, MSN

    Protect Your Family includes information for parents and caregivers about:

    • your rights and responsibilities
    • being PREPARED
    • being a PROACTIVE PARENT
    • Co-parenting
    • Dating a Parent
    • Dating as a Parent
    • Parenting Resources
    • Parenting Hacks
    • and more!! FOR FREE!

    Mandatory Reporters

    I have discussed this before, but it is worth mentioning again… Another potential source for the “not confirmed” reports stems from the mandatory reporters law.

    I do not know a nurse, teacher, childcare worker, or any other professional that works with children that would stand by and willingly allow child abuse to happen! I am not sure what exactly prompted the enactment of these laws, and it doesn’t specifically say why when reviewing the history of child abuse laws in Iowa’s Guide for Mandatory Reporters (link to downloadable pdf).

    Let me clarify, because I don’t believe everything about the law is absurd. For example, training for professionals in health and mental health care, education, childcare, social work, and law enforcement should continue to be mandatory for those professions. People that have never witnessed abuse do absolutely need to be educated about the signs and symptoms so they are fully prepared to keep a vigilant eye. And this training should be repeated on a regular basis, even though the training videos are dreadfully boring every time you have to watch them.

    I also agree that people in those fields should be protected from any civil or criminal liability if they make a report in good faith, or if they participate in an assessment being carried about by the department.

    However… and I feel very strongly about this… the threat of sanctions or revocation of a professional license and the potential for facing criminal charges for failure to report should be repealed!

    This part of the law has directly contributed to the division in this country by pinning good people against good people, usually over trivial matters or misunderstandings. And it sets the tone for a fearful/paranoid mindset and overpolicing of families! I am not the only one that thinks so! Check out these articles for more information:

    I can’t get into specifics, obviously, because of HIPAA… but there was only one time in my professional career when I made a report to DHS that I felt was valid. Ironically, it was while caring for a child in a foster home. Now that I think of it, it just dawned on me that it was a foster home that house SEVEN special needs children… And memories flood back.

    There were three times that I was forced by a supervisor to make a report that I did not agree with, because we had a difference in professional opinion, and I told the operator exactly that when I made the reports. And there was one other time when I had to instruct a family member that the boss said I would have to make a report if they didn’t proceed with doctor’s orders.

    Founded Abuse Categories

    Look again at the larger pie chart in the picture below. It shows a breakdown of the categories of founded abuse in Iowa in 2023. It is easy to see that an overwhelming majority (59%) of the founded abuse cases fall under the category of neglect, also known in Iowa as Denial of Critical Care.

    The next largest category, Dangerous substances, makes up 20% of the founded cases and is followed by the closely related category of Presence of illegal drugs (9%). I will save this discussion for a later post that you definitely won’t want to miss!

    Actual physical abuse makes up 7% of the founded cases. Sexual abuse is 4%. And the other category that includes more horrendous sexual exploits involving children, made up less than 1% of the founded cases.

    Here are the definitions related to child abuse from Iowa Code section 232.68:

    232.68 definitions of child abuseDownload

    Neglect

    Neglect, or Denial of Critical Care, contains some verbage that leaves the door open for misinterpretation. I am not alone in arguing that misinterpretation leads to confusion about what constitutes true neglect versus conditions of poverty, and I have discussed this before.

    I painted the following quote on a pumpkin in 2022. It comes from Jerry Milner, who led the U.S. Children’s Bureau under former President Donald Trump, and David Kelly, his former special assistant at the bureau.

    “Committing to a system that takes on poverty-related neglect in humane and effective ways requires active partnering with public and private entities that can, collectively, create the conditions where families can thrive and children are free from harm. It requires partnership with communities that know and understand the needs of their families and children. And, it requires a willingness to rally around families that are vulnerable and struggling with poverty, rather than judging them, labeling that vulnerability as neglect, and pathologizing them.
    If we truly care about children and families, it’s time to stop confusing poverty with neglect and devote ourselves to doing something about it.”

    Jerry Milner & David Kelly, Children’s Bureau Express Dec 2019/Jan 2020

    For a more detailed examination of Denial of Critical Care, I pulled up the Iowa Administrative Code r. 441-175.21 on the Legal Information Institute on the Cornell Law School website.

    “Denial of critical care” means the failure on the part of a person responsible for the care of a child to provide for the adequate food, shelter, clothing, medical or mental health treatment, supervision or other care necessary for the child’s health and welfare when financially able to do so, or when offered financial or other reasonable means to do so, and shall mean any of the following:

    1. Failure to provide adequate food and nutrition to the extent that there is danger of the child suffering injury or death.
    2. Failure to provide adequate shelter to the extent that there is danger of the child suffering injury or death.
    3. Failure to provide adequate clothing to the extent that there is danger of the child suffering injury or death.
    4. Failure to provide adequate health care to the extent that there is danger of the child suffering injury or death. A parent or guardian legitimately practicing religious beliefs who does not provide specified medical treatment for a child for that reason alone shall not be considered abusing the child and shall not be placed on the child abuse registry. However, a court may order that medical service be provided where the child’s health requires it.
    5. Failure to provide the mental health care necessary to adequately treat an observable and substantial impairment in the child’s ability to function.
    6. Gross failure to meet the emotional needs of the child necessary for normal development.
    7. Failure to provide for the adequate supervision of the child that a reasonable and prudent person would provide under similar facts and circumstances when the failure results in direct harm or creates a risk of harm to the child.
    8. *Failure to respond to the infant’s life-threatening conditions (also known as withholding medically indicated treatment) by providing treatment (including appropriate nutrition, hydration and medication) which in the treating physician’s reasonable medical judgment will be most likely to be effective in ameliorating or correcting all conditions, except that the term does not include the failure to provide treatment (other than appropriate nutrition, hydration, or medication) to an infant when, in the treating physician’s reasonable medical judgment any of the following circumstances apply: the infant is chronically and irreversibly comatose; the provision of the treatment would merely prolong dying, not be effective in ameliorating or correcting all of the infant’s life-threatening conditions, or otherwise be futile in terms of the survival of the infant; the provision of the treatment would be virtually futile in terms of the survival of the infant and the treatment itself under the circumstances would be inhumane.

    Now if you take those definitions at face value, that sounds all good and well. Except 8- *that shit is a jumbled mess of a run-on sentence! Whoever wrote it didn’t even bother to draft it in legislative format.

    C’mon man! The rate of victims per 1000 and percent of children found to be “victims of maltreatment” are significantly higher than the national average… WHY?

    Average Caseloads

    Iowa DHHS reports average caseloads for child protective workers and case managers versus the recommendations for caseloads

    The Iowa DHHS reports that, in 2023, there were 223 child protective workers employed across the state that carried an average of 13 cases/month. And there were 351 case managers with an average of 21 cases/month.

    The Child Welfare Information Gateway, part of the Children’s Bureau and Administration for Children and Families, offers the following recommendations: child protective workers- no more than 12; case managers- no more than 17.

    I could not find any county specific information about case loads averages.

    The Cost of Child Welfare

    If you are someone that gets mad about welfare programs like food stamps and Medicaid, this should really piss you off!

    Dollar amounts paid out in subsidies, wages for social workers, and family services in 2023

    In 2023 alone, Iowa reports that 77 million dollars went to adoption subsidies. These are monthly allotments granted to families that adopt children that the department stole from their parents- in addition to benefits, reimbursements and tax credits.

    Casey Family Programs (2016) reports that “For every $7 available for children in foster care, only $1 is available to invest in a wider array of services that prevent the need for foster care.”

    And those figures aren’t looking much better with time. I decided to pull the annual Child Welfare By The Numbers reports going back to 2012. Feel free to look for yourself, but here is a breakdown of the numbers.

    View the interactive stacked chart for more details

    Basic Daily Rates

    This is the rate of pay for adoptive foster parents PER DAY You don’t want struggling parents to be given cash…
    But you are okay with paying someone to take their kids
    and paying someone else to raise their kids? These payment codes show the categories for payments or reimbursed funds that every foster parent is eligible to receive. This is a page from the Iowa DHHS Adoption Permanent Placement Procedures

    Next up is form 470-4401 Foster Child Behavioral Assessment. This form is used to determine what level a foster child is and can help explain the range in daily base rates. Keep in mind that these are the behaviors exhibited by a child that was taken from his or her parents and placed with strangers.

    470-4401 Foster Child Behavioral AssessmentDownload

    Communities of Hope

    I can’t end this post on a negative note. So until I finish and publish about the three remaining Halloween 2024 pumpkins, I invite you to read more about the Casey Family Programs and a program they just launched in 2024 called Building Communities of Hope.

    Per the Casey Family Programs website, Building Communities of Hope is “a nationwide effort to prevent the need for foster care by supporting families in raising safe, happy and healthy children.

    We recognize that creating better futures for children and families will not be possible unless we take into consideration the community conditions that surround them. If a community is healthy — if it is safe, supportive and teeming with opportunities — then it will have the elements that children need to thrive.

    Happy Halloween 2024!

    Keep an eye out for Halloween 2024: Five Years of Pumpkins- Part Two.

    Support my work by sharing this blog post! Thank you in advance for your help spreading the word about this important information!

    «Rules for Being HUMAN Next: Four Blind Men and An Elephant»

    RELATED POSTS

    8 responses to “The Twelve Universal Laws”

    1. My Plan for ‘Being the Change’ – Iowa Family Rights December 8, 2024

      […] Learn more about the Universal Law of Compensation andthe other 12 Universal Laws […]

      LikeLike

      Reply
    2. The Law of Vibration – Iridescent Alchemyst August 5, 2024

      […] article is the third installment of a series exploring the 12 Universal Laws, timeless principles that guide the flow of energy and influence the fabric of our reality. Each […]

      LikeLike

      Reply
    3. My Plan for ‘Being the Change’ – Ashley Meredith for Iowa House June 17, 2024

      […] Click the link to learn more about the Universal Laws […]

      LikeLike

      Reply
    4. Exposure – Iridescent Alchemyst August 30, 2023

      […] This is how you are directly co-creating with the universe! Read more about the Law of Attraction and the other Universal Laws here. […]

      LikeLike

      Reply
    5. The Law of Divine Oneness – Iridescent Alchemyst May 10, 2022

      […] article is the second in the Twelve Universal Laws series as the focus shifts to the individual laws. It is my goal to provide a thorough examination […]

      LikeLike

      Reply
    6. My Plan for ‘Being the Change’ – Iridescent Alchemyst April 7, 2022

      […] Click the link to learn more about the Universal Laws […]

      LikeLike

      Reply
    7. You Haven’t Heard of Tom MacDonald?! – Iridescent Alchemyst April 6, 2022

      […] Law of Attraction, one of the 12 Universal Laws, says: that which is like, unto itself is drawn. This means if we are living in a state of fear, […]

      LikeLike

      Reply
    8. Numerals & Archetypes – Iridescent Alchemyst March 16, 2022

      […] cultures all over the world. It all goes back to that first and foundational law of the universe: Law of Divine Oneness. Regardless of our exponential progression from humble humanoid beginnings, or the obvious modern […]

      LikeLike

      Reply

    This is your chance to SHOW WHAT YA KNOW!! Share your own advice about this topic! Cancel reply

    Δ

    8 responses to “The Twelve Universal Laws”

    1. My Plan for ‘Being the Change’ – Iowa Family Rights December 8, 2024

      […] Learn more about the Universal Law of Compensation andthe other 12 Universal Laws […]

      LikeLike

      Reply
    2. The Law of Vibration – Iridescent Alchemyst August 5, 2024

      […] article is the third installment of a series exploring the 12 Universal Laws, timeless principles that guide the flow of energy and influence the fabric of our reality. Each […]

      LikeLike

      Reply
    3. My Plan for ‘Being the Change’ – Ashley Meredith for Iowa House June 17, 2024

      […] Click the link to learn more about the Universal Laws […]

      LikeLike

      Reply
    4. Exposure – Iridescent Alchemyst August 30, 2023

      […] This is how you are directly co-creating with the universe! Read more about the Law of Attraction and the other Universal Laws here. […]

      LikeLike

      Reply
    5. The Law of Divine Oneness – Iridescent Alchemyst May 10, 2022

      […] article is the second in the Twelve Universal Laws series as the focus shifts to the individual laws. It is my goal to provide a thorough examination […]

      LikeLike

      Reply
    6. My Plan for ‘Being the Change’ – Iridescent Alchemyst April 7, 2022

      […] Click the link to learn more about the Universal Laws […]

      LikeLike

      Reply
    7. You Haven’t Heard of Tom MacDonald?! – Iridescent Alchemyst April 6, 2022

      […] Law of Attraction, one of the 12 Universal Laws, says: that which is like, unto itself is drawn. This means if we are living in a state of fear, […]

      LikeLike

      Reply
    8. Numerals & Archetypes – Iridescent Alchemyst March 16, 2022

      […] cultures all over the world. It all goes back to that first and foundational law of the universe: Law of Divine Oneness. Regardless of our exponential progression from humble humanoid beginnings, or the obvious modern […]

      LikeLike

      Reply

    This is your chance to SHOW WHAT YA KNOW!! Share your own advice about this topic! Cancel reply

    Δ

    #frequency #hermeticPrinciples #hooponopono #lawOfAttraction #lawOfCauseAndEffect #lawOfCompensation #lawOfCorrespondence #lawOfGender #lawOfOneness #lawOfPerpetualTransmutation #lawOfPolarity #lawOfRelativity #lawOfRhythm #lawOfVibration #MentalHealth #positiveVibes #spiritualLaws #Spirituality #synchronicity #universalLaws

  11. Iridescent Alchemyst @iridescentalchemyst.wordpress.com@iridescentalchemyst.wordpress.com ·

    The Twelve Universal Laws

    February 24, 2022

    Ashley Marie

    *this post has been modified from it’s original version and was republished on 8/1/2024 with new and improved graphics!

    Perhaps you feel lost? Confused?

    Uncertain of your place in the world, and why you are here?

    Maybe your life seems like a constant series of ‘one step forward, two steps back.’ You make plans, and even though you try your hardest, something always goes wrong. Every day there are new hurdles, and the growing frustration that you feel inside tells you something isn’t quite right. 

    Maybe that is why you ended up here, on this blog post, looking for answers.

    You probably have heard of the Law of Attraction. It’s possible you have even read the book, The Secret, that elevated the concept into the mainstream.

    The Secret is a great book about the Law of Attraction. Get your copy on Amazon! *paid link

    Unfortunately, the book and its bandwagon of positive affirmers have seriously neglected to inform followers that The Law of Attraction is just one of twelve Universal Laws that govern all of creation.

    The 12 Universal Laws
    • History of the Laws
    • THe Laws and Synchronicity
    • The Laws of the Universe
      • Law of Divine Oneness
      • Law of Vibration
      • Law of Action
      • Law of Cause and Effect
      • Law of Compensation
      • Law of Attraction
      • Law of Perpetual Transmutation
      • Law of Relativity
      • Law of Polarity
      • Law of Rhythm
      • Law of Gender
    • Embrace the Laws
    • A Closer Look

    History of The Laws

    This is not newly discovered information. Documentation of these laws, and lists similar to this one, have been found in cultures all around the world. Historians argue they originate from Ancient Egyptian culture. After studying the Hermetic Principles, it is easy to see how they are a very likely foundation for the 12 Universal Laws as I have listed below.

    Even older than Ancient Egypt, the earliest recording of similar universal concepts can be traced back to ancient Hawaii. An ancient Hawaiian healing practice known as Ho’oponopono focuses on forgiveness and spiritual cleansing, which are two very important underlying themes in this list.

    The Laws and Synchronicity

    I first came across the list of Universal Laws as I was writing my book. This was a dark period in my life indeed. As I began to incorporate them in my day to day life, I began to notice strange coincidences happening more and more frequently. Now I realize those coincidences are called synchronicities.

    Synchronicities are signs from the divine realm that you are on the right path, that you are coming into alignment with your true purpose. Embracing these laws and adapting thoughts and behaviors to reflect them opens the door for the true essence of magick.

    The Laws of the Universe

    The greatest tools I can give you are those that make you stop and think about whether or not you are living in alignment with your true self.

    I love this quote from Socrates!

    Each of the laws require you to reflect and analyze yourself to see how your thoughts and actions have contributed to your current situation. Mastering these concepts will help you unlock the secrets to success and live a happier life. Even just acknowledging them will start to make a difference in how you feel.

    That sounds pretty good right? Keep reading to learn more about each of these 12 universal laws, and how you can put them into action to work for you!

    1. Law of Divine Oneness 

    We are one with each other. We are one with the universe. 

    The Universal Law of Divine Oneness: We are one with each other. We are one with the Universe.

    This law is the foundational concept of interconnectedness upon which all the other laws are built. No matter if you think of “it” as God, Allah, Elohim, The Universe, Zero Point Energy, etc. we are all creations of one divine source. It makes no difference where you were born, how you were raised, or what you believe. We are all human, and beyond the physical body and senses, our souls are intertwined more than you could imagine!

    2. Law of Vibration

    Everything is made of energy that vibrates at frequencies. 

    The Universal Law of Vibration: Everything is in constant motion, vibrating at a specific frequency.

    Everything (every atom, object, and living thing) is in constant motion, vibrating at a specific frequency. Anything that exists in our universe, whether seen or unseen, when broken down into and analyzed in its purest and most basic form, consists of pure energy or light which resonates and exists as a vibratory frequency or pattern. All matter has its own vibrational frequency. In order to materialize something, you must first match the vibration of what you want. 

    3. Law of Action

    Action is essential.

    The Universal Law of Action: Action is Essential.

    It is not enough to simply focus your attention on a goal or a desire, you must take action! We must engage in actions that support our desires and dreams. You are not likely to find what you are looking for by sitting at home. This means accepting opportunities and offers as life presents them to you. Taking steps forward takes courage and wit, but it is worth the benefits that will come along from accepting things with a grateful heart.

    4. Law of Correspondence

    As above, so below. As within, so without. As with the universe, so with the soul.

    The Universal Law of Correspondence: As Above, So Below. As Within, So Without.

    Everything has a corresponding counterpart. Different levels of reality exist in the universe and we refer to these different levels as dimensions or planes. These planes- physical, mental, spiritual- exist in continuum. There is always a correspondence between the laws and phenomena of the various planes. Changes at one level affect all the other levels in the same fashion.

    What’s going on inside of us corresponds with our external circumstances. Your internal environment is a direct reflection of your external environment. There is a direct correspondence between what you think and feel on the inside, and what you experience on the outside.

    5. Law of Cause and Effect

    Every action has an equal and opposite reaction.

    The Universal Law of Cause and Effect. Every Action Has an Equal and Opposite eaction.

    Every thought, word, and deed is a Cause that vibrates out into the world, setting into motion a chain of events, creating in its wake Effects. Every cause has an effect, and every effect becomes the cause of something new.

    The choices we make, whether conscious or unconscious, are all causes that will produce a corresponding effect. All thoughts lead to words and words lead to behaviors or actions. All actions have consequences, as do all inactions. These consequences can be positive or negative, and this is based largely on the intention behind the actions.

    6. Law of Compensation

    What you sow is what you shall reap.

    The Universal Law of Compensation: What You Reap Is What You Sow.

    Eventually the vibratory energy sent out with our actions will return to its source, like the swing of a pendulum. Compensation is the visible effects of your deeds, but this does not only mean our physical actions. Our thoughts, emotions, and intentions also create compensation for us. All the effort you give, the actions you take, the things you think and say and do will all determine how you will be compensated. We receive exactly the reward or punishment we deserve.

    7. Law of Attraction

    That which is like, unto itself is drawn.

    The Universal Law of Attraction: That Which Is Like Unto Itself Is Drawn.

    You attract the things, events, and people into your life based on your overall energetic vibration. Our feelings, emotions, subconscious and conscious thoughts, beliefs, words, and actions all contribute to our vibrational frequency. Your habitual thought patterns and your dominant mental attitude determine your overall vibration.

    Where your attention goes, your energy flows. If you focus on the negatives in life, you will attract more negative. When you consistently maintain a positive outlook and a grateful attitude, you will attract more positive experiences.

    8. Law of Perpetual Transmutation

    Energy cannot be created or destroyed, only changed.

    The Universal Law of Perpetual Transmutation: Energy Cannot Be Created or Destroyed, Only Changed.

    Energy is constantly changing, transferring, or transmuting into something different. It is always in a state of motion. The energy of the universe is constantly changing into and out of form. It is flowing into our consciousness constantly, and we can transform this energy into whatever we choose to focus our thoughts on.

    All persons have within themselves the power to change the conditions of their lives. Higher frequencies transform lower frequencies. Whenever we have a thought, that is energy in our bodies becoming manifest. In order to bring this energy into reality, we must keep our thoughts and vibrations consistent.

    9. Law of Relativity

    Nothing in life has meaning, except for the meaning we give it.

    The Universal Law of Relativity: Your Perception Creates Your Reality.

    Everything in our physical world is only made real by its relationship or comparison to something. Therefore, everything is relative. Light only exists because we compare it to dark. Good can only exist if there is a ‘bad’ to compare it to. It is your judgment and perception that makes things look good or bad.

    10. Law of Polarity

    Opposites are identical in nature, but different in degree.

    The Universal Law of Polarity: Everything Has Its Poles, Its Pair of Opposites.

    Everything exists in dual nature in the physical and mental realms. Everything has its pole. The polar ends are both extremes of the same continuum. There is not one point where you can say one starts and the other begins, it is a full spectrum.

    You cannot have one side of the continuum without the existence of and potential for the opposite. Consider the dual outcomes when you flip a coin. The two sides may appear separate, but they are two inseparable sides of the same thing. When the coin is in the air, there is the potential for it to land heads up, or tails up.

    11. Law of Rhythm

    Everything moves to certain rhythms

    The Universal Law of Rhythm: Everything Flows, Out and In; Everything Has Its Tides; All Things Rise and Fall.

    These rhythms establish seasons, cycles, stages of development, patterns. Some say the energy of the Universe is like a pendulum, but recently science has proven the cycles of the universe are more like a spiral.

    The meaning you give to events in your life determine what you think and how you feel about them, which in turn creates another rhythm within your life. With this knowledge, you can reflect and determine whether you were the cause of a downward spiral, or was it just the natural rhythm?

    12. Law of Gender

    Everything in nature contains within itself feminine and masculine energies.

    The Universal Law of Gender. Everything In Nature Contains Feminine and Masculine Energies.

    Everything in nature is both male and female. Both are required for life to exist. The gender principles exist as feminine, or yin, and masculine, or yang energies. Yin energies are passive, receptive, intuitive, and soft. Yang energies, in contrast, are active, projective, logical, and hard.

    On the mental plane, the conscious mind is masculine and the subconscious mind is feminine. In order to unite these principles, you must understand that whether you are male or female, you hold both gender principles within. Every male has the components of female energy within his being, and every female has components of the male energy within her being. The key to harmonizing these principles is balance.

    Embrace the Laws

    These immutable Universal Laws should be used as guiding principles as you navigate life in today’s complex and chaotic world. Each of the laws teach you something about the big questions in life. When you have a greater understanding of them, you are able to see your own place in the world more clearly. Becoming aware of their influence will help lead to positive, long-lasting change in your life.

    It may sound far fetched right now, but I assure you that embracing these laws in your own life will open you up to a whole new world of possibilities. Many who have followed this path report feeling more confident and productive as they spend more time reflecting on themselves and learning their place in the world.

    A Closer Look

    The links below will take you to a closer examination of each of the Universal Laws in greater depth, and provide you with tips on how to embrace them in your own life!

    Law of Divine Oneness

    Law of Action

    Law of Cause & Effect

    Law of Attraction

    Law of Relativity

    Law of Rhythm

    Law of Vibration

    Law of Correspondence

    Law of Compensation

    Law of Perpetual Transmutation

    Law of Polarity

    Law of Gender

    Five Years.

    It’s coming up on the five year anniversary since I said goodbye to my children. It’s hard to believe. It doesn’t seem right, and I’ve had to count the years out on my fingers several times.

    2020. 2021. 2022. 2023… 2024.

    I have reflected on years past in previous posts, so if you are just tuning in, the links above will get you all caught up.

    This article will be long enough, because I could easily write a full blog post for each of the five pumpkins. That is exactly why I am breaking it up into parts.

    Five years of digging deep on child welfare and child abuse has brought about many revelations. About the system, the laws, the policies, the actual practices I saw and experienced personally, and the experiences of others around me… revelations about myself. These insights have shaped my views, changing some of them and reinforcing others.

    I want to keep it short and sweet, but I have a lot to points to make.

    Each pumpkin is like a themed chapter in a book that I wrote specifically for the intended audience. This holiday tradition and my efforts are dedicated to my children, in honor of the loss of our family. The only tradition that even comes close to bringing me joy like holidays used to.

    1. Pumpkin #5- Benton County DHS
      1. Good job!
      2. 1800% Increase
      3. Staff Turnover
      4. Viktor E Frankl
    2. Pumpkin #4- Child Welfare By The Numbers
      1. Assessment Findings
        1. False Allegations
        2. Mandatory Reporters
      2. Founded Abuse Categories
    3. Communities of Hope

    Pumpkin #5- Benton County DHS

    I love the dramatic effect of this shot that was taken in front of the Benton County DHS office as the sun was coming up.

    I usually only decorate four pumpkins- one each for me and the kids. This year, I added a fifth pumpkin.

    I realized that I had neglected to represent the fifth member of my former little family… the boys’ dad. And even though we were no longer together when the kids were taken from us, he is still family to me. And regardless of what happened in our past, I know how badly he is hurting. I know he struggles with grief.

    The same local office took not only our children, but all five of his children.

    His youngest child was adopted by a local family and is doing well from what I hear.

    His older two children were taken from their mother about a year after we started dating. They stayed with Scott’s sister for awhile, until the case worker decided his sister had too many children in her home.

    And granted it was complete chaos at times, but his sister was a good mother and it was a home filled with love. The kids were happy with their cousins! Which is a lot more than I could say about their maternal grandmother’s house, where they were placed next.

    Theirs is not my story to tell, but I can assure you that it was not a good situation, and those kids are still impacted by the separation from the only family they knew.

    The front of this pumpkin was a clear indication of the intended recipients: the men and women that work for Benton County DHS.

    Good job!

    In the picture above, you can barely make out the main message that I want them to get this year. Here’s a better shot.

    “Benton County DHS gave my sons to CHILD ABUSERS! GOOD JOB!”

    I won’t get into that here… you can read more about what I am referring to in my post “Do they read my letters?

    Below that, you can see another key point that I wanted to make: Largest jump in increased founded cases was 1994-1995… who started working there? The arrow that points to this statement came from…

    1800% Increase

    Between 1986 and 1995 1800% increase in founded abuse cases- Top 5 in the state!

    Between 1986 and 1995, Benton County had a 1800% increase in the number of founded abuse cases. That percentage put them in the top 5 in the state! But you won’t find those figures anywhere online. The online databases on the Iowa Department of Health and Human Services website only go back to 2015.

    By the grace of the Gods, I came across a publication in a dumpster a few years ago that reported the statistics BY COUNTY on indicators of child welfare in Iowa from 1986 to 1995. Very interesting information! I will have to dig a little bit to find the booklet, but I will update this article when I do.

    I made a spreadsheet with some of the statistics from that book, but again, I will have to do a little digging to find it, and I will update this article when I find it.

    Staff Turnover

    Average turnover rate statewide is 1.5 to 2 years.
    Benton County maintained several staff for 30+ years

    Like the pumpkin says, the average staff turnover rate statewide is 1.5 to 2 years. Benton County maintained several staff for 30+ years. That makes me wonder… why do they not have the same issue as other counties?

    VPD Officer Josh West made the comment to me once, “We got rid of all the bad ones.”

    I wish I could get my hands on the body cam footage from that day- a story for another time- but I promise you that is exactly what he said. I talked about a few of my favorites before… And it may be true that the “bad ones” are no longer in the Vinton office, but I found out that several of them were PROMOTED. It’s scary to think that their toxic, malicious mindset is now in a higher role amongst their ranks.

    Wouldn’t promoting them only serve tp reinforce and solidify in their minds the superiority they demonstrate in their words and actions?

    I hope they read this post… and when they do, I pray that they have the courage and conviction to look themselves in the mirror and ask themselves the following questions? And, just as importantly, I pray that they can answer them honestly and objectively.

    • Are they taking the same training that I have found all over the new Iowa DHHS website?
    • Are they getting the messages, now that they are coming from official channels? Messages about:
      • Substance misuse, relapse and recovery, and EVIDENCE BASED PRACTICE?
      • Faulty Sweat Patch Testing?
      • Stigmatizing and hurtful language?
      • LIVED EXPERIENCES?
      • Trauma-focused care?
      • Abuse PREVENTION > Crisis management?
    • How are they doing at adjusting the mindset and the culture in their office?
    • If they are just taking this training themselves, how are they teaching this new mindset to the staff that are new to the job?
    • How are they working to educate the public about the errors of their ways?
    • Having served in the forefront as leaders in a movement that has victimized struggling families, whether intentional or not… how are they working to lead our communities in the right direction?

    Viktor E Frankl

    The last message on pumpkin #5 is a quote from Dr. Viktor E Frankl. Dr. Frankl was a Jewish Austrian psychiatrist, and one of the earlier arrivals to Auschwitz. After surviving the horrors of the concentration camp, he went on to write dozens of books, including Man’s Search for Meaning (*paid link).

    Jim and I recovered a copy from a dumpster a couple years ago. It is where I found the following quote, and I cannot emphasize enough- the book is a MUST READ! In fact, I would insist that Frankl’s book become part of a mandatory reading list for the same professionals that are held to mandatory reporter training.

    In the book’s 184 pages, Dr. Frankl shared details about his time at Auschwitz. He describes the horrors of humanity with bone chilling simplicity, summing up his analysis of the psychologies that surrounded him and outlining the basis of his life changing theory of logotherapy with insightful clarity.

    “The one thing you cannot take away from me is the way I choose to respond to what you do to me.” Viktor E Frankl

    Those are some POWERFUL words from the Doctor! The wisdom in those words give me strength when I find myself reliving the events that led up to the wrongful termination of my parental rights… more on that a little later in this post.

    Pumpkin #4- Child Welfare By The Numbers

    The fourth pumpkin features statistics from the annual report Child Welfare By the Numbers (download link for 2023 report) from the Iowa Department of Health and Human Services. I have been watching these statistics very closely, and just today I downloaded and reviewed every report going back to 2012.

    I hope the staff at Benton County DHS take a minute to read this blog post, because I doubt they are interpreting the results the same way that I do. And I don’t just analyze them from my own perspective. I can understand one’s skepticism, but judging by some of the jaw-dropping comments people have made, I seriously doubt anyone bothers to take other perspectives into account as thoroughly.

    2023 Child Welfare #s The pie charts show 1) the breakdown of unconfirmed, confirmed, and founded reports; 2) the breakdown of founded abuse types

    It doesn’t look like the department saw fit to share the total number of reports made to the hotline this year, but I can guess from the results of years past that a majority of them were accepted. The criteria they use is listed in Iowa Code 175.22(1)

    Any report made to the department which alleges child abuse, as defined in Iowa Code section 232.68, or constitutes a complaint that a child is a child in need of assistance, as defined in Iowa Code section 232.2(6), shall be accepted for assessment.

    I will go more in-depth with the actual definitions in just a bit. And that criteria sounds legit, right? I would’ve thought so too…

    Assessment Findings

    Of the 32,857 reports that met the criteria for assessment, there were 26,613 child abuse assessments conducted.

    • 18,674 (70%) of child abuse assessments resulted in a finding of “not confirmed
      • Not confirmed child abuse assessments involved 18,239 unique children
    • 1,459 (6%) of child abuse assessments resulted in a finding of “confirmed” abuse
      • “Confirmed” abuse means that the abuse was minor and isolated and not likely to reoccur; and the perpetrator is not placed on the child abuse registry
      • Confirmed child abuse assessments involved 1,828 unique children
    • 6,480 (24%) of child abuse assessments resulted in a finding of “founded” abuse
      • Founded child abuse assessments involved 8,632 unique children

    My point in showing the assessment findings is this: SEVENTY PERCENT of the reports made to the hotline were NOT CONFIRMED. This means that almost 19,000 reports were made that were potentially a complete waste of the department’s time, energy, and resources.

    Because trust me, these men and women are trained to look for every bit of evidence they can find so they can prove that the parents are abusing their children. They don’t want to miss something and end up with their name in the next headline about how DHS messed up- and I can’t fault them for that in itself.

    And when they walk in the door believing that the allegations are true- that you are abusing your children- any and everything they see and hear is interpreted through that lens.

    This classic book was part of the curriculum when I was growing up, now it is a BANNED BOOK!

    False Allegations

    I can personally speak from experience, and I have the documentation to prove it… there are some petty bitches (men and women alike) out there that make false allegations to DHS. This type of people are guilty of committing a simple misdemeanor according to Iowa Code § 232.75(3), but they aren’t referred to the county attorney for criminal charges until

    “the department receives more than three reports that identify the same child as a victim of child abuse or the same person as the alleged abuser of a child, or which were made by the same person, and the department determined the reports to be entirely false or without merit.”

    It would be interesting to see the statistics on how often that actually happens… Versus how many are listed as not confirmed.

    And since the caller’s identity is protected, someone that has been falsely accused has little ground to stand on when they attempt to defend themselves.

    Whatever happened to our “right to face our accuser?”

    Turns out that 6th amendment confrontation clause really only applies to criminal court proceedings, initially only at the FEDERAL level. “That all changed after the Fourteenth Amendment was passed in 1866, which subsequently made the right to confrontation applicable to both state and federal courts.” (Aron, 2021).

    …but it still doesn’t apply to the branch of district court known as juvenile, or family court.

    Regardless, if you are someone that calls in to the child abuse hotline because you are:

    • mad at your ex (READ: a spiteful or vengeful petty bitch)
    • fw some dude that has a girlfriend (READ: a jealous petty bitch)
    • an outsider looking in (READ: an ignorant petty bitch)

    If any of those descriptions apply to you… Then YOU are a big part of the problem here!! And you need to

    GROW THE F*CK UP!!!!

    Because really, you are not just hurting that other person… you are hurting the child involved. AND (this is important!) anything you say about someone else reflects back on you.

    Let me be clear on this point… NOBODY is “winning!!” And you aren’t “getting on their good side.” CHILD PLEASE!

    The child protective workers do not care about any of the adults in the situation… They care about your children. They think you are guilty of abusing children, and they will tell you whatever you want to hear to keep you talking. FACTS!

    If you are feeling triggered about what you just read, I’m gonna go ahead and guess you’ve been there before. On one side, or the other… Or maybe you’ve even been on both sides of the accusations.

    Do us all a favor…. do yourself a favor, and check out the information packet I put together called: PROTECT YOUR FAMILY

    Protect Your Family by Ashley Meredith, MSN

    Protect Your Family includes information for parents and caregivers about:

    • your rights and responsibilities
    • being PREPARED
    • being a PROACTIVE PARENT
    • Co-parenting
    • Dating a Parent
    • Dating as a Parent
    • Parenting Resources
    • Parenting Hacks
    • and more!! FOR FREE!

    Mandatory Reporters

    I have discussed this before, but it is worth mentioning again… Another potential source for the “not confirmed” reports stems from the mandatory reporters law.

    I do not know a nurse, teacher, childcare worker, or any other professional that works with children that would stand by and willingly allow child abuse to happen! I am not sure what exactly prompted the enactment of these laws, and it doesn’t specifically say why when reviewing the history of child abuse laws in Iowa’s Guide for Mandatory Reporters (link to downloadable pdf).

    Let me clarify, because I don’t believe everything about the law is absurd. For example, training for professionals in health and mental health care, education, childcare, social work, and law enforcement should continue to be mandatory for those professions. People that have never witnessed abuse do absolutely need to be educated about the signs and symptoms so they are fully prepared to keep a vigilant eye. And this training should be repeated on a regular basis, even though the training videos are dreadfully boring every time you have to watch them.

    I also agree that people in those fields should be protected from any civil or criminal liability if they make a report in good faith, or if they participate in an assessment being carried about by the department.

    However… and I feel very strongly about this… the threat of sanctions or revocation of a professional license and the potential for facing criminal charges for failure to report should be repealed!

    This part of the law has directly contributed to the division in this country by pinning good people against good people, usually over trivial matters or misunderstandings. And it sets the tone for a fearful/paranoid mindset and overpolicing of families! I am not the only one that thinks so! Check out these articles for more information:

    I can’t get into specifics, obviously, because of HIPAA… but there was only one time in my professional career when I made a report to DHS that I felt was valid. Ironically, it was while caring for a child in a foster home. Now that I think of it, it just dawned on me that it was a foster home that house SEVEN special needs children… And memories flood back.

    There were three times that I was forced by a supervisor to make a report that I did not agree with, because we had a difference in professional opinion, and I told the operator exactly that when I made the reports. And there was one other time when I had to instruct a family member that the boss said I would have to make a report if they didn’t proceed with doctor’s orders.

    Founded Abuse Categories

    Look again at the larger pie chart in the picture below. It shows a breakdown of the categories of founded abuse in Iowa in 2023. It is easy to see that an overwhelming majority (59%) of the founded abuse cases fall under the category of neglect, also known in Iowa as Denial of Critical Care.

    The next largest category, Dangerous substances, makes up 20% of the founded cases and is followed by the closely related category of Presence of illegal drugs (9%). I will save this discussion for a later post that you definitely won’t want to miss!

    Actual physical abuse makes up 7% of the founded cases. Sexual abuse is 4%. And the other category that includes more horrendous sexual exploits involving children, made up less than 1% of the founded cases.

    Here are the definitions related to child abuse from Iowa Code section 232.68:

    232.68 definitions of child abuseDownload

    Neglect

    Neglect, or Denial of Critical Care, contains some verbage that leaves the door open for misinterpretation. I am not alone in arguing that misinterpretation leads to confusion about what constitutes true neglect versus conditions of poverty, and I have discussed this before.

    I painted the following quote on a pumpkin in 2022. It comes from Jerry Milner, who led the U.S. Children’s Bureau under former President Donald Trump, and David Kelly, his former special assistant at the bureau.

    “Committing to a system that takes on poverty-related neglect in humane and effective ways requires active partnering with public and private entities that can, collectively, create the conditions where families can thrive and children are free from harm. It requires partnership with communities that know and understand the needs of their families and children. And, it requires a willingness to rally around families that are vulnerable and struggling with poverty, rather than judging them, labeling that vulnerability as neglect, and pathologizing them.
    If we truly care about children and families, it’s time to stop confusing poverty with neglect and devote ourselves to doing something about it.”

    Jerry Milner & David Kelly, Children’s Bureau Express Dec 2019/Jan 2020

    For a more detailed examination of Denial of Critical Care, I pulled up the Iowa Administrative Code r. 441-175.21 on the Legal Information Institute on the Cornell Law School website.

    “Denial of critical care” means the failure on the part of a person responsible for the care of a child to provide for the adequate food, shelter, clothing, medical or mental health treatment, supervision or other care necessary for the child’s health and welfare when financially able to do so, or when offered financial or other reasonable means to do so, and shall mean any of the following:

    1. Failure to provide adequate food and nutrition to the extent that there is danger of the child suffering injury or death.
    2. Failure to provide adequate shelter to the extent that there is danger of the child suffering injury or death.
    3. Failure to provide adequate clothing to the extent that there is danger of the child suffering injury or death.
    4. Failure to provide adequate health care to the extent that there is danger of the child suffering injury or death. A parent or guardian legitimately practicing religious beliefs who does not provide specified medical treatment for a child for that reason alone shall not be considered abusing the child and shall not be placed on the child abuse registry. However, a court may order that medical service be provided where the child’s health requires it.
    5. Failure to provide the mental health care necessary to adequately treat an observable and substantial impairment in the child’s ability to function.
    6. Gross failure to meet the emotional needs of the child necessary for normal development.
    7. Failure to provide for the adequate supervision of the child that a reasonable and prudent person would provide under similar facts and circumstances when the failure results in direct harm or creates a risk of harm to the child.
    8. *Failure to respond to the infant’s life-threatening conditions (also known as withholding medically indicated treatment) by providing treatment (including appropriate nutrition, hydration and medication) which in the treating physician’s reasonable medical judgment will be most likely to be effective in ameliorating or correcting all conditions, except that the term does not include the failure to provide treatment (other than appropriate nutrition, hydration, or medication) to an infant when, in the treating physician’s reasonable medical judgment any of the following circumstances apply: the infant is chronically and irreversibly comatose; the provision of the treatment would merely prolong dying, not be effective in ameliorating or correcting all of the infant’s life-threatening conditions, or otherwise be futile in terms of the survival of the infant; the provision of the treatment would be virtually futile in terms of the survival of the infant and the treatment itself under the circumstances would be inhumane.

    Now if you take those definitions at face value, that sounds all good and well. Except 8- *that shit is a jumbled mess of a run-on sentence! Whoever wrote it didn’t even bother to draft it in legislative format.

    C’mon man! The rate of victims per 1000 and percent of children found to be “victims of maltreatment” are significantly higher than the national average… WHY?

    Average Caseloads

    Iowa DHHS reports average caseloads for child protective workers and case managers versus the recommendations for caseloads

    The Iowa DHHS reports that, in 2023, there were 223 child protective workers employed across the state that carried an average of 13 cases/month. And there were 351 case managers with an average of 21 cases/month.

    The Child Welfare Information Gateway, part of the Children’s Bureau and Administration for Children and Families, offers the following recommendations: child protective workers- no more than 12; case managers- no more than 17.

    I could not find any county specific information about case loads averages.

    The Cost of Child Welfare

    If you are someone that gets mad about welfare programs like food stamps and Medicaid, this should really piss you off!

    Dollar amounts paid out in subsidies, wages for social workers, and family services in 2023

    In 2023 alone, Iowa reports that 77 million dollars went to adoption subsidies. These are monthly allotments granted to families that adopt children that the department stole from their parents- in addition to benefits, reimbursements and tax credits.

    Casey Family Programs (2016) reports that “For every $7 available for children in foster care, only $1 is available to invest in a wider array of services that prevent the need for foster care.”

    And those figures aren’t looking much better with time. I decided to pull the annual Child Welfare By The Numbers reports going back to 2012. Feel free to look for yourself, but here is a breakdown of the numbers.

    View the interactive stacked chart for more details

    Basic Daily Rates

    This is the rate of pay for adoptive foster parents PER DAY You don’t want struggling parents to be given cash…
    But you are okay with paying someone to take their kids
    and paying someone else to raise their kids? These payment codes show the categories for payments or reimbursed funds that every foster parent is eligible to receive. This is a page from the Iowa DHHS Adoption Permanent Placement Procedures

    Next up is form 470-4401 Foster Child Behavioral Assessment. This form is used to determine what level a foster child is and can help explain the range in daily base rates. Keep in mind that these are the behaviors exhibited by a child that was taken from his or her parents and placed with strangers.

    470-4401 Foster Child Behavioral AssessmentDownload

    Communities of Hope

    I can’t end this post on a negative note. So until I finish and publish about the three remaining Halloween 2024 pumpkins, I invite you to read more about the Casey Family Programs and a program they just launched in 2024 called Building Communities of Hope.

    Per the Casey Family Programs website, Building Communities of Hope is “a nationwide effort to prevent the need for foster care by supporting families in raising safe, happy and healthy children.

    We recognize that creating better futures for children and families will not be possible unless we take into consideration the community conditions that surround them. If a community is healthy — if it is safe, supportive and teeming with opportunities — then it will have the elements that children need to thrive.

    Happy Halloween 2024!

    Keep an eye out for Halloween 2024: Five Years of Pumpkins- Part Two.

    Support my work by sharing this blog post! Thank you in advance for your help spreading the word about this important information!

    «Rules for Being HUMAN Next: Four Blind Men and An Elephant»

    RELATED POSTS

    8 responses to “The Twelve Universal Laws”

    1. My Plan for ‘Being the Change’ – Iowa Family Rights December 8, 2024

      […] Learn more about the Universal Law of Compensation andthe other 12 Universal Laws […]

      LikeLike

      Reply
    2. The Law of Vibration – Iridescent Alchemyst August 5, 2024

      […] article is the third installment of a series exploring the 12 Universal Laws, timeless principles that guide the flow of energy and influence the fabric of our reality. Each […]

      LikeLike

      Reply
    3. My Plan for ‘Being the Change’ – Ashley Meredith for Iowa House June 17, 2024

      […] Click the link to learn more about the Universal Laws […]

      LikeLike

      Reply
    4. Exposure – Iridescent Alchemyst August 30, 2023

      […] This is how you are directly co-creating with the universe! Read more about the Law of Attraction and the other Universal Laws here. […]

      LikeLike

      Reply
    5. The Law of Divine Oneness – Iridescent Alchemyst May 10, 2022

      […] article is the second in the Twelve Universal Laws series as the focus shifts to the individual laws. It is my goal to provide a thorough examination […]

      LikeLike

      Reply
    6. My Plan for ‘Being the Change’ – Iridescent Alchemyst April 7, 2022

      […] Click the link to learn more about the Universal Laws […]

      LikeLike

      Reply
    7. You Haven’t Heard of Tom MacDonald?! – Iridescent Alchemyst April 6, 2022

      […] Law of Attraction, one of the 12 Universal Laws, says: that which is like, unto itself is drawn. This means if we are living in a state of fear, […]

      LikeLike

      Reply
    8. Numerals & Archetypes – Iridescent Alchemyst March 16, 2022

      […] cultures all over the world. It all goes back to that first and foundational law of the universe: Law of Divine Oneness. Regardless of our exponential progression from humble humanoid beginnings, or the obvious modern […]

      LikeLike

      Reply

    This is your chance to SHOW WHAT YA KNOW!! Share your own advice about this topic! Cancel reply

    Δ

    8 responses to “The Twelve Universal Laws”

    1. My Plan for ‘Being the Change’ – Iowa Family Rights December 8, 2024

      […] Learn more about the Universal Law of Compensation andthe other 12 Universal Laws […]

      LikeLike

      Reply
    2. The Law of Vibration – Iridescent Alchemyst August 5, 2024

      […] article is the third installment of a series exploring the 12 Universal Laws, timeless principles that guide the flow of energy and influence the fabric of our reality. Each […]

      LikeLike

      Reply
    3. My Plan for ‘Being the Change’ – Ashley Meredith for Iowa House June 17, 2024

      […] Click the link to learn more about the Universal Laws […]

      LikeLike

      Reply
    4. Exposure – Iridescent Alchemyst August 30, 2023

      […] This is how you are directly co-creating with the universe! Read more about the Law of Attraction and the other Universal Laws here. […]

      LikeLike

      Reply
    5. The Law of Divine Oneness – Iridescent Alchemyst May 10, 2022

      […] article is the second in the Twelve Universal Laws series as the focus shifts to the individual laws. It is my goal to provide a thorough examination […]

      LikeLike

      Reply
    6. My Plan for ‘Being the Change’ – Iridescent Alchemyst April 7, 2022

      […] Click the link to learn more about the Universal Laws […]

      LikeLike

      Reply
    7. You Haven’t Heard of Tom MacDonald?! – Iridescent Alchemyst April 6, 2022

      […] Law of Attraction, one of the 12 Universal Laws, says: that which is like, unto itself is drawn. This means if we are living in a state of fear, […]

      LikeLike

      Reply
    8. Numerals & Archetypes – Iridescent Alchemyst March 16, 2022

      […] cultures all over the world. It all goes back to that first and foundational law of the universe: Law of Divine Oneness. Regardless of our exponential progression from humble humanoid beginnings, or the obvious modern […]

      LikeLike

      Reply

    This is your chance to SHOW WHAT YA KNOW!! Share your own advice about this topic! Cancel reply

    Δ

    #frequency #hermeticPrinciples #hooponopono #lawOfAttraction #lawOfCauseAndEffect #lawOfCompensation #lawOfCorrespondence #lawOfGender #lawOfOneness #lawOfPerpetualTransmutation #lawOfPolarity #lawOfRelativity #lawOfRhythm #lawOfVibration #MentalHealth #positiveVibes #spiritualLaws #Spirituality #synchronicity #universalLaws

  12. What is the ARC Prize and why is it important?

    The ARC Prize is a $1,000,000+ public competition aimed at advancing open-source progress towards Artificial General Intelligence. The ARC Prize is a competition designed to inspire new ideas and drive progress towards Artificial General Intelligence (AGI) by reaching a target benchmark score on the ARC-AGI (Abstraction and Reasoning Corpus for Artificial General Intelligence) benchmark. The goal of the ARC-AGI benchmark is to measure how well an AI system can generalize on novel tasks, which is considered a key aspect of intelligence.

    Here are some key details about the ARC Prize:

    • The ARC Prize 2024 aimed to achieve an 85% score on the ARC-AGI private evaluation set. The competition ran from June to November 2024, with prizes including a grand prize of $600,000 for the first team to reach the 85% target, as well as other prizes for progress and paper submissions.
    • The competition was run on Kaggle, where participants attempted to solve 100 tasks from the ARC-AGI private evaluation set on a virtual machine with limited resources. Participants had to open-source their solutions to be eligible for prizes.
    • The highest score achieved during the 2024 competition was 55.5% by MindsAI, though they were not eligible for a prize due to not open-sourcing their solution. The score was beat by o3 from OpenAI achieving 75.7% at the end of 2024, indicating that the benchmark itself might be saturated in the very near future.
    • The competition also featured a secondary public leaderboard with relaxed compute constraints and internet access. This leaderboard was used to evaluate performance using commercially available APIs.
    • The ARC Prize also included "Paper Awards" to reward novel concepts, regardless of the scores achieved, with prizes awarded to several papers describing new techniques.
    • The ARC Prize is intended to be an annual competition until the ARC-AGI benchmark is defeated and a public reference solution is shared. The organizers plan to redesign the 2025 competition based on lessons learned from the 2024 event.
    • The ARC Prize has inspired the development of various tools, datasets, and repositories to support research and development related to ARC-AGI, including domain-specific languages, data generation frameworks, and interactive web tools.

    Allover, the ARC Prize seeks to promote open research in AGI, given that much of frontier AI research is no longer published by industry labs. The goal is to encourage researchers to develop new techniques and openly share them with the community. The competition is also intended to help improve the ARC-AGI benchmark itself.

    How does the ARC Price work?

    The ARC-AGI (Abstraction and Reasoning Corpus for Artificial General Intelligence) benchmark is designed to measure general intelligence and skill-acquisition efficiency in AI systems. Here's how it works:

    Task Structure

    • Each task in ARC-AGI consists of input-output examples presented as grids.
    • The grids can be any size from 1x1 to 30x305.
    • Each square in the grid can be one of ten colors.

    Evaluation Process

    • To solve a task, the AI system must produce a pixel-perfect, correct output grid for the evaluation input, including determining the correct dimensions of the output grid.
    • The benchmark includes public training and evaluation sets, as well as a private evaluation set.
    • The public training set contains 400 task files for algorithm training.
    • The public evaluation set also contains 400 task files for testing algorithm performance.
    • The private evaluation set, used for the official leaderboard, contains 100 task files.

    Scoring

    • Performance is measured by the percentage of correct predictions on the private evaluation set (100 tasks).
    • For each task, the system must predict exactly 2 outputs for every test input grid.
    • A task is considered solved only if the predicted output matches the ground truth exactly.

    Key Features

    • Novel Tasks: Each task in the dataset follows a different logic, ensuring that systems cannot be prepared for specific tasks in advance.
    • Core Knowledge Priors: The benchmark assumes only basic prior knowledge that humans typically acquire before age four, such as objectness, basic topology, and elementary integer arithmetic.
    • No Specialized Knowledge: Tasks do not require specialized world knowledge or language skills to solve.
    • Human Verification: All tasks have been verified by at least two STEM professionals to ensure solvability by humans1.

    Benchmark Difficulty

    • As of 2024, the state-of-the-art AI performance on ARC-AGI is 55.5% on the private evaluation set.
    • Human performance averages between 73.3% and 77.2% correct on the public sets.

    By focusing on skill-acquisition efficiency rather than task-specific performance, ARC-AGI aims to provide a more accurate measure of general intelligence in AI systems.

    Why is solving arc puzzles difficult for AIs?

    Solving ARC puzzles is particularly challenging for AI systems due to several key factors:

    Complexity of Problem-Solving

    • Few-Shot Learning Requirement: ARC puzzles are designed to assess an AI's ability to generalize from a limited number of examples (3-5). This few-shot learning requirement means that AI models cannot rely on extensive training data or memorization, which are common strategies in traditional machine learning. Instead, they must extract underlying principles and apply them to novel situations, similar to how humans learn.
    • Resistance to Memorization: The tasks are specifically crafted to resist simple memorization strategies. They often require understanding abstract concepts and relationships rather than just recognizing patterns from previous examples. As François Chollet, the creator of the ARC benchmark, noted, these tasks are easy for humans but difficult for current AI systems because they do not involve complex knowledge but rather the ability to reason and adapt.

    Nature of the Puzzles

    • Abstract Reasoning: The puzzles require a deep understanding of abstract reasoning, logic, and sometimes even physics. AI must recognize patterns and apply logical deductions based on given examples, which can be significantly more complex than it appears at first glance.
    • Variety of Tasks: Each puzzle presents a distinct learning problem, making it difficult for AI to apply a single strategy across different tasks. This diversity in problem types forces AI systems to develop flexible reasoning capabilities rather than relying on fixed algorithms or heuristics.

    Limitations of Current AI Models

    • Lack of True Understanding: Many modern AI systems, including large language models (LLMs), primarily operate through advanced memorization and statistical correlation rather than genuine understanding. This means that while they can perform well on specific tasks with large datasets, they struggle with the abstract reasoning required for ARC puzzles.
    • High Error Rates: Even with sophisticated approaches like brute-force searching or minimum description length strategies, current AI solutions have shown limited success on ARC tasks. For instance, the best-performing models have only achieved around 34% accuracy on these puzzles (o3 being the notable exception at the end of 2024), while human performance averages between 85% and 100%.

    In summary, the combination of few-shot learning requirements, resistance to memorization, the need for abstract reasoning, and the limitations of current AI models contribute to the difficulty AIs face in solving ARC puzzles. These challenges highlight the gap between human cognitive abilities and current artificial intelligence capabilities in achieving true generalization and reasoning skills.

    This gap is narrowing rapidly, and by 2025, a new version of the benchmark—ARC-AGI-2—will be introduced. In development since 2022, it aims to redefine the state-of-the-art. Its goal is to drive AGI research forward with rigorous, high-impact evaluations that expose the current limitations of AI systems. Preliminary testing of ARC-AGI-2 indicates it will be both valuable and extremely challenging, even for advanced models like o3. The launch of ARC-AGI-2 in tandem with the ARC Prize 2025, is anticipated for late Q1.

    Unlock the Future of Business with AI

    Dive into our immersive workshops and equip your team with the tools and knowledge to lead in the AI era.

    Get in touch with us

    #AGI #ARCPrize #Benchmark #o3

  13. “I Don’t Make a Fetish Out of Nonviolence.” Interview With Ray Luc Levasseur on the United Freedom Front

    On 16 April 2025, Unity of Fields interviewed Ray Luc Levasseur, a former political prisoner. In 1975 Levasseur co-founded the Sam Melville-Jonathan Jackson Unit, which later renamed itself the United Freedom Front. They carried out dozens of expropriations and anti-imperialist bombings until their capture in 1984, after being on the FBI’s Most Wanted list. Levasseur was sentenced to 45 years and served his time in some of the most brutal and repressive prisons in the country, USP Marion and ADX Florence, including thirteen years in solitary confinement. He was released in 2004 after serving 20 years, and now lives in his home state of Maine. The interview transcript has been lightly edited for clarity.

    If you are interested in reading more about Ray Luc Levasseur and the United Freedom Front, we recommend reading Until All Are Free: The Trial Statement of Ray Luc Levasseur and checking out his online archives at UMass Amherst, where you can find many of the documents mentioned in the interview.

    Download a zine version to print/fold here.

    Editorial disclaimer: The views and opinions expressed in this interview do not necessarily reflect the views of Unity of Fields.

    Unity of Fields: When people nowadays think of anti-imperialist armed struggle in the US, they tend to think of the Weather Underground and the Black Panther Party (BPP), maybe the Black Liberation Army (BLA), maybe the Symbionese Liberation Army (SLA). Often people aren’t aware of numerous smaller clandestine formations that were active around the same time, like the one you were part of, the Sam Melville-Jonathan Jackson Unit (SM-JJ), which later renamed itself the United Freedom Front (UFF).

    UFF is such an interesting, and, in a lot of ways, quite successful, case study of militancy. You came into revolutionary struggle in a slightly later generation than Weather, and in a different way than the stereotype of white radical elite college student — you were radicalized by serving in Vietnam, serving time in prison for a minor drug offense, and coming from a very working-class background.

    Could you speak to how you see UFF’s trajectory in this context, and why you think it is generally less well known? And why is it important for people of younger generations, especially those interested in the question of militancy, to consider?

    Ray Luc Levasseur: Part of it is some of these groups were very short-lived, for one thing. They traveled fast, but they went down in flames pretty fast too. It’s been a problem in terms of clandestine groups in this country. I mean, there’s amazing number that just didn’t last very long and took major hits and were pretty much decommissioned. The SLA weren’t around all that long either but one of the big reasons people remember them is because of the significant media coverage of it. But a lot of the other groups didn’t get that kind of media coverage like Weather or the SLA did. I don’t know if that’s class-based or not.

    Those of us that I was underground with, we all had some kind of previous political activity in public, but we were not part of big chapters of a national group per se. A couple of us were, I was in national VVAW (Vietnam Veterans Against the War), one of us had been in SDS, but in chapters that were not at the forefront of media attention. I think the George Jackson Brigade was like this too. So people in that particular area where they were operating, you know, would have a better idea of what’s going on, who this was being conducted by, and connect the message to the people where others don’t. A lot of the publicity, a lot of the media coverage is really negative, and part of the purpose for that, was not just in terms of what the general public was reading, but in terms of what political activists were reading.

    Clandestinity by its nature, people don’t know who you are and they can be very distrustful. And depending also on the extent of your aboveground support network, not every group has one, but every group should have one. A group like Weather had a really extensive aboveground network and that could be utilized in a lot of ways to promote the cause and build a little support, and certainly awareness and keeping the group front and center in people’s minds politically and personally. We had an aboveground network going under that was eventually decommissioned through police and other methods and then we went through a dry spell and then we started to rebuild another one. That support network eventually collapsed similar to the BLA network that collapsed after the Brinks [Robbery in 1981], and their network was more extensive than ours. That’s a major blow to any group. I know that it played a really significant factor with us, particularly the second time around where it had collapsed. That really contributes to your isolation. That kind of isolation is the enemy of an underground group because it hampers your ability to recruit and do all kinds of things. Essentially it cuts off the logistical network. The kind of support, material and otherwise, political and otherwise, that you might be getting through that aboveground support network all of a sudden just gets shut off. You cut off a supply route and it really has a big impact on even a conventional military force. Look what’s happened in Lebanon when the israelis were really able to dismantle a lot of the network that was supporting both Hezbollah and to some degree Hamas, it’s had a big impact. And the more isolated you get, the less you’re out there. Your voice is diminished somewhat.

    I think that when you say the Panthers, you’re really talking about BLA, in terms of more clandestine actions. The Panthers always, or did for a long time, had clandestine networks, but they weren’t there in an offensive capacity, they were more self-defense oriented. They’d have a safe house, they’d have the proper credentials, paper identification, funds, a way for somebody to disappear quickly if the need was there. The BLA actually had things set up more like we had set up, where you’re dealing strictly with people that are underground, have to stay underground, and are carrying the initiative forward. They’re initiating actions. They’re not there in the self-defense mode per se, I dunno if that makes sense. But the two [the BLA and BPP] often get used interchangeably, and the BLA benefited from the huge, huge reputation and media attention that the Panthers had, benefited in the sense of what the question you asked is, why some of these groups are well-known and some are not. So Weather had built its reputation by its involvement with SDS. Then when a significant number of them go underground and become the Weather Underground Organization, they’re already pretty well known. So that’s my thinking behind those two particular organizations. And both were around for a long time, especially when you consider those particular roots, one in the [Black] Panther Party and one in groups like SDS.

    UoF: Please correct me if I’m wrong, but based on what I’ve read about the United Freedom Front, it sounds like you guys achieved a huge number of successful actions and evaded capture for longer than many other groups. Is that correct? Why that was the case?

    RLL: It is correct. In fact, I think that’s one of our main claims to fame, really, is the length of time we were underground. Because we weren’t just hiding. We were the number one fugitives they wanted in the country. After the first couple years we became number one. As the other groups got picked off or decommissioned in one way or another, those forces of repression can focus more and more on you. Plus we were very active, we were always doing something and they knew it. High-risk stuff. We had developed means that if we had just wanted to be underground just to live away from the eyes and ears of the government, we could have done that indefinitely, because we had the methods down so well. But our justification for being underground was to be active. I wouldn’t be underground if I couldn’t stay activeSo we were constantly carrying out actions of one kind or another throughout the whole time, including many close calls. And when you look at groups, even within the BLA itself, which was more extensive than we were, and they were around for a considerable period of time, but individual cells within the BLA, a lot of ’em went down really quick. But they were large enough where they could absorb the loss and keep going.

    We were smaller, we couldn’t handle too many hits. You know what I mean? When you go up against the repressive arm of this government, they have all the money, the resources, the manpower, the computer power. They can make mistake after mistake after mistake. I can sit in and talk to you about the strategic and tactical mistakes the FBI and other police made in trying to get us. But because of that foundation, the endless supply of funding and police power, weaponry and intelligence, all of it, they can make mistake after mistake, and just go back to the drawing board and do it again. When you’re a small organization, there’s very little margin of error for you. You can make one mistake and it all comes tumbling down.

    Now, to give you an idea in terms of even Weather and BLA, which had had pretty good resources, the Brinks case really was like, if you look at it, it’s like all of a sudden the dominoes started falling. A huge part of their total underground infrastructure just went down around that one action. So you don’t have the room to make those kinds of mistakes. I think it’s really to our credit that we were underground for ten years. I mean, what other group can you see that did that and was politically active for that entire period of time and with a number one target on our backs almost the whole time?

    Expropriation was a part of our strategy, and that’s different than certain clandestine formations that got their funding a different way. When you look at Weather, some of that money obviously came from some pretty wealthy family members and friends, that was part of the network, right? There’s a difference in building revolutionary power, trying to build a clandestine armed movement. You’re building a different kind of revolutionary when you fund yourself through armed actions that target financial institutions to uphold capitalism as opposed to having Uncle John send you $10,000 stipend every monthAnd you can extrapolate from that into the nonprofit industrial complex. I know some really good people and good organizations that are nonprofits and they skimp to get by to do some really good community work. But there are a lot of nonprofits where the money just rolls in regularly every month, some grant, some foundation, to pay your pretty decent salary and all the benefits that are accrued with it…it makes for a different organization. It makes for a different mindset. Anyways, where were we?

    UoF: Not to oversimplify, but I think you could say that guerrillas inside of the imperial core take two distinct paths — one, those who think revolution is impossible within the core, and their primary goal is to give as much material support to Third World revolutionaries, without the expectation that the masses here will join them. And two, those who may share the primary goal of materially supporting Third World revolutionaries, but also think revolution is possible within the core and aim to win popular support and grow their ranks. Of course there has been a lot of internal disagreement on these questions within some of the formations we’re talking about. And in the so-called United States it’s more complex than, say, Denmark, because it’s built on settler colonialism. The “working class” here is still largely pacified by imperial super profits but there are also internal colonies with far more revolutionary potential because they are fighting national liberation struggles. How did you all conceptualize revolution here, and how did the UFF relate to the Third World national liberation struggles, including those internal to the US?

    RLL: Well, when I was part of it, we were trying to build a revolutionary resistance movement. We were anti-imperialists. So much is based on time, place, and conditions. If you don’t factor in time, place, and conditions into things, you can get off the mark really well, including with armed actions and stuff. You’ve got to factor these three components in to make decisions about how you’re going to move. At that time we’re talking, if you go back to SM-JJ [Sam Melville-Jonathan Jackson Unit], you’re talking early, mid-seventies, and then all the way up to UFF [United Freedom Front].

    The last UFF action was 1984. It’s an interesting communiqué that UFF put out. They hit Union Carbide, which was a big mining company in South Africa, Amerikan-owned multinational, and the communiqué answer the call to all parts of the anti-apartheid movement that existed at that time and any progressive revolutionary people that. It was really coming together pretty well, this aboveground anti-apartheid movement in the US at the time. But this communiqué was encouraging that [aboveground] movement to continue, while recognizing that we’re trying to build a multifaceted anti-imperialist movement, which for us necessitated a clandestine sector that was armed, armed for self-defense, and armed for offensive actions and that they were not mutually exclusive, that they should compliment each otherMultilevel, we’re at different levels, but we’re part of the same movement. So we encouraged the BDS movement at the time, students, workers, etc, to keep at it the same way because we were going to keep it at it as well.

    In terms of that anti-imperialist view from going back to the seventies into the eighties, we clearly really took our view of things based a lot on the national liberation struggles of the time. When you go back then, they were all over the world, anti-colonial struggles included in that. Just look at Africa: Mozambique, South Africa, Namibia, Angola. To us, these Third World national liberation struggles were a cutting edge of resisting and fighting back against US imperialism as it spread throughout the world. Each one of those countries that liberated itself was going to weaken US imperialism to some degree. And our role in part was to be supportive of those struggles. International solidarity, if you need a term for it. That was how we considered ourselves; they’re the vanguard, we’re the rear guard. The rear guard because we’re in the Belly of the Beast, we’re the US, we have some responsibility politically, morally, personally to do something, to attack the same system that’s being attacked by these revolutionary movements. It’s a unique position to be within the US and try to fight on the same field of battle, so to speak, in support of these liberation struggles.

    The great thinkers and guerrilla fighters that came out of these struggles [in the Third World] had a lot of influence on our own political vision and analysis. I was looking at the reading list on the Unity of Fields website. I can tell you, I’ve read many of those books. Everything from Carlos Marighella, Minimanual of the Urban Guerrilla. These were tremendously influential on us because Urban Guerrilla Warfare was relatively new at that time. It was like opening up a new area. George Jackson says, I think in Blood in my Eye, that the urban landscape can conceal a guerrilla as well as the jungle canopy. And we took that to heart. 

    What came after liberation in each of those countries, you know, we paid a lot of attention to the groups made up the different movements in the different colonies and different countries, because sometimes there would be multiple organizations. Obviously we would favor the political view of one group usually, but it wasn’t our job to put that out there. That was just to enable us to see what direction things were going in, and which organizations in these movements had the best prospects of really freeing the people there. So what came after liberation, we didn’t delve into, other than you’re freeing up a colony, you’re freeing up a people, which means self-determination for the first time for these people so that they are in a position, once they liberate themselves from foreign conflict, colonization or intervention, then they are much better suited to determine by themselves the direction they want to take to put that liberation into real terms for their people. Our actions were meant to keep those liberation struggles on the agenda in this country, both with the left and as much of the general public as we could reach through what we were doing.

    I think you mentioned the internal colonies as well, and that somewhat unique situation. Not all the underground groups from that period looked at internal colonies the same way. Even within certain organizations, it generally might not be completely unified on a position on the internal colonies. Our position was that Black people in this country do compromise an internal colony. So we’re looking at Black people, what do they want? What are the Black radical groups saying? What are they doing? Recognizing that somebody’s internally colonized is different than offering a format to deal with that. So it wasn’t our position to offer that format, our position was to support a freedom struggle. If you look at the position papers and communiqués and underground papers from that era, you’ll see that there is support for the national liberation of all of those internal colonies.

    We did get very involved with the Puerto Rican struggle, which is a little bit different in the sense that you have the diaspora here, you have a huge number of Puerto Ricans in this country, but the island is the land base of the nation. How they were going to deal with the diaspora, that comes with liberating your national borders. That’s the way I see it, anyways. We were really supportive of Puerto Rican independence and the release of the Puerto Rican nationalist prisoners that were kept at that time, Lolita LeBron and the others, and in fact, we were charged with quite a few actions around Puerto Rican independence. That we felt was very material support given as many Puerto Ricans in this country. My number one goal has been dismantle this fucking imperialist system. I think the internal colonies are a potential Achilles heel of imperialism right within its own borders.

    UoF: Absolutely agree. I was going to ask you a question about the state of the Palestine solidarity movement in this country, and I think that’s actually very related to our discussion about the internal colonies. Because the most useful thing we could do here for Palestine, for any Third World national liberation struggle, is to make a revolution here — to dismantle US imperialism from within. And obviously the internal colonies, now and historically, have the most revolutionary potential, so that goes hand in hand.

    I think the “Palestine solidarity movement,” as they call it, is coming up against the limitations of its own form. I’m not trying to say this in a defeatist way because I also think the movement has made great advances, but those advances have led us to this impasse or breaking point. The movement has failed in part by not addressing this issue of internal colonialism, by not universalizing the Palestinian struggle into a broader anti-imperialist struggle. That failure has manifested itself most clearly in the movement’s weak positions on the police, on resistance to the police, and on whether militancy should take place here at all. There’s a lot of rhetorical support for resistance far away, but not when it takes place here, which is why the movement also ignores a lot of the political prisoners in Amerikan dungeons, like Casey Goonan. And to be clear, when I say “movement,” I’m mostly talking about the nonprofit industrial complex, which is why I don’t even like using the term “movement” really, and I appreciated your critique of nonprofits earlier and how reformist they tend to become. But back to my point — we’ll be chanting “resistance is justified when people are occupied” at police-permitted and peace-police-marshalled parades without acknowledging that the Amerikan police are the domestic occupying force of the internal colonies here. That idea leads us to the logical conclusiont hat we should be resisting the police, and I don’t think these nonprofits actually really want people to do that, because like you said, they care about their grant money and their bottomline.

    When we were chatting the other week, you were also comparing how you and your comrades would be policed for supporting the Vietnamese National Liberation Front (NLF) and waving their flags at protests to how we are now told not to wave our Hezbollah flags or wear Hamas or PFLP headbands. So this kind of conditional “solidarity” that is actually anti-resistance is definitely not a new phenomenon, although the existence of the terror lists and designations has made people all the more scared of resistance, or given them more excuses to shy away from openly supporting it.

    But yeah, I guess I’m wondering what you think of the Palestine solidarity movement now, especially in this current wave of repression. Do you think the movement can transcend the limits of its current framework, its single issueism, really break out into a broader anti-imperialist movement?

    RLL: Important question. Well, the Palestine solidarity movement, I mean, I’m not the best judge of this in my current situation. You could be a better judge of it than me. I don’t know.

    I used to get into it with activists from New York a lot because I detected this attitude among some that New York was the center of the universe, and what people do outside of the center of that universe somehow doesn’t quite measure up to what’s up in New York. And it’s not just with somebody like me who lives in rural Maine, but I got friends and comrades in Boston and they get to sometimes the same way that they feel like, especially when they’re working with people and they want to put an event together. “Oh, is this is going to be New York or Boston,” and Boston seems to play in second field all the time and it sort irritates them. Or you get over into the Bay Area, it is very different being a radical in a place like rural Maine. I think I could mesh in much easier in the city like New York or the Bay Area that has a lot of old radicals, but in a place like Maine, it’s like you’re the only game in town. That’s why its fricking media and the cops still know who I am despite the time that’s gone by.

    But anyways, first of all, I’m going to say this question has come up even here in Maine, and we have some very committed activists here to figuring out which way forward, examining and reexamining actions that people are involved with. Everything from cultural events to CD [civil disobedience] where people get arrested and all these marches and all these rallies. I saw the piece on PSL in Unity of Fields and apparently there’s some differences there over strategy. I mean, PSL is here. I know some of them, I knew ’em before they were PSL. PSL hasn’t been around in any significant numbers until relatively recently. I mean it predates October 2023, but they hadn’t been around and they’re recruiting. When it comes to which way forward with Palestine solidarity, it’s still a work in progress as various groups hold a range of strategies and tactics. It’s an issue here in Maine and people talk about it because they want to build on what’s happened so far.

    The positive thing that I see is that I have never seen so much support, I’ll use it generically, the word “support,” and awareness around the Palestinian liberation struggle as I see now. That’s happened since October of 2023. I’ve seen it manifested in many different ways and I’ve also seen it in other parts of the country. I’m in touch with activists in other parts of the country. I’m seeing the same thing there. I could take it a step further and see it also in significant parts of the world.

    Because historically among the left, and I’m not talking about different party lines between different sectarian groups who want to argue to death over some line, I’m talking about substantive issues — you couldn’t find a lefty group in this country that wasn’t opposed to apartheid South Africa. But as the years passed by, Palestine was always, and forgive me if I’m repeating myself, but to put it in New York terms, Palestine was always considered the third rail of left politics.

    You know, the third rail in the subway, you touch a third rail and you’re instantly fried, you die. Periodically somebody does that in the subway system and that’s what happens to them. I personally know somebody who happened to die that way. In the NYPD investigation of how he died, they said he tripped and fell on it. This was a young anarchist kid that I knew. This is quite a few years ago. While his comrade was saying no, he got jumped and pushed on it. But in any event, you touch it, you die.

    So if you were a supporter of Palestine, you risked being ostracized by people, either individually within a group or by another group. It was always like you could give Palestine a certain amount of rhetorical support in your publication or whatever, but don’t get too heavy-handed with it. Don’t push the resistance too much and don’t push the one [Palestinian] state too much and those kind of things. If you did, then you risk being ostracized politically by other leftists.

    I’ve seen that starting to go by the wayside for the first time in my life. I’ve never seen this level of support before. I understand we’d have to go qualify it by going through what do I mean by support? You know what I mean? This and this. But I mean you take ten different ways that people can be supportive from financial to cultural to CD [civil disobedience] to every kind of thing in between, then I think there’s a big positive. It’s a positive, it can be built on, people are trying to build on it, it could grow even more.

    I mean, we don’t know what’s going on in Palestine until next week gets here. So much is up in the air right now. None of it seems good, but I think that’s been a pretty amazing thing. You could say, yeah, well, a lot of these people are basic liberals and maybe their idea of Palestine solidarity is to keep writing to their Congress person to vote to stop arms to israel or write a letter to the editor or whatever. I don’t discourage any of that kind of stuff. I just push people to do more. Or I don’t push, I used to push. I try to persuade people to do more. So I think that’s really good.

