SlideShare a Scribd company logo
1 of 2
Download to read offline
The Great White Hack. Trump is the "White Hat" Hacker of US Democracy
March 10th, 2019
By: E.B. Holmes
So-called "White Hat" hackers get paid to expose flaws in networked computer systems. I
would like to generalize the term to include democratic institutions, Corporate-owned Mass
Media, and "Social Surveillance" which is my term for "Social Media" (eg FaceBook).
"White Hats" use their hacker skills that otherwise could be concealed and maliciously
employed to expose security risks to the customers that hire them. Little did we know in the Fall
of 2016, that together with Steven K. Bannon, billionaire donors, and further aided by
commercialized social surveillance systems willfully prepared for exploit by Mark Zuckerberg
(Facebook), that America's democracy itself was about to be exposed to one of the most
uncontrolled and interesting experiments in her short history -- a public hacking of democratic
institutions in full public view, exposing some of the flaws of our human nature, Politics, Mass
Media and our Democratic systems. The unexpected 2016 presidential result in particular
required a mixture of at least 3 ingredients which, while predictable, were not being discussed by
our Mass Media, possibly because they themselves were major beneficiaries:
(1) The US Pay-to-Play Political system.
(2) The "Corporate Media Machine" co-opted for entertainment.
(3) Unchecked exploitation of Social Surveillance (ie Facebook)
The above ingredients explosively combined and propelled a perhaps unwilling administration to
the US Presidency. Let's begin with the pay-to-play political system. In 2016 there was a
groundswell of support for an authentic grassroots effort to displace the status-quo in
Washington. The backdrop consisted of disillusionment with Obama following two terms in
which "Change" didn't materialize for wide swathes of the US that continued to de-industrialize
in absence or real support from Washington. Backers of Bernie Sanders organized and
challenged the well established Clinton camp in a foreshadowing, but ultimately unsuccessful
bid for the Democratic nomination. At the Democratic Party convention, Clinton was nominated
based on SuperDelegates, an opaque and biased element of the Party apparatus that favored
Clinton based on pay-to-play politics, and that ultimately backfired on Clinton in the General
Election.
At the same time that the Democratic Party was being cleaved in twain, the Republican party
was attempting to nominate a traditional establishment candidate along the lines of Cruz, Rubio
or Bush. During this time what I refer to as the "Corporate Media Machine" (along the lines
defined by Chomsky in Manufacturing Consent) was ramping up Media coverage of long-shot
candidate Trump in exchange for massive commercial gain due to boosted ratings. This
candidate was known to the public from decades of scandal, countless interviews including
public musings of a presidential bid, and a run of reality TV programming. The candidate was
both well aware of the hypocrisy of the media and also of how to benefit from it. In fact, at
almost every turn, during grassroots rallies and TV interviews, he spoke directly to Media
executives about the ratings that he was providing for them in a blatant quid pro quo. In
summary, the candidate was already well positioned to exploit ingredients (1) and (2). The
trigger of this explosive combination of ingredients was provided by the Alt Right figure of
Stephen K. Bannon, aided by ingredient (3): the unchecked exploitation of Social Media which I
redefine here as Social Surveillance (eg Facebook).
Social Surveillance (eg FaceBook) had greatly aided campaigns before -- just take a look at
Obama's back-to-back successes utilizing the enormous platform. In the 2008 and 2012
elections, the $800M and $1B cash pile that the campaign brought in was provisioned to leverage
systematic targeting and influencing of voters. Looking outside of the US, the platform was
widely lauded for toppling regimes in Egypt and Tunisia during the Arab Spring. Little thought
was given at the time at the implications of the technology on our home shores. Anyone who
doubts how surveillance-oriented FaceBook is should read comments by NSA figures and those
who actually designed and implemented the software -- without a doubt it was and is intended to
vacuum up, store and distribute it's users personal information, usually unbeknownst to them, for
the purposes of monetizing it. The fact that the data was "weaponized" was coincidental. The
practice continues to this day until the public decides to leave the platform en-masse.
Much more can and should be said about the three ingredients above which combined
explosively to unwittingly propel a narcissist property developer to the US presidency. What is
important is that "White Hat Hack" occurred out in the open and in public exposing deep flaws
in our human nature, our corporate and media systems and pay-to-play political process that fails
to support truly democratically elected candidates such as Sanders. What is left for us to do now
is to impose checks on our human nature, our technology (as is done more widely in Europe
today) and our Politics, Corporations and Mass Media. In the case of November 2016, and the
ensuing years the phenomena has been laid bare in a way that I hope will harden our democracy's
defenses and prepare my generation to see the pros and cons of our connected world and our ever
tribal tendencies.
I would like to hear your thoughts on this brief article in the comments section below.
Image: https://www.perthnow.com.au/business/ceos/republicans-ted-cruz-and-john-kasich-team-
up-in-stop-trump-deal-ng-66a20154f4b478bf6e677a6db10c9e66

More Related Content

What's hot

PS 101 the media and american politics fall 2013
PS 101 the media and american politics fall 2013PS 101 the media and american politics fall 2013
PS 101 the media and american politics fall 2013
Christopher Rice
 
PS 101 The Media And American Politics Summer 2008
PS 101 The Media And American Politics Summer 2008PS 101 The Media And American Politics Summer 2008
PS 101 The Media And American Politics Summer 2008
Christopher Rice
 
161028_60 Second Marketer_Four Lessons on Olympics and Election
161028_60 Second Marketer_Four Lessons on Olympics and Election161028_60 Second Marketer_Four Lessons on Olympics and Election
161028_60 Second Marketer_Four Lessons on Olympics and Election
Hawthorne
 
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
REVULN
 

What's hot (19)

Russian mass media and intelligence
Russian mass media and intelligenceRussian mass media and intelligence
Russian mass media and intelligence
 
History of fake news
History of fake newsHistory of fake news
History of fake news
 
PS 101 the media and american politics fall 2013
PS 101 the media and american politics fall 2013PS 101 the media and american politics fall 2013
PS 101 the media and american politics fall 2013
 
Washington DC - National Guard Presence - Inauguration - Citizen Journalist A...
Washington DC - National Guard Presence - Inauguration - Citizen Journalist A...Washington DC - National Guard Presence - Inauguration - Citizen Journalist A...
Washington DC - National Guard Presence - Inauguration - Citizen Journalist A...
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
PS 101 The Media And American Politics Summer 2008
PS 101 The Media And American Politics Summer 2008PS 101 The Media And American Politics Summer 2008
PS 101 The Media And American Politics Summer 2008
 
Facebook usato da Governi anche per fake news
Facebook usato da Governi anche per fake newsFacebook usato da Governi anche per fake news
Facebook usato da Governi anche per fake news
 
Social media manipulation: algorithms, bots and computational propaganda
Social media manipulation: algorithms, bots and computational propagandaSocial media manipulation: algorithms, bots and computational propaganda
Social media manipulation: algorithms, bots and computational propaganda
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Fake news full
Fake news fullFake news full
Fake news full
 
American Politics: Why the Thrill Is Gone
American Politics: Why the Thrill Is GoneAmerican Politics: Why the Thrill Is Gone
American Politics: Why the Thrill Is Gone
 
Introduction-2
Introduction-2Introduction-2
Introduction-2
 
161028_60 Second Marketer_Four Lessons on Olympics and Election
161028_60 Second Marketer_Four Lessons on Olympics and Election161028_60 Second Marketer_Four Lessons on Olympics and Election
161028_60 Second Marketer_Four Lessons on Olympics and Election
 
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020
 
Matt Stevens - Policy Primer
Matt Stevens - Policy PrimerMatt Stevens - Policy Primer
Matt Stevens - Policy Primer
 
Social media and their influence on democratic election
Social media and their influence on democratic electionSocial media and their influence on democratic election
Social media and their influence on democratic election
 
Antarctica 2020 : NESARA Fake news distractions
Antarctica 2020 : NESARA Fake news distractionsAntarctica 2020 : NESARA Fake news distractions
Antarctica 2020 : NESARA Fake news distractions
 
Media
MediaMedia
Media
 

Similar to Trump is the "White Hat" Hacker of US Democracy

Tilting Right, TV News Analysis
Tilting Right, TV News AnalysisTilting Right, TV News Analysis
Tilting Right, TV News Analysis
Amber Moore
 
Rachel Miller Social Media and Image in Political Campaigns
Rachel Miller Social Media and Image in Political CampaignsRachel Miller Social Media and Image in Political Campaigns
Rachel Miller Social Media and Image in Political Campaigns
Rachel Miller M.S
 
American Government - Chapter 10 - Media
American Government - Chapter 10 - MediaAmerican Government - Chapter 10 - Media
American Government - Chapter 10 - Media
cyruskarimian
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best fri
AlleneMcclendon878
 
