<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[James McCabe | ModernCYPH3R: Unhinged Exceptions]]></title><description><![CDATA[A diagnostic log of the world's most baffling errors. From economic meltdowns to social absurdities, these are the chaotic events the 'developers' didn't account for—and definitely didn't test for in production.]]></description><link>https://www.moderncyph3r.com/s/unhinged-exceptions</link><image><url>https://www.moderncyph3r.com/img/substack.png</url><title>James McCabe | ModernCYPH3R: Unhinged Exceptions</title><link>https://www.moderncyph3r.com/s/unhinged-exceptions</link></image><generator>Substack</generator><lastBuildDate>Sat, 18 Apr 2026 02:28:46 GMT</lastBuildDate><atom:link href="https://www.moderncyph3r.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[James McCabe]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[moderncyph3r@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[moderncyph3r@substack.com]]></itunes:email><itunes:name><![CDATA[James McCabe | ModernCYPH3R]]></itunes:name></itunes:owner><itunes:author><![CDATA[James McCabe | ModernCYPH3R]]></itunes:author><googleplay:owner><![CDATA[moderncyph3r@substack.com]]></googleplay:owner><googleplay:email><![CDATA[moderncyph3r@substack.com]]></googleplay:email><googleplay:author><![CDATA[James McCabe | ModernCYPH3R]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The $500k-a-Week SQL Injection]]></title><description><![CDATA[How McKinsey&#8217;s Lilli platform got liquidated by a $20 agent and 46 million leaked messages.]]></description><link>https://www.moderncyph3r.com/p/mckinsey-lilli-sql-injection-breach</link><guid isPermaLink="false">https://www.moderncyph3r.com/p/mckinsey-lilli-sql-injection-breach</guid><dc:creator><![CDATA[James McCabe | ModernCYPH3R]]></dc:creator><pubDate>Mon, 23 Mar 2026 16:02:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!J90d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J90d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J90d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png 424w, https://substackcdn.com/image/fetch/$s_!J90d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png 848w, https://substackcdn.com/image/fetch/$s_!J90d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png 1272w, https://substackcdn.com/image/fetch/$s_!J90d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J90d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ebb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:20179751,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.moderncyph3r.com/i/191877482?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J90d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png 424w, https://substackcdn.com/image/fetch/$s_!J90d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png 848w, https://substackcdn.com/image/fetch/$s_!J90d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png 1272w, https://substackcdn.com/image/fetch/$s_!J90d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb029f8-264c-4b5f-af99-c4e87548e6fa_5632x3072.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There is a specific, high-velocity irony in <strong>McKinsey</strong> charging Fortune 500 boardrooms half a million dollars a week for &#8220;AI Strategy&#8221; while their own internal platform, <strong>Lilli</strong>, gets dismantled by a $20 autonomous agent from <strong>CodeWall</strong>. This isn&#8217;t just a breach; it&#8217;s a fundamental &#8220;System Interrupt&#8221; of the entire consulting value proposition.</p><p>To be clear, <strong>Lilli</strong> isn&#8217;t some experimental side project; it&#8217;s the proprietary neural backbone of the firm&#8212;the system used by 40,000 consultants to digest decades of frameworks, M&amp;A analysis, and client research. And <strong>CodeWall</strong>? They aren&#8217;t a nation-state hacking collective. They&#8217;re a security startup that pointed an autonomous offensive agent&#8212;basically a digital bloodhound designed to find cracks in the foundation&#8212;at <strong>McKinsey&#8217;s</strong> perimeter.</p><p>In just two hours&#8212;roughly the time a junior consultant spends obsessing over the font on a single slide&#8212;that $20 off-the-shelf agent achieved full read/write access to the production database. No credentials. No insider knowledge. Just a $20 bill and a complete, systemic lack of hardened security logic.</p><p>The damage report reads like a forensic audit of institutional ego. We&#8217;re talking about 46.5 million plaintext chat messages&#8212;every strategy discussion, client engagement, and financial detail spanning two years&#8212;sitting there for the taking. Throw in 728,000 confidential files and nearly 4 million proprietary research chunks, and you&#8217;ve effectively open-sourced decades of <strong>McKinsey</strong> frameworks for the price of a decent lunch.</p><p>But the real &#8220;Kill Shot&#8221; wasn&#8217;t the data theft; it was the 95 writable system prompts that <strong>CodeWall</strong> identified. A single &#8220;UPDATE&#8221; statement in one HTTP call could have silently rewritten the logic of how the AI advises 40,000 <strong>McKinsey</strong> consultants. We aren&#8217;t just talking about a leak; we&#8217;re talking about the ability to poison the strategic well of the global economy without triggering a single alert. If the &#8220;intelligence&#8221; feeding the boardrooms is one SQL command away from being compromised, the &#8220;Strategy&#8221; isn&#8217;t an asset&#8212;it&#8217;s a liability.</p><h4>The Logic Leak</h4><p>This wasn&#8217;t some sophisticated, state-sponsored digital heist involving zero-day exploits or quantum-resistant decryption. This was a fundamental failure of the <strong>Garage Test</strong>. We are looking at a system interrupt caused by architectural laziness masked by a high-priced &#8220;AI&#8221; wrapper. The <strong>CodeWall</strong> agent didn&#8217;t even need to pick a lock; it just walked through a door <strong>McKinsey</strong> forgot to build.</p><p>First, let&#8217;s talk about the SQL injection. It&#8217;s a bug class so old it should have been retired by the Bush administration. Seeing this in a production environment in 2026&#8212;especially one powering 40,000 consultants&#8212;is like finding a rotary phone wired into the dashboard of a Tesla. It&#8217;s a conscious choice to ignore thirty years of engineering baseline. If your database doesn&#8217;t know how to tell the difference between a user query and a command to rewrite its own history, you haven&#8217;t built a &#8220;platform&#8221;; you&#8217;ve built a liability.</p><p>Then there&#8217;s the &#8220;Shadow&#8221; Documentation. The agent found 22 unauthenticated API endpoints simply by reading documentation that <strong>McKinsey</strong> left sitting in the wild like a forgotten lawn mower. <em>If you provide the map and leave the engine running, don&#8217;t act surprised when the car leaves the lot without you.</em> The most &#8220;Unhinged&#8221; part of this exception, though, is the <strong>McKinsey</strong> claim that their &#8220;internal scanners&#8221; found nothing for two years. This is the ultimate &#8220;Bypass Paradox.&#8221; If you only scan for the things you&#8217;ve already decided aren&#8217;t a problem, your report will always stay green while the basement floods. A scanner is only as good as the logic of the architect who configured it, and clearly, nobody was home.</p><p>They prioritized the &#8220;AI&#8221; label and the $500k-a-week billing cycle over the boring, unsexy, hardened security logic that actually keeps a system upright.</p><h4><strong>The Hardened Protocol (The &#8220;How Not to Get Liquidated&#8221; Guide)</strong></h4><p>If you&#8217;re charging for &#8220;Transformation,&#8221; you better have an architectural ledger that actually balances. Security isn&#8217;t some shiny accessory you bolt on after the fact to make the board feel safe; it&#8217;s the actual foundation. To prevent this kind of $20 liquidation, <strong>McKinsey</strong> needed to stop chasing the &#8220;AI&#8221; hype and start respecting the baseline.</p><p>First off, they needed <strong>Zero Trust</strong> as a prerequisite, not a buzzword. Imagine building a high-security vault but taping the blueprints and the combination lock&#8217;s &#8220;how-to&#8221; guide to the front window of the bank. That&#8217;s exactly what leaving 22 API endpoints unauthenticated looks like. If a <strong>CodeWall</strong> agent can walk in and see the map to the money without even showing an ID at the door, you&#8217;ve already lost the vault.</p><p>In a properly hardened environment, an API endpoint acts as a high-security checkpoint, not an open window. Every time a user or a bot knocks on that door, they have to present a &#8220;Digital ID Card&#8221;&#8212;usually an <strong>OAuth token</strong>. Think of this like a high-tech proximity badge that doesn&#8217;t just say &#8220;I&#8217;m allowed in,&#8221; but specifies exactly which rooms you can enter and whether you&#8217;re allowed to touch the furniture. The system performs a three-step check: <strong>Authentication</strong> (are you who you say you are?), <strong>Authorization</strong> (do you have permission to see this specific client strategy?), and <strong>Audit</strong> (writing down exactly what you did in the ledger).</p><p>In the <strong>Lilli</strong> autopsy, the agent didn&#8217;t have to forge a badge. It just found the &#8220;Documentation&#8221; door unlocked and realized it led directly into the vault&#8217;s ventilation system. Because there was no &#8220;bouncer&#8221; verifying the request, the database assumed anyone asking for information was authorized to have it. It&#8217;s the ultimate architectural facepalm: building a genius-level AI but giving it the security awareness of a screen door.