    I think part of the reason you’re seeing the repression amped up, it’s not just because Trump is here, it’s because they’re worried about that level of support [for Palestine] and that’s why they’re coming after people to the extent that they are. I don’t think it’s going to stay this way, I think it’s going to get worse, but I still think that they are predominantly focused on low-hanging fruit. I hate to use that term, but I’ll use it. I’m accustomed to this because I was a prisoner for a long time and I see them do a lot of things to prisoners that people out here just don’t care about, don’t know about, don’t want to know about, and it’s out of sight, out of mind, it’s prisoners, the lower end of everybody. And then five years later they’re doing the same thing to people outside of prison. I can talk about surveillance technologies and all kinds of stuff. They’ll experiment with the prisons first. That’s the low-hanging fruit because we’re the most vulnerable, we’re the most marginalized.

    What they’re doing now, especially with the deportation stuff, is they’re targeting people. Totally make up a fucking story. But they’re going after people they know are vulnerable because they’re not a US citizen yet, or they can manipulate a law even if they got a green card or whatever to deport them. Something like this happened with the Red Scare with Emma Goldman and Alexander Berkman and various anarchists and communists that were put on boats, just rounded up and put on boats, and sent to other countries. I think that’s part of the reason why we’re seeing this repression, and it’s a great cause for concern because of the level of fear it induces and also because we have to come to the defense of these people that are being subjected to this repression.

    It’s a moral and political obligation that we do that. But it also requires resources. It also requires our attention, our time, our money, whatever support we can muster to defend people that are going to being targeted by this repression. That’s not to say that we should do any less, we should do more to defend people that are under attack. If you follow Cop City at all, you know what I’m talking about. All these people that are being deported could eventually prevail in their case, but the government still has succeeded in disrupting movement activities, scaring people that may be involved away. To them, they look at it like a win-win situation. If they can deport somebody and keep them out, that’s a win. But even if that person comes back, they figure they’d want something because he may be back, but they scared 20 people away, or they tied up people in organizations, tied those resources up, so they can’t be used for anything else.

    So I think that the potential is still there right now, despite the repression. I talked about time, place, and conditions — we didn’t have this internet before, we have to get on the fucking internet on a daily basis to find out how those conditions are changing. If you don’t have a good grasp of conditions, then it’s difficult to put together tactical and strategic plans of any kind. And it changes so much. But I think the potential is still there. This movement can grow now.

    Single-issue? Yeah, I mean I have to think of the Vietnam War because there were so many people. I was a state coordinator of Vietnam Veterans Against the War, and my Vietnam veteran partner in that had been a highly decorated army helicopter pilot. I was already an anti-imperialist by the time I got involved with VVAW. And this brother, he was strictly a single-issue person. He wanted to bring this war to an end and it had a moral base to it to a certain degree. He had studied to be a Jesuit before he got hooked into the military and he had strong moral objections to the US being in Vietnam and what they were doing there. I mean combined together, we made some really formidable presentations and worked all well together. But the minute that all was done, that was it. That was the end of his political activism. I immediately jumped. I didn’t wait until the war to be completely over, but it was obviously going to be. I already had made my way into working around the criminal legal system, prisoners and all of that. This was in the seventies when the prisoners rights thing was really big. That turned out to be a good move politically because I never looked at the war as a single issue. To me it was always connected. I just looked at my fucking training, and when I was in Vietnam, to know that white supremacy ran through the whole fricking war. It was white supremacy, racism on a massive scale. It was embedded into us in our training before we even got there. But yeah, I think that that is a problem probably, well, it depends how you look at it, whether it’s a problem or not. It’s a problem in terms of building an anti-imperialist movement. It’s probably a problem for these sectarian groups, including groups like PSL that obviously are involved in more than one issue. When you bring somebody into your organization or group or whatever, this is where political education comes in, really. You got to have political education I feel.

    A lot of people could be resistant to that, but I think that’s a good method in which to solidify people’s views about the system and making the connections. Most of the public speaking I do, I just did a class yesterday, it’s focused on prisons and I work in other stuff. I can’t when it’s an academic presentation, which it was, I got an hour and a quarter, and so I can’t go too far afield or I’m not meeting the qualifications of that particular class. I have to keep the focus on this issue, connecting it to larger issues in the criminal legal system, but also connecting it to the issue that are political prisoners in the US, because I always give a very quick thumbnail sketch of my background, my backstory as I call it. I open up, I didn’t just get here yesterday, you know what I mean? I was just a kid from a mill town and this war is originally what turned me on, then being in prison a year after I got out of the army, those dots were connected for me. So they see that right away that I have a more expansive view than just prison. But yeah, I don’t know how big an issue it needs to be right now. How many of these people are going to bail out on Palestine when we get to wherever we’re getting to?

    I mean, I’m dealing with some people like that here. The best thing I’ve seen happen is that so many generic anti-war people are doing vigils and stuff. I first ran into them when I got out in 2004 because we were doing them around Iraq, then it was Afghanistan, and they’re against the armaments industry, but they can be pretty generic about it, with their signs and their talk. But I’ve seen some of them cross over into the Palestine issue, which is a big step for some of them. They tend to be politically, how should I put this? Politically, they emphasize nonviolence rather than liberation. I’m going to put it that way. If you’re an anti-imperialist, you emphasize liberation. And resistance to imperialism can be violent or it can be nonviolent. It can be both. But I don’t make a fetish out of nonviolence either philosophically or as a practical manner. Some of these people are crossing over, which is encouraging.

    I’m not sure if I’m getting to the issue. We started talking about the demonstration [I went to in Maine recently]. People were showing up from different organizations with all kinds of different issues. I didn’t have any problem with people talking about losing their jobs and social security and healthcare, not war. I understand those issues, but I think the challenge in terms of recruiting people or encouraging people to get involved in Palestine solidarity is you have to be able to show them how it’s related, why Palestine is related to George Floyd, you know what I mean?

    UoF: A connection Yahya Sinwar made himself, in one of his last interviews with Western press before the Al-Aqsa Flood. He said in 2021, “The same type of racism that killed George Floyd is being used (by the zionist entity) against the Palestinians.”

    RLL: Yeah, you have to do that. I’ve been doing it in one form or another, going back to when I first became politically active. I became active on three fronts — the Vietnam War, the labor struggle, and civil rights. And so that shows right away that as soon as I got politically active in 1968, after I got out of the army, I was connecting the issues right away. So was the organization I was part of, Southern Student Organizing Committee, which sometimes is called a Southern SDS, but I don’t think that’s a really good description. And so our pamphlets and everything reflected that. We had pamphlets by Che Guevara, the Tricontinental Speech, Malcolm X, the history of IWW, whatever that general political education that these issues are related. And I think that long-term, wherever this direction goes with Palestine, is going to be a necessity for solidarity work with Palestine, for a Palestine. It’s going to continue for a long time. You learn from experience and I’ve been around quite a few people who are pretty capable and you can chew gum and walk at the same time other you can do be involved with some other kind of issue as well. We shouldn’t be in a competition to, well, if you’re with this group, you can’t do this over here. If you’re with us, you can’t do that over there. I don’t want to get into too much of that.

    UoF: Yeah, totally. We do need unity. And when we say that we mean unity in resistance, not just unity for unity’s sake, which I feel like is what you’re getting to. Everything you’ve said is really reaffirming why we thought it was so important to do this interview because with all this new repression coming down, we certainly are in a new stage, but we’re seeing some people talk about it as if it’s unprecedented when it’s very, very precedented. Maybe people are saying this because because we don’t know our own history, so these historical examples of repression and counter-repression are crucial to study. Our lives depend on it. And we’re really grateful you’re sharing all your experiences. Getting back to the UFF, we were talking about how yall managed to evade capture and stay underground for so long. As our movement is experiencing more surveillance and infiltration, I think this could be really useful advice to people engaged in all sorts of different tactics, so I was wondering if you could speak to how yall vetted people and dealt with infiltration or traitorship.
    RLL: That’s been the bane of a number of organizations. The worst snitches are not the ones that you manage to identify or that prove themselves unworthy after they’ve become involved in some kind of one form or another with clandestine work. [The worst snitches are] the people who break after the shit goes down. In other words, a person could be underground for three years, have participated in all kinds of stuff, been dependable, get busted, and they’ll sit him in a fucking room, slap him a couple of times, and they start talking and they’re going to slap him again to shut him up. In other words, they’re passed certain tests and are vetted, so to speak, through actually doing things, but when the heat dial hits a certain level, especially if you are arrested or captured and all of a sudden you are looking at enormous amount of time—just to give you one example, in a very bad prison, that kind of thing—and somebody completely falls apart.

    That’s a critical question because you’re talking about trust. The deeper in you are, and I don’t mean just underground, there’s a lot of people that get indicted or dragged before grand juries that are aboveground people, some who violate the law and some who don’t. They love fucking conspiracy laws in this country because they’re easy to convict people on. So why do people use Signal? Presumably to give them some kind of protection against conspiracy charges, right? I mean, I won’t get into that. I’ve been charged with conspiracy, different kinds of conspiracies and I know how the law works and that’s a favorite tactic.

    In terms of clandestinity, you’re talking about much higher risk and much more serious consequences generally speaking in that kind of situation. So a vetting process procedure is more serious. The gate somebody has to go through to assume a role underground should be fairly vigorous. And this is an issue I touch on in my book because it is so important and there’s no one size that fits all. There’s no particular test that will guarantee you that you are protected against somebody. I mean, there’s various kinds of informants and agents, provocateur or whatnot. If you go back and you look at these groups, a lot of them did have snitches rise out of ’em. In a way, the ones I feel that hurt the most, I mean if somebody comes in, they’re an undercover agent and you get set up and you get busted, that sucks, that hurts, but that’s not going to hurt the way your closest friend in your whole life flips and testifies against you. That really hurts. Or to set you up in a way where one of your comrades get killed or injured or busted, ends up in a fourty-year sentence, whatever. And that kind of betrayal is very difficult to flesh it out because it really comes down to an issue primarily of character. You have to assess a person’s character and you don’t know what somebody’s going to be like for sure until they’ve passed a trial under fire. I’ve known soldiers, conventional soldiers in the United States Army that got grade A’s all through basic and advanced training to be a soldier, fundamental part of learning how to kill somebody. But then when they come under actual enemy fire, they fall completely to pieces, where another trainee soldier who just kind of grunted and just kept their head down and nobody noticed him and he just got through basic training, advanced training and nothing special, nothing else stands out about him, but under fire after training in the real war, they rise above the others. They are able to do everything that a good soldier is supposed to do in a war situation under fire.

    So it’s really hard. That comes down to a character issue. And a lot of those other groups got burned. They got burned both ways. They got burned because they recruited the wrong people who turned out pretty quickly to be weak, undependable. They were alright until some cop starts twisting their arm and puts them on a hot seat and they break down and give up information, give up people. Part of it is like being spoken for, recruiting people that others can vouch for. That’s an important thing. Assuming the people that are vouching for them have proven their own selves in one way or another and a trusted comrade, that’s the best referral you can get unless you are coming into the group somebody grew up with or something they’ve known forever or whatever. Because trust is the basic thing. Nobody in our cases ever flipped and they had a lot of pressure. A lot of pressure, because we had kids involved too. And then you got both parents looking at a huge amount of pressures and years to flip and turn government witness. We didn’t have any. Our policy was “Give us 24 hours.”  Meaning that we understand that every human is likely to have a breaking point when it comes to brutality and torture. So, a captive holding out for at least 24 hours or longer gives others a chance to dump anything that could be compromised and move on to safety. I think it important to include this because it’s part of the security code but also shows we are not insensitive to those who suffer severe consequences because of their commitment.

    We had a snitch. We had people, aboveground support people, who basically testified for grand juries. That’s a whole other issue, but it’s related to this. We used to see a lot of use by the government of grand juries to particularly go after aboveground people seeking information on both the aboveground support networks for the clandestine and for anything they knew about people underground themselves.

    But we had one person who flipped early on, and I write about this in my book because this person came to us recommended, but he should have never been recruited. At some point I was starting to notice this person’s character was weak. A number of things happened that told me this person is weak. He was too mouthy, too pushy about we got to do this, we got to do this, we got to do this. You know what I mean? When we didn’t have the capacity to do it, he’s trying to push us into doing actions that at the time would’ve been over our head. So I talked to another comrade about it. He was feeling the same way, this is when it can get dangerous. You’re talking about an armed clandestine movement here, armed organizations, different ways to deal with different disciplinary issues underground. And you got to be very careful and conscientious about how you do it.

    There was another unit operating in the same general area as we were. We had a liaison between them and I was really getting uncomfortable with this guy. The other unit expressed interest in him. The guy that I’m talking about, the recruit, the person of bad character, I feel, I told the liaison take him if you want him, but I told the other group, through the liaison, I got questions about this guy’s character. I don’t know, if he’ll hold up, you should know that. The other person in the other group, they wanted him. So we dumped him and the minute he made that change over, we abandoned the safe house. He knew this one safe house where several of us lived and I was so concerned about him that we decided to dump that house, because that was the one place he knew. So if he did collaborate, that’s all he could lead them to and we’d be gone. So he fell in with this other group and I was clear to the other group, we don’t want anything more to do with him. We could have taken more drastic action, but that’s a whole other issue that I don’t want to get into for this. This guy was like all he wanted do was actions, get out there, get out there, boom, hit him again, boom, hit them again. This other group was into that kind of philosophy. I knew there was going to be a problem there. So we cut the liason off and sure enough they got down in the city and they just went to town and they went way beyond that capacity. They were going big there for a few weeks, but it all came crashing down.

    This guy I was telling you about was busted with some of the others and part of a aboveground support network. They got into the police barracks, scared him, and the guy never stopped talking. I got his completely grand jury testimony. He buried that whole other group. They all went to prison and broke it up as an organization. At least one person in the aboveground group went to prison. And sure enough, they found that safe house, which we had up on the Canadian border and they went in it. But by the time that happened, we had been gone two or three months by then. He completely turned weak, sold everybody out, and then started lying so that he could incriminate more people and try to incriminate me. He starts lying.

    But the underlying factor in all this is desperation. If you can’t recruit when you’re underground or doing any other sensitive stuff — unless your philosophy is we’re going to have a group of two or three people, that’s it, that’s going to be enough to do what we want do the way we want to do it, we don’t need anything more than that — but if you’re trying to build a movement, you need something larger than that. That means you need recruits. And we were desperate for a recruit at the time. He first came in with us, referred to by somebody who’s judgment I trusted, and he was a trustworthy person, he never snitched or anything like that, but his judgment wasn’t the greatest. So when you recruit from a position of desperation, then you’re going to make mistakes. You’re going to lower the bar when you evaluate a person. Can this person hold up to this kind of way of living underground, to do the kind of things that is going to be required of that person to do? The minute you start lowering the bar, the risk is greater that you’re going to pull somebody in that’s going to burn you somewhere down the line.

    The same thing with an action. Let’s say an expropriation. The worst time to do an expropriation is when you are desperate. You don’t even have next month’s rent. And that’s all tied into your security. If you can’t pay the rent and you get thrown out, you can’t be out on the street. You’re desperate. So you try to avoid that situation. You have enough of a bankroll from expropriations that you are not that desperate to go out and do that again. You’ve got to do it at a time when you have the resources to do it right. It’s the same thing with recruiting people. Don’t let yourself get so politically desperate to have this person or two more people into a group that you’re going to lower the standards, lower the bar in terms of what you’ve determined it takes from your own experience to do the work that would be required of this person.

    Fortunately there was nobody else after him with us that did that. When we recruited again later, we had had a lot of experience by then and we needed other people, but we didn’t get to the point where we were desperate. We needed it but we had years of experience — we knew pretty much the requirements of a person to live underground with a lot of heat on you and to do the kinds of things that are necessary. A lot of that stuff is stuff that even aboveground activists don’t know because they haven’t been through the experience — how many ways you can make yourself look and sound different, everything you need to know about fictitious identification and on and on, right down to the littlest details. We had documents, you’ll find some of this in my archives at UMass, they were like little training manuals for new recruits. So the people were given some orientation period to what would be required of them because people don’t have much experience with underground. And the lack of experience has cost people their lives underground.

    UoF: That was so useful, I think to a lot of people reading this who are doing all different kinds of work. The points you make about how being aboveground or being a public-facing spokesperson does not mean you are safe is really important. A lot of the people we’re seeing get abducted right now were those public facing people and were in fact sometimes very moderate politically and they’re still being targeted. It’s not just people doing direct action that need to be preparing for grand jury resistance, etc, that sort of repression will target our movement at every level.

    I wanted to close out maybe by asking you about why the UFF was originally named the Sam Melville-Jonathan Jackson Unit, if you could speak to the significance of these two freedom fighters. I know you just read the interview we did with Jonathan Peter Jackson Jr.

    RLL: Well, Jonathan Jackson was really very influential on me, even before I went underground. Not only with me, but with others, especially those of us who were underground, to the point where Tom Manning and Carol Manning who were part of our group named their son who was born underground after him. His son was born underground. Thinking about kids, it’s a whole other subject, right? One thing I learned underground was, and I learned it from my partner, this is the kind of thing that a normal aboveground person would not think of, that a very pregnant woman can move better underground and faster than a woman with a two or three-weeks-old child. And we actually learned that from experience.

    Now, who contemplating going underground is thinking about something like that? I mean, this goes back to what I was saying, before we get off into a hundred things about living that life. But Jonathan was the inspiration, as I told you about, for our coded secret dating system. It was based on a calendar that was, and you can see, George’s words in the back of his last page of his book, in Soledad Brother, that the death of Jonathan was such an important event it need to be noted on our calendars, ad infinitum, in other words, forever. So we developed a calendar based on that, that began with the first day after Jonathan’s death.*

    Jonathan, as a 17-year-old manchild coming from a colonized nation, an internal colony, he really represented and signified and epitomized Carlos Marighella’s words, that “The duty of the revolutionary is to make the revolution.” Without initiative there is no action. Jonathan, he has the kind of heart that it takes to be a revolutionary it takes to sacrifice and live that commitment and to the fullest. He was a 17-year-old version of Carlos Margighella, really, in a way.

    I remember an interview with Jonathan Jackson from a very long time ago. I don’t remember the publication, but this was when he was working on the Soledad Brothers’ case, and I remember him being asked why he was so angry, and why he was so militant, something to that effect. And his answer was, “What would you do if it was your brother?” That resonated with me, and I felt that deeply, and I still do. Because to make the kind of sacrifice that he made, to make that commitment and then that sacrifice, to put it all on the line, to rescue those brothers, to free those brothers from the Marin County Courthouse, that’s as much heart as you can bring into anything. And if you had a hundred like him, you could probably take some very significant steps and forward movement to bringing this whole fucking system down.

    That’s the kind of heart it takes. That’s a warrior’s heart, and there’s different ways to express it. But the thing that he said, when he said “What if it was your brother,” he’s trying to get people that don’t quite wrap their head around liberating Black captives using firearms. They can’t quite wrap their head around it. So he phrased it that way. To him, it could be his brother George, or it could have been William Christmas or Ruchell Magee because they were there too. But that’s the essential core of a revolutionary, is to identify really strongly, emotionally with oppressed people.

    In the cases that I was involved with around, let’s say, the slaughter that was going on in Central America in El Salvador, Guatemala, and Nicaragua at the time — I’m going to telling the jury this. I represent myself. I can give my own statements. I don’t identify with the ruling class in this country, the Ronald Reagans and the elites of either party, the fucking collaborators, whether the head of unions or head of associations or whatever they were the head. Who I identified with were the campesinos that were struggling and fighting for the own liberation in Central America, be they Mayans in Guatemala or the Sandinistas in Nicaragua. You have to have that feeling, and it’s part of what enabled me to do what I did blissfully and wish I could do more, because that’s what my love wasthat’s what my feeling was for these people. And Jonathan was like that. I mean, he was like a hero, that’s an overused word these days, but he really was, a great inspiration to us.

    UoF: It reminds me of what George said about martyrdom, that we shouldn’t cry, we should celebrate, we should only be sad that it’s taken so long for people willing to make those sacrifices to arrive. “These comrades must make the first contribution. They will be the first to fall. We gather up their bodies, clean them, kiss them and smile. Their funerals should be gala affairs, of home-brewed wine and revolutionary music to do the dance of death by. We should be sad only that it’s taken us so many generations to produce them.”

    RLL: Yeah. I’ve ran into this because I’ve done so much work around political prisoners, and it’s an abstract thing to a lot of people, and I always use the term our political prisoners, because to really be inspired enough to do any solidarity support work around political prisoners in this country, especially if you haven’t done any, you’ve got to take that first step to understand why you need to support activists when they’re imprisoned, and you look at other countries, just look at Palestine, you get a good example. They embrace their imprisoned people. They don’t marginalize them. So I always tell people, these are our political prisoners. It doesn’t mean you have to agree with every fricking thing that they did tactically or strategically or anything else. I mean, if somebody goes to prison for sabotaging the Dakota Pipeline, I may not have the same politics as them, but I totally understand what’s going on here and whose side I’m on, and then that person needs support. So I say, these are our prisoners. This is how you have to think about it. These are our prisoners.

    So when I used to look at what was happening in Central America, I’m not looking at like, oh, these foreigners down here. These are people that our struggle is meant to provide some kind of support for, to expose the truth of what’s happening to them, to expose the government’s criminal enterprise and criminal activity that’s destroying these people, taking their lives from them. You have to have that sort of heart to heart connection. It has to beyond abstract. It doesn’t mean that you have to have a gun in your hand as Jonathan did on that particular day, but it means that to be able to step up, do more work, make more sacrifices of your time, your resources — whatever you need to see people like that.

    I was doing stuff that I had never done before. The battlefield had completely changed. To me, once you get ensnared into that criminal legal system and you’re looking at trials and stuff, to me, it’s an extension of the battlefield you just leftAnd the battlefield I just left, the underground, the odds were always against us. We were always outgunned, outnumbered, outresourced. It was the David versus Goliath kind of situationI get into captivity and I realize this is an extension of that same battlefield. I’m outgunned, outnumbered, out, resourced. They’re trying to like hell to destroy me and my comrades. And so the tactics have to change, the strategy has to change, but it’s the same struggle, just on a different plane. And then when you get to prison, same thing there, it changes again and the odds to increase against you again, and you have to make it work there.

    And in prison, it always goes back to the same thing we thought about earlier, political education. I never knew a political prisoner in prison doing any kind of years that didn’t engage in political education and tried to get little groups going or exchanges, depending on the situation you were in, with people who were there for offenses that were not political, but to try to change their consciousness, especially with the youngsters.

    Of course, George is very big on this in his book. I mean, he really goes on about the importance of political education in that situation. Sam Melville was also an influence on me. I did not know Sam Melville personally, but my admiration for him stems as much, if not more, from his role in Attica than his relatively brief underground years. Although I have to admire anybody that bombed United Fruit, which he did, it goes by a different name now. But I mean, when you look at what has been designated as a genocide directed to Mayan people by the US-backed regime in Guatemala in the eighties, I mean, that’s where United Fruit was from. They owned fucking Guatemala. And so I was pleased to see that. If you’re reading Sam’s history, you realize he made some mistakes as he wasn’t real well acquainted with living and operating underground, and he stood up through all of it. I think it comes down, and this applies to Jonathan too, but Sam Melville, despite whatever personal deficiencies he had, he was a person of principle.

    I can tell you from my own experience, and when I was going into the last part of the last year that I was underground, the tenth year, the writing sort of was on the wall. Most of the underground groups that were operating on any level at all when we first went underground were decommissioned. People were in prison, some died, some just scattered. The network of groups that existed was down to very little in 1984. In fact, it only continued on into ’85 and not really beyond that.

    Part of the hopes of building something, I’m looking at it in 1984, and the people that I thought would still be there were gone, and they hadn’t been replaced. I knew then that our hopes of really setting up a network of clandestine groups, anti-imperialist clandestine groups that could go even much farther than 10 years, was almost a pipe dream at that point. But I kept going because of principle. Apartheid still existed in South Africa, and the slaughters going on in Central America were still happening. I would justify it to myself personally, I felt that as a matter of principle, I was not going to give up the struggle at that point. I was going to keep going, even if it was only based on a matter of principle, even if the material conditions were just absolutely not there anymore, beyond just basic survival to build anything more, I was still going to keep going, at least for the immediate future, which of course ended on November 4th, 1984.

    UoF: We ended the interview here. *Ray emailed us this note after:

    FYI: On the last letter, last page of Soledad Brother George writes:  

    August 9, 1970  Real Date, 2 days A.D.  

    Dear Joan, We reckon all time in the future from the day of the man-child’s death.

    We devised a dating system based on this which took an FBI counter-terrorism resource center months to figure out, simple as it is.

    In our NY trial the prosecutor presenting their closing statement to the jury brought up that 2 of our comrades/defendants had the audacity to name their son after Jonathan Jackson who kidnapped a judge, etc, etc.  His point being that these people are radical extremists who not only engage in political violence, they celebrate it.

    Download a zine version to print/fold here:

    RLL-1-1Download source: Unity of Fields

    abolitionmedia.noblogs.org/?p=

    #antiImperialism #northAmerica #resistance #unitedFreedomFront

  14. “I Don’t Make a Fetish Out of Nonviolence.” Interview With Ray Luc Levasseur on the United Freedom Front

    On 16 April 2025, Unity of Fields interviewed Ray Luc Levasseur, a former political prisoner. In 1975 Levasseur co-founded the Sam Melville-Jonathan Jackson Unit, which later renamed itself the United Freedom Front. They carried out dozens of expropriations and anti-imperialist bombings until their capture in 1984, after being on the FBI’s Most Wanted list. Levasseur was sentenced to 45 years and served his time in some of the most brutal and repressive prisons in the country, USP Marion and ADX Florence, including thirteen years in solitary confinement. He was released in 2004 after serving 20 years, and now lives in his home state of Maine. The interview transcript has been lightly edited for clarity.

    If you are interested in reading more about Ray Luc Levasseur and the United Freedom Front, we recommend reading Until All Are Free: The Trial Statement of Ray Luc Levasseur and checking out his online archives at UMass Amherst, where you can find many of the documents mentioned in the interview.

    Download a zine version to print/fold here.

    Editorial disclaimer: The views and opinions expressed in this interview do not necessarily reflect the views of Unity of Fields.

    Unity of Fields: When people nowadays think of anti-imperialist armed struggle in the US, they tend to think of the Weather Underground and the Black Panther Party (BPP), maybe the Black Liberation Army (BLA), maybe the Symbionese Liberation Army (SLA). Often people aren’t aware of numerous smaller clandestine formations that were active around the same time, like the one you were part of, the Sam Melville-Jonathan Jackson Unit (SM-JJ), which later renamed itself the United Freedom Front (UFF).

    UFF is such an interesting, and, in a lot of ways, quite successful, case study of militancy. You came into revolutionary struggle in a slightly later generation than Weather, and in a different way than the stereotype of white radical elite college student — you were radicalized by serving in Vietnam, serving time in prison for a minor drug offense, and coming from a very working-class background.

    Could you speak to how you see UFF’s trajectory in this context, and why you think it is generally less well known? And why is it important for people of younger generations, especially those interested in the question of militancy, to consider?

    Ray Luc Levasseur: Part of it is some of these groups were very short-lived, for one thing. They traveled fast, but they went down in flames pretty fast too. It’s been a problem in terms of clandestine groups in this country. I mean, there’s amazing number that just didn’t last very long and took major hits and were pretty much decommissioned. The SLA weren’t around all that long either but one of the big reasons people remember them is because of the significant media coverage of it. But a lot of the other groups didn’t get that kind of media coverage like Weather or the SLA did. I don’t know if that’s class-based or not.

    Those of us that I was underground with, we all had some kind of previous political activity in public, but we were not part of big chapters of a national group per se. A couple of us were, I was in national VVAW (Vietnam Veterans Against the War), one of us had been in SDS, but in chapters that were not at the forefront of media attention. I think the George Jackson Brigade was like this too. So people in that particular area where they were operating, you know, would have a better idea of what’s going on, who this was being conducted by, and connect the message to the people where others don’t. A lot of the publicity, a lot of the media coverage is really negative, and part of the purpose for that, was not just in terms of what the general public was reading, but in terms of what political activists were reading.

    Clandestinity by its nature, people don’t know who you are and they can be very distrustful. And depending also on the extent of your aboveground support network, not every group has one, but every group should have one. A group like Weather had a really extensive aboveground network and that could be utilized in a lot of ways to promote the cause and build a little support, and certainly awareness and keeping the group front and center in people’s minds politically and personally. We had an aboveground network going under that was eventually decommissioned through police and other methods and then we went through a dry spell and then we started to rebuild another one. That support network eventually collapsed similar to the BLA network that collapsed after the Brinks [Robbery in 1981], and their network was more extensive than ours. That’s a major blow to any group. I know that it played a really significant factor with us, particularly the second time around where it had collapsed. That really contributes to your isolation. That kind of isolation is the enemy of an underground group because it hampers your ability to recruit and do all kinds of things. Essentially it cuts off the logistical network. The kind of support, material and otherwise, political and otherwise, that you might be getting through that aboveground support network all of a sudden just gets shut off. You cut off a supply route and it really has a big impact on even a conventional military force. Look what’s happened in Lebanon when the israelis were really able to dismantle a lot of the network that was supporting both Hezbollah and to some degree Hamas, it’s had a big impact. And the more isolated you get, the less you’re out there. Your voice is diminished somewhat.

    I think that when you say the Panthers, you’re really talking about BLA, in terms of more clandestine actions. The Panthers always, or did for a long time, had clandestine networks, but they weren’t there in an offensive capacity, they were more self-defense oriented. They’d have a safe house, they’d have the proper credentials, paper identification, funds, a way for somebody to disappear quickly if the need was there. The BLA actually had things set up more like we had set up, where you’re dealing strictly with people that are underground, have to stay underground, and are carrying the initiative forward. They’re initiating actions. They’re not there in the self-defense mode per se, I dunno if that makes sense. But the two [the BLA and BPP] often get used interchangeably, and the BLA benefited from the huge, huge reputation and media attention that the Panthers had, benefited in the sense of what the question you asked is, why some of these groups are well-known and some are not. So Weather had built its reputation by its involvement with SDS. Then when a significant number of them go underground and become the Weather Underground Organization, they’re already pretty well known. So that’s my thinking behind those two particular organizations. And both were around for a long time, especially when you consider those particular roots, one in the [Black] Panther Party and one in groups like SDS.

    UoF: Please correct me if I’m wrong, but based on what I’ve read about the United Freedom Front, it sounds like you guys achieved a huge number of successful actions and evaded capture for longer than many other groups. Is that correct? Why that was the case?

    RLL: It is correct. In fact, I think that’s one of our main claims to fame, really, is the length of time we were underground. Because we weren’t just hiding. We were the number one fugitives they wanted in the country. After the first couple years we became number one. As the other groups got picked off or decommissioned in one way or another, those forces of repression can focus more and more on you. Plus we were very active, we were always doing something and they knew it. High-risk stuff. We had developed means that if we had just wanted to be underground just to live away from the eyes and ears of the government, we could have done that indefinitely, because we had the methods down so well. But our justification for being underground was to be active. I wouldn’t be underground if I couldn’t stay activeSo we were constantly carrying out actions of one kind or another throughout the whole time, including many close calls. And when you look at groups, even within the BLA itself, which was more extensive than we were, and they were around for a considerable period of time, but individual cells within the BLA, a lot of ’em went down really quick. But they were large enough where they could absorb the loss and keep going.

    We were smaller, we couldn’t handle too many hits. You know what I mean? When you go up against the repressive arm of this government, they have all the money, the resources, the manpower, the computer power. They can make mistake after mistake after mistake. I can sit in and talk to you about the strategic and tactical mistakes the FBI and other police made in trying to get us. But because of that foundation, the endless supply of funding and police power, weaponry and intelligence, all of it, they can make mistake after mistake, and just go back to the drawing board and do it again. When you’re a small organization, there’s very little margin of error for you. You can make one mistake and it all comes tumbling down.

    Now, to give you an idea in terms of even Weather and BLA, which had had pretty good resources, the Brinks case really was like, if you look at it, it’s like all of a sudden the dominoes started falling. A huge part of their total underground infrastructure just went down around that one action. So you don’t have the room to make those kinds of mistakes. I think it’s really to our credit that we were underground for ten years. I mean, what other group can you see that did that and was politically active for that entire period of time and with a number one target on our backs almost the whole time?

    Expropriation was a part of our strategy, and that’s different than certain clandestine formations that got their funding a different way. When you look at Weather, some of that money obviously came from some pretty wealthy family members and friends, that was part of the network, right? There’s a difference in building revolutionary power, trying to build a clandestine armed movement. You’re building a different kind of revolutionary when you fund yourself through armed actions that target financial institutions to uphold capitalism as opposed to having Uncle John send you $10,000 stipend every monthAnd you can extrapolate from that into the nonprofit industrial complex. I know some really good people and good organizations that are nonprofits and they skimp to get by to do some really good community work. But there are a lot of nonprofits where the money just rolls in regularly every month, some grant, some foundation, to pay your pretty decent salary and all the benefits that are accrued with it…it makes for a different organization. It makes for a different mindset. Anyways, where were we?

    UoF: Not to oversimplify, but I think you could say that guerrillas inside of the imperial core take two distinct paths — one, those who think revolution is impossible within the core, and their primary goal is to give as much material support to Third World revolutionaries, without the expectation that the masses here will join them. And two, those who may share the primary goal of materially supporting Third World revolutionaries, but also think revolution is possible within the core and aim to win popular support and grow their ranks. Of course there has been a lot of internal disagreement on these questions within some of the formations we’re talking about. And in the so-called United States it’s more complex than, say, Denmark, because it’s built on settler colonialism. The “working class” here is still largely pacified by imperial super profits but there are also internal colonies with far more revolutionary potential because they are fighting national liberation struggles. How did you all conceptualize revolution here, and how did the UFF relate to the Third World national liberation struggles, including those internal to the US?

    RLL: Well, when I was part of it, we were trying to build a revolutionary resistance movement. We were anti-imperialists. So much is based on time, place, and conditions. If you don’t factor in time, place, and conditions into things, you can get off the mark really well, including with armed actions and stuff. You’ve got to factor these three components in to make decisions about how you’re going to move. At that time we’re talking, if you go back to SM-JJ [Sam Melville-Jonathan Jackson Unit], you’re talking early, mid-seventies, and then all the way up to UFF [United Freedom Front].

    The last UFF action was 1984. It’s an interesting communiqué that UFF put out. They hit Union Carbide, which was a big mining company in South Africa, Amerikan-owned multinational, and the communiqué answer the call to all parts of the anti-apartheid movement that existed at that time and any progressive revolutionary people that. It was really coming together pretty well, this aboveground anti-apartheid movement in the US at the time. But this communiqué was encouraging that [aboveground] movement to continue, while recognizing that we’re trying to build a multifaceted anti-imperialist movement, which for us necessitated a clandestine sector that was armed, armed for self-defense, and armed for offensive actions and that they were not mutually exclusive, that they should compliment each otherMultilevel, we’re at different levels, but we’re part of the same movement. So we encouraged the BDS movement at the time, students, workers, etc, to keep at it the same way because we were going to keep it at it as well.

    In terms of that anti-imperialist view from going back to the seventies into the eighties, we clearly really took our view of things based a lot on the national liberation struggles of the time. When you go back then, they were all over the world, anti-colonial struggles included in that. Just look at Africa: Mozambique, South Africa, Namibia, Angola. To us, these Third World national liberation struggles were a cutting edge of resisting and fighting back against US imperialism as it spread throughout the world. Each one of those countries that liberated itself was going to weaken US imperialism to some degree. And our role in part was to be supportive of those struggles. International solidarity, if you need a term for it. That was how we considered ourselves; they’re the vanguard, we’re the rear guard. The rear guard because we’re in the Belly of the Beast, we’re the US, we have some responsibility politically, morally, personally to do something, to attack the same system that’s being attacked by these revolutionary movements. It’s a unique position to be within the US and try to fight on the same field of battle, so to speak, in support of these liberation struggles.

    The great thinkers and guerrilla fighters that came out of these struggles [in the Third World] had a lot of influence on our own political vision and analysis. I was looking at the reading list on the Unity of Fields website. I can tell you, I’ve read many of those books. Everything from Carlos Marighella, Minimanual of the Urban Guerrilla. These were tremendously influential on us because Urban Guerrilla Warfare was relatively new at that time. It was like opening up a new area. George Jackson says, I think in Blood in my Eye, that the urban landscape can conceal a guerrilla as well as the jungle canopy. And we took that to heart. 

    What came after liberation in each of those countries, you know, we paid a lot of attention to the groups made up the different movements in the different colonies and different countries, because sometimes there would be multiple organizations. Obviously we would favor the political view of one group usually, but it wasn’t our job to put that out there. That was just to enable us to see what direction things were going in, and which organizations in these movements had the best prospects of really freeing the people there. So what came after liberation, we didn’t delve into, other than you’re freeing up a colony, you’re freeing up a people, which means self-determination for the first time for these people so that they are in a position, once they liberate themselves from foreign conflict, colonization or intervention, then they are much better suited to determine by themselves the direction they want to take to put that liberation into real terms for their people. Our actions were meant to keep those liberation struggles on the agenda in this country, both with the left and as much of the general public as we could reach through what we were doing.

    I think you mentioned the internal colonies as well, and that somewhat unique situation. Not all the underground groups from that period looked at internal colonies the same way. Even within certain organizations, it generally might not be completely unified on a position on the internal colonies. Our position was that Black people in this country do compromise an internal colony. So we’re looking at Black people, what do they want? What are the Black radical groups saying? What are they doing? Recognizing that somebody’s internally colonized is different than offering a format to deal with that. So it wasn’t our position to offer that format, our position was to support a freedom struggle. If you look at the position papers and communiqués and underground papers from that era, you’ll see that there is support for the national liberation of all of those internal colonies.

    We did get very involved with the Puerto Rican struggle, which is a little bit different in the sense that you have the diaspora here, you have a huge number of Puerto Ricans in this country, but the island is the land base of the nation. How they were going to deal with the diaspora, that comes with liberating your national borders. That’s the way I see it, anyways. We were really supportive of Puerto Rican independence and the release of the Puerto Rican nationalist prisoners that were kept at that time, Lolita LeBron and the others, and in fact, we were charged with quite a few actions around Puerto Rican independence. That we felt was very material support given as many Puerto Ricans in this country. My number one goal has been dismantle this fucking imperialist system. I think the internal colonies are a potential Achilles heel of imperialism right within its own borders.

    UoF: Absolutely agree. I was going to ask you a question about the state of the Palestine solidarity movement in this country, and I think that’s actually very related to our discussion about the internal colonies. Because the most useful thing we could do here for Palestine, for any Third World national liberation struggle, is to make a revolution here — to dismantle US imperialism from within. And obviously the internal colonies, now and historically, have the most revolutionary potential, so that goes hand in hand.

    I think the “Palestine solidarity movement,” as they call it, is coming up against the limitations of its own form. I’m not trying to say this in a defeatist way because I also think the movement has made great advances, but those advances have led us to this impasse or breaking point. The movement has failed in part by not addressing this issue of internal colonialism, by not universalizing the Palestinian struggle into a broader anti-imperialist struggle. That failure has manifested itself most clearly in the movement’s weak positions on the police, on resistance to the police, and on whether militancy should take place here at all. There’s a lot of rhetorical support for resistance far away, but not when it takes place here, which is why the movement also ignores a lot of the political prisoners in Amerikan dungeons, like Casey Goonan. And to be clear, when I say “movement,” I’m mostly talking about the nonprofit industrial complex, which is why I don’t even like using the term “movement” really, and I appreciated your critique of nonprofits earlier and how reformist they tend to become. But back to my point — we’ll be chanting “resistance is justified when people are occupied” at police-permitted and peace-police-marshalled parades without acknowledging that the Amerikan police are the domestic occupying force of the internal colonies here. That idea leads us to the logical conclusiont hat we should be resisting the police, and I don’t think these nonprofits actually really want people to do that, because like you said, they care about their grant money and their bottomline.

    When we were chatting the other week, you were also comparing how you and your comrades would be policed for supporting the Vietnamese National Liberation Front (NLF) and waving their flags at protests to how we are now told not to wave our Hezbollah flags or wear Hamas or PFLP headbands. So this kind of conditional “solidarity” that is actually anti-resistance is definitely not a new phenomenon, although the existence of the terror lists and designations has made people all the more scared of resistance, or given them more excuses to shy away from openly supporting it.

    But yeah, I guess I’m wondering what you think of the Palestine solidarity movement now, especially in this current wave of repression. Do you think the movement can transcend the limits of its current framework, its single issueism, really break out into a broader anti-imperialist movement?

    RLL: Important question. Well, the Palestine solidarity movement, I mean, I’m not the best judge of this in my current situation. You could be a better judge of it than me. I don’t know.

    I used to get into it with activists from New York a lot because I detected this attitude among some that New York was the center of the universe, and what people do outside of the center of that universe somehow doesn’t quite measure up to what’s up in New York. And it’s not just with somebody like me who lives in rural Maine, but I got friends and comrades in Boston and they get to sometimes the same way that they feel like, especially when they’re working with people and they want to put an event together. “Oh, is this is going to be New York or Boston,” and Boston seems to play in second field all the time and it sort irritates them. Or you get over into the Bay Area, it is very different being a radical in a place like rural Maine. I think I could mesh in much easier in the city like New York or the Bay Area that has a lot of old radicals, but in a place like Maine, it’s like you’re the only game in town. That’s why its fricking media and the cops still know who I am despite the time that’s gone by.

    But anyways, first of all, I’m going to say this question has come up even here in Maine, and we have some very committed activists here to figuring out which way forward, examining and reexamining actions that people are involved with. Everything from cultural events to CD [civil disobedience] where people get arrested and all these marches and all these rallies. I saw the piece on PSL in Unity of Fields and apparently there’s some differences there over strategy. I mean, PSL is here. I know some of them, I knew ’em before they were PSL. PSL hasn’t been around in any significant numbers until relatively recently. I mean it predates October 2023, but they hadn’t been around and they’re recruiting. When it comes to which way forward with Palestine solidarity, it’s still a work in progress as various groups hold a range of strategies and tactics. It’s an issue here in Maine and people talk about it because they want to build on what’s happened so far.

    The positive thing that I see is that I have never seen so much support, I’ll use it generically, the word “support,” and awareness around the Palestinian liberation struggle as I see now. That’s happened since October of 2023. I’ve seen it manifested in many different ways and I’ve also seen it in other parts of the country. I’m in touch with activists in other parts of the country. I’m seeing the same thing there. I could take it a step further and see it also in significant parts of the world.

    Because historically among the left, and I’m not talking about different party lines between different sectarian groups who want to argue to death over some line, I’m talking about substantive issues — you couldn’t find a lefty group in this country that wasn’t opposed to apartheid South Africa. But as the years passed by, Palestine was always, and forgive me if I’m repeating myself, but to put it in New York terms, Palestine was always considered the third rail of left politics.

    You know, the third rail in the subway, you touch a third rail and you’re instantly fried, you die. Periodically somebody does that in the subway system and that’s what happens to them. I personally know somebody who happened to die that way. In the NYPD investigation of how he died, they said he tripped and fell on it. This was a young anarchist kid that I knew. This is quite a few years ago. While his comrade was saying no, he got jumped and pushed on it. But in any event, you touch it, you die.

    So if you were a supporter of Palestine, you risked being ostracized by people, either individually within a group or by another group. It was always like you could give Palestine a certain amount of rhetorical support in your publication or whatever, but don’t get too heavy-handed with it. Don’t push the resistance too much and don’t push the one [Palestinian] state too much and those kind of things. If you did, then you risk being ostracized politically by other leftists.

    I’ve seen that starting to go by the wayside for the first time in my life. I’ve never seen this level of support before. I understand we’d have to go qualify it by going through what do I mean by support? You know what I mean? This and this. But I mean you take ten different ways that people can be supportive from financial to cultural to CD [civil disobedience] to every kind of thing in between, then I think there’s a big positive. It’s a positive, it can be built on, people are trying to build on it, it could grow even more.

    I mean, we don’t know what’s going on in Palestine until next week gets here. So much is up in the air right now. None of it seems good, but I think that’s been a pretty amazing thing. You could say, yeah, well, a lot of these people are basic liberals and maybe their idea of Palestine solidarity is to keep writing to their Congress person to vote to stop arms to israel or write a letter to the editor or whatever. I don’t discourage any of that kind of stuff. I just push people to do more. Or I don’t push, I used to push. I try to persuade people to do more. So I think that’s really good.

    I think part of the reason you’re seeing the repression amped up, it’s not just because Trump is here, it’s because they’re worried about that level of support [for Palestine] and that’s why they’re coming after people to the extent that they are. I don’t think it’s going to stay this way, I think it’s going to get worse, but I still think that they are predominantly focused on low-hanging fruit. I hate to use that term, but I’ll use it. I’m accustomed to this because I was a prisoner for a long time and I see them do a lot of things to prisoners that people out here just don’t care about, don’t know about, don’t want to know about, and it’s out of sight, out of mind, it’s prisoners, the lower end of everybody. And then five years later they’re doing the same thing to people outside of prison. I can talk about surveillance technologies and all kinds of stuff. They’ll experiment with the prisons first. That’s the low-hanging fruit because we’re the most vulnerable, we’re the most marginalized.

    What they’re doing now, especially with the deportation stuff, is they’re targeting people. Totally make up a fucking story. But they’re going after people they know are vulnerable because they’re not a US citizen yet, or they can manipulate a law even if they got a green card or whatever to deport them. Something like this happened with the Red Scare with Emma Goldman and Alexander Berkman and various anarchists and communists that were put on boats, just rounded up and put on boats, and sent to other countries. I think that’s part of the reason why we’re seeing this repression, and it’s a great cause for concern because of the level of fear it induces and also because we have to come to the defense of these people that are being subjected to this repression.

    It’s a moral and political obligation that we do that. But it also requires resources. It also requires our attention, our time, our money, whatever support we can muster to defend people that are going to being targeted by this repression. That’s not to say that we should do any less, we should do more to defend people that are under attack. If you follow Cop City at all, you know what I’m talking about. All these people that are being deported could eventually prevail in their case, but the government still has succeeded in disrupting movement activities, scaring people that may be involved away. To them, they look at it like a win-win situation. If they can deport somebody and keep them out, that’s a win. But even if that person comes back, they figure they’d want something because he may be back, but they scared 20 people away, or they tied up people in organizations, tied those resources up, so they can’t be used for anything else.

    So I think that the potential is still there right now, despite the repression. I talked about time, place, and conditions — we didn’t have this internet before, we have to get on the fucking internet on a daily basis to find out how those conditions are changing. If you don’t have a good grasp of conditions, then it’s difficult to put together tactical and strategic plans of any kind. And it changes so much. But I think the potential is still there. This movement can grow now.

    Single-issue? Yeah, I mean I have to think of the Vietnam War because there were so many people. I was a state coordinator of Vietnam Veterans Against the War, and my Vietnam veteran partner in that had been a highly decorated army helicopter pilot. I was already an anti-imperialist by the time I got involved with VVAW. And this brother, he was strictly a single-issue person. He wanted to bring this war to an end and it had a moral base to it to a certain degree. He had studied to be a Jesuit before he got hooked into the military and he had strong moral objections to the US being in Vietnam and what they were doing there. I mean combined together, we made some really formidable presentations and worked all well together. But the minute that all was done, that was it. That was the end of his political activism. I immediately jumped. I didn’t wait until the war to be completely over, but it was obviously going to be. I already had made my way into working around the criminal legal system, prisoners and all of that. This was in the seventies when the prisoners rights thing was really big. That turned out to be a good move politically because I never looked at the war as a single issue. To me it was always connected. I just looked at my fucking training, and when I was in Vietnam, to know that white supremacy ran through the whole fricking war. It was white supremacy, racism on a massive scale. It was embedded into us in our training before we even got there. But yeah, I think that that is a problem probably, well, it depends how you look at it, whether it’s a problem or not. It’s a problem in terms of building an anti-imperialist movement. It’s probably a problem for these sectarian groups, including groups like PSL that obviously are involved in more than one issue. When you bring somebody into your organization or group or whatever, this is where political education comes in, really. You got to have political education I feel.

    A lot of people could be resistant to that, but I think that’s a good method in which to solidify people’s views about the system and making the connections. Most of the public speaking I do, I just did a class yesterday, it’s focused on prisons and I work in other stuff. I can’t when it’s an academic presentation, which it was, I got an hour and a quarter, and so I can’t go too far afield or I’m not meeting the qualifications of that particular class. I have to keep the focus on this issue, connecting it to larger issues in the criminal legal system, but also connecting it to the issue that are political prisoners in the US, because I always give a very quick thumbnail sketch of my background, my backstory as I call it. I open up, I didn’t just get here yesterday, you know what I mean? I was just a kid from a mill town and this war is originally what turned me on, then being in prison a year after I got out of the army, those dots were connected for me. So they see that right away that I have a more expansive view than just prison. But yeah, I don’t know how big an issue it needs to be right now. How many of these people are going to bail out on Palestine when we get to wherever we’re getting to?

    I mean, I’m dealing with some people like that here. The best thing I’ve seen happen is that so many generic anti-war people are doing vigils and stuff. I first ran into them when I got out in 2004 because we were doing them around Iraq, then it was Afghanistan, and they’re against the armaments industry, but they can be pretty generic about it, with their signs and their talk. But I’ve seen some of them cross over into the Palestine issue, which is a big step for some of them. They tend to be politically, how should I put this? Politically, they emphasize nonviolence rather than liberation. I’m going to put it that way. If you’re an anti-imperialist, you emphasize liberation. And resistance to imperialism can be violent or it can be nonviolent. It can be both. But I don’t make a fetish out of nonviolence either philosophically or as a practical manner. Some of these people are crossing over, which is encouraging.

    I’m not sure if I’m getting to the issue. We started talking about the demonstration [I went to in Maine recently]. People were showing up from different organizations with all kinds of different issues. I didn’t have any problem with people talking about losing their jobs and social security and healthcare, not war. I understand those issues, but I think the challenge in terms of recruiting people or encouraging people to get involved in Palestine solidarity is you have to be able to show them how it’s related, why Palestine is related to George Floyd, you know what I mean?

    UoF: A connection Yahya Sinwar made himself, in one of his last interviews with Western press before the Al-Aqsa Flood. He said in 2021, “The same type of racism that killed George Floyd is being used (by the zionist entity) against the Palestinians.”

    RLL: Yeah, you have to do that. I’ve been doing it in one form or another, going back to when I first became politically active. I became active on three fronts — the Vietnam War, the labor struggle, and civil rights. And so that shows right away that as soon as I got politically active in 1968, after I got out of the army, I was connecting the issues right away. So was the organization I was part of, Southern Student Organizing Committee, which sometimes is called a Southern SDS, but I don’t think that’s a really good description. And so our pamphlets and everything reflected that. We had pamphlets by Che Guevara, the Tricontinental Speech, Malcolm X, the history of IWW, whatever that general political education that these issues are related. And I think that long-term, wherever this direction goes with Palestine, is going to be a necessity for solidarity work with Palestine, for a Palestine. It’s going to continue for a long time. You learn from experience and I’ve been around quite a few people who are pretty capable and you can chew gum and walk at the same time other you can do be involved with some other kind of issue as well. We shouldn’t be in a competition to, well, if you’re with this group, you can’t do this over here. If you’re with us, you can’t do that over there. I don’t want to get into too much of that.

    UoF: Yeah, totally. We do need unity. And when we say that we mean unity in resistance, not just unity for unity’s sake, which I feel like is what you’re getting to. Everything you’ve said is really reaffirming why we thought it was so important to do this interview because with all this new repression coming down, we certainly are in a new stage, but we’re seeing some people talk about it as if it’s unprecedented when it’s very, very precedented. Maybe people are saying this because because we don’t know our own history, so these historical examples of repression and counter-repression are crucial to study. Our lives depend on it. And we’re really grateful you’re sharing all your experiences. Getting back to the UFF, we were talking about how yall managed to evade capture and stay underground for so long. As our movement is experiencing more surveillance and infiltration, I think this could be really useful advice to people engaged in all sorts of different tactics, so I was wondering if you could speak to how yall vetted people and dealt with infiltration or traitorship.
    RLL: That’s been the bane of a number of organizations. The worst snitches are not the ones that you manage to identify or that prove themselves unworthy after they’ve become involved in some kind of one form or another with clandestine work. [The worst snitches are] the people who break after the shit goes down. In other words, a person could be underground for three years, have participated in all kinds of stuff, been dependable, get busted, and they’ll sit him in a fucking room, slap him a couple of times, and they start talking and they’re going to slap him again to shut him up. In other words, they’re passed certain tests and are vetted, so to speak, through actually doing things, but when the heat dial hits a certain level, especially if you are arrested or captured and all of a sudden you are looking at enormous amount of time—just to give you one example, in a very bad prison, that kind of thing—and somebody completely falls apart.

    That’s a critical question because you’re talking about trust. The deeper in you are, and I don’t mean just underground, there’s a lot of people that get indicted or dragged before grand juries that are aboveground people, some who violate the law and some who don’t. They love fucking conspiracy laws in this country because they’re easy to convict people on. So why do people use Signal? Presumably to give them some kind of protection against conspiracy charges, right? I mean, I won’t get into that. I’ve been charged with conspiracy, different kinds of conspiracies and I know how the law works and that’s a favorite tactic.

    In terms of clandestinity, you’re talking about much higher risk and much more serious consequences generally speaking in that kind of situation. So a vetting process procedure is more serious. The gate somebody has to go through to assume a role underground should be fairly vigorous. And this is an issue I touch on in my book because it is so important and there’s no one size that fits all. There’s no particular test that will guarantee you that you are protected against somebody. I mean, there’s various kinds of informants and agents, provocateur or whatnot. If you go back and you look at these groups, a lot of them did have snitches rise out of ’em. In a way, the ones I feel that hurt the most, I mean if somebody comes in, they’re an undercover agent and you get set up and you get busted, that sucks, that hurts, but that’s not going to hurt the way your closest friend in your whole life flips and testifies against you. That really hurts. Or to set you up in a way where one of your comrades get killed or injured or busted, ends up in a fourty-year sentence, whatever. And that kind of betrayal is very difficult to flesh it out because it really comes down to an issue primarily of character. You have to assess a person’s character and you don’t know what somebody’s going to be like for sure until they’ve passed a trial under fire. I’ve known soldiers, conventional soldiers in the United States Army that got grade A’s all through basic and advanced training to be a soldier, fundamental part of learning how to kill somebody. But then when they come under actual enemy fire, they fall completely to pieces, where another trainee soldier who just kind of grunted and just kept their head down and nobody noticed him and he just got through basic training, advanced training and nothing special, nothing else stands out about him, but under fire after training in the real war, they rise above the others. They are able to do everything that a good soldier is supposed to do in a war situation under fire.

    So it’s really hard. That comes down to a character issue. And a lot of those other groups got burned. They got burned both ways. They got burned because they recruited the wrong people who turned out pretty quickly to be weak, undependable. They were alright until some cop starts twisting their arm and puts them on a hot seat and they break down and give up information, give up people. Part of it is like being spoken for, recruiting people that others can vouch for. That’s an important thing. Assuming the people that are vouching for them have proven their own selves in one way or another and a trusted comrade, that’s the best referral you can get unless you are coming into the group somebody grew up with or something they’ve known forever or whatever. Because trust is the basic thing. Nobody in our cases ever flipped and they had a lot of pressure. A lot of pressure, because we had kids involved too. And then you got both parents looking at a huge amount of pressures and years to flip and turn government witness. We didn’t have any. Our policy was “Give us 24 hours.”  Meaning that we understand that every human is likely to have a breaking point when it comes to brutality and torture. So, a captive holding out for at least 24 hours or longer gives others a chance to dump anything that could be compromised and move on to safety. I think it important to include this because it’s part of the security code but also shows we are not insensitive to those who suffer severe consequences because of their commitment.

    We had a snitch. We had people, aboveground support people, who basically testified for grand juries. That’s a whole other issue, but it’s related to this. We used to see a lot of use by the government of grand juries to particularly go after aboveground people seeking information on both the aboveground support networks for the clandestine and for anything they knew about people underground themselves.

    But we had one person who flipped early on, and I write about this in my book because this person came to us recommended, but he should have never been recruited. At some point I was starting to notice this person’s character was weak. A number of things happened that told me this person is weak. He was too mouthy, too pushy about we got to do this, we got to do this, we got to do this. You know what I mean? When we didn’t have the capacity to do it, he’s trying to push us into doing actions that at the time would’ve been over our head. So I talked to another comrade about it. He was feeling the same way, this is when it can get dangerous. You’re talking about an armed clandestine movement here, armed organizations, different ways to deal with different disciplinary issues underground. And you got to be very careful and conscientious about how you do it.

    There was another unit operating in the same general area as we were. We had a liaison between them and I was really getting uncomfortable with this guy. The other unit expressed interest in him. The guy that I’m talking about, the recruit, the person of bad character, I feel, I told the liaison take him if you want him, but I told the other group, through the liaison, I got questions about this guy’s character. I don’t know, if he’ll hold up, you should know that. The other person in the other group, they wanted him. So we dumped him and the minute he made that change over, we abandoned the safe house. He knew this one safe house where several of us lived and I was so concerned about him that we decided to dump that house, because that was the one place he knew. So if he did collaborate, that’s all he could lead them to and we’d be gone. So he fell in with this other group and I was clear to the other group, we don’t want anything more to do with him. We could have taken more drastic action, but that’s a whole other issue that I don’t want to get into for this. This guy was like all he wanted do was actions, get out there, get out there, boom, hit him again, boom, hit them again. This other group was into that kind of philosophy. I knew there was going to be a problem there. So we cut the liason off and sure enough they got down in the city and they just went to town and they went way beyond that capacity. They were going big there for a few weeks, but it all came crashing down.

    This guy I was telling you about was busted with some of the others and part of a aboveground support network. They got into the police barracks, scared him, and the guy never stopped talking. I got his completely grand jury testimony. He buried that whole other group. They all went to prison and broke it up as an organization. At least one person in the aboveground group went to prison. And sure enough, they found that safe house, which we had up on the Canadian border and they went in it. But by the time that happened, we had been gone two or three months by then. He completely turned weak, sold everybody out, and then started lying so that he could incriminate more people and try to incriminate me. He starts lying.

    But the underlying factor in all this is desperation. If you can’t recruit when you’re underground or doing any other sensitive stuff — unless your philosophy is we’re going to have a group of two or three people, that’s it, that’s going to be enough to do what we want do the way we want to do it, we don’t need anything more than that — but if you’re trying to build a movement, you need something larger than that. That means you need recruits. And we were desperate for a recruit at the time. He first came in with us, referred to by somebody who’s judgment I trusted, and he was a trustworthy person, he never snitched or anything like that, but his judgment wasn’t the greatest. So when you recruit from a position of desperation, then you’re going to make mistakes. You’re going to lower the bar when you evaluate a person. Can this person hold up to this kind of way of living underground, to do the kind of things that is going to be required of that person to do? The minute you start lowering the bar, the risk is greater that you’re going to pull somebody in that’s going to burn you somewhere down the line.

    The same thing with an action. Let’s say an expropriation. The worst time to do an expropriation is when you are desperate. You don’t even have next month’s rent. And that’s all tied into your security. If you can’t pay the rent and you get thrown out, you can’t be out on the street. You’re desperate. So you try to avoid that situation. You have enough of a bankroll from expropriations that you are not that desperate to go out and do that again. You’ve got to do it at a time when you have the resources to do it right. It’s the same thing with recruiting people. Don’t let yourself get so politically desperate to have this person or two more people into a group that you’re going to lower the standards, lower the bar in terms of what you’ve determined it takes from your own experience to do the work that would be required of this person.

    Fortunately there was nobody else after him with us that did that. When we recruited again later, we had had a lot of experience by then and we needed other people, but we didn’t get to the point where we were desperate. We needed it but we had years of experience — we knew pretty much the requirements of a person to live underground with a lot of heat on you and to do the kinds of things that are necessary. A lot of that stuff is stuff that even aboveground activists don’t know because they haven’t been through the experience — how many ways you can make yourself look and sound different, everything you need to know about fictitious identification and on and on, right down to the littlest details. We had documents, you’ll find some of this in my archives at UMass, they were like little training manuals for new recruits. So the people were given some orientation period to what would be required of them because people don’t have much experience with underground. And the lack of experience has cost people their lives underground.

    UoF: That was so useful, I think to a lot of people reading this who are doing all different kinds of work. The points you make about how being aboveground or being a public-facing spokesperson does not mean you are safe is really important. A lot of the people we’re seeing get abducted right now were those public facing people and were in fact sometimes very moderate politically and they’re still being targeted. It’s not just people doing direct action that need to be preparing for grand jury resistance, etc, that sort of repression will target our movement at every level.

    I wanted to close out maybe by asking you about why the UFF was originally named the Sam Melville-Jonathan Jackson Unit, if you could speak to the significance of these two freedom fighters. I know you just read the interview we did with Jonathan Peter Jackson Jr.

    RLL: Well, Jonathan Jackson was really very influential on me, even before I went underground. Not only with me, but with others, especially those of us who were underground, to the point where Tom Manning and Carol Manning who were part of our group named their son who was born underground after him. His son was born underground. Thinking about kids, it’s a whole other subject, right? One thing I learned underground was, and I learned it from my partner, this is the kind of thing that a normal aboveground person would not think of, that a very pregnant woman can move better underground and faster than a woman with a two or three-weeks-old child. And we actually learned that from experience.

    Now, who contemplating going underground is thinking about something like that? I mean, this goes back to what I was saying, before we get off into a hundred things about living that life. But Jonathan was the inspiration, as I told you about, for our coded secret dating system. It was based on a calendar that was, and you can see, George’s words in the back of his last page of his book, in Soledad Brother, that the death of Jonathan was such an important event it need to be noted on our calendars, ad infinitum, in other words, forever. So we developed a calendar based on that, that began with the first day after Jonathan’s death.*

    Jonathan, as a 17-year-old manchild coming from a colonized nation, an internal colony, he really represented and signified and epitomized Carlos Marighella’s words, that “The duty of the revolutionary is to make the revolution.” Without initiative there is no action. Jonathan, he has the kind of heart that it takes to be a revolutionary it takes to sacrifice and live that commitment and to the fullest. He was a 17-year-old version of Carlos Margighella, really, in a way.

    I remember an interview with Jonathan Jackson from a very long time ago. I don’t remember the publication, but this was when he was working on the Soledad Brothers’ case, and I remember him being asked why he was so angry, and why he was so militant, something to that effect. And his answer was, “What would you do if it was your brother?” That resonated with me, and I felt that deeply, and I still do. Because to make the kind of sacrifice that he made, to make that commitment and then that sacrifice, to put it all on the line, to rescue those brothers, to free those brothers from the Marin County Courthouse, that’s as much heart as you can bring into anything. And if you had a hundred like him, you could probably take some very significant steps and forward movement to bringing this whole fucking system down.

    That’s the kind of heart it takes. That’s a warrior’s heart, and there’s different ways to express it. But the thing that he said, when he said “What if it was your brother,” he’s trying to get people that don’t quite wrap their head around liberating Black captives using firearms. They can’t quite wrap their head around it. So he phrased it that way. To him, it could be his brother George, or it could have been William Christmas or Ruchell Magee because they were there too. But that’s the essential core of a revolutionary, is to identify really strongly, emotionally with oppressed people.

    In the cases that I was involved with around, let’s say, the slaughter that was going on in Central America in El Salvador, Guatemala, and Nicaragua at the time — I’m going to telling the jury this. I represent myself. I can give my own statements. I don’t identify with the ruling class in this country, the Ronald Reagans and the elites of either party, the fucking collaborators, whether the head of unions or head of associations or whatever they were the head. Who I identified with were the campesinos that were struggling and fighting for the own liberation in Central America, be they Mayans in Guatemala or the Sandinistas in Nicaragua. You have to have that feeling, and it’s part of what enabled me to do what I did blissfully and wish I could do more, because that’s what my love wasthat’s what my feeling was for these people. And Jonathan was like that. I mean, he was like a hero, that’s an overused word these days, but he really was, a great inspiration to us.

    UoF: It reminds me of what George said about martyrdom, that we shouldn’t cry, we should celebrate, we should only be sad that it’s taken so long for people willing to make those sacrifices to arrive. “These comrades must make the first contribution. They will be the first to fall. We gather up their bodies, clean them, kiss them and smile. Their funerals should be gala affairs, of home-brewed wine and revolutionary music to do the dance of death by. We should be sad only that it’s taken us so many generations to produce them.”

    RLL: Yeah. I’ve ran into this because I’ve done so much work around political prisoners, and it’s an abstract thing to a lot of people, and I always use the term our political prisoners, because to really be inspired enough to do any solidarity support work around political prisoners in this country, especially if you haven’t done any, you’ve got to take that first step to understand why you need to support activists when they’re imprisoned, and you look at other countries, just look at Palestine, you get a good example. They embrace their imprisoned people. They don’t marginalize them. So I always tell people, these are our political prisoners. It doesn’t mean you have to agree with every fricking thing that they did tactically or strategically or anything else. I mean, if somebody goes to prison for sabotaging the Dakota Pipeline, I may not have the same politics as them, but I totally understand what’s going on here and whose side I’m on, and then that person needs support. So I say, these are our prisoners. This is how you have to think about it. These are our prisoners.

    So when I used to look at what was happening in Central America, I’m not looking at like, oh, these foreigners down here. These are people that our struggle is meant to provide some kind of support for, to expose the truth of what’s happening to them, to expose the government’s criminal enterprise and criminal activity that’s destroying these people, taking their lives from them. You have to have that sort of heart to heart connection. It has to beyond abstract. It doesn’t mean that you have to have a gun in your hand as Jonathan did on that particular day, but it means that to be able to step up, do more work, make more sacrifices of your time, your resources — whatever you need to see people like that.

    I was doing stuff that I had never done before. The battlefield had completely changed. To me, once you get ensnared into that criminal legal system and you’re looking at trials and stuff, to me, it’s an extension of the battlefield you just leftAnd the battlefield I just left, the underground, the odds were always against us. We were always outgunned, outnumbered, outresourced. It was the David versus Goliath kind of situationI get into captivity and I realize this is an extension of that same battlefield. I’m outgunned, outnumbered, out, resourced. They’re trying to like hell to destroy me and my comrades. And so the tactics have to change, the strategy has to change, but it’s the same struggle, just on a different plane. And then when you get to prison, same thing there, it changes again and the odds to increase against you again, and you have to make it work there.

    And in prison, it always goes back to the same thing we thought about earlier, political education. I never knew a political prisoner in prison doing any kind of years that didn’t engage in political education and tried to get little groups going or exchanges, depending on the situation you were in, with people who were there for offenses that were not political, but to try to change their consciousness, especially with the youngsters.

    Of course, George is very big on this in his book. I mean, he really goes on about the importance of political education in that situation. Sam Melville was also an influence on me. I did not know Sam Melville personally, but my admiration for him stems as much, if not more, from his role in Attica than his relatively brief underground years. Although I have to admire anybody that bombed United Fruit, which he did, it goes by a different name now. But I mean, when you look at what has been designated as a genocide directed to Mayan people by the US-backed regime in Guatemala in the eighties, I mean, that’s where United Fruit was from. They owned fucking Guatemala. And so I was pleased to see that. If you’re reading Sam’s history, you realize he made some mistakes as he wasn’t real well acquainted with living and operating underground, and he stood up through all of it. I think it comes down, and this applies to Jonathan too, but Sam Melville, despite whatever personal deficiencies he had, he was a person of principle.

    I can tell you from my own experience, and when I was going into the last part of the last year that I was underground, the tenth year, the writing sort of was on the wall. Most of the underground groups that were operating on any level at all when we first went underground were decommissioned. People were in prison, some died, some just scattered. The network of groups that existed was down to very little in 1984. In fact, it only continued on into ’85 and not really beyond that.

    Part of the hopes of building something, I’m looking at it in 1984, and the people that I thought would still be there were gone, and they hadn’t been replaced. I knew then that our hopes of really setting up a network of clandestine groups, anti-imperialist clandestine groups that could go even much farther than 10 years, was almost a pipe dream at that point. But I kept going because of principle. Apartheid still existed in South Africa, and the slaughters going on in Central America were still happening. I would justify it to myself personally, I felt that as a matter of principle, I was not going to give up the struggle at that point. I was going to keep going, even if it was only based on a matter of principle, even if the material conditions were just absolutely not there anymore, beyond just basic survival to build anything more, I was still going to keep going, at least for the immediate future, which of course ended on November 4th, 1984.

    UoF: We ended the interview here. *Ray emailed us this note after:

    FYI: On the last letter, last page of Soledad Brother George writes:  

    August 9, 1970  Real Date, 2 days A.D.  

    Dear Joan, We reckon all time in the future from the day of the man-child’s death.

    We devised a dating system based on this which took an FBI counter-terrorism resource center months to figure out, simple as it is.

    In our NY trial the prosecutor presenting their closing statement to the jury brought up that 2 of our comrades/defendants had the audacity to name their son after Jonathan Jackson who kidnapped a judge, etc, etc.  His point being that these people are radical extremists who not only engage in political violence, they celebrate it.

    Download a zine version to print/fold here:

    RLL-1-1Download source: Unity of Fields

    abolitionmedia.noblogs.org/?p=

    #antiImperialism #northAmerica #resistance #unitedFreedomFront

  15. More Apple ][*, //* II* and classic Macintosh hardware upgrades

    The mini micro classic Apple emulators related post last week became way too big, so here is the classic Apple 2/Macintosh hardware upgrade part follow-up I announced in Some notes on mini/micro Apple //e emulators.

    Last week, I mentioned [Wayback/Archive] ARC Javmaster – YouTube. Let’s continue from there for an even bigger post (:

    Javmaster actually has a shop at [Wayback/Archive] Welcome to the 8-bit stuff store – 8 bit stuff cool retro computer 3D gadgets and geekery with a lot of interesting (mainly Apple ][ era related) retro things like:

    8bitstuff also pointed me to this shop with cool parts helping you fix Apple ][* and Apple //e and II* model issues: [Wayback/Archive] Shop | ReActiveMicro.com which is part of [Wayback/Archive] ReActiveMicro.com which has this great card in their catalog:

    and other hardware like:

    • Disk ][+ v1.0 kit

      USD 30-40 [Wayback/Archive] Disk ][+ – Assembled or Kit | ReActiveMicro.com

      Disk ][+ v1.0 is a small PCB that installs into Apple Disk ][ drives. It replaces the red LED in the drives with a two-color LED, to better distinguish the reading phases, in green, from the writing phases, in red. Comes assembled or in kit form.

      Notes:

      • You need one set for each drive.
      • I don’t really like the way they connect to the drive electronics, see picture below from [Wayback/Archive] Disk II+ – The ReActiveMicro Apple II Wiki . Instead of the pin, I would likely solder the wires to the electronics.

        4 hook probes connected to the Disk II analog board.

    • Apple IIe Enhancement Kit

      USD 30-35 [Wayback/Archive] IIe Enhancement Kit | ReActiveMicro.com

      Comes with an ‘Enhanced’ paper template, 65C02 CPU, and all the ROM’s necessary to upgrade your Apple IIe.

      [Wayback/Archive] Apple IIe Enhancement Kit – The ReActiveMicro Apple II Wiki

      Note it has various options (USA vs European Apple //e, plus  languages: check before you order!)

      I need to check if my Apple //e already has this enhancement kit.

    • No-Slot Clock v1.0

      USD 65 [Wayback/Archive] No-Slot Clock | ReActiveMicro.com

      The No-Slot Clock v1.0 allows your Apple II to remember the date and time. It will work on an Apple II, Apple II+, Apple IIe, Apple IIc, and Clone systems. It features dual battery holders. Two CR1025 cells included.

      The No Slot Clock does not fit in to the IIc or IIc+ with a RAM Card installed.

      [Wayback/Archive] No-Slot Clock – The ReActiveMicro Apple II Wiki

      Likely won’t needs this as ROMXe and ROMXc both include a clock.

    • Ultimate-Micro.com Apple II 3.5″ Disk Controller Card v1.0

      USD 200 [Wayback/Archive] Apple II 3.5 Disk Controller Card | ReActiveMicro.com

      This is the Apple II 3.5″ Disk Controller Card v1.0 from Ultimate-Micro.com.

      The Apple II 3.5″ Disk Controller Card v1.0 is a clone of Apple’s Apple II 3.5″ Disk Controller Card. The disk controller card allows you to use 3.5-inch floppy disk drives, including the Apple SuperDrive and Apple 3.5 Drive, with all Apple II computers. This card also supports the operation of older model Apple II UniDisk 3.5 drives.

      Not sure if I really want this one, especially with the USD 200 price tag: The Ultimate-Micro.com domain vanished and the Yellowstone Universal Disk Controller mentioned below at USD 170 (including cables) can do more.

    • Apple II A2io Bluetooth Game Port Receiver

      USD 20 [Wayback/Archive] A2io Bluetooth Game Port Receiver For Your Apple II Systems | ReActiveMicro.com

      This is the A2io Bluetooth Game Port Receiver from CraftyMech and designed by Aaron Reid. Works on all Apple II systems with a 9 pin game port.

      A2io allow you to connect and use a modern wireless game pad as either a joystick, paddle, or pad input device. You pair the game pad with your mobile device (phone/tablet/laptop) and then connect to the A2io. The mobile device acts like a translator between your Apple and game pad.

    • CFFA 300 REV C

      USD 225 [Wayback/Archive] CFFA3000 v1.0 Rev C-RM for II, II+, ///, IIe, and IIgs | ReActiveMicro.com

      This is the CFFA3000 v1.0 Rev C-RM built by ReActiveMicro under license from R&D Automation.

      The CFFA3000 v1.0 Rev C-RM Controller is a Mass Storage Device and Floppy Emulator that once installed in your Apple II system acts like a solid-state Hard Drive using Compact Flash Cards and USB Flash Drives. Floppy Emulation allows users to load .PO images as if they were physical disk. See the manual for more details. There is also discussion about adding .WOZ support, and we will post updates if/when it happens.