Final Paper.word
Final Paper.wordFinal Paper.word
Final Paper.word
Ryan Henry
 

Similar to Trump is the "White Hat" Hacker of US Democracy (16)

Branded2017 - Oz Sultan
Branded2017  - Oz SultanBranded2017  - Oz Sultan
Branded2017 - Oz Sultan
 
The Social Media Presidency #Branded2017
The Social Media Presidency #Branded2017The Social Media Presidency #Branded2017
The Social Media Presidency #Branded2017
 
Media Bias
Media BiasMedia Bias
Media Bias
 
The Bias Of The Media
The Bias Of The MediaThe Bias Of The Media
The Bias Of The Media
 
Anthropology Trumped
Anthropology TrumpedAnthropology Trumped
Anthropology Trumped
 
Fake News.pptx
Fake News.pptxFake News.pptx
Fake News.pptx
 
How social media used by politicians? 2016
How social media used by politicians? 2016How social media used by politicians? 2016
How social media used by politicians? 2016
 
Tilting Right, TV News Analysis
Tilting Right, TV News AnalysisTilting Right, TV News Analysis
Tilting Right, TV News Analysis
 
Education in a post truth world
Education in a post truth worldEducation in a post truth world
Education in a post truth world
 
Media Bias Essay
Media Bias EssayMedia Bias Essay
Media Bias Essay
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spies
 
Rachel Miller Social Media and Image in Political Campaigns
Rachel Miller Social Media and Image in Political CampaignsRachel Miller Social Media and Image in Political Campaigns
Rachel Miller Social Media and Image in Political Campaigns
 
American Government - Chapter 10 - Media
American Government - Chapter 10 - MediaAmerican Government - Chapter 10 - Media
American Government - Chapter 10 - Media
 
A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...
A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...
A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best fri
 
Final Paper.word
Final Paper.wordFinal Paper.word
Final Paper.word
 

More from eholmes80

Business to business marketing course booklet 2011-20120
Business to business marketing   course booklet 2011-20120Business to business marketing   course booklet 2011-20120
Business to business marketing course booklet 2011-20120
eholmes80
 
Consult temp
Consult tempConsult temp
Consult temp
eholmes80
 
Corporate Strategy
Corporate StrategyCorporate Strategy
Corporate Strategy
eholmes80
 

More from eholmes80 (14)

The Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US DemocracyThe Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US Democracy
 
Fulbright 2012
Fulbright 2012Fulbright 2012
Fulbright 2012
 
Organizational behavior
Organizational behaviorOrganizational behavior
Organizational behavior
 
Mba full-time-handbook-2011-12
Mba full-time-handbook-2011-12Mba full-time-handbook-2011-12
Mba full-time-handbook-2011-12
 
041773 execpriv
041773 execpriv041773 execpriv
041773 execpriv
 
Business to business marketing course booklet 2011-20120
Business to business marketing   course booklet 2011-20120Business to business marketing   course booklet 2011-20120
Business to business marketing course booklet 2011-20120
 
Consult temp
Consult tempConsult temp
Consult temp
 
Corporate Strategy
Corporate StrategyCorporate Strategy
Corporate Strategy
 
MBA Strategy (UEBS)
MBA Strategy (UEBS)MBA Strategy (UEBS)
MBA Strategy (UEBS)
 
Operations Management
Operations Management Operations Management
Operations Management
 
MBA Macroeconomics UEBS, Jonathan Crook
MBA Macroeconomics UEBS, Jonathan CrookMBA Macroeconomics UEBS, Jonathan Crook
MBA Macroeconomics UEBS, Jonathan Crook
 
2011-2012 Accounting UEBS (MBA)
2011-2012 Accounting UEBS (MBA)2011-2012 Accounting UEBS (MBA)
2011-2012 Accounting UEBS (MBA)
 
CS: GE Presentation
CS: GE PresentationCS: GE Presentation
CS: GE Presentation
 
BHP Billiton vs. Rio Tinto
BHP Billiton vs. Rio TintoBHP Billiton vs. Rio Tinto
BHP Billiton vs. Rio Tinto
 

Recently uploaded

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 

Recently uploaded (20)

BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 

Trump is the "White Hat" Hacker of US Democracy

  • 1. The Great White Hack. Trump is the "White Hat" Hacker of US Democracy March 10th, 2019 By: E.B. Holmes So-called "White Hat" hackers get paid to expose flaws in networked computer systems. I would like to generalize the term to include democratic institutions, Corporate-owned Mass Media, and "Social Surveillance" which is my term for "Social Media" (eg FaceBook). "White Hats" use their hacker skills that otherwise could be concealed and maliciously employed to expose security risks to the customers that hire them. Little did we know in the Fall of 2016, that together with Steven K. Bannon, billionaire donors, and further aided by commercialized social surveillance systems willfully prepared for exploit by Mark Zuckerberg (Facebook), that America's democracy itself was about to be exposed to one of the most uncontrolled and interesting experiments in her short history -- a public hacking of democratic institutions in full public view, exposing some of the flaws of our human nature, Politics, Mass Media and our Democratic systems. The unexpected 2016 presidential result in particular required a mixture of at least 3 ingredients which, while predictable, were not being discussed by our Mass Media, possibly because they themselves were major beneficiaries: (1) The US Pay-to-Play Political system. (2) The "Corporate Media Machine" co-opted for entertainment. (3) Unchecked exploitation of Social Surveillance (ie Facebook) The above ingredients explosively combined and propelled a perhaps unwilling administration to the US Presidency. Let's begin with the pay-to-play political system. In 2016 there was a groundswell of support for an authentic grassroots effort to displace the status-quo in Washington. The backdrop consisted of disillusionment with Obama following two terms in which "Change" didn't materialize for wide swathes of the US that continued to de-industrialize in absence or real support from Washington. Backers of Bernie Sanders organized and challenged the well established Clinton camp in a foreshadowing, but ultimately unsuccessful bid for the Democratic nomination. At the Democratic Party convention, Clinton was nominated based on SuperDelegates, an opaque and biased element of the Party apparatus that favored Clinton based on pay-to-play politics, and that ultimately backfired on Clinton in the General Election. At the same time that the Democratic Party was being cleaved in twain, the Republican party was attempting to nominate a traditional establishment candidate along the lines of Cruz, Rubio or Bush. During this time what I refer to as the "Corporate Media Machine" (along the lines defined by Chomsky in Manufacturing Consent) was ramping up Media coverage of long-shot candidate Trump in exchange for massive commercial gain due to boosted ratings. This candidate was known to the public from decades of scandal, countless interviews including public musings of a presidential bid, and a run of reality TV programming. The candidate was both well aware of the hypocrisy of the media and also of how to benefit from it. In fact, at almost every turn, during grassroots rallies and TV interviews, he spoke directly to Media executives about the ratings that he was providing for them in a blatant quid pro quo. In
  • 2. summary, the candidate was already well positioned to exploit ingredients (1) and (2). The trigger of this explosive combination of ingredients was provided by the Alt Right figure of Stephen K. Bannon, aided by ingredient (3): the unchecked exploitation of Social Media which I redefine here as Social Surveillance (eg Facebook). Social Surveillance (eg FaceBook) had greatly aided campaigns before -- just take a look at Obama's back-to-back successes utilizing the enormous platform. In the 2008 and 2012 elections, the $800M and $1B cash pile that the campaign brought in was provisioned to leverage systematic targeting and influencing of voters. Looking outside of the US, the platform was widely lauded for toppling regimes in Egypt and Tunisia during the Arab Spring. Little thought was given at the time at the implications of the technology on our home shores. Anyone who doubts how surveillance-oriented FaceBook is should read comments by NSA figures and those who actually designed and implemented the software -- without a doubt it was and is intended to vacuum up, store and distribute it's users personal information, usually unbeknownst to them, for the purposes of monetizing it. The fact that the data was "weaponized" was coincidental. The practice continues to this day until the public decides to leave the platform en-masse. Much more can and should be said about the three ingredients above which combined explosively to unwittingly propel a narcissist property developer to the US presidency. What is important is that "White Hat Hack" occurred out in the open and in public exposing deep flaws in our human nature, our corporate and media systems and pay-to-play political process that fails to support truly democratically elected candidates such as Sanders. What is left for us to do now is to impose checks on our human nature, our technology (as is done more widely in Europe today) and our Politics, Corporations and Mass Media. In the case of November 2016, and the ensuing years the phenomena has been laid bare in a way that I hope will harden our democracy's defenses and prepare my generation to see the pros and cons of our connected world and our ever tribal tendencies. I would like to hear your thoughts on this brief article in the comments section below. Image: https://www.perthnow.com.au/business/ceos/republicans-ted-cruz-and-john-kasich-team- up-in-stop-trump-deal-ng-66a20154f4b478bf6e677a6db10c9e66