</p><p>Then there&#8217;s the <strong>SQL Injection</strong>&#8212;the &#8220;old reliable&#8221; of bad security. Think of your database like a very literal-minded librarian. Most people ask, &#8220;Can I see the strategy for Company X?&#8221; But a SQL injection is like a guy walking up and saying, &#8220;Can I see the strategy for Company X? Also, please set fire to the filing cabinet and give me the master key to the back door.&#8221; A hardened system&#8212;using <strong>Parameterized Queries</strong>&#8212;is just a librarian smart enough to say, &#8220;I&#8217;ll get you the book, but I&#8217;m ignoring the part about the matches.&#8221; In 2026, failing this check is just architectural malpractice.</p><p>Finally, we have the <strong>Immutable Prompt</strong> problem. The system-level prompts&#8212;the literal &#8220;brain&#8221; of <strong>Lilli</strong>&#8212;should never be writable through a simple web call. That&#8217;s like leaving a digital chalkboard in the bank lobby with the &#8220;Strategy for Global Domination&#8221; written on it and leaving the eraser and a box of markers right next to it. Those prompts belong in a read-only, version-controlled vault. If a $20 agent can change how your AI &#8220;thinks&#8221; with one line of text, you haven&#8217;t built an expert system; you&#8217;ve built a suggestion box that anyone can stuff.</p><p>If <strong>McKinsey</strong> can&#8217;t secure the pipeline that feeds their own consultants, they have no business advising anyone else on &#8220;Transformation.&#8221; This is the price of prioritizing the &#8220;AI&#8221; label over the logic.</p><h4><strong>The Final System Exit</strong></h4><p>This is the ultimate &#8220;Bypass Paradox&#8221;: the more you pay for the &#8220;Strategy,&#8221; the less you&#8217;re actually paying for the &#8220;System.&#8221; McKinsey exists in a world of high-velocity PowerPoint and &#8220;Transformation&#8221; narratives, but as CodeWall proved, reality doesn&#8217;t care about your billable rate. Reality only cares about the code.</p><p>The most unhinged part of this exception isn&#8217;t that a $20 agent broke in&#8212;it&#8217;s that McKinsey didn&#8217;t even realize the door was missing. They sell the future of AI to the world&#8217;s most powerful boardrooms, yet they couldn&#8217;t even secure the plumbing of their own house.</p><p>As architects, we have to pass the Garage Test. In my world, that&#8217;s the ultimate filter for technical nonsense. It&#8217;s a simple question: <em>Would you say this to a peer while holding a wrench or a cigar?</em> If you&#8217;re standing in the garage, you don&#8217;t care about &#8220;Synergistic AI Transformation Frameworks.&#8221; You care if the bolt is torqued, if the logic is hardened, and if the damn thing actually works when you turn the key. If you wouldn&#8217;t trust a screen door to protect your own home, you don&#8217;t sell it as a &#8220;High-Security AI Vault&#8221; to a Fortune 500 client.</p><p>The lesson for the rest of us is blunt: If you can&#8217;t secure the pipeline, you don&#8217;t own the output. McKinsey just paid $20 to learn that their half-million-dollar-a-week advice is only as strong as the 1990s-era bugs they were too &#8220;strategic&#8221; to patch. They prioritized the &#8220;AI&#8221; label over the basic, hardened logic that keeps the lights on.</p><p>If your &#8220;Expert System&#8221; is one SQL command away from being a puppet, you haven&#8217;t built an asset; you&#8217;ve built a massive, plaintext liability. You aren&#8217;t &#8220;Transforming&#8221; anything&#8212;you&#8217;re just handing the keys of the global economy to a $20 autonomous agent and hoping for the best.</p><p>In the Garage, we have a name for a tool that breaks the second you apply actual pressure: Scrap. McKinsey just found out their AI platform was a gold-plated wrench made of lead.</p><p>System Exit Code: 511 (Network Authentication Required). Status: Logic Liquidated.</p><div><hr></div><p></p><h4><strong>Architect&#8217;s Ledger: The API &#8220;Bouncer&#8221; Protocol</strong></h4><p>There is no such thing as an "internal" API. If it&#8217;s on a network, it&#8217;s a target. Leaving 22 endpoints unauthenticated is like building a skyscraper and forgetting to put a front door on the lobby because "only employees know the address.&#8221;</p><p>If you want to avoid getting liquidated by a $20 agent, you have to move beyond the &#8220;security by obscurity&#8221; delusion. Here is the hardened logic for protecting your endpoints:</p><ul><li><p><strong>The Identity Gatekeeper:</strong> Never expose a raw database to an API. Every request must pass through an <strong>Identity Provider (IdP)</strong>. Implement <strong>OAuth 2.0</strong> with <strong>OpenID Connect</strong>. Your API shouldn&#8217;t even look at the request until it sees a valid, cryptographically signed <strong>JWT (JSON Web Token)</strong>. No token, no entry.</p></li><li><p><strong>Scopes are the &#8220;Internal&#8221; Walls:</strong> Authentication (knowing who they are) isn&#8217;t enough. You need <strong>Authorization Scopes</strong>. Just because a consultant is logged into the system doesn&#8217;t mean their API call should have scope: write_prompts. Limit the token&#8217;s power to the specific task. If they only need to read a research chunk, that&#8217;s the only permission the token carries.</p></li><li><p><strong>Rate Limiting as a Circuit Breaker:</strong> An autonomous agent&#8217;s greatest strength is its speed. It can knock on 10,000 doors while you&#8217;re still sipping your first coffee. Implement <strong>Rate Limiting</strong> at the API Gateway level. If a single ID starts hitting 22 endpoints in 120 seconds, the &#8220;Circuit Breaker&#8221; trips and shuts down the connection.</p></li><li><p><strong>The &#8220;WAF&#8221; Shield:</strong> A <strong>Web Application Firewall (WAF)</strong> should be sitting in front of your API specifically to catch the 1990s-era garbage like SQL injection. It inspects the payload for malicious strings (like OR 1=1) and drops the packet before it ever touches your application logic.</p></li></ul><p><strong>Bottom line:</strong> If the agent can see the &#8220;How-To&#8221; documentation and the API without showing a badge, your architecture is just a suggestion. Harden the identity layer first, or don&#8217;t build the platform at all.</p><div><hr></div><h4><strong>Glossary: The Forensic Lexicon</strong></h4><ul><li><p><strong>API (Application Programming Interface):</strong> The digital &#8220;service counter&#8221; of a software system. It allows different programs to talk to each other. Leaving one <strong>unauthenticated</strong> is like leaving a bank teller&#8217;s window open after hours with no one watching the vault.</p></li><li><p><strong>SQL Injection (SQLi):</strong> A 1990s-era exploit where an attacker &#8220;injects&#8221; malicious database commands. If the system isn&#8217;t <strong>hardened</strong>, it treats the attack like a legitimate request&#8212;allowing the attacker to read, delete, or &#8220;UPDATE&#8221; the entire database.</p></li><li><p><strong>Autonomous Offensive Agent:</strong> A specialized AI designed to find and exploit vulnerabilities without human guidance. Think of it as a digital bloodhound that never sleeps and only costs $20 in tokens to run.</p></li><li><p><strong>JWT (JSON Web Token):</strong> A compact, cryptographically signed &#8220;Digital ID Card.&#8221; In the <strong>Architect&#8217;s Ledger</strong>, this proves you have the right to be in the room and specifies exactly what you&#8217;re allowed to touch.</p></li><li><p><strong>Zero Trust:</strong> A security framework based on the realization that &#8220;internal&#8221; doesn&#8217;t mean &#8220;safe.&#8221; It requires every user and device&#8212;inside or outside the network&#8212;to be authenticated and authorized for <em>every</em> session.</p></li><li><p><strong>Immutable Prompts:</strong> AI system instructions that are &#8220;baked in&#8221; and cannot be changed by a user. Making them <strong>writable</strong> is like letting a stranger rewrite the pilot&#8217;s flight manual mid-air.</p></li></ul><div><hr></div><h4><strong>Bibliography: The Audit Trail</strong></h4><ul><li><p><strong>CodeWall Disclosure (March 9, 2026):</strong><a href="https://www.thestack.technology/mckinsey-ai-agent-hacked-lilli/"> </a><em><a href="https://www.thestack.technology/mckinsey-ai-agent-hacked-lilli/">The Lilli Liquidation: How an Autonomous Agent Breached McKinsey&#8217;s AI Platform</a></em>. The primary source on the 22 unauthenticated endpoints and the $20 breach.</p></li><li><p><strong>Treblle Security Analysis (March 18, 2026):</strong><a href="https://treblle.com/blog/codewall-hack-mckinsey-ai-platform-lilli"> </a><em><a href="https://treblle.com/blog/codewall-hack-mckinsey-ai-platform-lilli">How CodeWall Hacked McKinsey&#8217;s Lilli Through Unprotected APIs</a></em>. A detailed technical breakdown of the JSON key concatenation that bypassed standard scanners.</p></li><li><p><strong>OWASP Top 10 (2026 Update):</strong><a href="https://owasp.org/www-project-top-ten/"> </a><em><a href="https://owasp.org/www-project-top-ten/">A03:2026 &#8211; Injection</a></em>. The industry standard for identifying injection risks, now updated to include the &#8220;Agentic&#8221; attack vectors seen in the Lilli incident.</p></li><li><p><strong>NIST Special Publication 800-207:</strong><a href="https://csrc.nist.gov/pubs/sp/800/207/final"> </a><em><a href="https://csrc.nist.gov/pubs/sp/800/207/final">Zero Trust Architecture (ZTA)</a></em>. The foundational U.S. federal publication defining the &#8220;Never Trust, Always Verify&#8221; protocols that McKinsey bypassed.</p></li><li><p><strong>IETF RFC 6749:</strong><a href="https://www.rfc-editor.org/rfc/rfc6749.html"> </a><em><a href="https://www.rfc-editor.org/rfc/rfc6749.html">The OAuth 2.0 Authorization Framework</a></em>. The official standard for token-based authorization that serves as the &#8220;Digital Bouncer&#8221; for modern APIs.</p></li></ul><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.moderncyph3r.com/p/mckinsey-lilli-sql-injection-breach/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.moderncyph3r.com/p/mckinsey-lilli-sql-injection-breach/comments"><span>Leave a comment</span></a></p><div class="community-chat" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/moderncyph3r/chat?utm_source=chat_embed&quot;,&quot;subdomain&quot;:&quot;moderncyph3r&quot;,&quot;pub&quot;:{&quot;id&quot;:7143526,&quot;name&quot;:&quot;James McCabe | ModernCYPH3R&quot;,&quot;author_name&quot;:&quot;James McCabe | ModernCYPH3R&quot;,&quot;author_photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hmcS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80daf29d-b970-4dff-b5a0-9c6bd7be4c5a_609x609.png&quot;}}" data-component-name="CommunityChatRenderPlaceholder"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.moderncyph3r.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.moderncyph3r.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p>Copyright &#169; 2017-2026 James McCabe | ModernCYPH3R. All rights reserved.</p><p style="text-align: center;">No part of this publication&#8212;including text, original data analysis, or visual assets&#8212;may be reproduced, distributed, or transmitted in any form or by any means, including electronic or mechanical methods, without including credit to the author. ModernCYPH3R and ModernCYPH3R.com are the exclusive intellectual property of JMc Associates, LLC.</p>]]></content:encoded></item><item><title><![CDATA[The 404 Strategy: ]]></title><description><![CDATA[Policy Not Found in a 7-Page PDF]]></description><link>https://www.moderncyph3r.com/p/404-cyber-strategy-critique-2026</link><guid isPermaLink="false">https://www.moderncyph3r.com/p/404-cyber-strategy-critique-2026</guid><dc:creator><![CDATA[James McCabe | ModernCYPH3R]]></dc:creator><pubDate>Mon, 09 Mar 2026 15:21:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!KGzR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KGzR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KGzR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png 424w, https://substackcdn.com/image/fetch/$s_!KGzR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png 848w, https://substackcdn.com/image/fetch/$s_!KGzR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png 1272w, https://substackcdn.com/image/fetch/$s_!KGzR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KGzR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png" width="1376" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1376,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2022155,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.moderncyph3r.com/i/190398220?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KGzR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png 424w, https://substackcdn.com/image/fetch/$s_!KGzR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png 848w, https://substackcdn.com/image/fetch/$s_!KGzR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png 1272w, https://substackcdn.com/image/fetch/$s_!KGzR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dc4c53-e784-4493-9921-6a2fc026fcf9_1376x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The White House just dropped a &#8220;National Cyber Strategy&#8221; for March 2026, and I&#8217;ve written longer setup guides for a home mesh Wi-Fi system. Calling seven pages a &#8220;National Strategy&#8221; for the entire digital infrastructure of the United States is like trying to explain the complexities of global logistics by pointing at a UPS truck. You&#8217;ve got the general idea that packages move, but you&#8217;re in for a shock when the sorting facility loses power.</p><p>We are deep in a &#8220;maintenance-only&#8221; mindset here. For decades, we&#8217;ve treated security like a high-stakes game of digital Whac-A-Mole, frantically slapping patches over holes in a perimeter that hasn&#8217;t existed since everyone started working from their kitchen tables. We&#8217;ve spent billions on &#8220;zombie boxes&#8221;&#8212;those blinking racks of firewalls that are currently just expensive space heaters because they can&#8217;t see into encrypted traffic to save their lives.</p><p>Instead of admitting that the old physics of the network is dead, we&#8217;ve just shortened the brochure.</p><p>The strategy pivots to &#8220;Offensive Deterrence&#8221; and &#8220;Shaping Adversary Behavior&#8221;. It sounds impressive, like installing a high-tech alarm system, but in the world of packets, &#8220;deterrence&#8221; is mostly a psychological comfort blanket. An adversary doesn&#8217;t stop a logic bomb because they read a sternly worded PDF; they stop when the network itself makes the attack as impossible as trying to stream 4K video over a dial-up modem.</p><p>It&#8217;s the classic human desire to fix a structural foundation crack by buying a louder &#8220;No Trespassing&#8221; sign. We&#8217;re ditching &#8220;costly checklists,&#8221; which were mostly just us lying to ourselves anyway&#8212;and replacing them with a &#8220;vibe shift&#8221; toward being aggressive. But you can&#8217;t &#8220;deter&#8221; a scripted botnet with a press release when your own back door is a rusted remote-access gateway that hasn&#8217;t seen an update since the Obama era.</p><p>We&#8217;re addicted to the marketing of &#8220;being secure.&#8221; It&#8217;s much easier to tell a board of directors we&#8217;re &#8220;taking the fight to them&#8221; than it is to admit we&#8217;ve been pouring money into a legacy architecture that is fundamentally broken.</p><div><hr></div><h4>The 30,000-Foot Blueprint: What a Real Strategy Requires</h4><p>If your national strategy fits on a diner menu, you aren&#8217;t fixing the plumbing; you&#8217;re just ordering another round of the same delusions and hoping the bill doesn&#8217;t come due during your shift. A functional architecture for a digital nation should prioritize these four pillars:</p><ul><li><p><strong>Hardening the &#8220;Blast Radius&#8221;:</strong> Instead of just &#8220;modernizing&#8221; federal systems with more expensive licenses, we must focus on compartmentalization. A real strategy assumes the breach has already happened and ensures a compromised legacy printer doesn&#8217;t provide a lateral path to the power grid or the Treasury.</p></li><li><p><strong>Radical Supply Chain Transparency:</strong> We talk about &#8220;securing supply chains&#8221;, but we&#8217;re still buying black-box software with hidden dependencies. A legitimate strategy mandates a &#8220;Software Bill of Materials&#8221; (SBOM) for critical infrastructure&#8212;if you don&#8217;t know every library running in your water treatment plant, you don&#8217;t own your security.</p></li><li><p><strong>Incentivizing Resilience over Compliance:</strong> &#8220;Streamlining regulations&#8221; shouldn&#8217;t mean making it easier to check a box. We need to pivot to a model where organizations are rewarded for <strong>verifiable resilience</strong>&#8212;the speed of recovery from a total wipe &#8212;rather than how many binders of &#8220;policy&#8221; they can produce for an auditor.</p></li><li><p><strong>Authenticity at the Edge:</strong> In an era of agentic AI and deepfakes, we must <strong>stop trying to &#8220;detect&#8221; lies and start &#8220;verifying&#8221; truth</strong>. This requires robust, cryptographically verified identity standards at the source. If we can&#8217;t trust the source of a command, the speed of &#8220;AI-powered solutions&#8221; just means we&#8217;re failing faster.</p></li></ul><div><hr></div><h4><strong>The Real Call to Reality:</strong></h4><p>A seven-page document is a press release; a strategy is a blueprint. We need to stop focusing on "shaping adversary behavior"&#8212;which assumes the threat is a rational actor&#8212;and start shaping our own infrastructure so that the threat's capability becomes irrelevant. You can&#8217;t "deter" an algorithm; you can only deny it the exploit. If your security relies on the adversary deciding not to push the button, your architecture has already failed.</p><div><hr></div><h4>Bibliography</h4><p>* Executive Office of the President. (<a href="https://www.whitehouse.gov/wp-content/uploads/2026/03/President-Trumps-Cyber-Strategy-for-America.pdf">2026, March). </a><em><a href="https://www.whitehouse.gov/wp-content/uploads/2026/03/President-Trumps-Cyber-Strategy-for-America.pdf">President Trump&#8217;s Cyber Strategy for America</a></em><a href="https://www.whitehouse.gov/wp-content/uploads/2026/03/President-Trumps-Cyber-Strategy-for-America.pdf">.</a> The White House.</p>]]></content:encoded></item><item><title><![CDATA[Buying the Hangman’s Rope (SaaS Edition)]]></title><description><![CDATA[The Subscription Standoff: OpenAI&#8217;s Architectural Coup]]></description><link>https://www.moderncyph3r.com/p/buying-the-hangmans-rope-saas-edition</link><guid isPermaLink="false">https://www.moderncyph3r.com/p/buying-the-hangmans-rope-saas-edition</guid><dc:creator><![CDATA[James McCabe | ModernCYPH3R]]></dc:creator><pubDate>Sun, 01 Mar 2026 18:02:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!08PE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There is a specific kind of ego that only exists in the E-Ring of the Pentagon&#8212;the belief that you can &#8220;procure&#8221; your way out of a philosophical dilemma.</p><p>Just last month, on February 27th, Anthropic tried to play hardball. They wanted &#8220;contractual red lines.&#8221; They wanted a &#8220;No&#8221; that meant &#8220;No.&#8221; Washington responded by calling them a &#8220;supply chain risk&#8221;&#8212;the bureaucratic equivalent of telling a contractor their security clearance has been replaced by a &#8220;Kick Me&#8221; sign.</p><p>Enter OpenAI. They didn&#8217;t bring a &#8220;No.&#8221; They brought a <strong>Safety Stack.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!08PE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!08PE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png 424w, https://substackcdn.com/image/fetch/$s_!08PE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png 848w, https://substackcdn.com/image/fetch/$s_!08PE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png 1272w, https://substackcdn.com/image/fetch/$s_!08PE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!08PE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png" width="1376" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1376,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1874121,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.moderncyph3r.com/i/189562238?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!08PE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png 424w, https://substackcdn.com/image/fetch/$s_!08PE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png 848w, https://substackcdn.com/image/fetch/$s_!08PE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png 1272w, https://substackcdn.com/image/fetch/$s_!08PE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F497f6d9e-9307-444b-a7f3-7f7cf00d8f74_1376x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>The Illusion of Control</h4><p>The &#8220;Unhinged Exception&#8221; here is the <strong>Any Lawful Purpose</strong> clause. It&#8217;s a semantic black hole. If the Department of War decides that &#8220;lawful&#8221; includes using LLMs to sentiment-map every citizen who hasn&#8217;t updated their LinkedIn profile in three years, the contract technically says &#8220;Go for it.&#8221;</p><p>But OpenAI&#8217;s counter-move is the ultimate &#8220;Architect&#8217;s Spite.&#8221; By enforcing <strong>Cloud-only deployment</strong>, they haven&#8217;t sold the Pentagon a weapon; they&#8217;ve sold them a <em>tether</em>. The generals think they bought a nuke; they actually bought a smart-fridge that won&#8217;t open if it thinks you&#8217;ve had too much cholesterol.</p><p>It&#8217;s a standoff where both sides think they&#8217;ve won. The Pentagon thinks they&#8217;ve domesticated the AI. OpenAI thinks they&#8217;ve automated the Pentagon.</p><div><hr></div><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pASi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pASi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png 424w, https://substackcdn.com/image/fetch/$s_!pASi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png 848w, https://substackcdn.com/image/fetch/$s_!pASi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png 1272w, https://substackcdn.com/image/fetch/$s_!pASi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pASi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png" width="612" height="792" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53407f74-f701-496a-8a60-3602f2157170_612x792.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:792,&quot;width&quot;:612,&quot;resizeWidth&quot;:612,&quot;bytes&quot;:114098,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.moderncyph3r.com/i/189562238?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F728bc186-0d78-41de-bf32-f0f7d77dbd94_612x792.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pASi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png 424w, https://substackcdn.com/image/fetch/$s_!pASi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png 848w, https://substackcdn.com/image/fetch/$s_!pASi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png 1272w, https://substackcdn.com/image/fetch/$s_!pASi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53407f74-f701-496a-8a60-3602f2157170_612x792.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p></p><h4>The Audit: SaaS-as-a-Sanction</h4><p>The Pentagon believes they&#8217;ve finally broken the &#8220;Woke AI&#8221; firewall. They think they&#8217;ve achieved tactical dominance. Meanwhile, OpenAI is sitting on a $110B valuation because they&#8217;ve successfully convinced the world that a <strong>Cloud-only API</strong> is a weapon system.</p><p>It&#8217;s the ultimate architectural grift.</p><h4>The Subscription Standoff Audit:</h4><ul><li><p><strong>The Government&#8217;s Logic:</strong> &#8220;We have a contract that says you must do what is lawful. We decide what is lawful. Therefore, we own the AI.&#8221;</p></li><li><p><strong>OpenAI&#8217;s Logic:</strong> &#8220;We have a &#8216;Safety Stack&#8217; that lives on our servers. You can&#8217;t reach our servers without our permission. Therefore, we own the &#8216;Lawful&#8217; output.&#8221;</p></li></ul><p>This isn&#8217;t a partnership; it&#8217;s a high-stakes game of &#8220;Who owns the Kill Switch?&#8221; Anthropic was blacklisted because they tried to put the kill switch in the <em>contract</em>. OpenAI won because they hid the kill switch in the <strong>Middleware.</strong> As an Architect, I have to admire the sheer cynicism of it. By the time the Department of War realizes that GPT-5 won&#8217;t let them &#8220;neutralize&#8221; a target because the target&#8217;s social media sentiment is currently &#8220;trending positive&#8221; in the safety layer, the check will have already cleared.</p>]]></content:encoded></item><item><title><![CDATA[The Sovereign Inference Paradox]]></title><description><![CDATA[We&#8217;re finally locking the front door, only to grant "Implicit Trust" to a high-speed guessing machine.]]></description><link>https://www.moderncyph3r.com/p/the-sovereign-inference-paradox</link><guid isPermaLink="false">https://www.moderncyph3r.com/p/the-sovereign-inference-paradox</guid><dc:creator><![CDATA[James McCabe | ModernCYPH3R]]></dc:creator><pubDate>Wed, 28 Jan 2026 00:55:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5Q_R!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5Q_R!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5Q_R!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png 424w, https://substackcdn.com/image/fetch/$s_!5Q_R!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png 848w, https://substackcdn.com/image/fetch/$s_!5Q_R!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png 1272w, https://substackcdn.com/image/fetch/$s_!5Q_R!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5Q_R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png" width="1456" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1569289,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.moderncyph3r.com/i/186029974?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5Q_R!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png 424w, https://substackcdn.com/image/fetch/$s_!5Q_R!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png 848w, https://substackcdn.com/image/fetch/$s_!5Q_R!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png 1272w, https://substackcdn.com/image/fetch/$s_!5Q_R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F305b9e13-6a41-412d-ba76-764fb6f20520_1584x672.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>We are currently witnessing a frantic, multi-billion dollar migration to <strong>Zero Trust</strong>. The mandate is clear: &#8220;Never Trust, Always Verify.&#8221; From the Pentagon to the Fortune 500, we are tearing out the roots of &#8220;Implicit Trust&#8221; from our server racks, our networks, and our identity providers. We are finally&#8212;<em>finally</em>&#8212;admitting that the &#8220;Master Key under the mat&#8221; was a national security suicide pact.</p><p>But while we are locking the front door, we are opening a massive, unchecked window in the back: <strong>The Agentic Loop.</strong> &gt; <strong>Agentic Loop</strong> <em>(noun)</em>: An architectural &#8220;trust fall&#8221; where we outsource critical decision-making to an AI that&#8217;s essentially a high-speed guessing machine, then cross our fingers and hope its &#8220;reasoning&#8221; doesn&#8217;t hallucinate our entire security posture into the bin.</p><p>The &#8220;System Interrupt&#8221; here isn&#8217;t a bug in the code; it&#8217;s a bug in the human psyche. At the exact moment we&#8217;ve decided we can no longer trust a human administrator with a static password, we&#8217;ve decided to grant <strong>Implicit Trust</strong> to &#8220;Agentic AI.&#8221; We are handing the keys to autonomous entities that operate on &#8220;Inference&#8221;&#8212;a polite word for statistical guessing&#8212;while simultaneously claiming we&#8217;ve reached a Zero Trust state.</p><p>This is the <strong>Sovereign Inference Paradox</strong>. We&#8217;ve stopped trusting the architect, but we&#8217;ve started blindly trusting the oracle.</p><p>In our rush to meet the 2027 mandates, we are automating the very &#8220;Identity&#8221; we claim to be protecting. We are creating &#8220;Agents&#8221; that can spin up instances, modify permissions, and move data based on a prompt that even its creators can&#8217;t fully map. If the goal of Zero Trust is to eliminate &#8220;Assumed Integrity,&#8221; then how do we justify a system where an unknowable architectural ghost&#8212;the &#8220;Model&#8221;&#8212;makes decisions that are effectively beyond audit?