      Comes with CF Card as pictured, and with Remote option standard. Manual can be found here for review.

      Plug and play ready, and fully tested. Comes started with **256MB** CF Card, preloaded with several ProDOS 8 volumes with games and utilities, and several GS/OS volumes. You can select which one to boot using the on-board firmware menu (press “M” key on power up).

      [Wayback/Archive] wiki.reactivemicro.com/images/9/9d/2021-10-23-CFFA-RM_Manual.pdf

      I already have this, including the original remote back in 2014 from dreher: [Wayback/Archive] CFFA3000 Run 3: Order Status

    • CFFA3000 Remote

      USD 40 [Wayback/Archive] CFFA3000 – Remote Option With Cable | ReActiveMicro.com

      This is the CFFA3000 Remote option built by ReActiveMicro under license from R&D Automation. ***REMOTE ONLY!***
      ReActiveMicro is an authorized dealer and partner with R&D

      The CFFA3000 Remote option comes with the connector cable, which attaches to the CFFA3000 card installed in your Apple II system. It comes as pictured, with the Remote, the connection cable, and a 3D printed enclosure.

    Finally it pointed me to [Wayback/Archive] Home | JD Micro which has RAMX (for Apple ][* systems) and ROMX (variants for any Apple 2 model) for which these are most applicable to my systems (both ROMX versions also contain the fonts mentioned in their blog post [Wayback/Archive] 11th May 2021 | JD Micro):

    [Wayback/Archive] Review: ROMX+ Device for Apple II+ – YouTube

    Other results from the queries I used in the post last week also returned some hardware that can be used for classic Apple machines:

    • [Wayback/Archive] The ESP32 SoftCard for the Apple II | Applefritter

      I’ve been working on a new card for the Apple II that would extend its capabilities using my favorite Wi-Fi module: the ESP32. I decided to called it a soft card, because similarly to the original Z80 SoftCard it contains its own processor allowing it to run software not originally meant for the Apple II. And similarly to the original 80-column card that was needed, it produces its own composite video enabled through a soft switch. Both NTSC and PAL are supported and can be switched using a command. In addition it can produce 8-bit sound that is mixed and played through the Apple II speaker. For most of its applications the card also needs a FAT32 formatted microSD card.

      [Wayback/Archive] ESP32 SoftCard Expansion Card for the Apple II from CVT on Tindie

      ESP32 SoftCard Expansion Card for the Apple II

    • [Wayback/Archive] Apple2idiot card (ESP32) | Applefritter

      It is an interesting and different take on interfacing an ESP32 module to an Apple II. It uses a dual ported SRAM instead of trying to interface the ESP32 to the Apple II bus using something like 74LVC245s or through a parallel chip like a 6522 or 82C55 or through a serial chip like a 6551 or 6850.

      https://github.com/equant/apple2idiot

      [Wayback/Archive] GitHub – equant/apple2idiot: A general purpose ESP32 IOT board for the Apple IIe

    • assembly lines

      [Wayback/Archive] Shop – CT6502 and [Wayback/Archive] Shop – Page 2 of 2 – CT6502a

      • [Wayback/Archive] Assembly Lines: The Mug – CT6502
        Assembly Lines: The Mug; Print-on-demand from Printful.

        Mug; handle left

        Mug; handle behind

        Mug; handle right

        This is a really cool idea including the Choplifter and Lode Runner main sprites on the mug. The right picture shows you can also get it in 15oz size.

      • Apple II wDrive Disk Drive Emulator

        [Wayback/Archive] Apple II wDrive Disk Drive Emulator – CT6502

        The wDrive is a disk drive emulator for the Apple II (II+, IIe, IIc, IIGS) that boots disk images (WOZ, DSK, 2MG, HDV, etc) from an SD card.

        Manufacturer: [Wayback/Archive] Mfa2 Workshop

        We are developer of wDrive, softSP card and related accessories which are published through Kboo HK

        [email protected]

        Note it there are two options to choose from:

        • USD ~80: wDrive only (Apple IIc and IIGS)
        • USD ~100: wDrive plus SoftSP card (Apple II, II+, IIe)

        The second option includes this one:

      • MFA2 SoftSP Card

        [Wayback/Archive] Apple II MFA2 SoftSP Card wDrive or FujiNet – CT6502

        The SoftSP card allows you to boot hard disk images or use FujiNet devices on an Apple II+ or IIe, which do not have SmartPort support.

        The SoftSP card is not needed on the Apple IIc or Apple IIGS.

        The SoftSP card should be placed into a slot lower than the wDrive disk controller card. Slot 1 or 2 usually works well.

        Note: The SoftSP card will also work with the FloppyEMU. However, you MUST use a special drive cable that isolates pin 12, to avoid damaging your FloppyEMU. You do not need to use this cable with the wDrive, although it won’t cause any issues if you do. You can find details about the issue here.

        That last bit is really really important as SoftSP only can be installed in a system that also connects to a FloppyEMU under these circumstances:

        • Connect the FloppyEMU to a Yellowstone is a universal disk controller card for Apple II computers (see below), especially since the Yellowstone also supports both wDrive and FujiNet.
        • Connect the FloppyEMU to an original Disk Controller, but cut wire #12 as explained in [Wayback/Archive] Floppy Emu SoftSP Warning | Big Mess o’ Wires

          You can’t safely connect a Smartport device to a Disk II controller card, no matter how the card’s internal logic might be modified. That includes Floppy Emu when it’s configured in Smartport emulation mode. The reason is that Smartport devices connect pin 12 internally to ground. This is how other connected equipment and daisy-chained drives know that they’re Smartport drives, and it’s essential for correct daisy-chain operation of Smartport drives with the BMOW Daisy Chainer or the Apple Unidisk 3.5 drive.

        Both options essentially makes the SoftSP unneeded for FloppyEMU, and with this signalling problem for wire #12 (which is the SmartPort compatibility indicator) I am not sure which other SmartPort devices besides wDrive will actually work with the Apple ][, Apple ][+ and Apple //e without damaging the SmartPort device.

      • a
      • a
    • a

    Another shop via [Wayback/Archive] Big Mess o’ Wires -> [Wayback/Archive] Big Mess o’ Wires Store

    Bring new life to your classic computer

    From disk emulators to ROM upgrades, keyboard and mouse adapters, and more hardware creations, BMOW has your retrocomputer needs covered.

    • Yellowstone Universal Disk Controller Card and two DB-19 female adapters

      [Wayback/Archive] Yellowstone Disk Controller Everything Bundle – Big Mess o’ Wires

      Yellowstone is a universal disk controller card for Apple II computers. It supports nearly every type of Apple disk drive ever made, including standard 3.5 inch drives, 5.25 inch drives, smart drives like the Unidisk 3.5 and the BMOW Floppy Emu’s smartport hard disk, and even Macintosh 3.5 inch drives. Yellowstone combines the power of an Apple 3.5 Disk Controller Card, a standard 5.25 inch Disk II controller card, the Apple Liron controller, and more, all in a single card.

      The “everything” bundle includes the latest version Yellowstone Universal Disk Controller Card and two DB-19 female adapters

      • [Wayback/Archive] Yellowstone: Cloning the Apple II Liron | Big Mess o’ Wires

        The “Liron” disk controller was introduced by Apple in 1985. More formally known as the Apple II UniDisk 3.5 Controller, it’s designed to work with a new generation of “smart” disk drives more sophisticated than the venerable Disk II 5.25 inch floppy drive. The smart disk port on the Liron is appropriately named the Smartport, and it can communicate with block-based storage devices such as the Unidisk 3.5 (an early 800K drive) and Smartport-based Apple II hard drives.
        Why care about the Liron? The Apple IIc and Apple IIgs have integrated disk ports with built-in Smartport functionality, but for the earlier Apple II+ and IIe, the Liron is the only way to get a Smartport. For owners of the BMOW Floppy Emu disk emulator, the Liron card makes it possible to use the Floppy Emu as an external hard drive for the II+ and IIe. Unfortunately finding a Liron is difficult, and although they occasionally turn up on eBay, they’re quite expensive. That made cloning the Liron a logical first goal.

      • [Wayback/Archive] Yellowstone Universal Disk Controller – Big Mess o’ Wires

        Article: [Wayback/Archive] Yellowstone Universal Disk Controller for Apple II | Big Mess o’ Wires – Run any disk drive with your Apple II computer!

        Supported Drives

        Need to attach a disk drive to your Apple II? Yellowstone has got you covered. Yellowstone is compatible with the Apple IIe, Apple IIgs, Apple II+, Apple II, and most Apple II clones. It works with these disk drives and drive emulators:

        Can be connected directlyDisk II A2M0003Naked Apple 3.5” 800K, black labelNaked half-height Apple 5.25″Naked Apple 3.5” 800K, red labelFloppy Emu 5.25 modeNaked Apple 3.5” 1.44MB, auto-injectFloppy Emu Model C dual 5.25 modeNaked Apple 3.5” 1.44MB, manual-injectFloppy Emu 3.5 modewDriveFloppy Emu Unidisk 3.5 mode [1]Floppy Emu Smartport hard disk mode [1]And more…Requires optional DB-19F connectorUnidisk 5.25 A9M0104Macintosh 800K External M0131Disk IIc A2M4050Apple SuperDrive (Apple FDHD Drive) G7287Duo Disk 5.25 A9M0108Unidisk 3.5 A2M2053 [1]AppleDisk 5.25 A9M01075Applied Engineering 3.5 [2]Laser FD100 5.25Apple 3.5 Drive A9M0106And more…

        [1] smart drive
        [2] partial compatibility

        When using 3.5 inch drives, Yellowstone is compatible with Apple II standard 800K double-sided double-density disk media.

        A naked drive is a bare drive mechanism without any enclosure, such as an internal drive taken from a Macintosh, Apple IIc, or Apple IIc+.

        Yes, pull the internal 3.5 inch drive from an old Mac and use it directly with your Apple II!

        This brought back Applied Engineering memories (:

      • [Wayback/Archive] Yellowstone DB-19 Female Disk Adapter – Big Mess o’ Wires

        The adapter includes a six inch ribbon cable and a detachable mini-board that converts the ribbon cable connector into a DB-19 female shape.

        This adapter has custom wiring that’s specifically designed for use with Yellowstone, and should not be used with other disk hardware.

        Can be connected directly to Yellowstone boardApple Disk II A2M0003BMOW Floppy EmuNaked Apple 5.25” DriveswDriveNaked Apple 3.5” DrivesRequires Yellowstone DB-19F adapterUnidisk 5.25 A9M0104Macintosh 800K External M0131Disk IIc A2M4050Apple SuperDrive (Apple FDHD Drive) G7287Duo Disk 5.25 A9M0108Unidisk 3.5 A2M2053AppleDisk 5.25 A9M01075Applied Engineering 3.5Apple 3.5 Drive A9M0106Laser FD100 5.25 A naked drive is a bare drive mechanism without any enclosure, such as an internal drive taken from a Macintosh, Apple IIc, or Apple IIc+.

        (note that’s a ~15 cm ribbon cable)

      • [Wayback/Archive] Yellowstone Back From the Dead | Big Mess o’ Wires
    • Floppy Emu Model C Deluxe Bundle

      USD 130 [Wayback/Archive] Floppy Emu Model C Deluxe Bundle – Big Mess o’ Wires

      The BMOW Floppy Emu is a disk emulator for classic Apple II, Macintosh, and Lisa computers.

      The bundle includes:

      • Floppy Emu Model C
      • Frosted Ice Acrylic Case
      • Vintage Apple Software Collection SD Card
      • Full-Size SD Adapter
      • Disk Extension Cable

      [Wayback/Archive] BMOW Floppy EMU for Vintage Apple Computers! | Mastergeko4 – YouTube shot at the time the YouTuber was quite a novice, which brought back memories of me being young and figuring out things by fiddling with them and bumping my head against walls (:

    • Noisy Disk Mechanical Sounder with 2 ribbon cables attached

      USD 20 [Wayback/Archive] Noisy Disk Mechanical Sounder – Big Mess o’ Wires

      Noisy Disk uses a mechanical relay to create authentic-sounding mechanical stepping sounds for disk head movements for your Floppy Emu disk emulator’s virtual 5.25 inch floppy disk.

      Nothing will be harmed if Noisy Disk is used with other computers or emulation modes, but you’ll hear strange clacking noises that don’t match the disk activity.

      The product includes the Noisy Disk board with 2 x 10 pin rectangular input and output connectors, and a 6-inch extension cable for connecting to your Floppy Emu board.

      This likely sounds exactly like the more expensive Disk Clicker which was reviewed at [Wayback/Archive] Testing the New Classic Floppy Clicker on Apple Floppy Emulator – Authentic Retro Sounds! – YouTube and sold at [Wayback/Archive] Disk Clicker – 8bitdevices.com

    • Internal/External Drive Switcher for Apple IIc

      USD 25 [Wayback/Archive] Internal/External Drive Switcher for Apple IIc – Big Mess o’ Wires

      At the flip of a switch, select which Apple IIc floppy drives should act as Drive 1 and Drive 2. Add support for dual external 5.25 inch floppy emulation. For the Apple IIc with the Floppy Emu disk emulator.

      [Wayback/Archive] Internal/External Drive Switcher for Apple IIc | Big Mess o’ Wires

      This is a two-part device: a signal tap that should be installed inside the Apple IIc, and a modified DB19 adapter with two slide switches for the external connection. Two female-female jumper wires are passed through a gap in the case to make the connection between the two parts.

    • Daisy Chainer Disk Coupler

      USD 45 [Wayback/Archive] Daisy Chainer Disk Coupler – Big Mess o’ Wires

      Link the Floppy Emu disk emulator into a daisy chain with other Apple II disk drives. For use with Floppy Emu Model B and C.

      In order to work correctly, Apple II computers require daisy chained drives to be connected in a specific order:

      1. any 3.5 inch drives must go first in the chain
      2. Smartport and Unidisk 3.5 inch drives must go second
      3. any 5.25 inch drives must go last

      There can be at most two drives of each type, six drives total.

      There are two primary firmware versions for the Floppy Emu: normal firmware and Smartport daisy chain SPDC firmware. When using a Floppy Emu with the Daisy Chainer, the SPDC firmware is required if your Emu is configured to emulate a Smartport Hard Disk or a Unidisk 3.5. In all other cases, the normal firmware should be used.

      [Wayback/Archive] Floppy Emu Update: Smartport Daisy-Chain Support | Big Mess o’ Wires

      Most people should use the normal firmware version, and it’s the default for newly-purchased hardware. The Smartport daisy chain firmware version is only needed in uncommon situations when:

      1. The Floppy Emu’s selected emulation mode is Smartport Hard Disk, Smartport Unit 2, or Unidisk 3.5AND

      2. The Floppy Emu is plugged into the back of a BMOW Daisy Chainer or to the Apple Unidisk 3.5 drive, A2M2053.

      The wiki.apple2.org died, so here are archived links: [Wayback/Archive] wiki.apple2.org: A2 3.5 Drives -> Apple UniDisk 3.5 (A2M2053)

      Daisy Chainer clear acrylic case

      Oh: there is also this one for it:

    • USD 10 [Wayback/Archive] Clear Acrylic Case for Daisy Chainer – Big Mess o’ Wires

      A clear acrylic case to protect and showcase your Daisy Chainer board. These custom-made Daisy Chainer cases protect your board in style!

      This is a top-and-bottom “plate” style case with open sides. Assembly takes about 5 minutes.

    • Apple Disk Drive A/B Switch

      USD 20 [Wayback/Archive] Apple Disk Drive A/B Switch – Big Mess o’ Wires

      Select between a Floppy Emu and a real floppy drive at the flip of a switch. Includes switch module and one 3 foot 20-pin ribbon cable.

      For Lisa computer owners, and Macs with only one internal floppy connector, disk drive emulation can be awkward sometimes. The Apple Disk Drive A/B Switch aims to eliminate that awkwardness. This accessory makes it possible to attach a Floppy Emu and a real floppy disk drive at the same time, and select between them with a switch. Both drives will be powered, but the computer will only “see” one drive at a time, depending on the switch position.

      ⚠ Do not use Floppy Emu’s Dual 5.25 mode in combination with the A/B Switch. It will cause disk errors and may damage the Floppy Emu or your other 5.25 inch drive.

    Macintosh specific stuff from BMOW:

    Then there is a shop on the Cayman Islands that ships world wide and has both the Mac ROM SIMM and the Mac ROMM SIMM programmer:

    And there is [Wayback/Archive] a2heaven: For everyone who still loves and uses old computers.:

    • Liron Reborn

      USD 60 [Wayback/Archive] Liron Reborn

      Liron Reborn is a Samrt Port / Disk II controller card for Apple II/IIe computers.

      It is a functional hardware compatible Liron clone , with original Liron card Firmware.

      A difference from Original Liron card is that card can be used as a a standard 5.25 inch (Disk II) controller or Liron ( SmartPort ) card .

      I likely won’t need this as the Yellowstone card looks way more promising

    • FASTChip //e – 65C02

      USD 150 [Wayback/Archive] FASTChip //e – 65C02

      The FASTChip //e accelerates the Apple //e™ by replacing the on-board microprocessor with a much faster one. Because the memory on the Apple //e™ can only run at a 1 MHz speed maximum, faster memory (SRAM) must be provided to increase performance and allow the 65C02/65C816 CPU to run at full speed.

      To do this, the FASTChip //e contains 512KB/1024KB of fast SRAM memory. The clever design allows the acceleration of programs running in both main and auxiliary memory. The additional FASTChip //e memory can emulate both 192/448 KB fast RamWorks compatible RAM and 256/512 KB fast RamFactor (slinky) compatible RAM.

      [Wayback/Archive] REVIEW: FastChip //e Accellerator by A2Heaven – YouTube

    • 65C816->65C02 Board

      USD 35 [Wayback/Archive] 65C816->65C02 Board

      You can use 65C816->65C02 board to connect 65C816 CPU to your Apple II computer .

      * This board was based on Daryl Rictor’s original design. More information can be found here: sbc.rictor.org/support/conv.html

      [Wayback/Archive] 65816 to 6502 converter by Daryl Rictor.

    • DB19 to IDC20

      USD 11 [Wayback/Archive] DB19 to IDC20 Floppy Disk adapter

      DB19 to IDC20 Floppy Disk adapter

      directly connect IDC20 Pin Cable  connector to the 19-pin port of Apple IIc, or to a floppy controller with a 19-pin connector

      Probably cheaper to use the package deals from BMOW

    • IDC20 to DB19 cable adapter

      USD 13 [Wayback/Archive] IDC20 to DB19 cable adapter

      The product is designed to be directly connect IDC20 pin connector to the DB19 pin port .

      Likely the combo from BMOW is cheaper.

      TrackStar II

       

    • USD 75 [Wayback/Archive] TRAK STAR II

      Readout of Disk Drive head position .

      Constant Digital Readout of Disk Drive head position .

      Work with any 5″ Apple II compatible Drive .
      Display Full , Half and Quarter track head position .

      Nice idea, but has not been in stock for a long time and feels overpriced.

    • Quadlink Clone Kit

      USD 160 [Wayback/Archive] Quadlink Clone Kit

      It’s an ISA expansion card from the ’80s designed to turn your IBM PC (such as a 5150 or 5160) into an Apple ][! After booting and running the software, you can switch quickly between PC and Apple mode using Ctrl-Alt-A (for Apple) and Ctrl-Alt-P (for PC).

      Kit contain all PCB , passive components and chips needed to build working Quadlink Clone .

      [Wayback/Archive] GitHub – schlae/quapple: Quadlink clone turns your ancient IBM PC into an Apple ][

      Only useful if I find back an ISA compatible PC.

    • 3D Stickers set

      USD 10 [Wayback/Archive] 3D Stickers set

      Apple II logo and Disk II label sticker set .

      Actually this is quite a nice idea, despite them having been out of stock like forever.

    • RamFactor1M

      USD 85 [Wayback/Archive] RamFactor1M

      RamFactor1M is based on Aplied Engineering RAMFactor card ( firmware is same as original ), however it uses more modern low power 1MB SRAM and can provided battery backup up to 1-2 Year with small CR2032 Battery.

      The battery is for backup data (just like PowerFactor from Aplied Engineering ) and can be used as Solid State Disk.

      This is a trip down memory lane, though back then school could not afford these.

    • Apple II Slot Extender

      USD 40 [Wayback/Archive] Apple II Slot Extender

      The Apple II slot extender allows you to easily and freely test the functionality and repair your Apple II cards outside of the computer.

      You can also turn off voltages that aren’t necessary for the card to work to prevent testing errors.

      Package include

      • 1 x Apple II extender PCB bottom
      • 1 x Apple II extender PCB Top
      • 1 x 50 pin Flat ribbon cable with 0.5m length ( contact me if you want a longer cable )
    • a
    • a
    • a
    • a
    • a
    • a
    • a
    • a

    One more shop (: I think I found it searching for [Wayback/Archive] BlueSCSI, but anyway at [Wayback/Archive] Shop – Joe’s Computer Museum, focussing on [Wayback/Archive] Apple //e Archives – Joe’s Computer Museum I found these interesting items:

    For all shops: I didn’t list all of their items, just the ones that I might use in the future.

    An interesting device I did not know about either was the FujiNet one: it is fully open source! One thing to check out is where to order pre-assembled ones for Apple II series.

    • [Wayback/Archive] FujiNet · GitHub
      FujiNet is a multi-peripheral emulator and WiFi network device for vintage computers. The first completed hardware was for the Atari 8-Bit line of computers and development has begun for other systems (Coleco ADAM, Apple II, Commodore 64, Atari Lynx, ZX Spectrum and more) with the goal of supporting as many old systems as possible. What sets FujiNet apart from other WiFi devices is the new Network Device (the N Device). The N device allows vintage computers that do not have enough processing power to handle TCP/IP connections themselves to talk to the modern internet over WiFi. Virtual adapters have been created for many protocols including: TCP, UDP, HTTP, FTP, TNFS, HTTPS (SSL/TLS), SSH, TELNET, WebDAV and JSON parser. The FujiNet project is 100% completely open source, software and hardware. All code and schematics are available here.
    • [Wayback/Archive] FutureVision Research was the only shop I found selling them, but I probably overlooked others.
      • [Wayback/Archive] FujiNet – FutureVision Research
      • Apple II/III FujiNet w/ accesoiries

        USD 110 [Wayback/Archive] FujiNet for Apple II & III (With Accessories) – FutureVision Research

        The FujiApple Rev1.1 for SmartPort enabled Apple II computers emulates SmartPort drives, Disk II drives (read only), CP/M, Clock, Modem, and a new Network Device. Disk images can be mounted directly from the internet via TNFS servers or from the onboard MicroSD socket*. The Network device enables access to Internet protocols such as HTTP, HTTPS, TNFS, SSH, TCP, UDP and more.

        This kit comes with the following (ribbon cable color may be gray or rainbow depending on availability):
        • FujiNet for Apple II & III
        • DB-19 to IDC20 Female adapter
        • 30cm IDC20 Female to Male cable
        • 30cm IDC20 Female to Female cable
        • DB-19 spacer
        • Two different lengths of thumbscrews
          • Two 1.375″ thumbscrews for use with IIe/III
          • Two 1.5″ thumbscrews for use with IIc/gs/+

        The page contains many more helpful information and links.

     

    ………………………………………………………………………………………………………………………………………………………………………………………………

    Some non-shop links

    An external monitor on a Macingosh SE/30

    Mac SE/30 and Macintosh Classic

    Since I own both a Macintosh SE/30 and a Macintosh Classic, these are relevant too:

    Queries

    I used additional queries than the first blog post to complete this blog post. Here they are:

    --jeroen

     

     

     

     

     

     

     

    Rate this:

    #12 #156 #25 #3dprint #3dprinting #4 #Apple #appleiigs #AprilApples

  16. More Apple ][*, //* II* and classic Macintosh hardware upgrades

    The mini micro classic Apple emulators related post last week became way too big, so here is the classic Apple 2/Macintosh hardware upgrade part follow-up I announced in Some notes on mini/micro Apple //e emulators.

    Last week, I mentioned [Wayback/Archive] ARC Javmaster – YouTube. Let’s continue from there for an even bigger post (:

    Javmaster actually has a shop at [Wayback/Archive] Welcome to the 8-bit stuff store – 8 bit stuff cool retro computer 3D gadgets and geekery with a lot of interesting (mainly Apple ][ era related) retro things like:

    8bitstuff also pointed me to this shop with cool parts helping you fix Apple ][* and Apple //e and II* model issues: [Wayback/Archive] Shop | ReActiveMicro.com which is part of [Wayback/Archive] ReActiveMicro.com which has this great card in their catalog:

    and other hardware like:

    • Disk ][+ v1.0 kit

      USD 30-40 [Wayback/Archive] Disk ][+ – Assembled or Kit | ReActiveMicro.com

      Disk ][+ v1.0 is a small PCB that installs into Apple Disk ][ drives. It replaces the red LED in the drives with a two-color LED, to better distinguish the reading phases, in green, from the writing phases, in red. Comes assembled or in kit form.

      Notes:

      • You need one set for each drive.
      • I don’t really like the way they connect to the drive electronics, see picture below from [Wayback/Archive] Disk II+ – The ReActiveMicro Apple II Wiki . Instead of the pin, I would likely solder the wires to the electronics.

        4 hook probes connected to the Disk II analog board.

    • Apple IIe Enhancement Kit

      USD 30-35 [Wayback/Archive] IIe Enhancement Kit | ReActiveMicro.com

      Comes with an ‘Enhanced’ paper template, 65C02 CPU, and all the ROM’s necessary to upgrade your Apple IIe.

      [Wayback/Archive] Apple IIe Enhancement Kit – The ReActiveMicro Apple II Wiki

      Note it has various options (USA vs European Apple //e, plus  languages: check before you order!)

      I need to check if my Apple //e already has this enhancement kit.

    • No-Slot Clock v1.0

      USD 65 [Wayback/Archive] No-Slot Clock | ReActiveMicro.com

      The No-Slot Clock v1.0 allows your Apple II to remember the date and time. It will work on an Apple II, Apple II+, Apple IIe, Apple IIc, and Clone systems. It features dual battery holders. Two CR1025 cells included.

      The No Slot Clock does not fit in to the IIc or IIc+ with a RAM Card installed.

      [Wayback/Archive] No-Slot Clock – The ReActiveMicro Apple II Wiki

      Likely won’t needs this as ROMXe and ROMXc both include a clock.

    • Ultimate-Micro.com Apple II 3.5″ Disk Controller Card v1.0

      USD 200 [Wayback/Archive] Apple II 3.5 Disk Controller Card | ReActiveMicro.com

      This is the Apple II 3.5″ Disk Controller Card v1.0 from Ultimate-Micro.com.

      The Apple II 3.5″ Disk Controller Card v1.0 is a clone of Apple’s Apple II 3.5″ Disk Controller Card. The disk controller card allows you to use 3.5-inch floppy disk drives, including the Apple SuperDrive and Apple 3.5 Drive, with all Apple II computers. This card also supports the operation of older model Apple II UniDisk 3.5 drives.

      Not sure if I really want this one, especially with the USD 200 price tag: The Ultimate-Micro.com domain vanished and the Yellowstone Universal Disk Controller mentioned below at USD 170 (including cables) can do more.

    • Apple II A2io Bluetooth Game Port Receiver

      USD 20 [Wayback/Archive] A2io Bluetooth Game Port Receiver For Your Apple II Systems | ReActiveMicro.com

      This is the A2io Bluetooth Game Port Receiver from CraftyMech and designed by Aaron Reid. Works on all Apple II systems with a 9 pin game port.

      A2io allow you to connect and use a modern wireless game pad as either a joystick, paddle, or pad input device. You pair the game pad with your mobile device (phone/tablet/laptop) and then connect to the A2io. The mobile device acts like a translator between your Apple and game pad.

    • CFFA 300 REV C

      USD 225 [Wayback/Archive] CFFA3000 v1.0 Rev C-RM for II, II+, ///, IIe, and IIgs | ReActiveMicro.com

      This is the CFFA3000 v1.0 Rev C-RM built by ReActiveMicro under license from R&D Automation.

      The CFFA3000 v1.0 Rev C-RM Controller is a Mass Storage Device and Floppy Emulator that once installed in your Apple II system acts like a solid-state Hard Drive using Compact Flash Cards and USB Flash Drives. Floppy Emulation allows users to load .PO images as if they were physical disk. See the manual for more details. There is also discussion about adding .WOZ support, and we will post updates if/when it happens.

      Comes with CF Card as pictured, and with Remote option standard. Manual can be found here for review.

      Plug and play ready, and fully tested. Comes started with **256MB** CF Card, preloaded with several ProDOS 8 volumes with games and utilities, and several GS/OS volumes. You can select which one to boot using the on-board firmware menu (press “M” key on power up).

      [Wayback/Archive] wiki.reactivemicro.com/images/9/9d/2021-10-23-CFFA-RM_Manual.pdf

      I already have this, including the original remote back in 2014 from dreher: [Wayback/Archive] CFFA3000 Run 3: Order Status

    • CFFA3000 Remote

      USD 40 [Wayback/Archive] CFFA3000 – Remote Option With Cable | ReActiveMicro.com

      This is the CFFA3000 Remote option built by ReActiveMicro under license from R&D Automation. ***REMOTE ONLY!***
      ReActiveMicro is an authorized dealer and partner with R&D

      The CFFA3000 Remote option comes with the connector cable, which attaches to the CFFA3000 card installed in your Apple II system. It comes as pictured, with the Remote, the connection cable, and a 3D printed enclosure.

    Finally it pointed me to [Wayback/Archive] Home | JD Micro which has RAMX (for Apple ][* systems) and ROMX (variants for any Apple 2 model) for which these are most applicable to my systems (both ROMX versions also contain the fonts mentioned in their blog post [Wayback/Archive] 11th May 2021 | JD Micro):

    [Wayback/Archive] Review: ROMX+ Device for Apple II+ – YouTube

    Other results from the queries I used in the post last week also returned some hardware that can be used for classic Apple machines:

    • [Wayback/Archive] The ESP32 SoftCard for the Apple II | Applefritter

      I’ve been working on a new card for the Apple II that would extend its capabilities using my favorite Wi-Fi module: the ESP32. I decided to called it a soft card, because similarly to the original Z80 SoftCard it contains its own processor allowing it to run software not originally meant for the Apple II. And similarly to the original 80-column card that was needed, it produces its own composite video enabled through a soft switch. Both NTSC and PAL are supported and can be switched using a command. In addition it can produce 8-bit sound that is mixed and played through the Apple II speaker. For most of its applications the card also needs a FAT32 formatted microSD card.

      [Wayback/Archive] ESP32 SoftCard Expansion Card for the Apple II from CVT on Tindie

      ESP32 SoftCard Expansion Card for the Apple II

    • [Wayback/Archive] Apple2idiot card (ESP32) | Applefritter

      It is an interesting and different take on interfacing an ESP32 module to an Apple II. It uses a dual ported SRAM instead of trying to interface the ESP32 to the Apple II bus using something like 74LVC245s or through a parallel chip like a 6522 or 82C55 or through a serial chip like a 6551 or 6850.

      https://github.com/equant/apple2idiot

      [Wayback/Archive] GitHub – equant/apple2idiot: A general purpose ESP32 IOT board for the Apple IIe

    • assembly lines

      [Wayback/Archive] Shop – CT6502 and [Wayback/Archive] Shop – Page 2 of 2 – CT6502a

      • [Wayback/Archive] Assembly Lines: The Mug – CT6502
        Assembly Lines: The Mug; Print-on-demand from Printful.

        Mug; handle left

        Mug; handle behind

        Mug; handle right

        This is a really cool idea including the Choplifter and Lode Runner main sprites on the mug. The right picture shows you can also get it in 15oz size.

      • Apple II wDrive Disk Drive Emulator

        [Wayback/Archive] Apple II wDrive Disk Drive Emulator – CT6502

        The wDrive is a disk drive emulator for the Apple II (II+, IIe, IIc, IIGS) that boots disk images (WOZ, DSK, 2MG, HDV, etc) from an SD card.

        Manufacturer: [Wayback/Archive] Mfa2 Workshop

        We are developer of wDrive, softSP card and related accessories which are published through Kboo HK

        [email protected]

        Note it there are two options to choose from:

        • USD ~80: wDrive only (Apple IIc and IIGS)
        • USD ~100: wDrive plus SoftSP card (Apple II, II+, IIe)

        The second option includes this one:

      • MFA2 SoftSP Card

        [Wayback/Archive] Apple II MFA2 SoftSP Card wDrive or FujiNet – CT6502

        The SoftSP card allows you to boot hard disk images or use FujiNet devices on an Apple II+ or IIe, which do not have SmartPort support.

        The SoftSP card is not needed on the Apple IIc or Apple IIGS.

        The SoftSP card should be placed into a slot lower than the wDrive disk controller card. Slot 1 or 2 usually works well.

        Note: The SoftSP card will also work with the FloppyEMU. However, you MUST use a special drive cable that isolates pin 12, to avoid damaging your FloppyEMU. You do not need to use this cable with the wDrive, although it won’t cause any issues if you do. You can find details about the issue here.

        That last bit is really really important as SoftSP only can be installed in a system that also connects to a FloppyEMU under these circumstances:

        • Connect the FloppyEMU to a Yellowstone is a universal disk controller card for Apple II computers (see below), especially since the Yellowstone also supports both wDrive and FujiNet.
        • Connect the FloppyEMU to an original Disk Controller, but cut wire #12 as explained in [Wayback/Archive] Floppy Emu SoftSP Warning | Big Mess o’ Wires

          You can’t safely connect a Smartport device to a Disk II controller card, no matter how the card’s internal logic might be modified. That includes Floppy Emu when it’s configured in Smartport emulation mode. The reason is that Smartport devices connect pin 12 internally to ground. This is how other connected equipment and daisy-chained drives know that they’re Smartport drives, and it’s essential for correct daisy-chain operation of Smartport drives with the BMOW Daisy Chainer or the Apple Unidisk 3.5 drive.

        Both options essentially makes the SoftSP unneeded for FloppyEMU, and with this signalling problem for wire #12 (which is the SmartPort compatibility indicator) I am not sure which other SmartPort devices besides wDrive will actually work with the Apple ][, Apple ][+ and Apple //e without damaging the SmartPort device.

      • a
      • a
    • a

    Another shop via [Wayback/Archive] Big Mess o’ Wires -> [Wayback/Archive] Big Mess o’ Wires Store

    Bring new life to your classic computer

    From disk emulators to ROM upgrades, keyboard and mouse adapters, and more hardware creations, BMOW has your retrocomputer needs covered.

    • Yellowstone Universal Disk Controller Card and two DB-19 female adapters

      [Wayback/Archive] Yellowstone Disk Controller Everything Bundle – Big Mess o’ Wires

      Yellowstone is a universal disk controller card for Apple II computers. It supports nearly every type of Apple disk drive ever made, including standard 3.5 inch drives, 5.25 inch drives, smart drives like the Unidisk 3.5 and the BMOW Floppy Emu’s smartport hard disk, and even Macintosh 3.5 inch drives. Yellowstone combines the power of an Apple 3.5 Disk Controller Card, a standard 5.25 inch Disk II controller card, the Apple Liron controller, and more, all in a single card.

      The “everything” bundle includes the latest version Yellowstone Universal Disk Controller Card and two DB-19 female adapters

      • [Wayback/Archive] Yellowstone: Cloning the Apple II Liron | Big Mess o’ Wires

        The “Liron” disk controller was introduced by Apple in 1985. More formally known as the Apple II UniDisk 3.5 Controller, it’s designed to work with a new generation of “smart” disk drives more sophisticated than the venerable Disk II 5.25 inch floppy drive. The smart disk port on the Liron is appropriately named the Smartport, and it can communicate with block-based storage devices such as the Unidisk 3.5 (an early 800K drive) and Smartport-based Apple II hard drives.
        Why care about the Liron? The Apple IIc and Apple IIgs have integrated disk ports with built-in Smartport functionality, but for the earlier Apple II+ and IIe, the Liron is the only way to get a Smartport. For owners of the BMOW Floppy Emu disk emulator, the Liron card makes it possible to use the Floppy Emu as an external hard drive for the II+ and IIe. Unfortunately finding a Liron is difficult, and although they occasionally turn up on eBay, they’re quite expensive. That made cloning the Liron a logical first goal.

      • [Wayback/Archive] Yellowstone Universal Disk Controller – Big Mess o’ Wires

        Article: [Wayback/Archive] Yellowstone Universal Disk Controller for Apple II | Big Mess o’ Wires – Run any disk drive with your Apple II computer!

        Supported Drives

        Need to attach a disk drive to your Apple II? Yellowstone has got you covered. Yellowstone is compatible with the Apple IIe, Apple IIgs, Apple II+, Apple II, and most Apple II clones. It works with these disk drives and drive emulators:

        Can be connected directlyDisk II A2M0003Naked Apple 3.5” 800K, black labelNaked half-height Apple 5.25″Naked Apple 3.5” 800K, red labelFloppy Emu 5.25 modeNaked Apple 3.5” 1.44MB, auto-injectFloppy Emu Model C dual 5.25 modeNaked Apple 3.5” 1.44MB, manual-injectFloppy Emu 3.5 modewDriveFloppy Emu Unidisk 3.5 mode [1]Floppy Emu Smartport hard disk mode [1]And more…Requires optional DB-19F connectorUnidisk 5.25 A9M0104Macintosh 800K External M0131Disk IIc A2M4050Apple SuperDrive (Apple FDHD Drive) G7287Duo Disk 5.25 A9M0108Unidisk 3.5 A2M2053 [1]AppleDisk 5.25 A9M01075Applied Engineering 3.5 [2]Laser FD100 5.25Apple 3.5 Drive A9M0106And more…

        [1] smart drive
        [2] partial compatibility

        When using 3.5 inch drives, Yellowstone is compatible with Apple II standard 800K double-sided double-density disk media.

        A naked drive is a bare drive mechanism without any enclosure, such as an internal drive taken from a Macintosh, Apple IIc, or Apple IIc+.

        Yes, pull the internal 3.5 inch drive from an old Mac and use it directly with your Apple II!

        This brought back Applied Engineering memories (:

      • [Wayback/Archive] Yellowstone DB-19 Female Disk Adapter – Big Mess o’ Wires

        The adapter includes a six inch ribbon cable and a detachable mini-board that converts the ribbon cable connector into a DB-19 female shape.

        This adapter has custom wiring that’s specifically designed for use with Yellowstone, and should not be used with other disk hardware.

        Can be connected directly to Yellowstone boardApple Disk II A2M0003BMOW Floppy EmuNaked Apple 5.25” DriveswDriveNaked Apple 3.5” DrivesRequires Yellowstone DB-19F adapterUnidisk 5.25 A9M0104Macintosh 800K External M0131Disk IIc A2M4050Apple SuperDrive (Apple FDHD Drive) G7287Duo Disk 5.25 A9M0108Unidisk 3.5 A2M2053AppleDisk 5.25 A9M01075Applied Engineering 3.5Apple 3.5 Drive A9M0106Laser FD100 5.25 A naked drive is a bare drive mechanism without any enclosure, such as an internal drive taken from a Macintosh, Apple IIc, or Apple IIc+.

        (note that’s a ~15 cm ribbon cable)

      • [Wayback/Archive] Yellowstone Back From the Dead | Big Mess o’ Wires
    • Floppy Emu Model C Deluxe Bundle

      USD 130 [Wayback/Archive] Floppy Emu Model C Deluxe Bundle – Big Mess o’ Wires

      The BMOW Floppy Emu is a disk emulator for classic Apple II, Macintosh, and Lisa computers.

      The bundle includes:

      • Floppy Emu Model C
      • Frosted Ice Acrylic Case
      • Vintage Apple Software Collection SD Card
      • Full-Size SD Adapter
      • Disk Extension Cable

      [Wayback/Archive] BMOW Floppy EMU for Vintage Apple Computers! | Mastergeko4 – YouTube shot at the time the YouTuber was quite a novice, which brought back memories of me being young and figuring out things by fiddling with them and bumping my head against walls (:

    • Noisy Disk Mechanical Sounder with 2 ribbon cables attached

      USD 20 [Wayback/Archive] Noisy Disk Mechanical Sounder – Big Mess o’ Wires

      Noisy Disk uses a mechanical relay to create authentic-sounding mechanical stepping sounds for disk head movements for your Floppy Emu disk emulator’s virtual 5.25 inch floppy disk.

      Nothing will be harmed if Noisy Disk is used with other computers or emulation modes, but you’ll hear strange clacking noises that don’t match the disk activity.

      The product includes the Noisy Disk board with 2 x 10 pin rectangular input and output connectors, and a 6-inch extension cable for connecting to your Floppy Emu board.

      This likely sounds exactly like the more expensive Disk Clicker which was reviewed at [Wayback/Archive] Testing the New Classic Floppy Clicker on Apple Floppy Emulator – Authentic Retro Sounds! – YouTube and sold at [Wayback/Archive] Disk Clicker – 8bitdevices.com

    • Internal/External Drive Switcher for Apple IIc

      USD 25 [Wayback/Archive] Internal/External Drive Switcher for Apple IIc – Big Mess o’ Wires

      At the flip of a switch, select which Apple IIc floppy drives should act as Drive 1 and Drive 2. Add support for dual external 5.25 inch floppy emulation. For the Apple IIc with the Floppy Emu disk emulator.

      [Wayback/Archive] Internal/External Drive Switcher for Apple IIc | Big Mess o’ Wires

      This is a two-part device: a signal tap that should be installed inside the Apple IIc, and a modified DB19 adapter with two slide switches for the external connection. Two female-female jumper wires are passed through a gap in the case to make the connection between the two parts.

    • Daisy Chainer Disk Coupler

      USD 45 [Wayback/Archive] Daisy Chainer Disk Coupler – Big Mess o’ Wires

      Link the Floppy Emu disk emulator into a daisy chain with other Apple II disk drives. For use with Floppy Emu Model B and C.

      In order to work correctly, Apple II computers require daisy chained drives to be connected in a specific order:

      1. any 3.5 inch drives must go first in the chain
      2. Smartport and Unidisk 3.5 inch drives must go second
      3. any 5.25 inch drives must go last

      There can be at most two drives of each type, six drives total.

      There are two primary firmware versions for the Floppy Emu: normal firmware and Smartport daisy chain SPDC firmware. When using a Floppy Emu with the Daisy Chainer, the SPDC firmware is required if your Emu is configured to emulate a Smartport Hard Disk or a Unidisk 3.5. In all other cases, the normal firmware should be used.

      [Wayback/Archive] Floppy Emu Update: Smartport Daisy-Chain Support | Big Mess o’ Wires

      Most people should use the normal firmware version, and it’s the default for newly-purchased hardware. The Smartport daisy chain firmware version is only needed in uncommon situations when:

      1. The Floppy Emu’s selected emulation mode is Smartport Hard Disk, Smartport Unit 2, or Unidisk 3.5AND

      2. The Floppy Emu is plugged into the back of a BMOW Daisy Chainer or to the Apple Unidisk 3.5 drive, A2M2053.

      The wiki.apple2.org died, so here are archived links: [Wayback/Archive] wiki.apple2.org: A2 3.5 Drives -> Apple UniDisk 3.5 (A2M2053)

      Daisy Chainer clear acrylic case

      Oh: there is also this one for it:

    • USD 10 [Wayback/Archive] Clear Acrylic Case for Daisy Chainer – Big Mess o’ Wires

      A clear acrylic case to protect and showcase your Daisy Chainer board. These custom-made Daisy Chainer cases protect your board in style!

      This is a top-and-bottom “plate” style case with open sides. Assembly takes about 5 minutes.

    • Apple Disk Drive A/B Switch

      USD 20 [Wayback/Archive] Apple Disk Drive A/B Switch – Big Mess o’ Wires

      Select between a Floppy Emu and a real floppy drive at the flip of a switch. Includes switch module and one 3 foot 20-pin ribbon cable.

      For Lisa computer owners, and Macs with only one internal floppy connector, disk drive emulation can be awkward sometimes. The Apple Disk Drive A/B Switch aims to eliminate that awkwardness. This accessory makes it possible to attach a Floppy Emu and a real floppy disk drive at the same time, and select between them with a switch. Both drives will be powered, but the computer will only “see” one drive at a time, depending on the switch position.

      ⚠ Do not use Floppy Emu’s Dual 5.25 mode in combination with the A/B Switch. It will cause disk errors and may damage the Floppy Emu or your other 5.25 inch drive.

    Macintosh specific stuff from BMOW:

    Then there is a shop on the Cayman Islands that ships world wide and has both the Mac ROM SIMM and the Mac ROMM SIMM programmer:

    And there is [Wayback/Archive] a2heaven: For everyone who still loves and uses old computers.:

    • Liron Reborn

      USD 60 [Wayback/Archive] Liron Reborn

      Liron Reborn is a Samrt Port / Disk II controller card for Apple II/IIe computers.

      It is a functional hardware compatible Liron clone , with original Liron card Firmware.

      A difference from Original Liron card is that card can be used as a a standard 5.25 inch (Disk II) controller or Liron ( SmartPort ) card .

      I likely won’t need this as the Yellowstone card looks way more promising

    • FASTChip //e – 65C02

      USD 150 [Wayback/Archive] FASTChip //e – 65C02

      The FASTChip //e accelerates the Apple //e™ by replacing the on-board microprocessor with a much faster one. Because the memory on the Apple //e™ can only run at a 1 MHz speed maximum, faster memory (SRAM) must be provided to increase performance and allow the 65C02/65C816 CPU to run at full speed.

      To do this, the FASTChip //e contains 512KB/1024KB of fast SRAM memory. The clever design allows the acceleration of programs running in both main and auxiliary memory. The additional FASTChip //e memory can emulate both 192/448 KB fast RamWorks compatible RAM and 256/512 KB fast RamFactor (slinky) compatible RAM.

      [Wayback/Archive] REVIEW: FastChip //e Accellerator by A2Heaven – YouTube

    • 65C816->65C02 Board

      USD 35 [Wayback/Archive] 65C816->65C02 Board

      You can use 65C816->65C02 board to connect 65C816 CPU to your Apple II computer .

      * This board was based on Daryl Rictor’s original design. More information can be found here: sbc.rictor.org/support/conv.html

      [Wayback/Archive] 65816 to 6502 converter by Daryl Rictor.

    • DB19 to IDC20

      USD 11 [Wayback/Archive] DB19 to IDC20 Floppy Disk adapter

      DB19 to IDC20 Floppy Disk adapter

      directly connect IDC20 Pin Cable  connector to the 19-pin port of Apple IIc, or to a floppy controller with a 19-pin connector

      Probably cheaper to use the package deals from BMOW

    • IDC20 to DB19 cable adapter

      USD 13 [Wayback/Archive] IDC20 to DB19 cable adapter

      The product is designed to be directly connect IDC20 pin connector to the DB19 pin port .

      Likely the combo from BMOW is cheaper.

      TrackStar II

       

    • USD 75 [Wayback/Archive] TRAK STAR II

      Readout of Disk Drive head position .

      Constant Digital Readout of Disk Drive head position .

      Work with any 5″ Apple II compatible Drive .
      Display Full , Half and Quarter track head position .

      Nice idea, but has not been in stock for a long time and feels overpriced.

    • Quadlink Clone Kit

      USD 160 [Wayback/Archive] Quadlink Clone Kit

      It’s an ISA expansion card from the ’80s designed to turn your IBM PC (such as a 5150 or 5160) into an Apple ][! After booting and running the software, you can switch quickly between PC and Apple mode using Ctrl-Alt-A (for Apple) and Ctrl-Alt-P (for PC).

      Kit contain all PCB , passive components and chips needed to build working Quadlink Clone .

      [Wayback/Archive] GitHub – schlae/quapple: Quadlink clone turns your ancient IBM PC into an Apple ][

      Only useful if I find back an ISA compatible PC.

    • 3D Stickers set

      USD 10 [Wayback/Archive] 3D Stickers set

      Apple II logo and Disk II label sticker set .

      Actually this is quite a nice idea, despite them having been out of stock like forever.

    • RamFactor1M

      USD 85 [Wayback/Archive] RamFactor1M

      RamFactor1M is based on Aplied Engineering RAMFactor card ( firmware is same as original ), however it uses more modern low power 1MB SRAM and can provided battery backup up to 1-2 Year with small CR2032 Battery.

      The battery is for backup data (just like PowerFactor from Aplied Engineering ) and can be used as Solid State Disk.

      This is a trip down memory lane, though back then school could not afford these.

    • Apple II Slot Extender

      USD 40 [Wayback/Archive] Apple II Slot Extender

      The Apple II slot extender allows you to easily and freely test the functionality and repair your Apple II cards outside of the computer.

      You can also turn off voltages that aren’t necessary for the card to work to prevent testing errors.

      Package include

      • 1 x Apple II extender PCB bottom
      • 1 x Apple II extender PCB Top
      • 1 x 50 pin Flat ribbon cable with 0.5m length ( contact me if you want a longer cable )
    • a
    • a
    • a
    • a
    • a
    • a
    • a
    • a

    One more shop (: I think I found it searching for [Wayback/Archive] BlueSCSI, but anyway at [Wayback/Archive] Shop – Joe’s Computer Museum, focussing on [Wayback/Archive] Apple //e Archives – Joe’s Computer Museum I found these interesting items:

    For all shops: I didn’t list all of their items, just the ones that I might use in the future.

    An interesting device I did not know about either was the FujiNet one: it is fully open source! One thing to check out is where to order pre-assembled ones for Apple II series.

    • [Wayback/Archive] FujiNet · GitHub
      FujiNet is a multi-peripheral emulator and WiFi network device for vintage computers. The first completed hardware was for the Atari 8-Bit line of computers and development has begun for other systems (Coleco ADAM, Apple II, Commodore 64, Atari Lynx, ZX Spectrum and more) with the goal of supporting as many old systems as possible. What sets FujiNet apart from other WiFi devices is the new Network Device (the N Device). The N device allows vintage computers that do not have enough processing power to handle TCP/IP connections themselves to talk to the modern internet over WiFi. Virtual adapters have been created for many protocols including: TCP, UDP, HTTP, FTP, TNFS, HTTPS (SSL/TLS), SSH, TELNET, WebDAV and JSON parser. The FujiNet project is 100% completely open source, software and hardware. All code and schematics are available here.
    • [Wayback/Archive] FutureVision Research was the only shop I found selling them, but I probably overlooked others.
      • [Wayback/Archive] FujiNet – FutureVision Research
      • Apple II/III FujiNet w/ accesoiries

        USD 110 [Wayback/Archive] FujiNet for Apple II & III (With Accessories) – FutureVision Research

        The FujiApple Rev1.1 for SmartPort enabled Apple II computers emulates SmartPort drives, Disk II drives (read only), CP/M, Clock, Modem, and a new Network Device. Disk images can be mounted directly from the internet via TNFS servers or from the onboard MicroSD socket*. The Network device enables access to Internet protocols such as HTTP, HTTPS, TNFS, SSH, TCP, UDP and more.

        This kit comes with the following (ribbon cable color may be gray or rainbow depending on availability):
        • FujiNet for Apple II & III
        • DB-19 to IDC20 Female adapter
        • 30cm IDC20 Female to Male cable
        • 30cm IDC20 Female to Female cable
        • DB-19 spacer
        • Two different lengths of thumbscrews
          • Two 1.375″ thumbscrews for use with IIe/III
          • Two 1.5″ thumbscrews for use with IIc/gs/+

        The page contains many more helpful information and links.

     

    ………………………………………………………………………………………………………………………………………………………………………………………………

    Some non-shop links

    An external monitor on a Macingosh SE/30

    Mac SE/30 and Macintosh Classic

    Since I own both a Macintosh SE/30 and a Macintosh Classic, these are relevant too:

    Queries

    I used additional queries than the first blog post to complete this blog post. Here they are:

    --jeroen

     

     

     

     

     

     

     

    Rate this:

    #12 #156 #25 #3dprint #3dprinting #4 #Apple #appleiigs #AprilApples

  17. More Apple ][*, //* II* and classic Macintosh hardware upgrades

    The mini micro classic Apple emulators related post last week became way too big, so here is the classic Apple 2/Macintosh hardware upgrade part follow-up I announced in Some notes on mini/micro Apple //e emulators.

    Last week, I mentioned [Wayback/Archive] ARC Javmaster – YouTube. Let’s continue from there for an even bigger post (:

    Javmaster actually has a shop at [Wayback/Archive] Welcome to the 8-bit stuff store – 8 bit stuff cool retro computer 3D gadgets and geekery with a lot of interesting (mainly Apple ][ era related) retro things like:

    8bitstuff also pointed me to this shop with cool parts helping you fix Apple ][* and Apple //e and II* model issues: [Wayback/Archive] Shop | ReActiveMicro.com which is part of [Wayback/Archive] ReActiveMicro.com which has this great card in their catalog:

    and other hardware like:

    • Disk ][+ v1.0 kit

      USD 30-40 [Wayback/Archive] Disk ][+ – Assembled or Kit | ReActiveMicro.com

      Disk ][+ v1.0 is a small PCB that installs into Apple Disk ][ drives. It replaces the red LED in the drives with a two-color LED, to better distinguish the reading phases, in green, from the writing phases, in red. Comes assembled or in kit form.

      Notes:

      • You need one set for each drive.
      • I don’t really like the way they connect to the drive electronics, see picture below from [Wayback/Archive] Disk II+ – The ReActiveMicro Apple II Wiki . Instead of the pin, I would likely solder the wires to the electronics.

        4 hook probes connected to the Disk II analog board.

    • Apple IIe Enhancement Kit

      USD 30-35 [Wayback/Archive] IIe Enhancement Kit | ReActiveMicro.com

      Comes with an ‘Enhanced’ paper template, 65C02 CPU, and all the ROM’s necessary to upgrade your Apple IIe.

      [Wayback/Archive] Apple IIe Enhancement Kit – The ReActiveMicro Apple II Wiki

      Note it has various options (USA vs European Apple //e, plus  languages: check before you order!)

      I need to check if my Apple //e already has this enhancement kit.

    • No-Slot Clock v1.0

      USD 65 [Wayback/Archive] No-Slot Clock | ReActiveMicro.com

      The No-Slot Clock v1.0 allows your Apple II to remember the date and time. It will work on an Apple II, Apple II+, Apple IIe, Apple IIc, and Clone systems. It features dual battery holders. Two CR1025 cells included.

      The No Slot Clock does not fit in to the IIc or IIc+ with a RAM Card installed.

      [Wayback/Archive] No-Slot Clock – The ReActiveMicro Apple II Wiki

      Likely won’t needs this as ROMXe and ROMXc both include a clock.

    • Ultimate-Micro.com Apple II 3.5″ Disk Controller Card v1.0

      USD 200 [Wayback/Archive] Apple II 3.5 Disk Controller Card | ReActiveMicro.com

      This is the Apple II 3.5″ Disk Controller Card v1.0 from Ultimate-Micro.com.

      The Apple II 3.5″ Disk Controller Card v1.0 is a clone of Apple’s Apple II 3.5″ Disk Controller Card. The disk controller card allows you to use 3.5-inch floppy disk drives, including the Apple SuperDrive and Apple 3.5 Drive, with all Apple II computers. This card also supports the operation of older model Apple II UniDisk 3.5 drives.

      Not sure if I really want this one, especially with the USD 200 price tag: The Ultimate-Micro.com domain vanished and the Yellowstone Universal Disk Controller mentioned below at USD 170 (including cables) can do more.

    • Apple II A2io Bluetooth Game Port Receiver

      USD 20 [Wayback/Archive] A2io Bluetooth Game Port Receiver For Your Apple II Systems | ReActiveMicro.com

      This is the A2io Bluetooth Game Port Receiver from CraftyMech and designed by Aaron Reid. Works on all Apple II systems with a 9 pin game port.

      A2io allow you to connect and use a modern wireless game pad as either a joystick, paddle, or pad input device. You pair the game pad with your mobile device (phone/tablet/laptop) and then connect to the A2io. The mobile device acts like a translator between your Apple and game pad.

    • CFFA 300 REV C

      USD 225 [Wayback/Archive] CFFA3000 v1.0 Rev C-RM for II, II+, ///, IIe, and IIgs | ReActiveMicro.com

      This is the CFFA3000 v1.0 Rev C-RM built by ReActiveMicro under license from R&D Automation.

      The CFFA3000 v1.0 Rev C-RM Controller is a Mass Storage Device and Floppy Emulator that once installed in your Apple II system acts like a solid-state Hard Drive using Compact Flash Cards and USB Flash Drives. Floppy Emulation allows users to load .PO images as if they were physical disk. See the manual for more details. There is also discussion about adding .WOZ support, and we will post updates if/when it happens.

      Comes with CF Card as pictured, and with Remote option standard. Manual can be found here for review.

      Plug and play ready, and fully tested. Comes started with **256MB** CF Card, preloaded with several ProDOS 8 volumes with games and utilities, and several GS/OS volumes. You can select which one to boot using the on-board firmware menu (press “M” key on power up).

      [Wayback/Archive] wiki.reactivemicro.com/images/9/9d/2021-10-23-CFFA-RM_Manual.pdf

      I already have this, including the original remote back in 2014 from dreher: [Wayback/Archive] CFFA3000 Run 3: Order Status

    • CFFA3000 Remote

      USD 40 [Wayback/Archive] CFFA3000 – Remote Option With Cable | ReActiveMicro.com

      This is the CFFA3000 Remote option built by ReActiveMicro under license from R&D Automation. ***REMOTE ONLY!***
      ReActiveMicro is an authorized dealer and partner with R&D

      The CFFA3000 Remote option comes with the connector cable, which attaches to the CFFA3000 card installed in your Apple II system. It comes as pictured, with the Remote, the connection cable, and a 3D printed enclosure.

    Finally it pointed me to [Wayback/Archive] Home | JD Micro which has RAMX (for Apple ][* systems) and ROMX (variants for any Apple 2 model) for which these are most applicable to my systems (both ROMX versions also contain the fonts mentioned in their blog post [Wayback/Archive] 11th May 2021 | JD Micro):

    [Wayback/Archive] Review: ROMX+ Device for Apple II+ – YouTube

    Other results from the queries I used in the post last week also returned some hardware that can be used for classic Apple machines:

    • [Wayback/Archive] The ESP32 SoftCard for the Apple II | Applefritter

      I’ve been working on a new card for the Apple II that would extend its capabilities using my favorite Wi-Fi module: the ESP32. I decided to called it a soft card, because similarly to the original Z80 SoftCard it contains its own processor allowing it to run software not originally meant for the Apple II. And similarly to the original 80-column card that was needed, it produces its own composite video enabled through a soft switch. Both NTSC and PAL are supported and can be switched using a command. In addition it can produce 8-bit sound that is mixed and played through the Apple II speaker. For most of its applications the card also needs a FAT32 formatted microSD card.

      [Wayback/Archive] ESP32 SoftCard Expansion Card for the Apple II from CVT on Tindie

      ESP32 SoftCard Expansion Card for the Apple II

    • [Wayback/Archive] Apple2idiot card (ESP32) | Applefritter

      It is an interesting and different take on interfacing an ESP32 module to an Apple II. It uses a dual ported SRAM instead of trying to interface the ESP32 to the Apple II bus using something like 74LVC245s or through a parallel chip like a 6522 or 82C55 or through a serial chip like a 6551 or 6850.

      https://github.com/equant/apple2idiot

      [Wayback/Archive] GitHub – equant/apple2idiot: A general purpose ESP32 IOT board for the Apple IIe

    • assembly lines

      [Wayback/Archive] Shop – CT6502 and [Wayback/Archive] Shop – Page 2 of 2 – CT6502a

      • [Wayback/Archive] Assembly Lines: The Mug – CT6502
        Assembly Lines: The Mug; Print-on-demand from Printful.

        Mug; handle left

        Mug; handle behind

        Mug; handle right

        This is a really cool idea including the Choplifter and Lode Runner main sprites on the mug. The right picture shows you can also get it in 15oz size.

      • Apple II wDrive Disk Drive Emulator

        [Wayback/Archive] Apple II wDrive Disk Drive Emulator – CT6502

        The wDrive is a disk drive emulator for the Apple II (II+, IIe, IIc, IIGS) that boots disk images (WOZ, DSK, 2MG, HDV, etc) from an SD card.

        Manufacturer: [Wayback/Archive] Mfa2 Workshop

        We are developer of wDrive, softSP card and related accessories which are published through Kboo HK

        [email protected]

        Note it there are two options to choose from:

        • USD ~80: wDrive only (Apple IIc and IIGS)
        • USD ~100: wDrive plus SoftSP card (Apple II, II+, IIe)

        The second option includes this one:

      • MFA2 SoftSP Card

        [Wayback/Archive] Apple II MFA2 SoftSP Card wDrive or FujiNet – CT6502

        The SoftSP card allows you to boot hard disk images or use FujiNet devices on an Apple II+ or IIe, which do not have SmartPort support.

        The SoftSP card is not needed on the Apple IIc or Apple IIGS.

        The SoftSP card should be placed into a slot lower than the wDrive disk controller card. Slot 1 or 2 usually works well.

        Note: The SoftSP card will also work with the FloppyEMU. However, you MUST use a special drive cable that isolates pin 12, to avoid damaging your FloppyEMU. You do not need to use this cable with the wDrive, although it won’t cause any issues if you do. You can find details about the issue here.

        That last bit is really really important as SoftSP only can be installed in a system that also connects to a FloppyEMU under these circumstances:

        • Connect the FloppyEMU to a Yellowstone is a universal disk controller card for Apple II computers (see below), especially since the Yellowstone also supports both wDrive and FujiNet.
        • Connect the FloppyEMU to an original Disk Controller, but cut wire #12 as explained in [Wayback/Archive] Floppy Emu SoftSP Warning | Big Mess o’ Wires

          You can’t safely connect a Smartport device to a Disk II controller card, no matter how the card’s internal logic might be modified. That includes Floppy Emu when it’s configured in Smartport emulation mode. The reason is that Smartport devices connect pin 12 internally to ground. This is how other connected equipment and daisy-chained drives know that they’re Smartport drives, and it’s essential for correct daisy-chain operation of Smartport drives with the BMOW Daisy Chainer or the Apple Unidisk 3.5 drive.

        Both options essentially makes the SoftSP unneeded for FloppyEMU, and with this signalling problem for wire #12 (which is the SmartPort compatibility indicator) I am not sure which other SmartPort devices besides wDrive will actually work with the Apple ][, Apple ][+ and Apple //e without damaging the SmartPort device.

      • a
      • a
    • a

    Another shop via [Wayback/Archive] Big Mess o’ Wires -> [Wayback/Archive] Big Mess o’ Wires Store

    Bring new life to your classic computer

    From disk emulators to ROM upgrades, keyboard and mouse adapters, and more hardware creations, BMOW has your retrocomputer needs covered.

    • Yellowstone Universal Disk Controller Card and two DB-19 female adapters

      [Wayback/Archive] Yellowstone Disk Controller Everything Bundle – Big Mess o’ Wires

      Yellowstone is a universal disk controller card for Apple II computers. It supports nearly every type of Apple disk drive ever made, including standard 3.5 inch drives, 5.25 inch drives, smart drives like the Unidisk 3.5 and the BMOW Floppy Emu’s smartport hard disk, and even Macintosh 3.5 inch drives. Yellowstone combines the power of an Apple 3.5 Disk Controller Card, a standard 5.25 inch Disk II controller card, the Apple Liron controller, and more, all in a single card.

      The “everything” bundle includes the latest version Yellowstone Universal Disk Controller Card and two DB-19 female adapters

      • [Wayback/Archive] Yellowstone: Cloning the Apple II Liron | Big Mess o’ Wires

        The “Liron” disk controller was introduced by Apple in 1985. More formally known as the Apple II UniDisk 3.5 Controller, it’s designed to work with a new generation of “smart” disk drives more sophisticated than the venerable Disk II 5.25 inch floppy drive. The smart disk port on the Liron is appropriately named the Smartport, and it can communicate with block-based storage devices such as the Unidisk 3.5 (an early 800K drive) and Smartport-based Apple II hard drives.
        Why care about the Liron? The Apple IIc and Apple IIgs have integrated disk ports with built-in Smartport functionality, but for the earlier Apple II+ and IIe, the Liron is the only way to get a Smartport. For owners of the BMOW Floppy Emu disk emulator, the Liron card makes it possible to use the Floppy Emu as an external hard drive for the II+ and IIe. Unfortunately finding a Liron is difficult, and although they occasionally turn up on eBay, they’re quite expensive. That made cloning the Liron a logical first goal.

      • [Wayback/Archive] Yellowstone Universal Disk Controller – Big Mess o’ Wires

        Article: [Wayback/Archive] Yellowstone Universal Disk Controller for Apple II | Big Mess o’ Wires – Run any disk drive with your Apple II computer!

        Supported Drives

        Need to attach a disk drive to your Apple II? Yellowstone has got you covered. Yellowstone is compatible with the Apple IIe, Apple IIgs, Apple II+, Apple II, and most Apple II clones. It works with these disk drives and drive emulators:

        Can be connected directlyDisk II A2M0003Naked Apple 3.5” 800K, black labelNaked half-height Apple 5.25″Naked Apple 3.5” 800K, red labelFloppy Emu 5.25 modeNaked Apple 3.5” 1.44MB, auto-injectFloppy Emu Model C dual 5.25 modeNaked Apple 3.5” 1.44MB, manual-injectFloppy Emu 3.5 modewDriveFloppy Emu Unidisk 3.5 mode [1]Floppy Emu Smartport hard disk mode [1]And more…Requires optional DB-19F connectorUnidisk 5.25 A9M0104Macintosh 800K External M0131Disk IIc A2M4050Apple SuperDrive (Apple FDHD Drive) G7287Duo Disk 5.25 A9M0108Unidisk 3.5 A2M2053 [1]AppleDisk 5.25 A9M01075Applied Engineering 3.5 [2]Laser FD100 5.25Apple 3.5 Drive A9M0106And more…

        [1] smart drive
        [2] partial compatibility

        When using 3.5 inch drives, Yellowstone is compatible with Apple II standard 800K double-sided double-density disk media.

        A naked drive is a bare drive mechanism without any enclosure, such as an internal drive taken from a Macintosh, Apple IIc, or Apple IIc+.

        Yes, pull the internal 3.5 inch drive from an old Mac and use it directly with your Apple II!

        This brought back Applied Engineering memories (:

      • [Wayback/Archive] Yellowstone DB-19 Female Disk Adapter – Big Mess o’ Wires

        The adapter includes a six inch ribbon cable and a detachable mini-board that converts the ribbon cable connector into a DB-19 female shape.

        This adapter has custom wiring that’s specifically designed for use with Yellowstone, and should not be used with other disk hardware.

        Can be connected directly to Yellowstone boardApple Disk II A2M0003BMOW Floppy EmuNaked Apple 5.25” DriveswDriveNaked Apple 3.5” DrivesRequires Yellowstone DB-19F adapterUnidisk 5.25 A9M0104Macintosh 800K External M0131Disk IIc A2M4050Apple SuperDrive (Apple FDHD Drive) G7287Duo Disk 5.25 A9M0108Unidisk 3.5 A2M2053AppleDisk 5.25 A9M01075Applied Engineering 3.5Apple 3.5 Drive A9M0106Laser FD100 5.25 A naked drive is a bare drive mechanism without any enclosure, such as an internal drive taken from a Macintosh, Apple IIc, or Apple IIc+.

        (note that’s a ~15 cm ribbon cable)

      • [Wayback/Archive] Yellowstone Back From the Dead | Big Mess o’ Wires
    • Floppy Emu Model C Deluxe Bundle

      USD 130 [Wayback/Archive] Floppy Emu Model C Deluxe Bundle – Big Mess o’ Wires

      The BMOW Floppy Emu is a disk emulator for classic Apple II, Macintosh, and Lisa computers.

      The bundle includes:

      • Floppy Emu Model C
      • Frosted Ice Acrylic Case
      • Vintage Apple Software Collection SD Card
      • Full-Size SD Adapter
      • Disk Extension Cable

      [Wayback/Archive] BMOW Floppy EMU for Vintage Apple Computers! | Mastergeko4 – YouTube shot at the time the YouTuber was quite a novice, which brought back memories of me being young and figuring out things by fiddling with them and bumping my head against walls (:

    • Noisy Disk Mechanical Sounder with 2 ribbon cables attached

      USD 20 [Wayback/Archive] Noisy Disk Mechanical Sounder – Big Mess o’ Wires

      Noisy Disk uses a mechanical relay to create authentic-sounding mechanical stepping sounds for disk head movements for your Floppy Emu disk emulator’s virtual 5.25 inch floppy disk.

      Nothing will be harmed if Noisy Disk is used with other computers or emulation modes, but you’ll hear strange clacking noises that don’t match the disk activity.

      The product includes the Noisy Disk board with 2 x 10 pin rectangular input and output connectors, and a 6-inch extension cable for connecting to your Floppy Emu board.

      This likely sounds exactly like the more expensive Disk Clicker which was reviewed at [Wayback/Archive] Testing the New Classic Floppy Clicker on Apple Floppy Emulator – Authentic Retro Sounds! – YouTube and sold at [Wayback/Archive] Disk Clicker – 8bitdevices.com

    • Internal/External Drive Switcher for Apple IIc

      USD 25 [Wayback/Archive] Internal/External Drive Switcher for Apple IIc – Big Mess o’ Wires

      At the flip of a switch, select which Apple IIc floppy drives should act as Drive 1 and Drive 2. Add support for dual external 5.25 inch floppy emulation. For the Apple IIc with the Floppy Emu disk emulator.

      [Wayback/Archive] Internal/External Drive Switcher for Apple IIc | Big Mess o’ Wires

      This is a two-part device: a signal tap that should be installed inside the Apple IIc, and a modified DB19 adapter with two slide switches for the external connection. Two female-female jumper wires are passed through a gap in the case to make the connection between the two parts.

    • Daisy Chainer Disk Coupler

      USD 45 [Wayback/Archive] Daisy Chainer Disk Coupler – Big Mess o’ Wires

      Link the Floppy Emu disk emulator into a daisy chain with other Apple II disk drives. For use with Floppy Emu Model B and C.

      In order to work correctly, Apple II computers require daisy chained drives to be connected in a specific order:

      1. any 3.5 inch drives must go first in the chain
      2. Smartport and Unidisk 3.5 inch drives must go second
      3. any 5.25 inch drives must go last

      There can be at most two drives of each type, six drives total.

      There are two primary firmware versions for the Floppy Emu: normal firmware and Smartport daisy chain SPDC firmware. When using a Floppy Emu with the Daisy Chainer, the SPDC firmware is required if your Emu is configured to emulate a Smartport Hard Disk or a Unidisk 3.5. In all other cases, the normal firmware should be used.

      [Wayback/Archive] Floppy Emu Update: Smartport Daisy-Chain Support | Big Mess o’ Wires

      Most people should use the normal firmware version, and it’s the default for newly-purchased hardware. The Smartport daisy chain firmware version is only needed in uncommon situations when:

      1. The Floppy Emu’s selected emulation mode is Smartport Hard Disk, Smartport Unit 2, or Unidisk 3.5AND

      2. The Floppy Emu is plugged into the back of a BMOW Daisy Chainer or to the Apple Unidisk 3.5 drive, A2M2053.

      The wiki.apple2.org died, so here are archived links: [Wayback/Archive] wiki.apple2.org: A2 3.5 Drives -> Apple UniDisk 3.5 (A2M2053)

      Daisy Chainer clear acrylic case

      Oh: there is also this one for it:

    • USD 10 [Wayback/Archive] Clear Acrylic Case for Daisy Chainer – Big Mess o’ Wires

      A clear acrylic case to protect and showcase your Daisy Chainer board. These custom-made Daisy Chainer cases protect your board in style!

      This is a top-and-bottom “plate” style case with open sides. Assembly takes about 5 minutes.

    • Apple Disk Drive A/B Switch

      USD 20 [Wayback/Archive] Apple Disk Drive A/B Switch – Big Mess o’ Wires

      Select between a Floppy Emu and a real floppy drive at the flip of a switch. Includes switch module and one 3 foot 20-pin ribbon cable.

      For Lisa computer owners, and Macs with only one internal floppy connector, disk drive emulation can be awkward sometimes. The Apple Disk Drive A/B Switch aims to eliminate that awkwardness. This accessory makes it possible to attach a Floppy Emu and a real floppy disk drive at the same time, and select between them with a switch. Both drives will be powered, but the computer will only “see” one drive at a time, depending on the switch position.

      ⚠ Do not use Floppy Emu’s Dual 5.25 mode in combination with the A/B Switch. It will cause disk errors and may damage the Floppy Emu or your other 5.25 inch drive.

    Macintosh specific stuff from BMOW:

    Then there is a shop on the Cayman Islands that ships world wide and has both the Mac ROM SIMM and the Mac ROMM SIMM programmer:

    And there is [Wayback/Archive] a2heaven: For everyone who still loves and uses old computers.:

    • Liron Reborn

      USD 60 [Wayback/Archive] Liron Reborn

      Liron Reborn is a Samrt Port / Disk II controller card for Apple II/IIe computers.

      It is a functional hardware compatible Liron clone , with original Liron card Firmware.

      A difference from Original Liron card is that card can be used as a a standard 5.25 inch (Disk II) controller or Liron ( SmartPort ) card .

      I likely won’t need this as the Yellowstone card looks way more promising

    • FASTChip //e – 65C02

      USD 150 [Wayback/Archive] FASTChip //e – 65C02

      The FASTChip //e accelerates the Apple //e™ by replacing the on-board microprocessor with a much faster one. Because the memory on the Apple //e™ can only run at a 1 MHz speed maximum, faster memory (SRAM) must be provided to increase performance and allow the 65C02/65C816 CPU to run at full speed.

      To do this, the FASTChip //e contains 512KB/1024KB of fast SRAM memory. The clever design allows the acceleration of programs running in both main and auxiliary memory. The additional FASTChip //e memory can emulate both 192/448 KB fast RamWorks compatible RAM and 256/512 KB fast RamFactor (slinky) compatible RAM.

      [Wayback/Archive] REVIEW: FastChip //e Accellerator by A2Heaven – YouTube

    • 65C816->65C02 Board

      USD 35 [Wayback/Archive] 65C816->65C02 Board

      You can use 65C816->65C02 board to connect 65C816 CPU to your Apple II computer .

      * This board was based on Daryl Rictor’s original design. More information can be found here: sbc.rictor.org/support/conv.html

      [Wayback/Archive] 65816 to 6502 converter by Daryl Rictor.

    • DB19 to IDC20

      USD 11 [Wayback/Archive] DB19 to IDC20 Floppy Disk adapter

      DB19 to IDC20 Floppy Disk adapter

      directly connect IDC20 Pin Cable  connector to the 19-pin port of Apple IIc, or to a floppy controller with a 19-pin connector

      Probably cheaper to use the package deals from BMOW

    • IDC20 to DB19 cable adapter

      USD 13 [Wayback/Archive] IDC20 to DB19 cable adapter

      The product is designed to be directly connect IDC20 pin connector to the DB19 pin port .

      Likely the combo from BMOW is cheaper.

      TrackStar II

       

    • USD 75 [Wayback/Archive] TRAK STAR II

      Readout of Disk Drive head position .

      Constant Digital Readout of Disk Drive head position .

      Work with any 5″ Apple II compatible Drive .
      Display Full , Half and Quarter track head position .

      Nice idea, but has not been in stock for a long time and feels overpriced.

    • Quadlink Clone Kit

      USD 160 [Wayback/Archive] Quadlink Clone Kit

      It’s an ISA expansion card from the ’80s designed to turn your IBM PC (such as a 5150 or 5160) into an Apple ][! After booting and running the software, you can switch quickly between PC and Apple mode using Ctrl-Alt-A (for Apple) and Ctrl-Alt-P (for PC).

      Kit contain all PCB , passive components and chips needed to build working Quadlink Clone .

      [Wayback/Archive] GitHub – schlae/quapple: Quadlink clone turns your ancient IBM PC into an Apple ][

      Only useful if I find back an ISA compatible PC.

    • 3D Stickers set

      USD 10 [Wayback/Archive] 3D Stickers set

      Apple II logo and Disk II label sticker set .

      Actually this is quite a nice idea, despite them having been out of stock like forever.

    • RamFactor1M

      USD 85 [Wayback/Archive] RamFactor1M

      RamFactor1M is based on Aplied Engineering RAMFactor card ( firmware is same as original ), however it uses more modern low power 1MB SRAM and can provided battery backup up to 1-2 Year with small CR2032 Battery.

      The battery is for backup data (just like PowerFactor from Aplied Engineering ) and can be used as Solid State Disk.

      This is a trip down memory lane, though back then school could not afford these.

    • Apple II Slot Extender

      USD 40 [Wayback/Archive] Apple II Slot Extender

      The Apple II slot extender allows you to easily and freely test the functionality and repair your Apple II cards outside of the computer.

      You can also turn off voltages that aren’t necessary for the card to work to prevent testing errors.

      Package include

      • 1 x Apple II extender PCB bottom
      • 1 x Apple II extender PCB Top
      • 1 x 50 pin Flat ribbon cable with 0.5m length ( contact me if you want a longer cable )
    • a
    • a
    • a
    • a
    • a
    • a
    • a
    • a

    One more shop (: I think I found it searching for [Wayback/Archive] BlueSCSI, but anyway at [Wayback/Archive] Shop – Joe’s Computer Museum, focussing on [Wayback/Archive] Apple //e Archives – Joe’s Computer Museum I found these interesting items:

    For all shops: I didn’t list all of their items, just the ones that I might use in the future.

    An interesting device I did not know about either was the FujiNet one: it is fully open source! One thing to check out is where to order pre-assembled ones for Apple II series.

    • [Wayback/Archive] FujiNet · GitHub
      FujiNet is a multi-peripheral emulator and WiFi network device for vintage computers. The first completed hardware was for the Atari 8-Bit line of computers and development has begun for other systems (Coleco ADAM, Apple II, Commodore 64, Atari Lynx, ZX Spectrum and more) with the goal of supporting as many old systems as possible. What sets FujiNet apart from other WiFi devices is the new Network Device (the N Device). The N device allows vintage computers that do not have enough processing power to handle TCP/IP connections themselves to talk to the modern internet over WiFi. Virtual adapters have been created for many protocols including: TCP, UDP, HTTP, FTP, TNFS, HTTPS (SSL/TLS), SSH, TELNET, WebDAV and JSON parser. The FujiNet project is 100% completely open source, software and hardware. All code and schematics are available here.
    • [Wayback/Archive] FutureVision Research was the only shop I found selling them, but I probably overlooked others.
      • [Wayback/Archive] FujiNet – FutureVision Research
      • Apple II/III FujiNet w/ accesoiries

        USD 110 [Wayback/Archive] FujiNet for Apple II & III (With Accessories) – FutureVision Research

        The FujiApple Rev1.1 for SmartPort enabled Apple II computers emulates SmartPort drives, Disk II drives (read only), CP/M, Clock, Modem, and a new Network Device. Disk images can be mounted directly from the internet via TNFS servers or from the onboard MicroSD socket*. The Network device enables access to Internet protocols such as HTTP, HTTPS, TNFS, SSH, TCP, UDP and more.

        This kit comes with the following (ribbon cable color may be gray or rainbow depending on availability):
        • FujiNet for Apple II & III
        • DB-19 to IDC20 Female adapter
        • 30cm IDC20 Female to Male cable
        • 30cm IDC20 Female to Female cable
        • DB-19 spacer
        • Two different lengths of thumbscrews
          • Two 1.375″ thumbscrews for use with IIe/III
          • Two 1.5″ thumbscrews for use with IIc/gs/+

        The page contains many more helpful information and links.

     

    ………………………………………………………………………………………………………………………………………………………………………………………………

    Some non-shop links

    An external monitor on a Macingosh SE/30

    Mac SE/30 and Macintosh Classic

    Since I own both a Macintosh SE/30 and a Macintosh Classic, these are relevant too:

    Queries

    I used additional queries than the first blog post to complete this blog post. Here they are:

    --jeroen

     

     

     

     

     

     

     

    Rate this:

    #12 #156 #25 #3dprint #3dprinting #4 #Apple #appleiigs #AprilApples

  18. Mostly Monday Reads: Oops!  He did it again! 

    “King of kings..” John Buss, @repeat1968

    Good Day, Sky Dancers!

    The Trump Kakistocracy continues to upset the operations of every agency in the country. Unfortunately, some of the most necessary and strategic posts have been filled with village idiots.  After the revelation of the first SignalGate, you would think there would be more quick changes to protect the conversations at the top of the Pentagon and the Department of Defense.  Party Boy, sexual predator, and all-around dumb guy, Pete Hegseth, has done it again.  No need for spies when the head of the nation’s military broadcasts stuff on commercial software that everyone’s hacked.  There is total chaos at the Pentagon. This headline from Politico says it all. “White House backs Hegseth, Leavitt says ‘entire Pentagon’ is resisting him. Hegseth “is doing phenomenal leading the Pentagon,” Leavitt said during a Monday “Fox & Friends” appearance.”

    “President Donald Trump “stands strongly behind Pete Hegseth,” press secretary Karoline Leavitt said Monday morning, defending the scandal-plagued Defense secretary against escalating criticism from Democrats and former senior officials.

    Hegseth “is doing phenomenal leading the Pentagon,” Leavitt said in a “Fox & Friends” appearance. “This is what happens when the entire Pentagon is working against you and working against the monumental change you are trying to implement.”

    Her comments came a day after The New York Times reported that Hegseth shared sensitive information about military operations in Yemen in a private chat on the Signal app that included his wife, brother and personal lawyer — the second reported instance of the secretary sharing operational plans in an unclassified chat. The revelations have reignited the so-called Signalgate scandal and deepened scrutiny over Hegseth’s judgment and leadership.

    Former top Pentagon spokesperson John Ullyot, who stepped down last week, also bashed the Pentagon leader for allegedly plunging the department into dysfunction in a POLITICO Magazine opinion piece published Sunday night.

    Ullyot — once a vocal supporter of the Defense secretary — accused Hegseth’s team of spreading unverified claims about three top officials who were fired last week, falsely accusing them of leaking sensitive information to media outlets.

    “President Donald Trump has a strong record of holding his top officials to account,’” Ullyot wrote. “Given that, it’s hard to see Defense Secretary Pete Hegseth remaining in his role for much longer.”

    Hegseth brushed off the allegations Monday and blamed it on backlash for his efforts to reshape the Pentagon.

    I love this headline from Rolling Stone. “Turns Out It Wasn’t Such a Great Idea to Put Pete Hegseth in Charge of the Military. The former Fox News host’s tenure at the top of the Pentagon has been riddled with scandal and broader institutional turmoil.”  The article was filed by Ryan Bort and Asawin Suebsaeng

    Pete Hegseth barely received enough votes to win confirmation as Donald Trump’s defense secretary. Three Republicans even bucked their own party’s president to oppose him. One of them, Sen. Lisa Murkowski (R-Alaska), cited “accusations of financial mismanagement and problems with the workplace culture he fostered.” Another, Sen. Mitch McConnell (R-Ky.), said Hegseth had “failed to demonstrate” that he could manage “nearly 3 million military and civilian personnel, an annual budget of nearly $1 trillion.”

    It hasn’t taken long for Hegseth to prove them — along with every Senate Democrat and the countless others who warned about him taking over the Pentagon — right.

    The New York Times reported on Sunday that Hegseth shared attack plans in a second unsecured Signal group chat, following the revelation last month that he shared the plans to attack Houthi militants in Yemen in a Signal chat group that included a journalist. The second chat included Hegseth’s wife, brother, and personal lawyer, underscoring the former Fox News host’s recklessness with highly sensitive information.

    The news came after a tumultuous week in the Pentagon that saw Hegseth fire three senior officials — ostensibly because of an internal investigation into leaking, although the officials seemed confused about what happened. “We still have not been told what exactly we were investigated for, if there is still an active investigation, or if there was even a real investigation of ‘leaks’ to begin with,” they wrote in a joint statement Friday night, adding that, although the experience was “unconscionable,” they will continue to support Trump’s plans for the Pentagon.

    John Ullyot, who resigned as a spokesperson for the Pentagon last week, put a button on the turmoil in an op-ed for Politico on Sunday. “It’s been a month of total chaos at the Pentagon,” the piece began. “From leaks of sensitive operational plans to mass firings, the dysfunction is now a major distraction for the president — who deserves better from his senior leadership.”

    Ullyot went on to bash the week’s firings, calling the purge “strange and baffling”; detail Hegeth’s “horrible crisis-communications” following the initial Signal scandal; and predict that “many in the secretary’s own inner circle will applaud quietly” if Trump decides to hold him accountable. Ullyot also predicted that the drama isn’t going to let up anytime soon: “There are very likely more shoes to drop in short order, with even bigger bombshell stories coming this week, key Pentagon reporters have been telling sources privately.”

    We’ve already received notice in Louisiana about the number of student VISAS yanked by the #FARTUS party.  If it happens here, it’s undoubtedly happening all over the country. Jennifer Rubin has this advice on her Substack, The Contrarian. “Stop Waiting for a Formal Declaration of ‘Crisis’. It is here. We are living through it. No shit cupcake.

    Are we in a “constitutional crisis”?

    You have likely heard that question innumerable times over the past three months, followed by a discussion as to whether our president has actually, explicitly, openly violated a court order (make that a Supreme Court order). When a question is so pervasive, it is safe to assume that yes, we are already there.

    When does the combo of authoritarian bullying, revenge seeking, stooge-nominating, retaliatory prosecuting, contemptuous litigating, and lawless usurpation of congressional power become a “crisis”? The word is defined by Merriam-Webster as “an unstable or crucial time or state of affairs in which a decisive change is impending…especiallyone with the distinct possibility of a highly undesirable outcome.” Frankly, we have been in that “crisis” since the first day of the Trump presidency.

    When a Republican Congress allows the president to seize the power of the purse and does nothing, when the secretary of defense commits the worst breach of national security protocols in memory (and evidently doesn’t learn his lesson), or when Republicans refuse to reclaim the power to lay tariffs—despite a recession-inducing presidential trade war—the question is not if we are in a constitutional crisis, but just how bad it is.

    For Kilmar Abrego GarciaRumeysa OzturkMahmoud KhalilMohsen Mahdawi, and scores of others who are legally present in the United States have been snatched up, incarcerated (or are facing incarceration) in a foreign gulag, and are deprived of their right to contest their confinement and visa revocation, the “constitutional crisis” is well underway.

    When the Supreme Court convenes “literally in the middle of the night” to stop the government from spiriting away Venezuelans in apparent contradiction of their instruction to give every individual a meaningful opportunity to oppose their deportation, the “constitutional crisis” has arrived.

    Sen. Chris Van Hollen (D-Md.) knows a constitutional crisis. When asked explicitly whether we were in one on Meet the Press, he affirmed, “Yes, we are.” He had to fly down to El Salvador to see for himself Abrego Garcia’s condition, and upon his return, called out the president and his flacks for abject lies, even revealing the clumsy attempt to stage a scene suggesting he and Kilmar were tossing down margaritas on a tropical holiday.

    When such steps are required to confirm whether or not a lawful American resident is alive, we know this is not only the least trustworthy White House in modern history, but one seemingly eager to foment a constitutional crisis. “They wanted to create this appearance that life was just lovely for Kilmar, which of course is a big, fat lie,” Van Hollen said. Calling out the White House’s baseless allegations that Abrego Garcia is a gang member and terrorist, Van Hollen declared, “…In other words, put up in court or shut up.”

    If you are interested in tracking foreign students who have lost their VISAS, you may look at this from Inside Higher Education. “What We’ve Learned So Far From Tracking Student Visa Data. More than 1,500 students from nearly 250 colleges have had their visas revoked, but who they are—and why they’ve been targeted—is still largely unknown.” Two international students from UNO, where I teach, have had theirs removed.

    On April 7, amid reports that the federal government was detaining international students and revoking their visas, Inside Higher Ed began collecting and cross-checking data in an effort to track exactly how many students were affected—and at which institutions. Our goal was to understand the scope of the federal government’s involvement in the visa process and what it means for international students and the colleges and universities they attend.

    Over the past two weeks, more than 1,500 students—representing several hundred colleges and universities, as well as state systems—have had a sudden or unexpected change in their Student and Exchange Visitor Information System (SEVIS) listing, or their F-1 or J-1 visa status.

    Luke Garrett, writing for NPR, has this headline today. “House Democrats land in El Salvador, demand Abrego Garcia’s return.”  They need to start showing up in ICE detention centers, like the one down here, before more folks get shipped off despite all the court decisions.

    Four House Democrats were scheduled to land in El Salvador Monday to demand the release and return of Kilmar Abrego Garcia, a Salvadoran citizen who lived in Maryland and was deported by the administration to a prison in El Salvador due to what the Trump administration an “administrative error.”

    The group — Rep. Robert Garcia, D-Calif., Rep. Maxwell Frost, D-Fla., Rep. Yassamin Ansari, D-Ariz., and Rep. Maxine Dexter, D-Ore. — said in a statement they hope “to pressure” the White House “to abide by a Supreme Court order.”

    “While Donald Trump continues to defy the Supreme Court, Kilmar Abrego Garcia is being held illegally in El Salvador after being wrongfully deported,” Rep. Garcia said. “That is why we’re here — to remind the American people that kidnapping immigrants and deporting them without due process is not how we do things in America.”

    The Trump administration has refused to bring back Abrego Garcia despite a Supreme Court order to “facilitate” his return — and is receiving bipartisan criticism for it. The Salvadoran citizen entered the country illegally; an immigration judge said he should not be deported to El Salvador because Abrego Garcia was able to prove he was likely to suffer persecution in his home country. The Trump administration says it deported him because he was a member of MS-13; his lawyers deny that Abrego Garcia belongs to the gang.

    The White House has said it can’t force the Salvadoran government to release one of its citizens, while El Salvador’s President Nayib Bukele called the idea of Abrego Garcia’s release “preposterous.”

    On Thursday, a federal court denied the Trump administration’s appeal of the court’s return-order.

    Last week, Reps. Garcia and Frost requested congressional travel funds and security for the trip to El Salvador. Rep. James Comer, the Kentucky Republican who chairs the House Oversight and Government Reform Committee, rejected the request. Rep. Mark Green, the Tennessee Republican who chairs the House Homeland Security Committee, said Thursday he’d also deny any such request.

    The group’s visit to El Salvador is not a taxpayer funded CODEL trip.

    “The Complicated Relevance of Dr. Seuss’s Political Cartoons The children’s author’s early works have been finding a new audience among those opposed to the “America First” policies of President Donald Trump.”

    At least members of the Democratic Party are beginning to do something.  Will it be enough?  Some of the worst news came when an Executive Order leaked that basically removed all the Eisenhower reforms of the Diplomatic Corps and turned them all back into Ugly Americans.  The Substack PastPresentFuture, written by Dan Gardner, will give you some background on the changes made during Eisenhower’s presidency.

    If one is of a certain vintage, the phrase “ugly American” has a vivid meaning.

    Picture the worst stereotype of an American abroad. Loud, abrasive, arrogant. Incurious about local culture and politics because Americans have nothing to learn from foreigners. Incapable of delivering even a few words in another language and certain they can always make themselves understood by speaking English at a higher volume. Smugly confident that the United States is the most advanced of civilizations, in every way that matters, and all the rest of the world silently dreams of being American, or least meeting one of God’s chosen.

    That’s an “ugly American.”

    Curiously, though, that’s not what the phrase meant when it was coined. In fact, what it originally described was the opposite of all that.

    The history of “ugly American” is worth reviewing because in that one phrase we can see how American foreign aid — and foreign policy more generally — is changing in the second Trump administration. There is even a direct connection between “ugly American” and today’s headlines, notably the hostile takeover of USAID by Elon Musk and his band of young zealots.

    This isn’t a happy story, I’m afraid. But it is an important one.

    You may read about the story at the link.  Here’s the information on the linked EO from The Daily Beast.Diplomats Are Freaking Out About Trump’s Leaked Executive Order. One official said monkeys with a typewriter could have come up with a more logical plan for the State Department.”

    American diplomats spent the weekend panicking about a possible plan to radically reshape the State Department in President Donald Trump’s image.

    A 16-page document that appears to be a draft for an executive order has been circulating among diplomatic staff since last week. It calls for the elimination of dozens of positions and departments, slashing diplomatic operations in Canada, and closing “non-essential” embassies and consulates in sub-Saharan Africa.

    It would also overhaul the traditionally non-partisan foreign service exam to test applicants on whether they share Trump’s MAGA foreign policy views, according to Bloomberg.

    Secretary of State Marco Rubio called a New York Times report on the draft document “fake news‚” though he didn’t offer any details about which part was wrong.

    Diplomats, however, worried the document was real, especially in light of the administration asking Congress to cut the State Department’s budget almost in half this year, to $28.4 billion, Politico reported.

    “There’s a lot that could be reformed, but you could give infinite monkeys infinite typewriters, and they would come up with something better than that,” one diplomat told Politico.

    Many of the document’s items violate the laws that govern the State Department’s operations, while other parts contradict the Trump administration’s communications to Congress about its plans for the department, according to Politico.

    Other parts are internally inconsistent. For example, the Fulbright Program would be recast as “solely for master’s-level study in national security-related disciplines” with priority given to programs offering intense instruction in critical languages, including Russian and Mandarin Chinese.

    At the same time, the entire African Affairs bureau would be replaced by a single special envoy reporting directly to the National Security Council. Experts say pulling out of Africa would leave a void that Russia and China are both eager to exploit.

    Already, Kremlin-backed groups are handing out boxes of tuberculosis and HIV medication on the continent after the Trump administration froze U.S. aid funding, The Washington Post reported. Chinese officials have given interviews and taken out advertisements branding the country as a reliable partner.

    The purported State Department draft order would also lead to a major disruption in services for Americans living and traveling in the affected countries, including those who lose their passports or need to register births abroad.

    “Something tells me that Steven Miller is one of the monkeys with a typewriter. So, this is about all I’m up for today.  I’ll leave some suggested reads below.

    I imagine you’ve all heard that Pope Francis has exited the Earthly Door.  I’m just sorry that one of the last faces he saw was that of J Dank. But maybe he wanted to give him a test after the Cardinal gave him a lecture on why deporting innocent people is not very Catholic of him.

    This headline has raised my torch and pitchfork.

    You may check for more at Memeorandum.

    Have as nice a week as possible!

    What’s on your reading and blogging list?

     

    #FARTUSPlansForDiplomats #JohnbussBskySocialJohnBuss #FARTUS #FreeAlbregoGarcia #kakistocracy #PeteHegsethWeirdoSexualAssaulter #RIPPopeFrancis #uglyAmerican

  19. Mostly Monday Reads: Oops!  He did it again! 

    “King of kings..” John Buss, @repeat1968

    Good Day, Sky Dancers!

    The Trump Kakistocracy continues to upset the operations of every agency in the country. Unfortunately, some of the most necessary and strategic posts have been filled with village idiots.  After the revelation of the first SignalGate, you would think there would be more quick changes to protect the conversations at the top of the Pentagon and the Department of Defense.  Party Boy, sexual predator, and all-around dumb guy, Pete Hegseth, has done it again.  No need for spies when the head of the nation’s military broadcasts stuff on commercial software that everyone’s hacked.  There is total chaos at the Pentagon. This headline from Politico says it all. “White House backs Hegseth, Leavitt says ‘entire Pentagon’ is resisting him. Hegseth “is doing phenomenal leading the Pentagon,” Leavitt said during a Monday “Fox & Friends” appearance.”

    “President Donald Trump “stands strongly behind Pete Hegseth,” press secretary Karoline Leavitt said Monday morning, defending the scandal-plagued Defense secretary against escalating criticism from Democrats and former senior officials.

    Hegseth “is doing phenomenal leading the Pentagon,” Leavitt said in a “Fox & Friends” appearance. “This is what happens when the entire Pentagon is working against you and working against the monumental change you are trying to implement.”

    Her comments came a day after The New York Times reported that Hegseth shared sensitive information about military operations in Yemen in a private chat on the Signal app that included his wife, brother and personal lawyer — the second reported instance of the secretary sharing operational plans in an unclassified chat. The revelations have reignited the so-called Signalgate scandal and deepened scrutiny over Hegseth’s judgment and leadership.

    Former top Pentagon spokesperson John Ullyot, who stepped down last week, also bashed the Pentagon leader for allegedly plunging the department into dysfunction in a POLITICO Magazine opinion piece published Sunday night.

    Ullyot — once a vocal supporter of the Defense secretary — accused Hegseth’s team of spreading unverified claims about three top officials who were fired last week, falsely accusing them of leaking sensitive information to media outlets.

    “President Donald Trump has a strong record of holding his top officials to account,’” Ullyot wrote. “Given that, it’s hard to see Defense Secretary Pete Hegseth remaining in his role for much longer.”

    Hegseth brushed off the allegations Monday and blamed it on backlash for his efforts to reshape the Pentagon.

    I love this headline from Rolling Stone. “Turns Out It Wasn’t Such a Great Idea to Put Pete Hegseth in Charge of the Military. The former Fox News host’s tenure at the top of the Pentagon has been riddled with scandal and broader institutional turmoil.”  The article was filed by Ryan Bort and Asawin Suebsaeng

    Pete Hegseth barely received enough votes to win confirmation as Donald Trump’s defense secretary. Three Republicans even bucked their own party’s president to oppose him. One of them, Sen. Lisa Murkowski (R-Alaska), cited “accusations of financial mismanagement and problems with the workplace culture he fostered.” Another, Sen. Mitch McConnell (R-Ky.), said Hegseth had “failed to demonstrate” that he could manage “nearly 3 million military and civilian personnel, an annual budget of nearly $1 trillion.”

    It hasn’t taken long for Hegseth to prove them — along with every Senate Democrat and the countless others who warned about him taking over the Pentagon — right.

    The New York Times reported on Sunday that Hegseth shared attack plans in a second unsecured Signal group chat, following the revelation last month that he shared the plans to attack Houthi militants in Yemen in a Signal chat group that included a journalist. The second chat included Hegseth’s wife, brother, and personal lawyer, underscoring the former Fox News host’s recklessness with highly sensitive information.

    The news came after a tumultuous week in the Pentagon that saw Hegseth fire three senior officials — ostensibly because of an internal investigation into leaking, although the officials seemed confused about what happened. “We still have not been told what exactly we were investigated for, if there is still an active investigation, or if there was even a real investigation of ‘leaks’ to begin with,” they wrote in a joint statement Friday night, adding that, although the experience was “unconscionable,” they will continue to support Trump’s plans for the Pentagon.

    John Ullyot, who resigned as a spokesperson for the Pentagon last week, put a button on the turmoil in an op-ed for Politico on Sunday. “It’s been a month of total chaos at the Pentagon,” the piece began. “From leaks of sensitive operational plans to mass firings, the dysfunction is now a major distraction for the president — who deserves better from his senior leadership.”

    Ullyot went on to bash the week’s firings, calling the purge “strange and baffling”; detail Hegeth’s “horrible crisis-communications” following the initial Signal scandal; and predict that “many in the secretary’s own inner circle will applaud quietly” if Trump decides to hold him accountable. Ullyot also predicted that the drama isn’t going to let up anytime soon: “There are very likely more shoes to drop in short order, with even bigger bombshell stories coming this week, key Pentagon reporters have been telling sources privately.”

    We’ve already received notice in Louisiana about the number of student VISAS yanked by the #FARTUS party.  If it happens here, it’s undoubtedly happening all over the country. Jennifer Rubin has this advice on her Substack, The Contrarian. “Stop Waiting for a Formal Declaration of ‘Crisis’. It is here. We are living through it. No shit cupcake.

    Are we in a “constitutional crisis”?

    You have likely heard that question innumerable times over the past three months, followed by a discussion as to whether our president has actually, explicitly, openly violated a court order (make that a Supreme Court order). When a question is so pervasive, it is safe to assume that yes, we are already there.

    When does the combo of authoritarian bullying, revenge seeking, stooge-nominating, retaliatory prosecuting, contemptuous litigating, and lawless usurpation of congressional power become a “crisis”? The word is defined by Merriam-Webster as “an unstable or crucial time or state of affairs in which a decisive change is impending…especiallyone with the distinct possibility of a highly undesirable outcome.” Frankly, we have been in that “crisis” since the first day of the Trump presidency.

    When a Republican Congress allows the president to seize the power of the purse and does nothing, when the secretary of defense commits the worst breach of national security protocols in memory (and evidently doesn’t learn his lesson), or when Republicans refuse to reclaim the power to lay tariffs—despite a recession-inducing presidential trade war—the question is not if we are in a constitutional crisis, but just how bad it is.

    For Kilmar Abrego GarciaRumeysa OzturkMahmoud KhalilMohsen Mahdawi, and scores of others who are legally present in the United States have been snatched up, incarcerated (or are facing incarceration) in a foreign gulag, and are deprived of their right to contest their confinement and visa revocation, the “constitutional crisis” is well underway.

    When the Supreme Court convenes “literally in the middle of the night” to stop the government from spiriting away Venezuelans in apparent contradiction of their instruction to give every individual a meaningful opportunity to oppose their deportation, the “constitutional crisis” has arrived.

    Sen. Chris Van Hollen (D-Md.) knows a constitutional crisis. When asked explicitly whether we were in one on Meet the Press, he affirmed, “Yes, we are.” He had to fly down to El Salvador to see for himself Abrego Garcia’s condition, and upon his return, called out the president and his flacks for abject lies, even revealing the clumsy attempt to stage a scene suggesting he and Kilmar were tossing down margaritas on a tropical holiday.

    When such steps are required to confirm whether or not a lawful American resident is alive, we know this is not only the least trustworthy White House in modern history, but one seemingly eager to foment a constitutional crisis. “They wanted to create this appearance that life was just lovely for Kilmar, which of course is a big, fat lie,” Van Hollen said. Calling out the White House’s baseless allegations that Abrego Garcia is a gang member and terrorist, Van Hollen declared, “…In other words, put up in court or shut up.”

    If you are interested in tracking foreign students who have lost their VISAS, you may look at this from Inside Higher Education. “What We’ve Learned So Far From Tracking Student Visa Data. More than 1,500 students from nearly 250 colleges have had their visas revoked, but who they are—and why they’ve been targeted—is still largely unknown.” Two international students from UNO, where I teach, have had theirs removed.

    On April 7, amid reports that the federal government was detaining international students and revoking their visas, Inside Higher Ed began collecting and cross-checking data in an effort to track exactly how many students were affected—and at which institutions. Our goal was to understand the scope of the federal government’s involvement in the visa process and what it means for international students and the colleges and universities they attend.

    Over the past two weeks, more than 1,500 students—representing several hundred colleges and universities, as well as state systems—have had a sudden or unexpected change in their Student and Exchange Visitor Information System (SEVIS) listing, or their F-1 or J-1 visa status.

    Luke Garrett, writing for NPR, has this headline today. “House Democrats land in El Salvador, demand Abrego Garcia’s return.”  They need to start showing up in ICE detention centers, like the one down here, before more folks get shipped off despite all the court decisions.

    Four House Democrats were scheduled to land in El Salvador Monday to demand the release and return of Kilmar Abrego Garcia, a Salvadoran citizen who lived in Maryland and was deported by the administration to a prison in El Salvador due to what the Trump administration an “administrative error.”

    The group — Rep. Robert Garcia, D-Calif., Rep. Maxwell Frost, D-Fla., Rep. Yassamin Ansari, D-Ariz., and Rep. Maxine Dexter, D-Ore. — said in a statement they hope “to pressure” the White House “to abide by a Supreme Court order.”

    “While Donald Trump continues to defy the Supreme Court, Kilmar Abrego Garcia is being held illegally in El Salvador after being wrongfully deported,” Rep. Garcia said. “That is why we’re here — to remind the American people that kidnapping immigrants and deporting them without due process is not how we do things in America.”

    The Trump administration has refused to bring back Abrego Garcia despite a Supreme Court order to “facilitate” his return — and is receiving bipartisan criticism for it. The Salvadoran citizen entered the country illegally; an immigration judge said he should not be deported to El Salvador because Abrego Garcia was able to prove he was likely to suffer persecution in his home country. The Trump administration says it deported him because he was a member of MS-13; his lawyers deny that Abrego Garcia belongs to the gang.

    The White House has said it can’t force the Salvadoran government to release one of its citizens, while El Salvador’s President Nayib Bukele called the idea of Abrego Garcia’s release “preposterous.”

    On Thursday, a federal court denied the Trump administration’s appeal of the court’s return-order.

    Last week, Reps. Garcia and Frost requested congressional travel funds and security for the trip to El Salvador. Rep. James Comer, the Kentucky Republican who chairs the House Oversight and Government Reform Committee, rejected the request. Rep. Mark Green, the Tennessee Republican who chairs the House Homeland Security Committee, said Thursday he’d also deny any such request.

    The group’s visit to El Salvador is not a taxpayer funded CODEL trip.

    “The Complicated Relevance of Dr. Seuss’s Political Cartoons The children’s author’s early works have been finding a new audience among those opposed to the “America First” policies of President Donald Trump.”

    At least members of the Democratic Party are beginning to do something.  Will it be enough?  Some of the worst news came when an Executive Order leaked that basically removed all the Eisenhower reforms of the Diplomatic Corps and turned them all back into Ugly Americans.  The Substack PastPresentFuture, written by Dan Gardner, will give you some background on the changes made during Eisenhower’s presidency.

    If one is of a certain vintage, the phrase “ugly American” has a vivid meaning.

    Picture the worst stereotype of an American abroad. Loud, abrasive, arrogant. Incurious about local culture and politics because Americans have nothing to learn from foreigners. Incapable of delivering even a few words in another language and certain they can always make themselves understood by speaking English at a higher volume. Smugly confident that the United States is the most advanced of civilizations, in every way that matters, and all the rest of the world silently dreams of being American, or least meeting one of God’s chosen.

    That’s an “ugly American.”

    Curiously, though, that’s not what the phrase meant when it was coined. In fact, what it originally described was the opposite of all that.

    The history of “ugly American” is worth reviewing because in that one phrase we can see how American foreign aid — and foreign policy more generally — is changing in the second Trump administration. There is even a direct connection between “ugly American” and today’s headlines, notably the hostile takeover of USAID by Elon Musk and his band of young zealots.

    This isn’t a happy story, I’m afraid. But it is an important one.

    You may read about the story at the link.  Here’s the information on the linked EO from The Daily Beast.Diplomats Are Freaking Out About Trump’s Leaked Executive Order. One official said monkeys with a typewriter could have come up with a more logical plan for the State Department.”

    American diplomats spent the weekend panicking about a possible plan to radically reshape the State Department in President Donald Trump’s image.

    A 16-page document that appears to be a draft for an executive order has been circulating among diplomatic staff since last week. It calls for the elimination of dozens of positions and departments, slashing diplomatic operations in Canada, and closing “non-essential” embassies and consulates in sub-Saharan Africa.

    It would also overhaul the traditionally non-partisan foreign service exam to test applicants on whether they share Trump’s MAGA foreign policy views, according to Bloomberg.

    Secretary of State Marco Rubio called a New York Times report on the draft document “fake news‚” though he didn’t offer any details about which part was wrong.

    Diplomats, however, worried the document was real, especially in light of the administration asking Congress to cut the State Department’s budget almost in half this year, to $28.4 billion, Politico reported.

    “There’s a lot that could be reformed, but you could give infinite monkeys infinite typewriters, and they would come up with something better than that,” one diplomat told Politico.

    Many of the document’s items violate the laws that govern the State Department’s operations, while other parts contradict the Trump administration’s communications to Congress about its plans for the department, according to Politico.

    Other parts are internally inconsistent. For example, the Fulbright Program would be recast as “solely for master’s-level study in national security-related disciplines” with priority given to programs offering intense instruction in critical languages, including Russian and Mandarin Chinese.

    At the same time, the entire African Affairs bureau would be replaced by a single special envoy reporting directly to the National Security Council. Experts say pulling out of Africa would leave a void that Russia and China are both eager to exploit.

    Already, Kremlin-backed groups are handing out boxes of tuberculosis and HIV medication on the continent after the Trump administration froze U.S. aid funding, The Washington Post reported. Chinese officials have given interviews and taken out advertisements branding the country as a reliable partner.

    The purported State Department draft order would also lead to a major disruption in services for Americans living and traveling in the affected countries, including those who lose their passports or need to register births abroad.

    “Something tells me that Steven Miller is one of the monkeys with a typewriter. So, this is about all I’m up for today.  I’ll leave some suggested reads below.

    I imagine you’ve all heard that Pope Francis has exited the Earthly Door.  I’m just sorry that one of the last faces he saw was that of J Dank. But maybe he wanted to give him a test after the Cardinal gave him a lecture on why deporting innocent people is not very Catholic of him.

    This headline has raised my torch and pitchfork.

    You may check for more at Memeorandum.

    Have as nice a week as possible!

    What’s on your reading and blogging list?

     

    #FARTUSPlansForDiplomats #JohnbussBskySocialJohnBuss #FARTUS #FreeAlbregoGarcia #kakistocracy #PeteHegsethWeirdoSexualAssaulter #RIPPopeFrancis #uglyAmerican

  20. SIGUE ⬇️

    Renuncia a dinero, pero consigue la custodia total de su hija.

    ¿El motivo? Evitar que Suri creciera dentro del sistema.

    Desde entonces, Tom Cruise no ha tenido contacto público con su hija.
    Todo apunta a la política de desconexión: Katie fue considerada una amenaza para la organización.

    El contraste es brutal con Nicole Kidman.

    Cuando ella se divorció de Cruise en 2001, no tenía ese plan.
    Sus hijos, Bella y Connor, crecieron dentro de la Cienciología.
    Fueron sometidos a auditorías desde jóvenes y educados para ver a su madre como una “Persona Supresiva”.

    Hoy siguen dentro.
    Y prácticamente sin relación con ella.

    Nicole, en público, no ataca a la organización.
    Sabe que si lo hace, pierde cualquier posibilidad de acercamiento.

    También está el caso de Leah Remini, que salió y se convirtió en una de las voces más duras contra la Cienciología, denunciando todo esto en documentales.

    Y aquí está la clave final: ¿qué ofrece todo esto a cambio?

    Promete libertad espiritual, superar traumas, incluso habilidades superiores en niveles avanzados.
    Pero también ofrece algo muy potente: pertenecer a un grupo que te hace sentir elegido, diferente, por encima del resto.

    El problema es el precio: dinero, privacidad, relaciones personales… y, en muchos casos, la capacidad de salir sin consecuencias.

    No necesitas barrotes cuando consigues que la gente tenga más miedo de irse que de quedarse.

    No es algo simple de “cree o no cree”, es más bien una red donde entras poco a poco… y salir se vuelve complicado por todo lo que dejas dentro.

    En el caso de John Travolta, la idea de la “jaula de oro” se usa mucho porque resume bien esa mezcla de privilegio y dependencia.

    Empieza por las auditorías.
    Durante décadas, Travolta ha pasado por miles de horas de sesiones.
    Y no son charlas ligeras: ahí se confiesa todo.
    Miedos, errores, cosas íntimas, incluso pensamientos que normalmente no contarías a nadie.
    Todo eso se anota, se archiva… y según exmiembros, muchas veces se graba.

    Eso crea lo que dentro llaman “expediente ético”.
    Cuanto más tiempo llevas, más cargado está.
    Y ahí aparece el problema: no es solo espiritual, es poder.
    Porque esa información, si saliera fuera, podría dañar seriamente la imagen pública de alguien como él.

    Luego está el tema de su vida privada.
    Durante años han circulado rumores, demandas y comentarios sobre su orientación.
    Aquí hay que ser prudente con lo que se afirma, pero sí es cierto que la Iglesia de la Cienciología ha tenido posturas muy críticas con la homosexualidad en sus textos clásicos.
    Dentro de esa lógica, cualquier información sensible puede convertirse en presión interna.

    No hace falta que alguien diga “te vamos a chantajear”.
    El sistema ya está montado para que lo entiendas sin decirlo.

    El punto más duro de su historia es la muerte de su hijo Jett en 2009.
    Jett tenía problemas neurológicos y convulsiones.
    La relación entre la Cienciología y la medicina siempre ha sido conflictiva, sobre todo con la psiquiatría.
    Eso generó muchas críticas externas, porque algunos consideran que se prioriza el enfoque espiritual frente a tratamientos médicos convencionales.

    Tras la muerte del chico, mucha gente pensó que Travolta se alejaría de la organización.
    Pero ocurrió lo contrario: se mantuvo dentro.
    Y ahí es donde muchos exmiembros señalan algo clave: en momentos de crisis, la organización refuerza el vínculo, rodea a la persona, le da apoyo… y hace más difícil aún que se cuestione todo.

    ¿Y qué recibe él a cambio?

    Dentro del sistema, Travolta no es solo un actor.
    Es alguien con estatus altísimo.
    Se le considera avanzado espiritualmente, con niveles OT elevados.
    Eso, para alguien que lleva décadas dentro, no es un detalle menor.
    Es identidad.

    Además, su entorno profesional muchas veces está compuesto por miembros de la organización: asistentes, empleados, gente de confianza.
    Eso crea un círculo muy cerrado, muy leal… y también muy controlado.

    La diferencia con Tom Cruise es interesante.
    Cruise es visto como un creyente total, casi la cara pública más potente del sistema.
    En cambio, Travolta suele describirse (según exmiembros) como alguien más ambiguo: no tanto líder, pero tampoco alguien que pueda irse sin consecuencias.

    Y ahí está el núcleo de todo esto: no es solo fe, ni solo dinero, ni solo fama.
    Es una mezcla de todo.
    Prestigio, protección, identidad… a cambio de silencio y permanencia.

    Más que una cárcel clásica, es un sistema donde la puerta existe… pero cruzarla tiene un coste muy alto.

    ▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣

    #cienciologia #sectas #controversia #historiareal #controlmental #tomcruise #katieholmes #nicolekidman #historiasreales #ecosdelpasado

  21. SIGUE ⬇️

    Renuncia a dinero, pero consigue la custodia total de su hija.

    ¿El motivo? Evitar que Suri creciera dentro del sistema.

    Desde entonces, Tom Cruise no ha tenido contacto público con su hija.
    Todo apunta a la política de desconexión: Katie fue considerada una amenaza para la organización.

    El contraste es brutal con Nicole Kidman.

    Cuando ella se divorció de Cruise en 2001, no tenía ese plan.
    Sus hijos, Bella y Connor, crecieron dentro de la Cienciología.
    Fueron sometidos a auditorías desde jóvenes y educados para ver a su madre como una “Persona Supresiva”.

    Hoy siguen dentro.
    Y prácticamente sin relación con ella.

    Nicole, en público, no ataca a la organización.
    Sabe que si lo hace, pierde cualquier posibilidad de acercamiento.

    También está el caso de Leah Remini, que salió y se convirtió en una de las voces más duras contra la Cienciología, denunciando todo esto en documentales.

    Y aquí está la clave final: ¿qué ofrece todo esto a cambio?

    Promete libertad espiritual, superar traumas, incluso habilidades superiores en niveles avanzados.
    Pero también ofrece algo muy potente: pertenecer a un grupo que te hace sentir elegido, diferente, por encima del resto.

    El problema es el precio: dinero, privacidad, relaciones personales… y, en muchos casos, la capacidad de salir sin consecuencias.

    No necesitas barrotes cuando consigues que la gente tenga más miedo de irse que de quedarse.

    No es algo simple de “cree o no cree”, es más bien una red donde entras poco a poco… y salir se vuelve complicado por todo lo que dejas dentro.

    En el caso de John Travolta, la idea de la “jaula de oro” se usa mucho porque resume bien esa mezcla de privilegio y dependencia.

    Empieza por las auditorías.
    Durante décadas, Travolta ha pasado por miles de horas de sesiones.
    Y no son charlas ligeras: ahí se confiesa todo.
    Miedos, errores, cosas íntimas, incluso pensamientos que normalmente no contarías a nadie.
    Todo eso se anota, se archiva… y según exmiembros, muchas veces se graba.

    Eso crea lo que dentro llaman “expediente ético”.
    Cuanto más tiempo llevas, más cargado está.
    Y ahí aparece el problema: no es solo espiritual, es poder.
    Porque esa información, si saliera fuera, podría dañar seriamente la imagen pública de alguien como él.

    Luego está el tema de su vida privada.
    Durante años han circulado rumores, demandas y comentarios sobre su orientación.
    Aquí hay que ser prudente con lo que se afirma, pero sí es cierto que la Iglesia de la Cienciología ha tenido posturas muy críticas con la homosexualidad en sus textos clásicos.
    Dentro de esa lógica, cualquier información sensible puede convertirse en presión interna.

    No hace falta que alguien diga “te vamos a chantajear”.
    El sistema ya está montado para que lo entiendas sin decirlo.

    El punto más duro de su historia es la muerte de su hijo Jett en 2009.
    Jett tenía problemas neurológicos y convulsiones.
    La relación entre la Cienciología y la medicina siempre ha sido conflictiva, sobre todo con la psiquiatría.
    Eso generó muchas críticas externas, porque algunos consideran que se prioriza el enfoque espiritual frente a tratamientos médicos convencionales.

    Tras la muerte del chico, mucha gente pensó que Travolta se alejaría de la organización.
    Pero ocurrió lo contrario: se mantuvo dentro.
    Y ahí es donde muchos exmiembros señalan algo clave: en momentos de crisis, la organización refuerza el vínculo, rodea a la persona, le da apoyo… y hace más difícil aún que se cuestione todo.

    ¿Y qué recibe él a cambio?

    Dentro del sistema, Travolta no es solo un actor.
    Es alguien con estatus altísimo.
    Se le considera avanzado espiritualmente, con niveles OT elevados.
    Eso, para alguien que lleva décadas dentro, no es un detalle menor.
    Es identidad.

    Además, su entorno profesional muchas veces está compuesto por miembros de la organización: asistentes, empleados, gente de confianza.
    Eso crea un círculo muy cerrado, muy leal… y también muy controlado.

    La diferencia con Tom Cruise es interesante.
    Cruise es visto como un creyente total, casi la cara pública más potente del sistema.
    En cambio, Travolta suele describirse (según exmiembros) como alguien más ambiguo: no tanto líder, pero tampoco alguien que pueda irse sin consecuencias.

    Y ahí está el núcleo de todo esto: no es solo fe, ni solo dinero, ni solo fama.
    Es una mezcla de todo.
    Prestigio, protección, identidad… a cambio de silencio y permanencia.

    Más que una cárcel clásica, es un sistema donde la puerta existe… pero cruzarla tiene un coste muy alto.

    ▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣

    #cienciologia #sectas #controversia #historiareal #controlmental #tomcruise #katieholmes #nicolekidman #historiasreales #ecosdelpasado

  22. SIGUE ⬇️

    Renuncia a dinero, pero consigue la custodia total de su hija.

    ¿El motivo? Evitar que Suri creciera dentro del sistema.

    Desde entonces, Tom Cruise no ha tenido contacto público con su hija.
    Todo apunta a la política de desconexión: Katie fue considerada una amenaza para la organización.

    El contraste es brutal con Nicole Kidman.

    Cuando ella se divorció de Cruise en 2001, no tenía ese plan.
    Sus hijos, Bella y Connor, crecieron dentro de la Cienciología.
    Fueron sometidos a auditorías desde jóvenes y educados para ver a su madre como una “Persona Supresiva”.

    Hoy siguen dentro.
    Y prácticamente sin relación con ella.

    Nicole, en público, no ataca a la organización.
    Sabe que si lo hace, pierde cualquier posibilidad de acercamiento.

    También está el caso de Leah Remini, que salió y se convirtió en una de las voces más duras contra la Cienciología, denunciando todo esto en documentales.

    Y aquí está la clave final: ¿qué ofrece todo esto a cambio?

    Promete libertad espiritual, superar traumas, incluso habilidades superiores en niveles avanzados.
    Pero también ofrece algo muy potente: pertenecer a un grupo que te hace sentir elegido, diferente, por encima del resto.

    El problema es el precio: dinero, privacidad, relaciones personales… y, en muchos casos, la capacidad de salir sin consecuencias.

    No necesitas barrotes cuando consigues que la gente tenga más miedo de irse que de quedarse.

    No es algo simple de “cree o no cree”, es más bien una red donde entras poco a poco… y salir se vuelve complicado por todo lo que dejas dentro.

    En el caso de John Travolta, la idea de la “jaula de oro” se usa mucho porque resume bien esa mezcla de privilegio y dependencia.

    Empieza por las auditorías.
    Durante décadas, Travolta ha pasado por miles de horas de sesiones.
    Y no son charlas ligeras: ahí se confiesa todo.
    Miedos, errores, cosas íntimas, incluso pensamientos que normalmente no contarías a nadie.
    Todo eso se anota, se archiva… y según exmiembros, muchas veces se graba.

    Eso crea lo que dentro llaman “expediente ético”.
    Cuanto más tiempo llevas, más cargado está.
    Y ahí aparece el problema: no es solo espiritual, es poder.
    Porque esa información, si saliera fuera, podría dañar seriamente la imagen pública de alguien como él.

    Luego está el tema de su vida privada.
    Durante años han circulado rumores, demandas y comentarios sobre su orientación.
    Aquí hay que ser prudente con lo que se afirma, pero sí es cierto que la Iglesia de la Cienciología ha tenido posturas muy críticas con la homosexualidad en sus textos clásicos.
    Dentro de esa lógica, cualquier información sensible puede convertirse en presión interna.

    No hace falta que alguien diga “te vamos a chantajear”.
    El sistema ya está montado para que lo entiendas sin decirlo.

    El punto más duro de su historia es la muerte de su hijo Jett en 2009.
    Jett tenía problemas neurológicos y convulsiones.
    La relación entre la Cienciología y la medicina siempre ha sido conflictiva, sobre todo con la psiquiatría.
    Eso generó muchas críticas externas, porque algunos consideran que se prioriza el enfoque espiritual frente a tratamientos médicos convencionales.

    Tras la muerte del chico, mucha gente pensó que Travolta se alejaría de la organización.
    Pero ocurrió lo contrario: se mantuvo dentro.
    Y ahí es donde muchos exmiembros señalan algo clave: en momentos de crisis, la organización refuerza el vínculo, rodea a la persona, le da apoyo… y hace más difícil aún que se cuestione todo.

    ¿Y qué recibe él a cambio?

    Dentro del sistema, Travolta no es solo un actor.
    Es alguien con estatus altísimo.
    Se le considera avanzado espiritualmente, con niveles OT elevados.
    Eso, para alguien que lleva décadas dentro, no es un detalle menor.
    Es identidad.

    Además, su entorno profesional muchas veces está compuesto por miembros de la organización: asistentes, empleados, gente de confianza.
    Eso crea un círculo muy cerrado, muy leal… y también muy controlado.

    La diferencia con Tom Cruise es interesante.
    Cruise es visto como un creyente total, casi la cara pública más potente del sistema.
    En cambio, Travolta suele describirse (según exmiembros) como alguien más ambiguo: no tanto líder, pero tampoco alguien que pueda irse sin consecuencias.

    Y ahí está el núcleo de todo esto: no es solo fe, ni solo dinero, ni solo fama.
    Es una mezcla de todo.
    Prestigio, protección, identidad… a cambio de silencio y permanencia.

    Más que una cárcel clásica, es un sistema donde la puerta existe… pero cruzarla tiene un coste muy alto.

    ▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣

    #cienciologia #sectas #controversia #historiareal #controlmental #tomcruise #katieholmes #nicolekidman #historiasreales #ecosdelpasado

  23. SIGUE ⬇️

    Renuncia a dinero, pero consigue la custodia total de su hija.

    ¿El motivo? Evitar que Suri creciera dentro del sistema.

    Desde entonces, Tom Cruise no ha tenido contacto público con su hija.
    Todo apunta a la política de desconexión: Katie fue considerada una amenaza para la organización.

    El contraste es brutal con Nicole Kidman.

    Cuando ella se divorció de Cruise en 2001, no tenía ese plan.
    Sus hijos, Bella y Connor, crecieron dentro de la Cienciología.
    Fueron sometidos a auditorías desde jóvenes y educados para ver a su madre como una “Persona Supresiva”.

    Hoy siguen dentro.
    Y prácticamente sin relación con ella.

    Nicole, en público, no ataca a la organización.
    Sabe que si lo hace, pierde cualquier posibilidad de acercamiento.

    También está el caso de Leah Remini, que salió y se convirtió en una de las voces más duras contra la Cienciología, denunciando todo esto en documentales.

    Y aquí está la clave final: ¿qué ofrece todo esto a cambio?

    Promete libertad espiritual, superar traumas, incluso habilidades superiores en niveles avanzados.
    Pero también ofrece algo muy potente: pertenecer a un grupo que te hace sentir elegido, diferente, por encima del resto.

    El problema es el precio: dinero, privacidad, relaciones personales… y, en muchos casos, la capacidad de salir sin consecuencias.

    No necesitas barrotes cuando consigues que la gente tenga más miedo de irse que de quedarse.

    No es algo simple de “cree o no cree”, es más bien una red donde entras poco a poco… y salir se vuelve complicado por todo lo que dejas dentro.

    En el caso de John Travolta, la idea de la “jaula de oro” se usa mucho porque resume bien esa mezcla de privilegio y dependencia.

    Empieza por las auditorías.
    Durante décadas, Travolta ha pasado por miles de horas de sesiones.
    Y no son charlas ligeras: ahí se confiesa todo.
    Miedos, errores, cosas íntimas, incluso pensamientos que normalmente no contarías a nadie.
    Todo eso se anota, se archiva… y según exmiembros, muchas veces se graba.

    Eso crea lo que dentro llaman “expediente ético”.
    Cuanto más tiempo llevas, más cargado está.
    Y ahí aparece el problema: no es solo espiritual, es poder.
    Porque esa información, si saliera fuera, podría dañar seriamente la imagen pública de alguien como él.

    Luego está el tema de su vida privada.
    Durante años han circulado rumores, demandas y comentarios sobre su orientación.
    Aquí hay que ser prudente con lo que se afirma, pero sí es cierto que la Iglesia de la Cienciología ha tenido posturas muy críticas con la homosexualidad en sus textos clásicos.
    Dentro de esa lógica, cualquier información sensible puede convertirse en presión interna.

    No hace falta que alguien diga “te vamos a chantajear”.
    El sistema ya está montado para que lo entiendas sin decirlo.

    El punto más duro de su historia es la muerte de su hijo Jett en 2009.
    Jett tenía problemas neurológicos y convulsiones.
    La relación entre la Cienciología y la medicina siempre ha sido conflictiva, sobre todo con la psiquiatría.
    Eso generó muchas críticas externas, porque algunos consideran que se prioriza el enfoque espiritual frente a tratamientos médicos convencionales.

    Tras la muerte del chico, mucha gente pensó que Travolta se alejaría de la organización.
    Pero ocurrió lo contrario: se mantuvo dentro.
    Y ahí es donde muchos exmiembros señalan algo clave: en momentos de crisis, la organización refuerza el vínculo, rodea a la persona, le da apoyo… y hace más difícil aún que se cuestione todo.

    ¿Y qué recibe él a cambio?

    Dentro del sistema, Travolta no es solo un actor.
    Es alguien con estatus altísimo.
    Se le considera avanzado espiritualmente, con niveles OT elevados.
    Eso, para alguien que lleva décadas dentro, no es un detalle menor.
    Es identidad.

    Además, su entorno profesional muchas veces está compuesto por miembros de la organización: asistentes, empleados, gente de confianza.
    Eso crea un círculo muy cerrado, muy leal… y también muy controlado.

    La diferencia con Tom Cruise es interesante.
    Cruise es visto como un creyente total, casi la cara pública más potente del sistema.
    En cambio, Travolta suele describirse (según exmiembros) como alguien más ambiguo: no tanto líder, pero tampoco alguien que pueda irse sin consecuencias.

    Y ahí está el núcleo de todo esto: no es solo fe, ni solo dinero, ni solo fama.
    Es una mezcla de todo.
    Prestigio, protección, identidad… a cambio de silencio y permanencia.

    Más que una cárcel clásica, es un sistema donde la puerta existe… pero cruzarla tiene un coste muy alto.

    ▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣

    #cienciologia #sectas #controversia #historiareal #controlmental #tomcruise #katieholmes #nicolekidman #historiasreales #ecosdelpasado

  24. GRINDER no te deja decir “no sionistas “ en tu bio o tus preferencias.
    Parece que la página de encuentro #LGTBIQ no deja sus usuarios posicionarse en contra de la doctrina fascista supremacista israelí.
    Parece que estar buscando un ligue fuera de la lógica colonialista xenófoba promovida por los sionistas no entra en los valores de esta pagina #gay.
    Dicho de otra manera, parece que #grinder apoya los autores del #genocidio en curso en #gaza.
    404media.co/grindr-no-zionists Grindr Won’t Let Users Say 'No Zionists'

  25. Del «Aumento de Productividad» al «Desplazamiento de Mano de Obra» por IA

    Aunque muchas empresas de IA sostienen que su tecnología solo elimina el «trabajo aburrido», los capitalistas de riesgo (VCs) encuestados por TechCrunch son más directos sobre sus expectativas financieras (Fuente CNBC).

    https://youtu.be/gC6S6tSaiDU?si=JFVjpHtB7idY2abD

    1. Reasignación Agresiva de Presupuestos

    Los inversores señalan que 2026 será el primer año completo donde los presupuestos corporativos reflejarán una transferencia masiva de fondos: del gasto en salarios humanos hacia el gasto en infraestructura y licencias de IA.

    • Rajeev Dham (Sapphire): Afirma que los presupuestos de 2026 marcarán el inicio del desvío de recursos de la mano de obra hacia la implementación de IA.
    • Marell Evans: Predice que los despidos continuarán impactando agresivamente la tasa de empleo en EE. UU. a medida que los presupuestos de IA crezcan.

    2. El Surgimiento de los «Agentes Autónomos»

    Jason Mendel (Battery Ventures) destaca que 2026 será el «año de los agentes». La IA evolucionará de ser un «copiloto» que ayuda al humano a ser un agente de software que automatiza el trabajo por sí mismo, entregando la propuesta de valor de desplazamiento de mano de obra en áreas específicas (especialmente roles repetitivos y de lógica compleja).

    3. La IA como «Chivo Expiatorio» Corporativo

    El informe revela una tendencia cínica: la IA se convertirá en la excusa técnica perfecta para despidos que, en realidad, responden a errores de gestión pasados o sobrecontrataciones durante la pandemia.

    «La IA será el chivo expiatorio para los ejecutivos que buscan cubrir errores del pasado». — TechCrunch survey insights.

    Datos que Respaldan el Temor

    • Automatización Real: Un estudio de noviembre (MIT) citado en el artículo estima que el 11.7% de los trabajos actuales ya son técnicamente automatizables con la IA disponible.
    • Eliminación de Nivel Inicial: Los empleadores ya están eliminando puestos de entrada (entry-level), argumentando que los seniors pueden realizar esas tareas apoyados en herramientas de IA.

    Cómo prepararse (Según el análisis)

    A pesar del panorama, los inversores sugieren que la clave para sobrevivir a 2026 no es competir con la IA, sino dominar la «Vibe Coding» o la orquestación de sistemas. El mercado valorará a quienes puedan planificar y lanzar herramientas interactivas usando plataformas de desarrollo impulsadas por IA, moviéndose hacia roles de gestión de productos y estrategia.

    #AgentesIA #arielmcorg #Automatización #despidos #Desplazamientos #EstrategiaEmpresarial #FuturoDelTrabajo #IA2026 #infosertec #Inversores #MercadoLaboral #PORTADA

  26. 3/3
    Pero el maestro remata: "No, la pregunta misma es ilógica. ¿Cómo van a entrar dos hombres por la misma chimenea y que uno salga limpio y el otro no?".
    A veces la lógica colapsa porque aceptamos premisas falsas. El error no siempre está en la respuesta, sino en aceptar una pregunta equivocada. 💡
    #Debate #Sabiduría #Mastodon

  27. Google alerta sobre ataques de «destilación» para clonar modelos de inteligencia artificial

    Un nuevo informe del Google Threat Intelligence Group (GTIG) ha encendido las alarmas en Silicon Valley. Según el reporte publicado este febrero de 2026, la Inteligencia Artificial ya no es solo una herramienta de ataque, sino que se ha convertido en el objetivo principal. Los hackers están utilizando técnicas de «destilación» o extracción de modelos para intentar robar la lógica interna de sistemas como Gemini y replicarlos a una fracción de su costo original (Fuente Google).

    Hasta hace poco, el robo de propiedad intelectual en tecnología implicaba extraer archivos de un servidor. Hoy, la táctica es más sutil y se basa en el «bombardeo de prompts». Google detectó una campaña masiva donde atacantes realizaron más de 100,000 consultas a Gemini con un solo objetivo: observar las respuestas de razonamiento del modelo para realizar ingeniería inversa y entrenar sus propias IAs «estudiantes» con el conocimiento de la IA «maestra».

    ¿Cómo funciona un ataque de extracción de inteligencia?

    A diferencia de un hackeo tradicional, este ataque no busca «romper» la seguridad, sino «ordeñar» el conocimiento:

    1. Entrada Masiva: Los atacantes utilizan scripts automatizados para enviar cientos de miles de preguntas complejas al modelo.
    2. Mapeo de Lógica: Analizan cómo la IA estructura sus respuestas, sus sesgos y su razonamiento lógico.
    3. Clonación de Bajo Costo: Utilizan esos datos para entrenar un modelo mucho más pequeño y barato que imita el comportamiento de la IA original, ahorrándose los miles de millones de dólares que costó el entrenamiento inicial.

    IA-Augmented Malware: El caso HONESTCUE

    El informe de Google también revela la aparición de nuevas familias de malware, como HONESTCUE, que llevan la ciberamenaza a un nivel autónomo:

    • Inyección de Código en Tiempo Real: En lugar de llevar el código malicioso pregrabado (que es fácil de detectar por los antivirus), este malware hace llamadas a la API de Gemini durante su ejecución para solicitar fragmentos de código específicos según el entorno que encuentre.
    • Ofuscación Dinámica: La IA ayuda al malware a reescribir su propio código cada pocas horas, volviéndolo prácticamente invisible para los sistemas de detección tradicionales basados en firmas.

    Actores estatales en escena

    Google ha identificado que grupos de hackers vinculados a China, Rusia, Irán y Corea del Norte están liderando este cambio de paradigma. Estos actores no solo buscan clonar modelos, sino que utilizan la IA para realizar reconocimientos de objetivos que antes tomaban semanas en cuestión de minutos, eliminando errores gramaticales en correos de phishing y creando perfiles de confianza extremadamente convincentes.

    «Estamos entrando en la era de la ciberseguridad máquina-contra-máquina», advierte el reporte. La defensa ya no puede ser estática; para detener a un adversario que utiliza IA para evolucionar sus tácticas en tiempo real, las empresas deben adoptar defensas igualmente autónomas y adaptativas. Google ya ha comenzado a implementar defensas proactivas en Gemini que degradan intencionalmente la calidad de la respuesta cuando detectan patrones de extracción, protegiendo así su propiedad intelectual.

    #arielmcorg #ciberataque #ciberseguridad #gemini #google #innovación #InteligenciaArtificial #malware #PORTADA #PropiedadIntelectual #Reporte2026 #TechNews
  28. Opinión | Hilda Teresita Bautista Villegas | Signos del deterioro mental del presidente Trump

    Menospreciar con frases denigrantes, como decir que “le besan el trasero”, a los mismos empresarios que financiaron su llegada a la presidencia y que lo han acompañado hasta hoy, no solo es un acto de ingratitud, sino un grave error político.

    Por Hilda Teresita Bautista Villegas

    Imponer políticas arancelarias que afectan directamente el suministro de materias primas para muchas empresas estadounidenses es una medida absurda que debilita su propia economía.

    Acusar ridículamente a la presidenta de México, de tener miedo a los cárteles por no permitir la intromisión del ejército estadounidense y defender nuestra soberanía, es una tontería sin dimensión, además de una provocación machista y torpe, totalmente desubicada e ignorante de la madurez política y psicológica que impera en nuestro país.

    ¿Cómo puede un “presidente” que arrebata a las escuelas el presupuesto destinado a atender los problemas emocionales de jóvenes trastornados por generaciones de culto al miedo, al bullying, al armamentismo y a la permisividad hacia las drogas, pretender resolver los conflictos de otro país?

    ¿Adónde está su lógica?

    La hipocresía en su máxima expresión

    La existencia de los carteles y sus actividades ilícitas son problemas fomentados y alimentados por el tráfico de armas y la economía negra que se mueve dentro de su propio territorio.

    ¿No es acaso un acto terrorista interno y externo el fomentar la infiltración de armas a grupos vulnerables, proteger el huachicoleo de combustible y desatender a su propia población hundida en el consumo de drogas?  

    Permitir el robo de combustible mexicano para procesarlo en Texas y venderlo de regreso a México, también es un grave delito solapado por su ineficiente gobierno.

    ¡Claro que merecen cárcel los delincuentes de cuello blanco que participan en esas redes de corrupción!

    México hoy está encabezado por un gobierno responsable, formado por personas capacitadas que, desde el corazón y el discernimiento, están entregando su vida para reconstruir un país devastado por años y años de corrupción e indiferencia.

    Claudia Sheinbaum Pardo

    ¿Cómo se atreve entonces, un presidente pretencioso y fifi, como lo es Trump, sugerir lo que debe hacerse en nuestra tierra cuando es incapaz de ver los problemas catastróficos que están desmoronando a su propio pueblo desde hace décadas. 

    ¡Caro que no distingue esos problemas ya que él mismo, con su inestabilidad emocional, los está generando!

    El trastorno psicológico que Trump manifiesta le impide comprender que el ser humano está hecho de alma, cuerpo, cerebro y corazón. Cada una de esas dimensiones requiere atención y equilibrio. Pero su egocentrismo patológico lo encierra en una percepción materialista, carente de empatía y de todo sentido humanista.

    Quitar presupuesto a la salud y la educación. Llevar a la quiebra a cientos de empresas. Expulsar del país a trabajadores mexicanos que mantienen en funcionamiento negocios clave de la economía estadounidense porque los empresarios no logran cubrir esas vacantes con ciudadanos locales a los que ¡no les gusta trabajar con las manos y como tristemente parece, tampoco con el discernimiento!

    Todo esto -y mucho más-, no solo revela una profunda descomposición política, sino alarmantes signos de deterioro mental en el presidente Trump, cuyas decisiones parecen ir siempre en contra del bienestar de su propio país.

    Él no parece saber responder a una lógica estratégica ni a la coherencia institucional, sino más bien a sus impulsos, miedos y delirios de poder.

    ¿Hasta cuándo despertará el pueblo estadounidense? ¿Cuándo descubrirán que el consumismo y la comida chatarra no son el origen de su poder personal y tampoco son el poder de su voz?

    ¡Ya, pronto, tienen que despertar y reconectar con su capacidad racional y humana para cambiar el rumbo de su historia!

    Donald Trump

    ¡Conéctate con Sociedad Noticias! Suscríbete a nuestro canal de YouTube y activa las notificaciones, o bien, síguenos en las redes sociales: FacebookTwitter e Instagram.

    #ClaudiasheinbaumLopezObradorFernandeznoronAMarceloEbrardOmarGarciaHarfuchFisgonMiguelTorruco #AndrésManuelLópezObrador #arancelesComercialesTrump #armasTráficoEstadosUnidos #Cdmx #derechosHumanosMéxico #dignidadNacional #discursoDeOdioTrump #DonaldTrump #estabilidadEmocionalLíderes #gobiernoMexicanoActual #huachicolCombustibleTexas #Información #InformaciónMéxico #México #migraciónMéxicoEEUU_ #Morena #noticia #noticias #NoticiasMéxico #NoticiasSociedad #políticaExteriorMéxico #políticaTóxicaTrump #relacionesMéxicoEstadosUnidos #saludMentalTrump #SN #soberaníaNacional #Sociedad #SociedadNoticias #SociedadNoticiasCom #sociedadNoticias #SociedadNoticiasCom

  29. :stargif: 𝑳𝒂 𝒄𝒂𝒔𝒂 𝒒𝒖𝒆 𝒏𝒖𝒏𝒄𝒂 𝒒𝒖𝒊𝒔𝒐 𝒕𝒆𝒓𝒎𝒊𝒏𝒂𝒓𝒔𝒆: 𝒆𝒍 𝒅𝒖𝒆𝒍𝒐 𝒆𝒕𝒆𝒓𝒏𝒐 𝒅𝒆 𝑺𝒂𝒓𝒂𝒉 𝑾𝒊𝒏𝒄𝒉𝒆𝒔𝒕𝒆𝒓 :stargif:

    Dicen que fue diseñada por los muertos.
    Y lo inquietante es que, cuanto más se conoce su historia, menos suena a simple leyenda 👁️

    Sarah Winchester heredó una de las mayores fortunas de Estados Unidos gracias al rifle que “conquistó el Oeste”.
    Pero su vida personal fue una sucesión de pérdidas.
    Primero murió su hija Annie, con apenas semanas de vida.
    Años después, su esposo William Winchester.
    Desde entonces, Sarah nunca volvió a ser la misma 💔

    Según el folclore, un médium le aseguró que estaba maldita: las almas de todos los que habían muerto por culpa del rifle Winchester la perseguían.
    La única forma de sobrevivir era construir una casa para ellos… y no detener jamás las obras.
    Sarah obedeció.
    Durante 38 años, día y noche, los martillos no callaron 🕯️

    La casa creció sin planos, sin lógica y sin final.
    Pasillos que no llevan a ningún sitio, escaleras que suben para terminar contra el techo, puertas que se abren al vacío.
    No era un error arquitectónico: era una estrategia.
    Un laberinto diseñado para confundir a los espíritus 👣

    Sarah desarrolló una obsesión casi ritual con el número 13.
    Hay 13 baños, ventanas con 13 paneles, lámparas con 13 brazos y hasta desagües con 13 agujeros.
    Cada detalle parecía pensado para mantener a raya a aquello que ella sentía que la acechaba.

    Cada medianoche, según los testimonios, se encerraba en la Sala Azul para realizar sesiones de espiritismo.
    Decía recibir instrucciones directas de los fantasmas sobre qué construir al día siguiente.
    No mandaba arquitectos: seguía voces.

    Cuando el terremoto de San Francisco de 1906 dañó gravemente la mansión, Sarah creyó que los espíritus estaban enfadados porque la casa se acercaba a su final.
    Ordenó sellar las habitaciones destruidas y continuar construyendo en otras direcciones, como si el caos fuese una forma de apaciguarlos.

    Tras su muerte en 1922, muchos esperaban encontrar una caja fuerte llena de oro.
    En su lugar hallaron mechones de cabello de su hija y su esposo, cartas de amor, fotografías familiares y recortes de obituarios.
    No había dinero.
    Solo duelo.

    Sarah Winchester recibía el equivalente a miles de dólares diarios, pero gastó gran parte de su fortuna levantando una casa que nunca fue un hogar.
    Hoy, la Winchester Mystery House sigue en pie en San José.
    Se puede visitar.
    Y aún hay quienes aseguran que, cuando cae la noche, algo sigue caminando por sus pasillos.

    No fue una loca construyendo sin sentido.
    Fue una mujer rota intentando convivir con la culpa, la pérdida y el silencio.

    ▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣▣

    #sarahwinchester #winchestermysteryhouse #casasembrujadas #historiasoscuras #leyendasamericanas #duelo #arquitecturaextraña #misteriosreales #historiacultural

  30. Opinión | Hilda Teresita Bautista Villegas | Signos del deterioro mental del presidente Trump

    Menospreciar con frases denigrantes, como decir que “le besan el trasero”, a los mismos empresarios que financiaron su llegada a la presidencia y que lo han acompañado hasta hoy, no solo es un acto de ingratitud, sino un grave error político.

    Por Hilda Teresita Bautista Villegas

    Imponer políticas arancelarias que afectan directamente el suministro de materias primas para muchas empresas estadounidenses es una medida absurda que debilita su propia economía.

    Acusar ridículamente a la presidenta de México, de tener miedo a los cárteles por no permitir la intromisión del ejército estadounidense y defender nuestra soberanía, es una tontería sin dimensión, además de una provocación machista y torpe, totalmente desubicada e ignorante de la madurez política y psicológica que impera en nuestro país.

    ¿Cómo puede un “presidente” que arrebata a las escuelas el presupuesto destinado a atender los problemas emocionales de jóvenes trastornados por generaciones de culto al miedo, al bullying, al armamentismo y a la permisividad hacia las drogas, pretender resolver los conflictos de otro país?

    ¿Adónde está su lógica?

    La hipocresía en su máxima expresión

    La existencia de los carteles y sus actividades ilícitas son problemas fomentados y alimentados por el tráfico de armas y la economía negra que se mueve dentro de su propio territorio.

    ¿No es acaso un acto terrorista interno y externo el fomentar la infiltración de armas a grupos vulnerables, proteger el huachicoleo de combustible y desatender a su propia población hundida en el consumo de drogas?  

    Permitir el robo de combustible mexicano para procesarlo en Texas y venderlo de regreso a México, también es un grave delito solapado por su ineficiente gobierno.

    ¡Claro que merecen cárcel los delincuentes de cuello blanco que participan en esas redes de corrupción!

    México hoy está encabezado por un gobierno responsable, formado por personas capacitadas que, desde el corazón y el discernimiento, están entregando su vida para reconstruir un país devastado por años y años de corrupción e indiferencia.

    Claudia Sheinbaum Pardo

    ¿Cómo se atreve entonces, un presidente pretencioso y fifi, como lo es Trump, sugerir lo que debe hacerse en nuestra tierra cuando es incapaz de ver los problemas catastróficos que están desmoronando a su propio pueblo desde hace décadas. 

    ¡Caro que no distingue esos problemas ya que él mismo, con su inestabilidad emocional, los está generando!

    El trastorno psicológico que Trump manifiesta le impide comprender que el ser humano está hecho de alma, cuerpo, cerebro y corazón. Cada una de esas dimensiones requiere atención y equilibrio. Pero su egocentrismo patológico lo encierra en una percepción materialista, carente de empatía y de todo sentido humanista.

    Quitar presupuesto a la salud y la educación. Llevar a la quiebra a cientos de empresas. Expulsar del país a trabajadores mexicanos que mantienen en funcionamiento negocios clave de la economía estadounidense porque los empresarios no logran cubrir esas vacantes con ciudadanos locales a los que ¡no les gusta trabajar con las manos y como tristemente parece, tampoco con el discernimiento!

    Todo esto -y mucho más-, no solo revela una profunda descomposición política, sino alarmantes signos de deterioro mental en el presidente Trump, cuyas decisiones parecen ir siempre en contra del bienestar de su propio país.

    Él no parece saber responder a una lógica estratégica ni a la coherencia institucional, sino más bien a sus impulsos, miedos y delirios de poder.

    ¿Hasta cuándo despertará el pueblo estadounidense? ¿Cuándo descubrirán que el consumismo y la comida chatarra no son el origen de su poder personal y tampoco son el poder de su voz?

    ¡Ya, pronto, tienen que despertar y reconectar con su capacidad racional y humana para cambiar el rumbo de su historia!

    Donald Trump

    ¡Conéctate con Sociedad Noticias! Suscríbete a nuestro canal de YouTube y activa las notificaciones, o bien, síguenos en las redes sociales: FacebookTwitter e Instagram.

    #ClaudiasheinbaumLopezObradorFernandeznoronAMarceloEbrardOmarGarciaHarfuchFisgonMiguelTorruco #AndrésManuelLópezObrador #arancelesComercialesTrump #armasTráficoEstadosUnidos #Cdmx #derechosHumanosMéxico #dignidadNacional #discursoDeOdioTrump #DonaldTrump #estabilidadEmocionalLíderes #gobiernoMexicanoActual #huachicolCombustibleTexas #Información #InformaciónMéxico #México #migraciónMéxicoEEUU_ #Morena #noticia #noticias #NoticiasMéxico #NoticiasSociedad #políticaExteriorMéxico #políticaTóxicaTrump #relacionesMéxicoEstadosUnidos #saludMentalTrump #SN #soberaníaNacional #Sociedad #SociedadNoticias #SociedadNoticiasCom #sociedadNoticias #SociedadNoticiasCom