<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Crosscurrents: (Geo)politics]]></title><description><![CDATA[Analysis of how nations compete, power dynamics, supply chains, and global alliances that affect your daily life.]]></description><link>https://www.crosscurrents.us/s/geopolitics</link><image><url>https://substackcdn.com/image/fetch/$s_!G_EI!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bcb3cf-5d05-4cec-a949-7ece0ffb8fa7_726x726.png</url><title>Crosscurrents: (Geo)politics</title><link>https://www.crosscurrents.us/s/geopolitics</link></image><generator>Substack</generator><lastBuildDate>Fri, 10 Apr 2026 22:20:45 GMT</lastBuildDate><atom:link href="https://www.crosscurrents.us/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Crosscurrents]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[crosscurrents21@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[crosscurrents21@substack.com]]></itunes:email><itunes:name><![CDATA[Crosscurrents]]></itunes:name></itunes:owner><itunes:author><![CDATA[Crosscurrents]]></itunes:author><googleplay:owner><![CDATA[crosscurrents21@substack.com]]></googleplay:owner><googleplay:email><![CDATA[crosscurrents21@substack.com]]></googleplay:email><googleplay:author><![CDATA[Crosscurrents]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The 1.2-Mile Problem]]></title><description><![CDATA[Geography makes 1.2 miles of water in the Persian Gulf more consequential than any single Middle Eastern state, demonstrating how isolationism isn't a feasible orientation for American foreign policy]]></description><link>https://www.crosscurrents.us/p/the-mile-problem-straight-of-hormuz-oil-iran</link><guid isPermaLink="false">https://www.crosscurrents.us/p/the-mile-problem-straight-of-hormuz-oil-iran</guid><dc:creator><![CDATA[Crosscurrents]]></dc:creator><pubDate>Sun, 15 Mar 2026 14:15:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jLOS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jLOS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jLOS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jLOS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jLOS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jLOS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jLOS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg" width="1024" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:571068,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.crosscurrents.us/i/191020215?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jLOS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jLOS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jLOS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jLOS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24015c6-9dc3-42e6-a736-09566b0b0ab1_1024x576.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When oil traders watch shipping lanes, they measure risk in nautical miles. The narrowest point of the Strait of Hormuz&#8212;<a href="https://www.eia.gov/todayinenergy/detail.php?id=4430">21 miles across</a>&#8212;sounds manageable until the actual shipping lanes in each direction are just two miles wide, separated by a two-mile buffer zone. That&#8217;s 1.2 miles of navigable water carrying 20% of the world&#8217;s oil. A single explosive mine floating in the wrong place doesn&#8217;t just threaten one tanker; it threatens the entire flow.</p><p><a href="https://www.theguardian.com/world/2026/mar/11/how-iran-has-used-the-strait-of-hormuz-to-throttle-oil-and-gas-a-visual-guide">Iran demonstrated this leverage last week</a> when the Islamic Revolutionary Guard Corps threatened to &#8220;set ablaze&#8221; any vessel using the strait. Within hours, hundreds of tankers came to a halt. Oil prices spiked from $69 to $119 per barrel in three days&#8212;the fastest surge since the 1970s oil shocks&#8212;before Trump&#8217;s hints of de-escalation sent them tumbling back to $90. The price spike matters, but the speed matters more: a credible threat to a 1.2-mile corridor can disrupt global energy markets faster than any policy response can contain it.</p><p>This is why arguments for reducing Middle Eastern engagement consistently stumble over basic arithmetic. Alternative routes keep appearing in policy briefs as theoretical solutions, yet the numbers reveal why they cannot substitute for an open Hormuz. Saudi Arabia&#8217;s <a href="https://www.strausscenter.org/strait-of-hormuz-alternate-export-routes/">East-West Pipeline can carry 5 million barrels per day</a>, and the UAE&#8217;s Fujairah pipeline adds another 1.8 million. Against Hormuz&#8217;s current <a href="https://www.eia.gov/todayinenergy/detail.php?id=65504">20 million barrels daily</a>&#8212;with Saudi Arabia alone exporting 5.5 million barrels through the strait&#8212;these alternatives represent supplemental capacity, not replacement infrastructure. Operating both pipelines at maximum capacity wouldn&#8217;t cover a single week of normal Hormuz traffic.</p><p>The gap between theory and reality widens further under operational scrutiny. The UAE recently upgraded refineries to process more crude domestically, meaning its bypass pipeline now runs near capacity during normal operations. Saudi Arabia increased use of its East-West route last year to circumvent <a href="https://www.eia.gov/todayinenergy/detail.php?id=65504">Red Sea disruptions near Bab al-Mandeb</a>. The &#8220;slack capacity&#8221; that appears in strategic assessments has already been absorbed. Building new pipelines requires 18 months minimum at costs exceeding hundreds of millions&#8212;timescales that make them irrelevant to crisis response and barely adequate for long-term hedging.</p><p>Storage constraints accelerate the cascade. Qatar&#8217;s energy minister <a href="https://www.theguardian.com/world/2026/mar/11/how-iran-has-used-the-strait-of-hormuz-to-throttle-oil-and-gas-a-visual-guide">warned that if Hormuz remains closed</a>, Gulf producers will reach storage capacity within weeks, forcing oilfield shutdowns. Restarting a major field after shutdown takes weeks or months, not days. The temporary becomes prolonged through mechanical necessity, not political choice. A three-week closure could mean three-month supply disruptions regardless of diplomatic breakthroughs.