Later On

A blog written for those whose interests more or less match mine.

Why Putin was able to do it

leave a comment »

I think that Putin identified two key vulnerabilities of the US:

  1. most US citizens do not understand or appreciate the work the government does, and how intricate and important it is; and<
  2. most US citizens do not vote.

Those are the gaping holes through which he complete a virtual invasion and conquest/occupation. I believe the first vulnerability was created by the GOP, which has long been hostile to government, beginning with Ronald Reagan’s constant refrain (and jokes) that government is the problem, not the solution. And of course the GOP has also been amazingly active in trying to keep people from being able to vote.

The “government,” of course, consists not of buildings but of organizational understandings: rules, norms, experience, knowledge (both of content and how to interact effectively with the organization). The result is a remarkably intricate and also delicate structure that depends on a particular culture. So despite its intricacy, it is vulnerable from the top (always the weakness of a hierarchical structure, something the Internet, for example, has tried to avoid—but still there are vulnerable points, as we’ve seen. But the Internet was deliberately designed to be decentralized, able to continue operation even if parts were blown away in a war. (ARPAnet, the direct ancestor of the Internet, incorporating all the basic design, was before the date ARPANET”adopted TCP/IP on January 1, 1983, and from there researchers began to assemble the “network of networks” that became the modern Internet. Thus the Internet grew up in the cultural environment of the cold war, and naturally memes that emerged were shaped by (and for) this environment.

The Fifth Risk, by Michael Lewis, speaks clearly to the way the government easily can be (and is being) destoryed. An extract of the book’s beginning has been published in the Guardian.

Written by Leisureguy

8 October 2018 at 1:24 pm

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: