• The Automated Watchdog: Promise and Peril of AI in Government Auditing

    The Automated Watchdog: Promise and Peril of AI in Government Auditing

    1. The Potential Benefits of AI Auditors

    • Massive Data Processing: AI can analyze entire government spending databases (e.g., USASpending.gov) in minutes, a task that is physically impossible for human teams.
    • Real-Time Anomaly Detection: Unlike traditional audits that are often retrospective, AI can flag suspicious transactions, contracts, or grant awards as they happen, enabling proactive intervention.
    • Enhanced Pattern Recognition: AI excels at identifying complex, subtle patterns of waste or fraud across multiple agencies and years that would be invisible to human auditors.
    • Potential for Non-Partisan Oversight: When properly designed and constrained, AI systems can apply auditing rules consistently, reducing the potential for human bias or political influence in routine checks.

    2. Inherent Risks and Systemic Blind Spots

    The risks extend beyond simple technical errors and encompass systemic vulnerabilities that could undermine the entire oversight framework.

    (more…)
  • The Problem: Decentralized, Trustless Last-Mile Logistics

    Companies like DoorDash, Uber Eats, and Amazon Flex have solved the last-mile delivery problem using a centralized, server-based architecture. A central server, owned by the company, is the trusted intermediary that holds all the data: customer orders, restaurant/merchant locations, driver locations, driver reputations, and payment information. It acts as the “brain,” dispatching orders to drivers based on a proprietary algorithm.

    From first principles, design a system that accomplishes the same goal—efficiently matching customers who want items delivered with a fleet of independent drivers—but without a central server or trusted intermediary.

    Your proposed system must solve the following core problems from the ground up:

    1. Discovery: How does a customer’s order request get broadcast to nearby, available drivers without a central server to see everyone’s location? How does a driver “see” available orders?
    2. Selection & Bidding: How is a driver selected for an order? Does the customer choose? Is there a bidding system? How do you prevent a single malicious actor from accepting all orders and never completing them (a Sybil attack)?
    3. Reputation & Trust: Without a central database of star ratings, how is driver reputation established and verified in a decentralized manner? How can a customer trust a driver they’ve never met? How can a driver trust that the customer will pay? Reputation must be resistant to manipulation.
    4. Payment: How are payments processed trustlessly? The customer needs to be sure they won’t be charged until the item is delivered, and the driver needs to be sure they will be paid upon successful delivery. Design a payment-in-escrow mechanism that doesn’t rely on a central company holding the funds. Consider using smart contracts or a similar cryptographic method.
    5. Efficiency & Scalability: Centralized dispatch algorithms are highly optimized. How can a decentralized, peer-to-peer network achieve comparable route and batching efficiency without a god’s-eye view of the entire system? How does your system scale from a single neighborhood to a whole city?

    Your answer should focus on the fundamental architecture, protocols, and incentive structures, not just the user interface of an app.

  • Precision Doctrine: Re-evaluating Digital Assets from Peacetime Liability to Wartime Strategic Reserve

    Precision Doctrine: Re-evaluating Digital Assets from Peacetime Liability to Wartime Strategic Reserve

    David’s Note: This article was substantially revised on October 12, 2025 to incorporate new research and provide a more comprehensive analysis.

    Executive Summary

    This report argues that the Guiding and Establishing National Innovation for U.S. Stablecoins (GENIUS) Act represents a fundamental misinterpretation of digital asset technology’s strategic value. The Act integrates stablecoins into the peacetime financial system to foster innovation. However, this policy creates a significant national security liability. It strengthens a global infrastructure that adversaries exploit for illicit finance and sanctions evasion.

    The core argument is that the technology’s decisive value is not in peacetime commerce. Instead, its highest and best use is as a strategic military asset reserved for times of declared conflict. This analysis examines the GENIUS Act, the arguments of its proponents and opponents, and the extensive evidence of security threats posed by the peacetime proliferation of cryptocurrencies.

    As an alternative, this report proposes a “Wartime Digital Asset Act.” This framework would restrict the peacetime use of public cryptocurrencies. It would simultaneously develop the underlying technology as a strategic military reserve. This capability would be activated only upon a declaration of war by Congress for critical applications. These include resilient command and control, secure logistics, and wartime finance.

    The report concludes that true technological leadership requires the precise application of innovation to its most decisive purpose. In this case, that purpose is to serve as a reserved instrument of national power.

    (more…)
  • ‪Can Electors Go Rogue? The “Faithless Elector”‬

    ‪Can Electors Go Rogue? The “Faithless Elector”‬

    An elector can vote against the popular vote of their state. This is known as being a “faithless elector.” Historically, however, this has been rare and has never changed the outcome of a presidential election.

    Who are the electors? They are chosen by the political parties in each state. They are often party loyalists, chosen to recognize their service.