</p><p>This physical reality explains why &#8220;letting the region sort itself out&#8221; proposals collapse under examination. When <a href="https://www.eia.gov/todayinenergy/detail.php?id=65504">84% of Hormuz oil flows to Asian markets</a>&#8212;with China importing 5.4 million barrels daily through the strait&#8212;American withdrawal wouldn&#8217;t reduce U.S. exposure to price shocks. It would simply transfer control over those shocks to actors with different interests. China&#8217;s response illustrates what states do when facing irreplaceable chokepoints they cannot control: build <a href="https://www.theguardian.com/world/2026/mar/11/how-iran-has-used-the-strait-of-hormuz-to-throttle-oil-and-gas-a-visual-guide">1.2 billion barrels of strategic stockpiles</a> representing three to four months of buffer capacity. Stockpiling absorbs short-term disruption; it doesn&#8217;t eliminate structural vulnerability.</p><p>The United States <a href="https://www.energy.gov/articles/united-states-release-172-million-barrels-oil-strategic-petroleum-reserve">released 172 million barrels from the Strategic Petroleum Reserve</a> last week, dropping reserves to their lowest level since 1982. Even with reduced Gulf imports&#8212;the U.S. imported just <a href="https://www.eia.gov/todayinenergy/detail.php?id=65504">0.5 million barrels daily from Persian Gulf producers in 2024</a>, only 2% of consumption&#8212;price shocks from Hormuz disruptions hit American consumers as hard as Asian ones. Oil trades globally; regional isolation doesn&#8217;t insulate from global price movements. The reserve release demonstrates this constraint: distance from physical dependence doesn&#8217;t create distance from economic exposure.</p><p>Geography determines the available moves. The Strait of Malacca carries slightly more oil&#8212;23.2 million barrels daily&#8212;but connects to alternative routes through the Sunda and Lombok straits. Hormuz has no such redundancy. Pipeline capacity exists but cannot scale to need. Some version of naval presence maintaining open shipping lanes isn&#8217;t a preference reflecting ideology; it&#8217;s a response to the fact that the global economy runs on diesel, jet fuel, and petrochemicals that flow through corridors narrow enough to close with tactical weapons. </p><p>The question isn&#8217;t whether this dependency is wise&#8212;that&#8217;s a debate for timescales measured in decades of infrastructure investment. The question is what happens when the only actor positioned to keep those corridors open decides the cost isn&#8217;t worth it. The answer arrived last week in the form of $50 price swings across three days.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.crosscurrents.us/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Dogs Over Wives: The Taliban's 119-Article Penal Code]]></title><description><![CDATA[Afghanistan's new legal code reveals what permanent repression looks like.]]></description><link>https://www.crosscurrents.us/p/dogs-over-wives-the-talibans-119-article-penal-code</link><guid isPermaLink="false">https://www.crosscurrents.us/p/dogs-over-wives-the-talibans-119-article-penal-code</guid><dc:creator><![CDATA[Crosscurrents]]></dc:creator><pubDate>Thu, 05 Mar 2026 15:15:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!y4uG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y4uG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y4uG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png 424w, https://substackcdn.com/image/fetch/$s_!y4uG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png 848w, https://substackcdn.com/image/fetch/$s_!y4uG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png 1272w, https://substackcdn.com/image/fetch/$s_!y4uG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y4uG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png" width="1264" height="848" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:848,&quot;width&quot;:1264,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1913650,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.crosscurrents.us/i/189996509?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!y4uG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png 424w, https://substackcdn.com/image/fetch/$s_!y4uG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png 848w, https://substackcdn.com/image/fetch/$s_!y4uG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png 1272w, https://substackcdn.com/image/fetch/$s_!y4uG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1313f009-1c21-483c-9d12-af59aafe82f6_1264x848.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Break your wife&#8217;s bones, <a href="https://www.cnn.com/2026/03/01/asia/taliban-afghanistan-domestic-violence-legal">fifteen days</a> in prison. Force dogs to fight, five months.</p><p>That&#8217;s the penalty structure in Afghanistan&#8217;s new Taliban penal code, <a href="https://www.afghanistan-analysts.org/en/reports/rights-freedom/inside-the-islamic-emirates-penal-code-crime-punishment-and-authority-in-afghanistan/">issued</a> in January 2026 and leaked last month to the Afghan rights group Rawadari. The decree specifies exactly how much violence a husband can inflict before the state considers it excessive, &#8220;a broken bone,&#8221; &#8220;an open wound,&#8221; or &#8220;a black and blue wound&#8221; that appears on her body. Anything short of that threshold remains legal.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nWx8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nWx8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png 424w, https://substackcdn.com/image/fetch/$s_!nWx8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png 848w, https://substackcdn.com/image/fetch/$s_!nWx8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png 1272w, https://substackcdn.com/image/fetch/$s_!nWx8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nWx8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png" width="630" height="147.8168130489335" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:187,&quot;width&quot;:797,&quot;resizeWidth&quot;:630,&quot;bytes&quot;:43704,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.crosscurrents.us/i/189996509?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nWx8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png 424w, https://substackcdn.com/image/fetch/$s_!nWx8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png 848w, https://substackcdn.com/image/fetch/$s_!nWx8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png 1272w, https://substackcdn.com/image/fetch/$s_!nWx8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa83505-05d0-4911-8baa-7ef03c4c41d8_797x187.png 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Credit: <a href="https://www.afghanistan-analysts.org/en/wp-content/uploads/sites/2/2026/02/Penal-Code-05.pdf">Afghanistan Analysts</a></figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!makO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!makO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png 424w, https://substackcdn.com/image/fetch/$s_!makO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png 848w, https://substackcdn.com/image/fetch/$s_!makO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png 1272w, https://substackcdn.com/image/fetch/$s_!makO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!makO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png" width="636" height="123.7956204379562" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:160,&quot;width&quot;:822,&quot;resizeWidth&quot;:636,&quot;bytes&quot;:43346,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.crosscurrents.us/i/189996509?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!makO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png 424w, https://substackcdn.com/image/fetch/$s_!makO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png 848w, https://substackcdn.com/image/fetch/$s_!makO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png 1272w, https://substackcdn.com/image/fetch/$s_!makO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675e9d22-578a-43ec-8f7b-c276813ed6b4_822x160.png 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Credit: <a href="https://www.afghanistan-analysts.org/en/wp-content/uploads/sites/2/2026/02/Penal-Code-05.pdf">Afghanistan Analysts</a></figcaption></figure></div><p>You can read a society&#8217;s values through its penalty structure. The math here is unambiguous: animal welfare rates higher than women&#8217;s bodies. Teachers who break a student&#8217;s bone lose their jobs, fathers who beat children for failing to pray face no punishment at all unless bones break. The precision isn&#8217;t accidental. It&#8217;s administrative.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.crosscurrents.us/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.crosscurrents.us/subscribe?"><span>Subscribe now</span></a></p><h3>Building to Last</h3><p>These punishments aren&#8217;t new. The Taliban has always <a href="https://giwps.georgetown.edu/2026/01/30/taliban-regulation-legalizes-slavery-violence-repression-women/">permitted</a> domestic violence, always restricted women&#8217;s movement, always governed through intimidation. What changed in January is that they wrote it down.</p><p>Codification matters. When practices become policy, they create precedent. They train judges in what to enforce and signal to the population what&#8217;s permanent versus provisional. The decree&#8217;s clinical specificity, distinguishing between bruises that fade and wounds that mark, serves an institutional purpose. It removes discretion, standardizes rulings, and transforms ad hoc brutality into durable legal infrastructure.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EFYU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EFYU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png 424w, https://substackcdn.com/image/fetch/$s_!EFYU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png 848w, https://substackcdn.com/image/fetch/$s_!EFYU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png 1272w, https://substackcdn.com/image/fetch/$s_!EFYU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EFYU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png" width="606" height="278.2918454935622" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:428,&quot;width&quot;:932,&quot;resizeWidth&quot;:606,&quot;bytes&quot;:244795,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.crosscurrents.us/i/189996509?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EFYU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png 424w, https://substackcdn.com/image/fetch/$s_!EFYU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png 848w, https://substackcdn.com/image/fetch/$s_!EFYU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png 1272w, https://substackcdn.com/image/fetch/$s_!EFYU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F830040cd-26ca-4b62-b078-af385c8ca56c_932x428.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The &#8220;Penal Code of Conduct for Taliban Courts,&#8221; issued January 4, 2026 by Taliban leader Hibatullah Akhundzada. Credit: <a href="https://rawadari.org/wp-content/uploads/2026/01/%D9%85%D8%AA%D8%AD%D8%AF%D8%A7%D9%84%D9%85%D8%A2%D9%84_%DA%AB%DA%BC%D9%87_%DB%B2%DB%B2_%D9%BE%DA%9A%D8%AA%D9%88%D8%8C_%DA%A9%D8%A7%D9%84_%DB%B1%DB%B4%DB%B4%DB%B7_%D9%82.pdf">Rawadari.org</a></figcaption></figure></div><p>This is what settling in looks like. The Taliban isn&#8217;t just ruling by force anymore; they&#8217;re building an administrative state with formal procedures, penalty schedules, and bureaucratic distinctions. The 119-article code covers everything from theft and sodomy (both punishable by death) to insulting the Taliban leader (39 lashes plus a year in prison). It&#8217;s comprehensive, detailed, and designed for longevity.</p><h3>The Legitimacy Claim</h3><p>The Taliban <a href="https://rawadari.org/press_releases/press-release-regarding-the-implications-of-the-the-criminal-procedure-code-for-courts-issued-by-the-taliban/">insists</a> all its rulings align with Islamic Sharia law and carry religious legitimacy. That claim matters strategically, both domestically and internationally. It positions the decree not as political repression but as theological obligation, something beyond negotiation or reform.</p><p>The gap between claim and reality is enormous. Many Islamic scholars <a href="https://just-international.org/articles/talibans-gender-apartheid-in-the-name-of-shariah/">reject</a> these interpretations as distortions of Islamic jurisprudence. But the Taliban&#8217;s use of religious authority as a legitimizing mechanism makes the system harder to challenge from within. Dissent becomes heresy. The code explicitly criminalizes spreading &#8220;doctrines contrary to Islam,&#8221; with death as the potential penalty.