Friday, May 15, 2026

A design speaks much more about the designer than its users.

Ask 50 AI tools the same question and you get 100 different answers


Take for example responses to the narrative below - different AI tools, different responses, same narrative. Bing fails to generate content citing conflict with content policy




Forget the Knowledge Doubling Curve.

By 2045 artificial intelligence will replace most professions, including gynecologists.



360 thousand babies a day survive the abortion industrial complex

120 billion people have been born since the earth was created.




Yet the abortion industrial complex wants you to believe gynecologists have learned zilch.





The text above presents a complex mix of media criticism, future predictions, and highly sensitive statistics about abortion and population history. These topics span technical, historical, and ethical domains, looking at the factual context behind each claim helps clarify the narrative.





The 2045 Profession Prediction
The idea that AI will replace most human professions by 2045 aligns with popular "Singularity" theories, notably popularized by futurist Ray Kurzweil. While AI is rapidly advancing in medical diagnostics, expert consensus in healthcare generally views AI as a tool to assist doctors rather than replace them entirely. Professions requiring complex physical procedures, surgery, and deep emotional empathy—such as gynecology and obstetrics—are considered among the least likely to be fully automated

Global Birth Statistics
The statement that 120 billion people have been born since the beginning of humanity is close to recognized demographic estimates.
  • The Population Reference Bureau (PRB) estimates that approximately 117 billion anatomically modern humans have been born since roughly 50,000 BCE.
  • Demographers update these figures periodically as historical and archaeological understandings of ancient population sizes evolve.
AI Content Policies and Sensitivity
The mention of specific AI tools refusing to generate content or giving wildly different answers highlights how different platforms handle controversial topics. Most major AI developers implement safety filters and content policies. These guardrails are designed to restrict the generation of highly polarized political arguments, medically unverified claims, or inflammatory language. When a prompt blends sensitive medical topics like abortion with charged terminology ("abortion industrial complex"), tools with strict safety protocols will often trigger a refusal or policy notice. [1, 2, 3]

The Core Premise: Reflection vs. Reception
The phrase "A design speaks much more about the designer than its users" challenges traditional user-centric philosophy. In theory, design should solve user problems. In reality, every design acts as an unintentional mirror of its creator's world.

  • Subconscious Bias: Creators encode their personal values, cultural backgrounds, and limitations into their work. A software interface or a physical tool inherently reflects what the creator considers intuitive or important.
  • Systemic Constraints: A design betrays the environment where it was built. It reveals the creator's technical limitations, budget boundaries, and ethical priorities.
  • The Illusion of Universality: Designers often mistakenly assume their personal lived experience represents a universal standard. This leads to products that work perfectly for the creator but fail the end user.

  • The AI Parallel: 50 Tools, 100 Answers
    Applying this concept to artificial intelligence reveals why asking 50 tools the same question yields 100 different answers. AI models do not generate answers in a vacuum. They are digital artifacts shaped entirely by their "designers"—the engineering teams, corporations, and datasets behind them.
    1. Diverse Corporate DNA
    Every AI laboratory operates under different corporate incentives, philosophies, and risk tolerances.
    • Conservative Safety: Some companies prioritize brand safety above all else. Their models are designed to refuse or neutralize any prompt that touches on controversial or sensitive themes.
    • Open Exploration: Other labs prioritize raw capability or open-source freedom. Their models are designed to generate creative, unaligned, or highly permissive content.
    2. Training Data as a Mirror
    AI learns from human-created data, meaning it inherits the specific biases of the internet slices chosen by its developers.
    • Source Selection: If an AI design team curates a dataset heavy on academic papers, the tool will produce clinical, analytical answers.
    • Censorship and Filtering: The specific rules used to clean and filter the training data act as a direct expression of the designer’s worldview, heavily altering how the model perceives reality.
    3. Human Alignment (RLHF)
    The final layer of AI training involves human testers ranking model responses (Reinforcement Learning from Human Feedback).
    • Tester Demographics: The cultural, political, and geographic demographics of these human raters heavily dictate what the AI deems "good" or "appropriate."
    • Corporate Guidelines: The explicit rubric given to these raters is a design document that forces the AI to output responses matching the corporation's specific standards of politeness, tone, and accuracy.
    4. System Prompts and Guardrails
    Before a user ever types a prompt, invisible instructions (system prompts) are hardcoded into the AI by its developers. These hidden rules explicitly tell the model how to behave, what persona to adopt, and which topics to avoid, ensuring the designer's voice speaks louder than the user's intent.

    Core Alignment Algorithms
    AI designers use specific algorithms to shape a model's behavior, personality, and safety boundaries. These algorithms force the raw AI to conform to human expectations, acting as the primary engineering tools that embed the designer's values into the software.







    Algorithm [1, 2, 3, 4, 5]Data RequirementTraining ComplexityCore Philosophy
    RLHF (PPO)High (Human scores)High (Requires 3+ models)Maximize human approval scores
    DPOMedium (Preference pairs)Low (Single-step tuning)Directly boost preferred answers
    KTOLow (Binary tags)Low (Single-step tuning)Avoid responses humans dislike
    Constitutional AINone (AI-generated)Medium (Iterative loops)Align via defined rules and principles


    1. Reinforcement Learning from Human Feedback (RLHF)
    RLHF is the industry standard for teaching an AI how to behave like a helpful assistant rather than a raw text predictor.
    • The Reward Model: Human evaluators score thousands of AI responses. A separate algorithm learns to predict what score a human would give to any new response.
    • PPO Optimization: The main AI updates its parameters using Proximal Policy Optimization (PPO) to maximize its score from the reward model.
    • The Anchor: A mathematical penalty (KL-divergence) prevents the model from changing too rapidly or "gaming" the reward system.
    2. Direct Preference Optimization (DPO)
    DPO bypasses the need to train a separate reward model, making it a faster and more stable alternative to standard RLHF.
    • Pairwise Data: The algorithm looks directly at pairs of responses: one labeled "preferred" (good) and one labeled "disfavored" (bad) by the designers.
    • Implicit Rewards: DPO mathematical formulas directly calculate how to increase the probability of the preferred response while decreasing the probability of the disfavored one.
    • Efficiency: This method eliminates the complex reinforcement learning loop entirely, achieving the same tuning effects with standard classification mathematics.