    Are there rules against it? Yes, many states have laws that require electors to vote for the candidate they are pledged to. The Supreme Court has upheld these laws, allowing states to penalize or replace faithless electors. As of 2024, 38 states and D.C. have such laws.

    (more…)
  • Hey Rep. Issa, I’ll Take That Bet: Here Are the Democrats Who Will Support Law Enforcement.

    Rep. Issa, regarding your “Over/Under on how many Democrats will support law enforcement,” I’ll happily take the over. You might be guessing not many, but I’m betting on a flicker of common sense from a handful who understand that “condemning violence against law enforcement” should be the easiest bipartisan win of the century.

    My guesstimate? You’ll get about 10 Democrats to vote YES on your resolution.

    Here’s the scouting report on the Democrats most likely to break ranks and join you, and why:

    (more…)
  • The Phoenix Plan: A Blueprint for American Rebirth

    The Phoenix Plan: A Blueprint for American Rebirth

    Prioritize national strength, economic independence, and internal order.

    Core Principles

    • Competent Government: Before voting on any bill, members of Congress must have one week to read it and pass a test to prove they understand it.
    • “Fortress America” Economy: The plan aims for a self-reliant economy. This includes:
      • Taxes: Making current individual tax rates permanent while eliminating special-interest loopholes, the Child Tax Credit, and complex corporate taxes.
      • Trade and Investment: Using tariffs to protect critical industries and offering residency to foreigners who make multi-million dollar investments in the U.S.
      • Ending Corporate Crime: Forcing companies to be specific about how they use investor money. Seized assets from convicted executives and banks will fund their own prosecution and imprisonment.
      • Nationalizing Crypto: Making all private cryptocurrency transactions illegal. The entire crypto system will be seized and reserved as a financial weapon for the military to use only during a declared war.
      • Honest Money: Transitioning away from the Federal Reserve to a system where the U.S. Treasury issues debt-free money directly.
    (more…)
  • The Energy Doctrine: A Fantastical Strategy for Earth and Space

    The Energy Doctrine: A Fantastical Strategy for Earth and Space

    What follows is not a sober policy proposal. It is a thought experiment, a flight of fancy designed to shatter the narrow confines of the current energy debate. The public discourse pits solar against fossil fuels as if it were a schoolyard argument, while the real game of power operates on a level of complexity that is rarely, if ever, discussed. This article is a wild, speculative attempt to outline a more complete, if fantastical, doctrine for energy strategy across three domains: strategic deception, tactical resilience, and celestial dominance. None of this is to be taken too seriously.

    The Terrestrial Battlefield: The Art of Strategic Deception

    The first principle of this doctrine is that a nation’s true energy capacity should be its most closely guarded secret. The ancient military strategist Sun Tzu taught that all warfare is based on deception. Publicly available data on energy production is, in this light, a strategic blunder—it’s like handing your enemy the schematics to your fortress. A wiser, if more paranoid, approach would be to reveal only what a sophisticated AI predicts is the bare minimum necessary to project stability, while concealing the true depth of your power. The real strength lies in the undisclosed—the unexpected and the unseen.

    The Deception Layer: Power Beneath the Surface

    The ultimate expression of strategic energy deception lies in moving critical infrastructure where it cannot be seen or targeted: underground. To be truly secure, a nation must possess power generation that is impervious to satellite surveillance, drone attacks, and bunker-busting bombs. The most practical technologies for this are nuclear and geothermal. All forms of nuclear reactors, from today’s fission plants to tomorrow’s fusion concepts, can be housed in deep, hardened subterranean bunkers. Geothermal energy, which taps the planet’s own internal heat, is perhaps even more elegant. With a minimal surface footprint, these plants provide constant, 24/7 power, regardless of weather, time of day, or what’s happening on the surface. By creating a distributed network of hidden geothermal and nuclear sites, a nation could build an invisible power base, with energy transmitted via hardened, buried, or even laser-based systems to ensure a second-strike capability and industrial survival.

    The Solar Paradox and Strategic Response

    On the surface, solar infrastructure is a paradox. In a conflict, sprawling solar farms are a liability—fragile, indefensible, and far more costly to rebuild than the munitions needed to destroy them. If you were Ukraine, fields of glass panels would be an illogical investment. Furthermore, we must consider scenarios beyond conventional warfare. A massive earthquake, a super-volcano eruption like Yellowstone that blacks out the sky with ash, or a meteor strike would render solar power useless. There are even whispers of weather manipulation technologies that could blot out the sun over a target area—a potentially cheaper tactic than building a massive solar infrastructure in the first place.

    This is where the strategic value of natural gas becomes clear. It’s not about powering a peaceful nation; it’s about tactical response in a crisis. The ability to quickly spin up natural gas turbines provides the immediate power needed to launch a counter-attack, power essential services after a natural disaster, or simply keep the lights on in a command bunker when the sun has disappeared.

    (more…)