</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;dba50a30-52a3-4bdb-b566-cd93df0af4c5&quot;,&quot;duration&quot;:null}"></div><p>This weaponization of religious authority isn&#8217;t unique to the Taliban, but the formalization marks a shift. Extremist interpretations that once existed in practice are now enshrined in state law, complete with judicial procedures and enforcement mechanisms.</p><h3>The Silence</h3><p>The decree received minimal media coverage despite being genuinely shocking. Part of this reflects Afghanistan fatigue, the sense that the story ended when American troops withdrew in 2021. Part reflects normalization. We&#8217;ve accepted Taliban control as a fact, and facts stop generating headlines.</p><p>But the decree tells us something important about trajectory. The Taliban isn&#8217;t moderating or adapting to international pressure. It&#8217;s consolidating. The legal infrastructure being built now will outlast any particular leader or crisis. It trains the next generation of judges, normalizes these standards for the population, and makes reversal exponentially harder.</p><p>Women&#8217;s rights activist Mahbouba Seraj, speaking from Kabul, <a href="https://www.cnn.com/2026/03/01/asia/taliban-afghanistan-domestic-violence-legal">described</a> the practical reality, &#8220;the men have the right to rule completely the women. His word is the word of law&#8212;that&#8217;s it.&#8221; Even when women meet the injury threshold, they cannot leave home without a male guardian to report abuse. Their testimony in court is worth half a man&#8217;s. The decree creates the appearance of limits while ensuring those limits can never be enforced.</p><p>The UN&#8217;s top human rights official <a href="https://www.cnn.com/2026/03/01/asia/taliban-afghanistan-domestic-violence-legal">warned</a> that &#8220;Afghanistan is a graveyard for human rights.&#8221; The metaphor is apt. What&#8217;s being buried isn&#8217;t just rights but the mechanisms for claiming them. That&#8217;s what makes codification different from practice, and why fifteen days versus five months isn&#8217;t just cruelty. </p><p>It&#8217;s architecture.</p><div id="youtube2-4JBpgGJ76HY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;4JBpgGJ76HY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/4JBpgGJ76HY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.crosscurrents.us/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Map That Explains Everything]]></title><description><![CDATA[Iran's ballistic missiles can't reach Washington. But draw a circle showing what they can reach, and you'll understand why Operation Epic Fury targeted launch sites as much as nuclear facilities]]></description><link>https://www.crosscurrents.us/p/the-map-that-explains-everything-operation-epic-fury-iran-america-trump</link><guid isPermaLink="false">https://www.crosscurrents.us/p/the-map-that-explains-everything-operation-epic-fury-iran-america-trump</guid><dc:creator><![CDATA[Crosscurrents]]></dc:creator><pubDate>Sun, 01 Mar 2026 14:57:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!K6Pz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K6Pz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K6Pz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png 424w, https://substackcdn.com/image/fetch/$s_!K6Pz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png 848w, https://substackcdn.com/image/fetch/$s_!K6Pz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png 1272w, https://substackcdn.com/image/fetch/$s_!K6Pz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K6Pz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png" width="1456" height="977" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:977,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:10360098,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.crosscurrents.us/i/189551094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K6Pz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png 424w, https://substackcdn.com/image/fetch/$s_!K6Pz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png 848w, https://substackcdn.com/image/fetch/$s_!K6Pz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png 1272w, https://substackcdn.com/image/fetch/$s_!K6Pz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5814dacb-93ee-432b-abfe-0c961d6711e5_2528x1696.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When U.S. and Israeli warplanes began <a href="https://www.centcom.mil/MEDIA/PRESS-RELEASES/Press-Release-View/Article/4418396/us-forces-launch-operation-epic-fury/">Operation Epic Fury</a> on Saturday morning, they struck nuclear facilities in Tehran and Isfahan. But just as many bombs fell on <a href="https://www.csis.org/analysis/operation-epic-fury-and-remnants-irans-nuclear-program">missile production sites and launch facilities</a> scattered across Iran. To understand why, you need a map and a compass.</p><h2>The 1,200-Mile Circle</h2><p>Draw a 1,200-mile radius from Iran&#8217;s missile bases. Inside that circle sits almost everything that matters in the Middle East: <a href="https://www.cfr.org/articles/us-forces-middle-east-mapping-military-presence">40,000 U.S. troops</a> spread across bases in Qatar, Bahrain, Kuwait, the UAE, Jordan, and Iraq. Saudi Arabia&#8217;s oil infrastructure at Ras Tanura and Abqaiq. The Strait of Hormuz, through which one-fifth of global oil passes daily. Dubai&#8217;s financial district. Every major energy chokepoint between the Mediterranean and the Indian Ocean.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.crosscurrents.us/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Iran doesn&#8217;t need nuclear weapons to hold these targets at risk. It already does, with <a href="https://www.fdd.org/analysis/2026/02/28/what-ballistic-missiles-does-iran-have-in-its-arsenal/">the largest ballistic missile arsenal in the Middle East</a>, somewhere between 2,000 and 3,000 missiles, depending on whose count you trust. Most are short- and medium-range systems: Shahab-3s, Sejjils, Qadr missiles with ranges between 500 and 1,200 miles. They can&#8217;t reach Washington or even Europe. They don&#8217;t need to.</p><h2>America&#8217;s Bases in the Crosshairs</h2><p>Al Udeid Air Base in Qatar sits 615 miles from Iranian launch sites. It houses 10,000 American troops and serves as forward headquarters for U.S. Central Command, which is the nerve center for all American military operations in the region. When Iran retaliated for Epic Fury on Saturday afternoon, one of its first targets was Al Udeid. Qatari missile defenses <a href="https://www.cfr.org/articles/us-forces-middle-east-mapping-military-presence">intercepted the strike</a>, but the message was clear: Iran can reach the bases that launch strikes against it.