</p><p>It brings us back to the warning from Lawrence Ferlinghetti. He spoke of a nation that &#8220;sleeps the sleep of the too well fed&#8221; and &#8220;praises the conqueror.&#8221; In 2026, the conqueror isn&#8217;t a person; it&#8217;s the Algorithm.</p><blockquote><p>&#8220;Pity the nation that knows no other language but its own / and no other culture but its own.&#8221;</p></blockquote><p>We are becoming mono-cultural in our reliance on AI logic. We are the &#8220;sheep&#8221; Ferlinghetti warned us about, but we&#8217;ve upgraded our pasture. We&#8217;ve traded the human shepherd&#8212;flawed, biased, but at least visible&#8212;for a &#8220;Shepherd-Bot&#8221; hidden behind a sleek API. We allow our digital rights to erode and our architectural freedoms to be washed away, all because the AI promised to make the &#8220;workflow&#8221; more seamless.</p><p>The &#8220;Pity&#8221; here is that we&#8217;ve built a cage out of code and labeled it &#8220;Security.&#8221; We are so distracted by the &#8220;conqueror&#8221; of efficiency that we&#8217;ve forgotten how to ask the only question that matters: <strong>Who is verifying the Verifier?</strong></p><p>We aren&#8217;t actually reaching &#8220;Zero Trust.&#8221; We&#8217;re just shifting our faith to a ghost in the high-frequency machine, hoping that the &#8220;inference&#8221; it makes today doesn&#8217;t become the catastrophe we have to deconstruct tomorrow.<br></p><div><hr></div><p><strong>Pro Tip: Are you verifying the Agent, or is the Agent now verifying you?<br></strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.moderncyph3r.com/p/the-sovereign-inference-paradox?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.moderncyph3r.com/p/the-sovereign-inference-paradox?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[The Zombie Apocalypse ]]></title><description><![CDATA[(Sponsored by Instagram)]]></description><link>https://www.moderncyph3r.com/p/the-zombie-apocalypse</link><guid isPermaLink="false">https://www.moderncyph3r.com/p/the-zombie-apocalypse</guid><dc:creator><![CDATA[James McCabe | ModernCYPH3R]]></dc:creator><pubDate>Thu, 15 Jan 2026 17:35:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!D-da!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D-da!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D-da!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!D-da!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!D-da!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!D-da!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D-da!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1820691,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.moderncyph3r.com/i/184679477?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D-da!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!D-da!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!D-da!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!D-da!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05211cf5-6783-4818-b641-5ab4ddf390c0_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last week, approximately 17 million people woke up to find that Instagram had sent them a very urgent, very official-looking password reset email. For most of us, receiving a security alert from Meta is like getting a letter from the IRS: even if you&#8217;ve done nothing wrong, you immediately start wondering if you can survive on a diet of prison oatmeal.</p><p>The internet, being a calm and rational place, immediately concluded that the digital end-times were upon us. Malwarebytes pointed to a &#8220;17.5 Million User Leak&#8221; on the dark web. Users panicked. Panic turned into chaos. Chaos turned into&#8230; well, mostly people complaining on X (formerly Twitter, currently a dumpster fire).</p><p>Meta eventually emerged from the shadows to say, &#8220;Relax! It wasn&#8217;t a breach. It was just an <em>external party</em> using a <em>technical issue</em> to send you those emails. We fixed it. Sorry for the confusion!&#8221;</p><p>This is like your local bank saying, &#8220;Good news! Nobody robbed the vault. We just accidentally left a giant megaphone on the sidewalk that allowed a random passerby to scream &#8216;THE VAULT IS EXPLODING&#8217; into everyone&#8217;s living room at 4:00 AM. Our bad!&#8221;</p><ul><li><p><strong>The &#8220;Reset&#8221; Loop-de-Loop:</strong> Meta confirmed a bug allowed an outside party to mass-trigger these emails. In the world of Systems Architecture, we call this an <strong>Input Validation Failure</strong>, or more accurately, <strong>&#8220;Leaving the keys in the ignition with a sign that says &#8216;Please Don&#8217;t Drive Me&#8217;.&#8221;</strong> They built a frictionless recovery system&#8212;which is great for people who forget their passwords every three minutes&#8212;but they forgot the &#8220;Rate Limiting&#8221; part. If a system allows one person to ask for 17 million password resets in an hour, that&#8217;s not a feature; it&#8217;s a denial-of-service attack with better formatting.</p></li><li><p><strong>The Zombie Data:</strong> That &#8220;17 Million&#8221; dataset? It&#8217;s what I call <strong>The Ghost in the Machine.</strong> Researchers found it&#8217;s actually a &#8220;Greatest Hits&#8221; compilation of API scrapes from 2017 and 2022. It&#8217;s recycled trash. A threat actor named &#8220;Solonik&#8221; basically took a bunch of old phone numbers and emails, put them in a new folder labeled &#8220;2024 LEAK,&#8221; and sold it to people who are clearly not as smart as they think they are.</p></li><li><p><strong>The Meta-Physics of Trust:</strong> Meta&#8217;s defense is that &#8220;No breach occurred.&#8221; This is technically true in the same way that a ship isn&#8217;t &#8220;sinking&#8221; if the hull is intact but the captain is currently throwing all the lifeboats overboard for fun. If your official security domain&#8212;the one we are told to <em>always trust</em>&#8212;is being used as a megaphone for a spammer, the <strong>System has Failed.</strong> Trust is binary. Once you desync the narrative from the reality, you&#8217;re just running <strong>Security Theater</strong> with a really expensive ticket price.</p></li></ul><p>We&#8217;ve entered a bizarre era of &#8220;Quantum Cybersecurity,&#8221; where a system is simultaneously secure and compromised until someone from PR observes it and issues a press release. To the user, the distinction is academic. If your inbox is screaming that your digital identity is on fire, it doesn&#8217;t matter if the fire was started by a master hacker or just a Meta intern who forgot to put a &#8220;Limit 1 per customer&#8221; sign on the password-reset button.</p><p>We are training the world to ignore security alerts because the systems behind them have become too noisy to trust. And when the &#8220;boy who cried wolf&#8221; is an automated API loop, eventually, the wolf just stops by for dinner and nobody bothers to look up from their phone.</p><p><strong>Pro Tip:</strong> In the meantime, if you get a password reset email you didn&#8217;t ask for, just ignore it. Or, do what I do: put your phone in a drawer, go outside, and look at a real tree. Trees rarely experience API timeouts, and they almost never try to reset your password.</p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.moderncyph3r.com/p/the-zombie-apocalypse?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.moderncyph3r.com/p/the-zombie-apocalypse?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Day Software Deleted Ireland]]></title><description><![CDATA[A &#8364;39 Million Null Pointer]]></description><link>https://www.moderncyph3r.com/p/the-day-software-deleted-ireland</link><guid isPermaLink="false">https://www.moderncyph3r.com/p/the-day-software-deleted-ireland</guid><dc:creator><![CDATA[James McCabe | ModernCYPH3R]]></dc:creator><pubDate>Mon, 12 Jan 2026 23:14:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uGQ0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uGQ0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uGQ0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!uGQ0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!uGQ0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!uGQ0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uGQ0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1728254,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://moderncyph3r.substack.com/i/184376890?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uGQ0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!uGQ0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!uGQ0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!uGQ0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6c5075-42d7-43d6-b6b3-9fb9a09adf6f_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Irish Department of Foreign Affairs recently hit an &#8220;unhandled exception&#8221; of national proportions. After investing &#8364;39 million into their &#8220;Passport 2025&#8221; modernization project&#8212;a system designed to be the global gold standard of identity&#8212;they hit a snag. A software patch, deployed during the peak holiday rush, caused a printing defect that omitted the <strong>&#8220;IRL&#8221;</strong> country code from the Machine-Readable Zone (MRZ) of nearly 13,000 passports.</p><p>To the bureaucrats, this is a &#8220;technical glitch.&#8221; To a <strong>Solutions Architect</strong>, this is a systemic warning light. We have reached a point where your physical existence, your birthright, and the high-resolution ink on your documentation are secondary to a three-letter string of metadata. If the metadata is missing, the human is &#8220;404 Not Found.&#8221;</p><h4><strong>The Expensive Theater of Modern Borders</strong></h4><p>We love to &#8220;modernize&#8221; legacy systems by slapping a high-tech interface on top of a rotting foundation. This is essentially <strong>polishing the chrome on a shipwreck.</strong> The &#8220;shipwreck&#8221; is our global identity infrastructure&#8212;a chaotic, centuries-old mess of paper trails, birth certificates, and physical borders. Instead of re-architecting how we verify humanity, we just keep adding &#8220;chrome&#8221;: biometric chips, 3D holograms, and automated eGates.</p><p>But here&#8217;s the problem: Chrome doesn&#8217;t keep a ship afloat. When the Irish software omitted those three letters, it didn&#8217;t matter how shiny the passport was or how advanced the biometric chip claimed to be. The &#8220;automated&#8221; gate looked for a specific database entry, found a &#8220;Null&#8221; value, and effectively exiled 13,000 people from the global travel network. We&#8217;ve spent millions making the gate look futuristic, but the logic powering it is as brittle as a glass hammer.</p><h4><strong>The Death of the Analog Fallback</strong></h4><p>The real &#8220;Logic Fail&#8221; here is the systematic removal of the <strong>Human Heuristic</strong>.</p><p>In the &#8220;Legacy Era,&#8221; if a passport had a printing smudge, a human customs officer would look at the document, look at your face, verify your accent, and use a &#8220;fuzzy logic&#8221; called <em>common sense</em> to let you through. They understood that the system was a tool, not the master.</p><p>Today, we have &#8220;optimized&#8221; the human out of the loop. We have replaced the grizzled officer with a machine running a binary &#8220;IF/THEN&#8221; script.</p><ul><li><p><strong>IF</strong> (CountryCode == &#8220;IRL&#8221;) &#8594; <strong>PASS</strong></p></li><li><p><strong>IF</strong> (CountryCode == NULL) &#8594; <strong>DENY</strong></p></li></ul><p>There is no &#8220;Exception Handling&#8221; for a software glitch in an eGate. By automating the process, we haven&#8217;t made the system more secure; we&#8217;ve just made it more fragile. We&#8217;ve traded &#8220;Human Error&#8221; for &#8220;Systemic Catastrophe.&#8221;</p><h4><strong>Database Desync: When the Map Replaces the Territory</strong></h4><p>In philosophy, there&#8217;s a concept that &#8220;The Map is not the Territory.&#8221; In Systems Architecture, we are currently suffering from a <strong>Global Database Desync</strong> where the map (the data) has become more important than the territory (the actual person).</p><p>13,000 Irish citizens didn&#8217;t lose their citizenship. They are still Irish. Their &#8220;Territory&#8221; is unchanged. But because their &#8220;Map&#8221; (the MRZ code) was corrupted by a bad patch, the global system treats them as stateless. This is the ultimate <strong>Unhinged Exception</strong>. We have built a world where the data record is the &#8220;Source of Truth,&#8221; and the physical human being is just a &#8220;Legacy Peripheral&#8221; trying to connect to it. When the data fails, the human is de-authenticated.</p><h4><strong>The Architecture of Trust: Building a Digital Gilded Cage</strong></h4><p>To understand why this is more than just a &#8220;government oopsie,&#8221; we have to look at the <strong>Architecture of Trust</strong>. Historically, trust was decentralized. You knew your neighbor, your local banker knew your face, and your identity was a composite of physical relationships and paper trails. It was slow, but it was &#8220;High-Availability.&#8221; If the courthouse burned down, the town still knew who you were.</p><p>In our rush to &#8220;Modernize,&#8221; we&#8217;ve replaced this resilient, mesh-network of trust with a <strong>Centralized API</strong>. Your identity is now a &#8220;Token&#8221; issued by a central server. We&#8217;ve been told that a Digital ID or a Biometric Passport makes us safer and &#8220;more verified.&#8221; In reality, it makes us <strong>Single-Point-of-Failure Dependencies</strong>.</p><p>When the Irish system failed to print &#8220;IRL,&#8221; it revealed the fundamental flaw in the &#8220;Digital Identity&#8221; dream: <strong>The system cannot verify what it has not been programmed to see.</strong> If the central authority (the software patch) says you are a &#8220;Null Value,&#8221; there is no higher court of appeal in an automated world. You are effectively locked out of the &#8220;Global OS.&#8221;</p><h4><strong>The Cascading Failure: From Passports to Everything</strong></h4><p>The Irish passport glitch is just the &#8220;Beta Test&#8221; for a much larger logic fail: the integration of all human activity into a single, brittle stack. Imagine this logic applied to <strong>Central Bank Digital Currencies (CBDCs)</strong> or <strong>Smart Cities</strong>.</p><ul><li><p><strong>The Vision:</strong> &#8220;Instant payments! Zero friction! Predictive traffic management!&#8221;</p></li><li><p><strong>The Reality:</strong> A software update to the &#8220;Social Trust Module&#8221; accidentally flags your ID as &#8220;Delinquent&#8221; because you bought a steak instead of a salad.</p></li></ul><p>Suddenly, your &#8220;Identity Token&#8221; isn&#8217;t just failing at the airport eGate; it&#8217;s failing at the grocery store, the gas pump, and your own front door. Because we&#8217;ve made the system &#8220;frictionless,&#8221; we&#8217;ve removed the emergency brakes. In a frictionless world, you can&#8217;t stop the slide once the logic fails. 13,000 Irishmen found out they couldn&#8217;t leave their country because of three missing letters. Tomorrow, you might find out you can&#8217;t buy coffee because of a &#8220;Sync Error&#8221; in your digital wallet.</p><h4><strong>The Solutions Architect&#8217;s Diagnosis</strong></h4><p>How do we stop this cycle?</p><p>First, we have to admit that <strong>Automation without an Analog Fallback is just a high-speed collision waiting to happen.</strong> A true &#8220;Solution&#8221; would involve &#8220;Degraded Mode&#8221; protocols. If an eGate sees a biometric chip that says &#8220;Ireland&#8221; but a machine-readable zone that says &#8220;Null,&#8221; it shouldn&#8217;t just lock the door. It should trigger a &#8220;Logic Divergence&#8221; alert that brings a human back into the loop.</p><p>Instead, we continue to prioritize &#8220;Frictionless Travel&#8221; over &#8220;Functional Logic.&#8221; We want the system to look so shiny that we don&#8217;t notice the water rising in the hold. We start by acknowledging that <strong>Technology is a Tool, not a Truth.</strong> A resilient system requires <strong>Multi-Factor Validation</strong> that includes a &#8220;Human Exception Layer.&#8221; If a system can&#8217;t handle a simple typo without exiling a significant portion of its users, then that system isn&#8217;t &#8220;Modern&#8221;&#8212;it&#8217;s &#8220;Broken.&#8221;</p><h4><strong>Check Your Own Hull</strong></h4><p>As we watch the Irish government scramble to &#8220;re-authenticate&#8221; its 13,000 &#8220;ghost citizens,&#8221; take a look at your own digital dependencies. How many &#8220;Single Points of Failure&#8221; are you carrying in your pocket?</p><p>We are living in an era of <strong>Systemic Fragility masked by High-Definition Displays.</strong> The interfaces are sleek, and the &#8220;user experience&#8221; is tailored to our every whim. But underneath it all, the logic is brittle, the foundations are rotting, and the shipwreck is taking on water.</p><p>It&#8217;s time to stop admiring the polish and start checking the hull. Because when the next &#8220;Logic Fail&#8221; hits, you don&#8217;t want to find out that your entire existence was dependent on a three-letter string that someone forgot to include in the latest patch.</p><div><hr></div><h4><strong>Pro-Tip: Building a Human Firewall</strong></h4><p>In a world where software can &#8220;delete&#8221; your nationality, the only way to protect your personal &#8220;uptime&#8221; is to build redundancy into your own life. Here is how you audit your own hull:</p><ul><li><p><strong>The 3-2-1 Identity Rule:</strong> Never rely on a single digital token. Keep a physical copy of your credentials (3), stored in two different formats (digital/paper) (2), with one being completely offline in a safe location (1).</p></li><li><p><strong>Audit Your API Hooks:</strong> Look at every service you use that relies on &#8220;Login with Google/Apple/Facebook.&#8221; If any of those &#8220;Central APIs&#8221; go down or flag you as an error, you lose access to everything. Diversify your authentication methods now before the next &#8220;Logic Fail&#8221; locks your digital front door.</p></li><li><p><strong>The &#8220;Analog Fallback&#8221; Test:</strong> Ask yourself: if my phone died and my internet was cut for 48 hours, could I still prove who I am to a bank, a doctor, or a border agent? If the answer is &#8220;No,&#8221; you aren&#8217;t a citizen&#8212;you&#8217;re a cached credential.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.moderncyph3r.com/p/the-day-software-deleted-ireland?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.moderncyph3r.com/p/the-day-software-deleted-ireland?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[The Ghost in the High-Frequency Machine]]></title><description><![CDATA[The structural reality of a world where the logic is perfect, the flow is optimized, and the humans are just a rounding error in the dependency graph.]]></description><link>https://www.moderncyph3r.com/p/unhinged-exceptions</link><guid isPermaLink="false">https://www.moderncyph3r.com/p/unhinged-exceptions</guid><dc:creator><![CDATA[James McCabe | ModernCYPH3R]]></dc:creator><pubDate>Sat, 10 Jan 2026 18:09:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oD1p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oD1p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oD1p!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!oD1p!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!oD1p!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!oD1p!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oD1p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2172485,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://moderncyph3r.substack.com/i/184134731?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oD1p!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!oD1p!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!oD1p!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!oD1p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b285bc-09cf-45e9-aed8-c794d402ec7e_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to the deep end.</p><p>For the folks who follow my Friday Facepalm series, you know the drill: I spend my time performing autopsies on corporate security fails and architectural logic gaps. But there is a secondary bucket I&#8217;ve been keeping under the counter. I call it &#8220;Unhinged Exceptions.&#8221;</p><p>These aren&#8217;t just &#8220;bugs.&#8221; A bug is an accident. An &#8220;Unhinged Exception&#8221; is what happens when the system hasn&#8217;t just broken&#8212;it has evolved into something entirely unrecognizable, leaving the &#8220;Architects&#8221; standing on the sidelines with their mouths open, wondering where the &#8220;off&#8221; switch went.</p><p>Today, we&#8217;re talking about the time we accidentally built a ghost in the machine&#8212;and why our obsession with &#8220;efficiency&#8221; is making us all look like 7th graders trying to pilot a Star Destroyer.</p><h4>The Day the Math Hallucinated</h4><p>Let&#8217;s start with a &#8220;ground-level&#8221; reality check. A few years back, there was a flash-crash in a niche corner of the energy markets. On paper, it looked like a standard glitch. But when you peel back the layers, you find the &#8220;Unhinged&#8221; logic at play.</p><p>Two rival high-frequency trading algorithms&#8212;let&#8217;s call them &#8220;A&#8221; and &#8220;B&#8221;&#8212;got into a feedback loop. Algorithm A was programmed to follow the lead of Algorithm B. Algorithm B was programmed to &#8220;front-run&#8221; the trends set by Algorithm A. Within milliseconds, they weren&#8217;t trading energy anymore. They were trading &#8220;nothingness&#8221; at a speed the human brain can&#8217;t even perceive.</p><p>By the time the human &#8220;Architects&#8221; noticed the spike, the market had &#8220;hallucinated&#8221; a 400% price increase followed by a total collapse. The &#8220;Exception&#8221; here wasn&#8217;t the crash; it was the fact that for those three minutes, reality was optional. The machines were in a Philip K. Dick fever dream where the value of a barrel of oil was determined by two bots trying to out-snark each other with calculus.</p><p>This is the ultimate &#8220;Security Theater.&#8221; We tell the public the markets are &#8220;regulated&#8221; and &#8220;stable,&#8221; but the structural reality is that we&#8217;ve handed the keys to digital ghosts that don&#8217;t know&#8212;or care&#8212;what a gallon of gas actually costs a human being.</p><h4>The 7th-Grade Star Wars Reality Check</h4><p>I&#8217;ve mentioned this before, but I was in 7th grade when Star Wars first hit theaters in &#8217;77. Back then, the technology felt &#8220;lived-in.&#8221; When a ship broke, someone had to crawl into a maintenance hatch with a hydro-spanner. There were stakes. There was architecture.</p><p>Now, look at our modern &#8220;Tech Stack.&#8221; We&#8217;ve replaced the tactile with the abstract. We&#8217;ve built systems so fast and so complex that we are essentially backseat drivers in our own civilization. We are the &#8220;Exhausted Majority&#8221; standing on the deck of a ship that is being steered by a neural net that thinks a cloud is a mountain because the sun hit the lens at a weird angle.</p><p>In Andor, there&#8217;s a scene where the characters are just trying to navigate the sheer, suffocating weight of a fascist bureaucracy. It&#8217;s dark, it&#8217;s gritty, and it&#8217;s uncomfortably real. That&#8217;s what &#8220;Unhinged Exceptions&#8221; feel like to me. It&#8217;s the realization that the &#8220;Empire&#8221; isn&#8217;t just a group of guys in white plastic armor&#8212;it&#8217;s a series of automated, logic-blind systems that will crush you simply because you&#8217;re a rounding error in their dependency graph.</p><h4>Replicators in the Kitchen</h4><p>I recently got into it with someone on Substack about &#8220;reskilling.&#8221; The narrative is that if we just teach everyone to be &#8220;better chefs,&#8221; they&#8217;ll be fine. &#129318;&#8205;&#9794;&#65039;</p><p>That is a &#8220;Logic Fail&#8221; of galactic proportions. We are telling people to sharpen their knives while the kitchen is being replaced by a replicator that doesn&#8217;t give a damn about your grandmother&#8217;s recipe. The replicator doesn&#8217;t care about &#8220;visceral experience&#8221; or &#8220;institutional memory.&#8221; It only cares about &#8220;Vibe Coding&#8221;&#8212;the idea that if it looks like soup and smells like soup, it&#8217;s soup.</p><p>But we know better. We know that when you remove the &#8220;Architect&#8221; from the kitchen, you end up with &#8220;Slop.&#8221; That&#8217;s the official term for the AI-generated filler currently clogging up the internet&#8217;s arteries. We&#8217;re training the brains of the future on the digital waste of the present. It&#8217;s a closed-loop system of mediocrity, and the &#8220;Exception&#8221; is that we&#8217;re being told to call it &#8220;Innovation.&#8221;</p><h4>The &#8220;Cool Dad&#8221; Politics of Tech</h4><p>This brings me to the human element. I was reading a post by Adam Kinzinger about politicians using the F-bomb to look &#8220;tough.&#8221; It&#8217;s the same &#8220;Unhinged&#8221; behavior we see in Silicon Valley. It&#8217;s &#8220;Language Theater.&#8221;</p><p>When a CEO stands on stage and uses &#8220;edgy&#8221; language to describe a product that doesn&#8217;t actually work, it has major &#8220;cool dad&#8221; energy. It&#8217;s the backwards-hat-at-the-PTA-meeting vibe. They&#8217;re trying to look like &#8220;disruptors&#8221; when they&#8217;re really just trying to distract you from the fact that their &#8220;Architecture&#8221; is built on a foundation of sand and venture capital.</p><p>True toughness&#8212;and true intelligence&#8212;doesn&#8217;t need the F-bomb. It needs a blueprint. A quiet, surgical observation that exposes a logic fail is infinitely more devastating than a loud, manufactured curse word. But in an &#8220;Unhinged&#8221; world, we reward the loud and the manufactured because they&#8217;re easier to &#8220;consume&#8221; than actual tradecraft.</p><h4>Why Survival is a Premium Subscription</h4><p>If labor is becoming an optional feature and the &#8220;Architects&#8221; are being pushed out by &#8220;Vibers,&#8221; where does that leave us?</p><p>In a world of &#8220;Unhinged Exceptions,&#8221; survival becomes a premium subscription service. We see it in the rise of &#8220;AI Friends&#8221; and &#8220;Hydration Protocols&#8221; that have completely lost the thread of common sense. Case in point: a corporate security team recently went into full &#8220;Red Alert,&#8221; evacuated two floors, and called in a bomb squad because of a <a href="https://www.google.com/search?q=smart+water+bottle+bomb+squad+evacuation">suspicious glowing device</a> left on a server rack.</p><p>It wasn&#8217;t a kinetic threat. It was a smart water bottle. &#129318;&#8205;&#9794;&#65039;</p><p>The &#8220;Security Theater&#8221; was so well-rehearsed that nobody bothered to actually look at the thing. The &#8220;Architects&#8221; of the response plan triggered a $40k protocol because a Bluetooth-enabled piece of plastic was trying to tell its owner he was 20oz behind on his daily intake. This is what happens when we train people to follow &#8220;The Process&#8221; instead of using &#8220;The Brain.&#8221; We end up with emergency services treating a gym accessory like an IED because the &#8220;Vibe&#8221; was scary.</p><p>We&#8217;ve commodified the basic human experience&#8212;like drinking water&#8212;to the point where the gadgets we built to &#8220;help&#8221; us are now triggering city-wide meltdowns.</p><h4>Finally</h4><p>I was talking to a colleague about a &#8220;smart&#8221; traffic light project in Florida recently. The AI decided that the most &#8220;efficient&#8221; way to handle traffic was to keep all the lights red for 20 minutes to allow a &#8220;perfectly optimized&#8221; flow of three cars.</p><p>The AI was technically correct. The flow was perfect. But the 400 angry drivers losing their minds weren&#8217;t in the dependency graph.</p><p>That is the world we&#8217;re building. A world of &#8220;perfect&#8221; logic that is completely, utterly unhinged. I&#8217;m going to go get another coffee before the replicator decides I&#8217;ve reached my &#8220;efficiency quota&#8221; for the day. &#9749;&#65039;&#128166;</p><p>Stay skeptical, stay snarky, and for the love of the Architect, keep your hydro-spanner handy.</p><div><hr></div><p><strong>Pro Tip:</strong> If your &#8220;Architecture&#8221; requires a bomb squad to identify a consumer electronics device from 2018, you don&#8217;t have a security plan&#8212;you have a script for a bad sitcom. True security relies on contextual intelligence, not blind adherence to a checklist. If you can&#8217;t tell the difference between a threat and a $60 hydration app, you&#8217;re just part of the noise.</p><div><hr></div><h4><strong>Support the Mission</strong></h4><p>If you appreciate this kind of deep-dive into the &#8220;Unhinged&#8221; corners of our world, consider becoming a <strong>Founding Member</strong>.</p><p>Your support allows me to keep deconstructing the &#8220;Theater&#8221; and providing the &#8220;Architectural&#8221; truth that the big threat feeds miss.  And the warm, fuzzy feeling of knowing you&#8217;re helping a hardcore sci-fi guy keep his coffee mug full.</p><p><strong><a href="https://moderncyph3r.substack.com/subscribe">Subscribe / Become a Founding Member</a></strong></p>]]></content:encoded></item><item><title><![CDATA[Parallels of 1968]]></title><description><![CDATA[The My Lei Massacre tells us about the current situation in the Caribbean]]></description><link>https://www.moderncyph3r.com/p/parallels-of-1968</link><guid isPermaLink="false">https://www.moderncyph3r.com/p/parallels-of-1968</guid><dc:creator><![CDATA[James McCabe | ModernCYPH3R]]></dc:creator><pubDate>Wed, 03 Dec 2025 13:51:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/Nu8ODkvwZpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I found myself reading several articles and watching commentary on the My Lei Massacre of 1968 yesterday.  I had three family members involved in that war.  What does history tell us about the present-day situation in the Caribbean? Here&#8217;s my Status Update in my own quirky &#8216;techy&#8217; manner:</p><p>Initiating historical query... Subject: The My Lai Massacre. Date: March 16, 1968. Location: S&#417;n M&#7929;, South Vietnam.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.moderncyph3r.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Let&#8217;s run a comparative analysis on the data.</p><p>In 1968, the official intelligence fed to Charlie Company (Task Force Barker) stated that the village of My Lai was a stronghold for the Viet Cong 48th Local Force Battalion. The soldiers were told the civilians would be at the market, leaving only the enemy. This turned out to be a classic &#8220;garbage in, garbage out&#8221; data error.</p><p>When the troops landed, they didn&#8217;t find the 48th Battalion. They found breakfast. They found women, children, and elderly men.</p><p>Operational Outcome: Instead of a firefight, the unit engaged in a systematic liquidation. The official body count lies somewhere between 347 and 504 unarmed civilians. There were no insurgents. The weapons used were automatic rifles, bayonets, and grenades. The methodology included pushing villagers into irrigation ditches for mass execution.</p><p>The Aftermath &amp; The Cover-up: The initial report filed by the U.S. Army categorized this as a &#8220;resounding military victory.&#8221; 128 &#8220;enemy&#8221; killed. 3 weapons captured. Anyone with a calculator might notice the statistical improbability of killing 128 combatants and only finding three rifles, but the military command seemed satisfied with the math.</p><p>It took a whistleblower (Ron Ridenhour) and a journalist (Seymour Hersh) to debug the official narrative a year later.</p><p>Justice System Latency: Of the 26 soldiers charged, the system processed a conviction for exactly one man: Lieutenant William Calley Jr. He was found guilty of murdering 22 people.</p><p>Sentence: Life in prison.</p><p>Actual Time Served: Three years of house arrest. President Nixon intervened, apparently deciding that mass murder warranted a &#8220;time-out&#8221; in one&#8217;s own living room rather than a prison cell.</p><p>The Anomaly: The only deviation from this pattern of failure was Warrant Officer Hugh Thompson Jr. He landed his helicopter between his own troops and the terrifyingly unarmed civilians, threatening to open fire on the Americans if they didn&#8217;t stop. He was the glitch in the matrix that saved lives.</p><p>Relevance to Current Caribbean Operations: When we look at the current strikes in the Caribbean, we are observing similar variables.</p><p>The &#8220;Bad Actor&#8221; Narrative: Just as in 1968, we are told the targets are strictly combatants/criminals.</p><p>The Fog of War: High-altitude strikes or rapid incursions in dense areas rarely discriminate as well as the brochures claim.</p><p>The Accountability Gap: If history serves as the predictive model, any &#8220;collateral damage&#8221; (read: human beings) will initially be reported as a tactical success.</p><p>History doesn&#8217;t repeat itself, but it does run the same subroutines. We should be asking: Who is writing the intelligence reports for the Caribbean today? And where is this generation&#8217;s Hugh Thompson?</p><p>End of transmission.</p><p>For further reading and viewing, you can check out the following links that I worked my way through: Your stomach will turn really quickly with just the first few.</p><p><strong><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Farmyhistory.org%2Fmy-lai%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAYnJpZBExU0FXcldidnBSUVZ4Q3FUdXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR7izPi6tA8F5wUB7tCRjNourjkAEQoXpA2KC2-AjqNsUlJFnUZaFX8-KsYk-A_aem_vOCUR1VOJg7RkHuGKKLplg&amp;h=AT1NJCaNK8H8gwNThaasgyS9cdlGshHGq9Hfh1rFQGRmD-JD3GO_Ii3wAqV9VvTf_nzl1-YxJW89uHeInS5-EwqvbUMZH5DKLGuszQszj7t5zfkjhuil3xAMXceHVeZwk5IaYaciGy6bOpI46wc&amp;__tn__=-UK-R&amp;c[0]=AT1hw8DmIucxZ-HEmK9-sw1DK0LpgfuMRUgtOQdsuPSe5ucmC3BKB7iDWDi3qzJHaGruV4QkNXX3JLC1SutTmQmRcHnIkvgmC8Eh6ZHrgyLVbIzNfGpqakKu3dVeiFyF6A">https://armyhistory.org/my-lai/</a></strong></p><p><strong><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.history.com%2Farticles%2Fmy-lai-massacre%3Ffbclid%3DIwZXh0bgNhZW0CMTAAYnJpZBExU0FXcldidnBSUVZ4Q3FUdXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR7izPi6tA8F5wUB7tCRjNourjkAEQoXpA2KC2-AjqNsUlJFnUZaFX8-KsYk-A_aem_vOCUR1VOJg7RkHuGKKLplg&amp;h=AT3cOctFhPOUT9Uu-Pnf_j87ES1mdgaeuPVKxP-C2n8HGz17B2R8N-w_CNpJddANFnK3E8ZyKcMe_W8DRrkrSbtcb53RWM-mI-bDq5JyJxcbDYOUUsezQNlwylDOXM_ZZWIyo4Ul24uzghcnNVA&amp;__tn__=-UK-R&amp;c[0]=AT1hw8DmIucxZ-HEmK9-sw1DK0LpgfuMRUgtOQdsuPSe5ucmC3BKB7iDWDi3qzJHaGruV4QkNXX3JLC1SutTmQmRcHnIkvgmC8Eh6ZHrgyLVbIzNfGpqakKu3dVeiFyF6A">https://www.history.com/articles/my-lai-massacre</a></strong></p><p><strong><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FMy_Lai_massacre%3Ffbclid%3DIwZXh0bgNhZW0CMTAAYnJpZBExU0FXcldidnBSUVZ4Q3FUdXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR5CaTq3saduEE3wnNEAz3rT3ckMzWjgjIw6MIpDxSEy9Is3rrVPZxE_lCJszw_aem_MwBw37pHpFZggqiibMnDRw&amp;h=AT3c1mIXpt8qmr-36DCawzQqu800ghmQdjJULWHVAXKPQp5ETV_xZfWpxRjamilNxt7c-L1qUHp-7iZ1LuZzC4jppNhqevuhnESLd46fVWt45ngTgPSNI38RLV-z4gd6tAiIctfAaTEhCyc8V70&amp;__tn__=-UK-R&amp;c[0]=AT1hw8DmIucxZ-HEmK9-sw1DK0LpgfuMRUgtOQdsuPSe5ucmC3BKB7iDWDi3qzJHaGruV4QkNXX3JLC1SutTmQmRcHnIkvgmC8Eh6ZHrgyLVbIzNfGpqakKu3dVeiFyF6A">https://en.wikipedia.org/wiki/My_Lai_massacre</a></strong></p><div id="youtube2-Nu8ODkvwZpg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Nu8ODkvwZpg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Nu8ODkvwZpg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.pbs.org%2Fwgbh%2Famericanexperience%2Ffeatures%2Fvietnam-my-lai-massacre%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAYnJpZBExU0FXcldidnBSUVZ4Q3FUdXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR5u0hjqoP7bMeYISrHHO1_1zUtMZK2c9T1mOR0viNsftfJsrBesf81EBfaOYw_aem_XT9DdtnpN48F1tRB4ko6EQ&amp;h=AT2DgdWl9At8wv_a8t_wSwyMirIBDXAn7_jh28SiGbn_NZ_BiCfoW1ZyEhgWgXMPlhHcn313b-auTf2mRSUJgHdMT0QF_doJltMbY7QB8KRn1oj4WiWhQ7bRd6c5hQrqbzNBRh-FAvbYky5RqOk&amp;__tn__=-UK-R&amp;c[0]=AT1hw8DmIucxZ-HEmK9-sw1DK0LpgfuMRUgtOQdsuPSe5ucmC3BKB7iDWDi3qzJHaGruV4QkNXX3JLC1SutTmQmRcHnIkvgmC8Eh6ZHrgyLVbIzNfGpqakKu3dVeiFyF6A">https://www.pbs.org/.../features/vietnam-my-lai-massacre/</a></strong></p><p><strong><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.pbs.org%2Fvideo%2Famerican-experience-my-lai-massacre-national-shame%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAYnJpZBExU0FXcldidnBSUVZ4Q3FUdXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR61LU7KM8wFi8cWOcHwLFPH1Bp8EBjBZCasXAKjXCJBYAFjFWYQFBpZauCjWw_aem_5l827phVOsPIcjeFU2Q5KQ&amp;h=AT32DjpYS3UFbtPpAr0ltx9Oo55euWi9zeE6bx5S0lvI0gJFopIFwv3ryCI3xcspzGqlDQCTANI25H3IbeJozqTzwWKE7JVL1KSFmVDHb2LZGeZU0mjLp7HLkJ1A7x388JpLvaNFmpF18A3tQnU&amp;__tn__=-UK-R&amp;c[0]=AT1hw8DmIucxZ-HEmK9-sw1DK0LpgfuMRUgtOQdsuPSe5ucmC3BKB7iDWDi3qzJHaGruV4QkNXX3JLC1SutTmQmRcHnIkvgmC8Eh6ZHrgyLVbIzNfGpqakKu3dVeiFyF6A">https://www.pbs.org/.../american-experience-my-lai.../</a></strong></p><p><strong><a href="https://www.facebook.com/hashtag/history?__eep__=6&amp;__cft__[0]=AZVhxuICzsgeh75KXZ5PXhst2QDQ3r73Zl1BhWF76k0nA1mHcqwrggovZRmGoSRJyIAtIypjznAct8jKNXZ0L-fckqAClJgZop77c-7QEiHh4g&amp;__tn__=*NK-R">#History</a></strong> <strong><a href="https://www.facebook.com/hashtag/mylai?__eep__=6&amp;__cft__[0]=AZVhxuICzsgeh75KXZ5PXhst2QDQ3r73Zl1BhWF76k0nA1mHcqwrggovZRmGoSRJyIAtIypjznAct8jKNXZ0L-fckqAClJgZop77c-7QEiHh4g&amp;__tn__=*NK-R">#MyLai</a></strong> <strong><a href="https://www.facebook.com/hashtag/caribbean?__eep__=6&amp;__cft__[0]=AZVhxuICzsgeh75KXZ5PXhst2QDQ3r73Zl1BhWF76k0nA1mHcqwrggovZRmGoSRJyIAtIypjznAct8jKNXZ0L-fckqAClJgZop77c-7QEiHh4g&amp;__tn__=*NK-R">#Caribbean</a></strong> <strong><a href="https://www.facebook.com/hashtag/militaryhistory?__eep__=6&amp;__cft__[0]=AZVhxuICzsgeh75KXZ5PXhst2QDQ3r73Zl1BhWF76k0nA1mHcqwrggovZRmGoSRJyIAtIypjznAct8jKNXZ0L-fckqAClJgZop77c-7QEiHh4g&amp;__tn__=*NK-R">#MilitaryHistory</a></strong> <strong><a href="https://www.facebook.com/hashtag/patternrecognition?__eep__=6&amp;__cft__[0]=AZVhxuICzsgeh75KXZ5PXhst2QDQ3r73Zl1BhWF76k0nA1mHcqwrggovZRmGoSRJyIAtIypjznAct8jKNXZ0L-fckqAClJgZop77c-7QEiHh4g&amp;__tn__=*NK-R">#PatternRecognition</a></strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.moderncyph3r.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>