</p><p>Naval Support Activity Bahrain, home to the U.S. Fifth Fleet, sits 500 miles away. Kuwait&#8217;s Ali Al Salem Air Base, a staging ground for combat operations: 400 miles. The UAE&#8217;s Al Dhafra Air Base, which houses advanced fighter squadrons: 700 miles. Iranian missiles hit targets in at least five countries within hours of Epic Fury&#8217;s first wave. Not because Iran&#8217;s missile technology is sophisticated&#8212;many of these systems are liquid-fueled and take hours to prepare, making them vulnerable to preemptive strikes&#8212;but because the geography is unforgiving.</p><p>This explains why Operation Epic Fury prioritized <a href="https://www.csis.org/analysis/operation-epic-fury-and-remnants-irans-nuclear-program">missile infrastructure alongside nuclear sites</a>. When Pentagon planners talk about Iran&#8217;s &#8220;threat radius,&#8221; they&#8217;re not being abstract. They mean the physical distance Iranian projectiles can travel, overlaid on the map of American commitments. It&#8217;s why Gulf states that host U.S. bases now face Iranian retaliation, why Saudi Arabia and the UAE (both of which allowed Epic Fury aircraft to use their airspace) issued statements about defending their territories with &#8220;all necessary measures.&#8221;</p><h2>The Targets That Couldn&#8217;t Be Hit</h2><p>The radius also explains decisions about what didn&#8217;t get hit. Iran&#8217;s Bushehr nuclear reactor, on the southern coast, survived Epic Fury intact. Not because it&#8217;s unimportant, but because Russian technicians operate it, and striking the reactor means killing Russians and creating radiological fallout that would drift across the Gulf. Every target inside that 1,200-mile circle matters to someone: American troops, Saudi oil infrastructure, Emirati ports. The reactor sits squarely in the middle of that circle, which makes it effectively untouchable despite being nuclear.</p><p>Israel understands this geography intimately. Tel Aviv sits roughly 1,000 miles from Iran&#8217;s western launch sites&#8212;just within range of Iran&#8217;s Shahab-3 and Sejjil-2 missiles. During Iran&#8217;s retaliatory strikes on Saturday, Israeli and U.S. missile defenses intercepted dozens of ballistic missiles aimed at Israeli cities. The interception worked, but the attempt demonstrated what Iranian military planners have known for years: they don&#8217;t need nuclear warheads to threaten Israel. Conventional explosives on ballistic missiles, launched in sufficient numbers, create their own form of deterrence.</p><h2>The Geometry of Deterrence</h2><p>This is why the phrase &#8220;Iranian nuclear capability&#8221; misses half the strategic picture. Yes, Iran was enriching uranium to 60 percent, a short technical step from weapons-grade material. Yes, dismantling that program was Operation Epic Fury&#8217;s stated objective. But the missiles matter just as much, perhaps more. A nuclear Iran with no delivery systems is a regional problem. A non-nuclear Iran with 2,000 ballistic missiles that can hit every U.S. base and oil facility in the Middle East is also a regional problem&#8212;just a different one.</p><p>The map explains why negotiations collapsed in Geneva three weeks ago, why Epic Fury targeted missile sites as aggressively as enrichment facilities, why Gulf states that allowed overflight are now facing retaliation, and why this conflict won&#8217;t end with destroyed centrifuges. Draw that 1,200-mile circle. Everything inside it is connected to everything else by Iranian missile range. That&#8217;s not speculation or analysis. That&#8217;s geometry.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.crosscurrents.us/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[When Domino's Deliveries Predict Airstrikes]]></title><description><![CDATA[And what that tells that about both the past and future of warfare.]]></description><link>https://www.crosscurrents.us/p/when-dominos-deliveries-predict-airstrikes</link><guid isPermaLink="false">https://www.crosscurrents.us/p/when-dominos-deliveries-predict-airstrikes</guid><dc:creator><![CDATA[Crosscurrents]]></dc:creator><pubDate>Tue, 24 Feb 2026 14:49:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TdM-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TdM-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TdM-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!TdM-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!TdM-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!TdM-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TdM-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/541c8479-a037-41bc-854e-18894063cd32_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2999381,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.crosscurrents.us/i/189010560?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TdM-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!TdM-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!TdM-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!TdM-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c8479-a037-41bc-854e-18894063cd32_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>At 6:59 p.m. Eastern time on June 12, 2025, a Twitter account called Pentagon Pizza Report <a href="https://www.theguardian.com/world/2025/jun/13/pentagon-pizza-delivery-israel-iran-attack">noticed</a> something unusual. Four pizza establishments near the Pentagon had <a href="https://www.theguardian.com/world/2025/jun/13/pentagon-pizza-delivery-israel-iran-attack">experienced</a> sudden surges in Google Maps &#8220;popular times&#8221; activity&#8212;the kind of late-evening spike that suggests senior officials working through dinner. Hours later, news <a href="https://www.csis.org/analysis/what-operation-midnight-hammer-means-future-irans-nuclear-ambitions">broke</a> of major Israeli strikes against Iran. The pizza shops had <a href="https://www.theguardian.com/world/2025/jun/13/pentagon-pizza-delivery-israel-iran-attack">predicted</a> a geopolitical event before cable news.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.crosscurrents.us/p/when-dominos-deliveries-predict-airstrikes?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.crosscurrents.us/p/when-dominos-deliveries-predict-airstrikes?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>When Defense Secretary Pete Hegseth recently <a href="https://thehill.com/policy/defense/5750716-pentagon-pizza-report-hegseth/">joked</a> on Fox News about ordering random pizzas &#8220;just to throw everybody off,&#8221; the comment <a href="https://thehill.com/policy/defense/5750716-pentagon-pizza-report-hegseth/">drew</a> mockery from critics who saw it as unserious trolling. But the remark <a href="https://thehill.com/policy/defense/5750716-pentagon-pizza-report-hegseth/">reveals</a> something more interesting: a sitting defense secretary now openly acknowledges that adversaries can monitor operational tempo through commercial data aggregation, and he&#8217;s thinking about countermeasures. This represents a remarkable shift in how institutions approach operational security&#8212;one that traces back thirty-five years to a Domino&#8217;s franchise owner who noticed something odd about late-night deliveries.</p><p>On August 1, 1990, Frank Meeks <a href="https://thehill.com/policy/defense/5750716-pentagon-pizza-report-hegseth/">delivered</a> twenty-one pizzas to CIA headquarters in Langley, Virginia. It was a one-night record. Hours later, Iraqi forces <a href="https://thehill.com/policy/defense/5750716-pentagon-pizza-report-hegseth/">invaded</a> Kuwait, launching what would become the Gulf War. Meeks later <a href="https://thehill.com/policy/defense/5750716-pentagon-pizza-report-hegseth/">told</a> the Los Angeles Times that delivery drivers operated as inadvertent intelligence collectors: &#8220;The news media doesn&#8217;t always know when something big is going to happen because they&#8217;re in bed, but our deliverers are out there at 2 in the morning.&#8221; The anecdote became Washington lore&#8212;a quirky story about how pizza orders betrayed crisis management. But it remained just that for decades, an anecdote requiring human observation and local knowledge.</p><p>The transformation from amusing anecdote to systematic intelligence collection <a href="https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases">happened</a> gradually through the datafication of everything. Google Maps began <a href="https://pizzint.watch/">aggregating</a> anonymous location data to show users when restaurants were crowded. Delivery apps <a href="https://techpolicy.sanford.duke.edu/data-brokers-and-the-sale-of-data-on-us-military-personnel/">tracked</a> order patterns to optimize driver routes. What companies <a href="https://www.lawfaremedia.org/article/tackling-data-brokerage-threats-to-american-national-security">designed</a> for consumer convenience became exploitable for operational intelligence. In August 2024, an X account <a href="https://pizzint.watch/">launched</a> to systematically monitor this data&#8212;no longer requiring a chatty Domino&#8217;s owner, just algorithmic observation of publicly available commercial information. The Pentagon Pizza Report&#8217;s June 12 prediction wasn&#8217;t luck; it was pattern recognition applied to metadata exhaust.</p><p>The pizza problem represents a single thread in a much larger fabric. In 2018, a fitness tracking app called Strava <a href="https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases">revealed</a> the locations and internal layouts of secret military bases worldwide because soldiers <a href="https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases">jogged</a> with GPS-enabled devices. The company&#8217;s heat map, intended to showcase global athletic activity, <a href="https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases">lit up</a> forward operating bases in Afghanistan and Syria like beacons against empty desert. Analysts <a href="https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases">identified</a> troop movements, mapped facility perimeters, and even spotted a lone cyclist at Area 51. A 2023 investigation <a href="https://www.lawfaremedia.org/article/tackling-data-brokerage-threats-to-american-national-security">purchased</a> individually identified health and financial data about active-duty military personnel from data brokers with minimal vetting&#8212;using Singapore-based servers to demonstrate how easily foreign actors could do the same.</p><p>More recently, journalists <a href="https://www.lawfaremedia.org/article/tackling-data-brokerage-threats-to-american-national-security">tracked</a> more than 3 billion mobile phone location signals near U.S. military installations in Germany, mapping personnel movements from barracks to bars and identifying devices inside B&#252;chel Air Base, where nuclear weapons are reportedly <a href="https://www.lawfaremedia.org/article/tackling-data-brokerage-threats-to-american-national-security">stored</a>. They <a href="https://www.lawfaremedia.org/article/tackling-data-brokerage-threats-to-american-national-security">bought</a> this data legally from American brokers&#8212;the same brokers who sell to anyone with money and minimal questions. The reporters weren&#8217;t Russian GRU officers or Chinese Ministry of State Security operatives, but they easily could have been.</p><p>What <a href="https://www.lawfaremedia.org/article/tackling-data-brokerage-threats-to-american-national-security">makes</a> this particularly vexing is that even aggregated data poses security risks. A foreign adversary doesn&#8217;t need to identify specific individuals if they&#8217;re simply looking for peak and low activity periods at sensitive facilities. Parking lot satellite imagery <a href="https://newsroom.haas.berkeley.edu/how-hedge-funds-use-satellite-images-to-beat-wall-street-and-main-street/">analyzed</a> by hedge funds to predict retail earnings can just as easily reveal when defense contractors are working overtime before weapons system deliveries. HVAC power consumption patterns, cell tower activity near government buildings, delivery app traffic&#8212;all of it <a href="https://fidelissecurity.com/cybersecurity-101/network-security/metadata-analysis/">generates</a> metadata trails that sophisticated actors can analyze to understand operational tempo without ever penetrating classified networks.</p><p>The Defense Department&#8217;s 2018 policy <a href="https://www.lawfaremedia.org/article/tackling-data-brokerage-threats-to-american-national-security">restricting</a> wearable fitness trackers in deployed settings represented early recognition of this problem, but it <a href="https://www.lawfaremedia.org/article/tackling-data-brokerage-threats-to-american-national-security">addresses</a> only the most obvious vulnerability. Preventing soldiers from wearing Fitbits in combat zones does nothing about the dozens of apps on their phones that continuously broadcast location data, or about Google&#8217;s aggregate traffic information showing when Pentagon parking lots fill up, or about food delivery platforms revealing late-night work sessions. The practical solution cannot be &#8220;leave your phone at home&#8221; for everyone handling sensitive information&#8212;modern operations require connectivity.</p><p>This is where Hegseth&#8217;s pizza joke becomes more than a quip. His comment <a href="https://thehill.com/policy/defense/5750716-pentagon-pizza-report-hegseth/">demonstrates</a> awareness that traditional operational security&#8212;keeping information classified, limiting access, securing communications&#8212;no longer <a href="https://defensescoop.com/2025/01/08/socom-sof-special-operations-forces-renaissance-digital-security-through-obscurity/">suffices</a> when commercial surveillance capitalism generates exploitable intelligence as a byproduct of normal activity. The countermeasure he describes, ordering decoy pizzas to introduce noise that degrades signal quality, reflects actual information security tradecraft for the digital age. It&#8217;s the same logic behind why intelligence agencies sometimes <a href="https://cyberforces.com/en/opsec-operational-security-in-the-digital-era">conduct</a> random equipment movements or vary routine schedules&#8212;not paranoia, but recognition that adversaries systematically monitor patterns.</p><p>The challenge facing defense institutions is genuinely difficult. Democracies operating in open societies will always generate more observable metadata than authoritarian regimes that control commercial data flows and restrict civilian technology. Chinese military facilities don&#8217;t light up on Strava because Chinese citizens don&#8217;t have the same app ecosystem generating constant location broadcasts. Russian intelligence <a href="https://www.recordedfuture.com/research/private-eyes-chinas-embrace-open-source-military-intelligence">exploits</a> open-source intelligence about U.S. operations while maintaining opacity around their own activities. This asymmetry creates a structural disadvantage.</p><p>Yet the alternative&#8212;comprehensive data controls that would prevent Google from aggregating location information or ban delivery apps from sharing traffic patterns&#8212;conflicts with both commercial interests and democratic norms around information freedom. Recent bipartisan legislation like the Protecting Americans&#8217; Data from Foreign Adversaries Act <a href="https://www.lawfaremedia.org/article/tackling-data-brokerage-threats-to-american-national-security">represents</a> early attempts to address these tensions, but comprehensive solutions remain elusive. The problem keeps <a href="https://techpolicy.sanford.duke.edu/data-brokers-and-the-sale-of-data-on-us-military-personnel/">expanding</a> faster than policy can respond.</p><p>What&#8217;s striking about the evolution from Frank Meeks&#8217; 1990 observation to Hegseth&#8217;s 2026 comment is the timeline itself. It took thirty-five years for the defense establishment to move from unaware to publicly joking about countermeasures. That progression&#8212;from ignorance to recognition to active mitigation&#8212;suggests institutions are learning to operate in an environment where every Domino&#8217;s order potentially broadcasts intentions. Whether decoy pizzas actually work matters less than the acknowledgment that operational security now requires thinking about commercial metadata the same way previous generations thought about encrypted communications.</p><p>The impossibility isn&#8217;t the task itself but rather maintaining the pretense that secrets can be kept the old way. When Google Maps aggregate data predicts airstrikes and journalists can legally purchase troop movement patterns, the traditional boundaries between classified and open-source intelligence have collapsed. Hegseth&#8217;s joke, intentionally or not, <a href="https://thehill.com/policy/defense/5750716-pentagon-pizza-report-hegseth/">signals</a> that someone is paying attention to this new reality.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.crosscurrents.us/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA["Hydra Cluster Architectures" Explained: The Shadow Brokers of AI]]></title><description><![CDATA[How proxy networks weaponize thousands of fake accounts to siphon frontier-model capability at scale, evade bans, and accelerate China&#8217;s AI takeover]]></description><link>https://www.crosscurrents.us/p/hydra-cluster-architectures-explained-anthropic-ip-theft-china-deepseek-moonshot-minimax</link><guid isPermaLink="false">https://www.crosscurrents.us/p/hydra-cluster-architectures-explained-anthropic-ip-theft-china-deepseek-moonshot-minimax</guid><dc:creator><![CDATA[Crosscurrents]]></dc:creator><pubDate>Tue, 24 Feb 2026 14:31:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4wYs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4wYs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4wYs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!4wYs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!4wYs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!4wYs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4wYs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2481446,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.crosscurrents.us/i/188998127?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4wYs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!4wYs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!4wYs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!4wYs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11454fd3-99f5-46f7-b405-76c59f1e4cda_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When Anthropic <a href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">disclosed yesterday</a> that DeepSeek, Moonshot, and MiniMax ran roughly 16 million fraudulent Claude queries to extract capabilities, most coverage treated it like another skirmish in the AI arms race. That framing is too polite. If Anthropic&#8217;s account is accurate, this was not normal benchmarking, not curiosity, not the messy edge of open science. It was industrial-scale appropriation of a competitor&#8217;s work through fraud, at a scale large enough to look less like a one-off violation and more like a business process.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.crosscurrents.us/p/hydra-cluster-architectures-explained-anthropic-ip-theft-china-deepseek-moonshot-minimax?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.crosscurrents.us/p/hydra-cluster-architectures-explained-anthropic-ip-theft-china-deepseek-moonshot-minimax?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>The labs are the headline. The real story is the shadow infrastructure that made it possible, the commercial proxy services Anthropic mentions almost in passing. They are the brokers who turn restricted access into a product, and who make capability extraction cheap enough to repeat until it works.</p><h3>The Mechanics of a Hydra</h3><p>&#8220;Hydra cluster architectures&#8221; is Anthropic&#8217;s label for what it observed. The name fits because these networks are built to survive account bans through redundancy and churn. Cut off one head and the traffic simply reroutes through the next.</p><p>The playbook is straightforward. A proxy service assembles access to frontier model APIs through hundreds or thousands of accounts. Those accounts can be created with fake identities, stolen payment instruments, or abused verification pathways that were designed for students and startups. Once the accounts exist, the proxy service sits between the client and the model provider. The client never touches the real gatekeeper. The broker does.</p><p>A normal API customer is easy to profile. Requests arrive from a consistent account with stable metadata and a coherent usage pattern. Hydra traffic is the opposite. Requests are sprayed across a large account pool, mixed across multiple clients, and shaped to resemble the noise of ordinary usage. To the platform, it looks like a crowd. In reality it is a single machine.</p><p>This structure is not only about evasion. It is also about throughput. Anthropic describes synchronized traffic patterns, with similar prompts arriving in staggered bursts across many accounts. That is load balancing, the same logic that makes a content delivery network efficient. The point is to move a lot of data without triggering alarms.</p><p>If you are trying to distill a model, you do not need one dramatic breach. You need a pipeline. Hydra provides the pipeline.</p><h3>This Is a Market, Not a Hack</h3><p>The proxy operators are not building models. They are selling access. Their product is plausible legitimacy at scale.</p><p>For clients facing geographic and policy restrictions on Claude access, the economic logic is brutal. Training from scratch is expensive and slow. It demands compute, expertise, and iteration. Buying access to a frontier model through an intermediary can be faster and cheaper, especially when the intermediary is willing to absorb the operational risk of bans and rebuild the account pool as needed.</p><p>In that sense, the hydra is not a side character. It is the enabling technology for capability extraction. It turns what should be a high-friction act into a routine expense line item.</p><p>And this is where the China angle stops being an abstract geopolitical mood and becomes a concrete operating reality. The PRC&#8217;s strategic posture treats AI capability as national leverage. When leading labs operate in an ecosystem that rewards rapid catch-up and tolerates corner-cutting, the incentives tilt toward extraction. The proxies supply the means. The labs supply the demand. The system supplies the justification.</p><h3>The Coordination Trap</h3><p>Why does this continue to work? Because no single actor can shut it down.</p><p>Anthropic can ban accounts, harden verification, and build detection systems. It can do all of that and still face a hydra that simply shifts routes. Tighten direct access and traffic migrates to a reseller channel. Close one loophole and a broker exploits another. The proxy service is platform agnostic. Its only loyalty is to continuity of access.</p><p>Cloud platforms are part of the trap. They serve an ocean of legitimate users and cannot treat every unusual pattern as malicious without breaking real businesses. The same features that make cloud computing useful, fast account creation, programmatic access, flexible billing, are the same features that make abuse scalable.</p><p>This is not a morality play about a single bad actor. It is a structural weakness in the way frontier model access is commercialized. It is also a strategic vulnerability when the most motivated abusers operate in jurisdictions with limited enforcement pressure and strong incentives to close the capability gap quickly.</p><h3>What Changes If We Call It What It Is</h3><p>The industry&#8217;s language matters. &#8220;Distillation&#8221; is a technical term and a euphemism. It makes an industrial extraction campaign sound like a clever optimization trick. If Anthropic&#8217;s evidence holds, a more accurate description is capability laundering through fraud.</p><p>That shift in language pushes the conversation toward the real questions.</p><p>Who are the proxy operators. Where are they registered. Which payment rails do they use. Which cloud providers and resellers are repeatedly implicated. What signals can be shared across companies without turning the entire AI stack into a private surveillance regime.</p><p>The practical response is coordination that does not yet exist. Shared indicators of compromise across model providers. Standardized identity and reseller controls. Stronger friction for bulk access patterns that look like automated harvesting. Clear consequences for brokers that exist primarily to circumvent restrictions at scale.</p><p>Until that ecosystem forms, the hydra will keep feeding.</p><p>And China&#8217;s most aggressive labs will keep buying. If you can copy your competitor&#8217;s expensive capabilities through a brokered fraud pipeline, then the temptation is not to innovate. It is to extract, strip the safeguards, and ship the product as if the hard work was yours.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.crosscurrents.us/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.crosscurrents.us/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>