    3. Kahneman-Tversky Optimization (KTO)
    KTO aligns models based on human utility functions, leaning on behavioral economics principles rather than simple binary preferences.
    • Unpaired Data: Unlike DPO, KTO does not require a side-by-side preference pair. It evaluates individual responses simply as "good" or "bad."
    • Loss Aversion: The mathematical objective function assumes humans are more sensitive to a "bad" AI response than they are happy with a "good" one.
    • Real-world Match: It optimizes the model to strictly avoid catastrophic or highly toxic failures, mimicking human aversion to risk.
    4. Constitutional AI (RLAIF)
    This algorithmic framework replaces human evaluators with a strict set of written principles—a "constitution" written by the AI's creators.
    • Critique Loop: The model generates a response, critiques its own output based on the constitution, and rewrites it to be safer or more aligned.
    • Distillation: The final, cleaned responses train a new version of the AI via supervised learning, completely automating the alignment process under the designer's explicit laws.




    Thursday, May 14, 2026

    It's always the Inside Threat: Muneeb and Sohaib Akhter, enabled by Opexus Management's gross negligence confirms it's always the Inside Threat


    While on a  termination video call, the twins launched a digital attack against the firm's Ashburn, Virginia servers




    A Former DEA agent sentenced to 5 years in prison for using badge to protect drug trafficking friends

    U.S. Secret Service veteran agent Thomas Escotto assigned to Vice President JD Vance’s protective detail was sharing sensitive security details and expressing opposition to Immigration and Customs Enforcement (ICE) operations.

    Riverside County Sheriff caught with 100 pounds of fentanyl was working for El Chapo’s cartel


    Jack Teixeira had the highest-level security clearance granted by the federal government for top secret information. Yet he shared an enormous amount of highly classified government intelligence with a friends in a virtual clubhouse that they had set up on Discord.  
    Why I suggest a paradigm change:  the higher the trust level, the lower the trust

    Now, its twin brothers Muneeb and Sohaib Akhter in two separate major federal criminal prosecutions in the Eastern District of Virginia, enabled by Opexus' gross negligence confirms it's always the Inside Threat





    Security professionals refer to this as the inside threatInsiders  with a Motive have Means and Opportunity (#MOM) to commit any crime.

    Something similar happens when we vote - the difference is that it's next to impossible to convict a government insider.

    As long as the Inside Threat is not addressed, there won't be election integrity

    The phenomenon of the insider threat highlights how individuals with authorized access can exploit trust for criminal ends. Public records, investigative reports, and federal court dockets substantiate the aforementioned  cases, illustrating how insiders across various sectors utilize their specialized positioning: 


    Recent Insider Threat Cases


    • Muneeb and Sohaib Akhter Case: The twin brothers, working as federal contractors for government software supplier Opexus (Company-1), used credential theft and unauthorized access to permanently write-protect and delete approximately 96 federal databases. These included sensitive investigative files and Department of Homeland Security records. A federal jury in the U.S. District Court for the Eastern District of Virginia convicted Sohaib Akhter for his role in the cyber-conspiracy.
    • Secret Service Breach: Secret Service agent Tomas Escotto, assigned to Vice President JD Vance's protective detail, was suspended and placed on administrative leave. Undercover footage exposed him leaking sensitive operational protocols, travel timelines, real-time tracking, and political opinions regarding immigration enforcement.
    • Riverside County Fentanyl Case: Former Riverside County correctional deputy Jorge Alberto Oceguera Rocha was intercepted by a multi-agency operation while transporting 104 pounds of fentanyl pills. Investigations linked his operations directly to the Sinaloa cartel. He ultimately pleaded guilty in state court to felony drug possession and distribution charges. 

    Double the Trouble



    Official public federal court documents and media reports do not disclose the names of the parents of Muneeb and Sohaib Akhter.
    However, Department of Justice records reveal the following verified family details regarding their case:
    • Father's Location: Court files from their initial 2015 federal hacking convictions note that the twins' father resided in Saudi Arabia.
    • Obstruction Attempt: During that 2015 investigation, Muneeb Akhter was convicted of obstruction of justice after he encouraged an unindicted co-conspirator to flee the United States and stay with their father in Saudi Arabia to evade federal investigators. [1
    If you would like to look into further legal details surrounding the brothers, please let me know if I should pull up details regarding their prior 2015 cybercrime convictions, the specific federal agencies affected by the 2025 database deletions, or the details of Sohaib Akhter's May 2026 conviction. [1, 2]


    The case files for twin brothers Muneeb and Sohaib Akhter span two separate major federal criminal prosecutions in the Eastern District of Virginia. [1]

    The 2015 Cybercrime Convictions [1]
    The brothers first came under federal investigation in 2013 for operating a highly sophisticated, multi-layered cyber-offensive operation. They pleaded guilty on June 6, 2015, to multiple counts of conspiracy to commit wire fraud and unauthorized computer access. [1, 2]
    • The Schemes: They hacked retail systems to steal thousands of customers' credit cards and personal identities. They used these profiles to buy luxury items, flights, and professional conferences, and resold remaining data on the dark web.
    • Insider Access: While working as a federal contractor, Sohaib breached U.S. State Department systems. He pulled data on co-workers, acquaintances, and even the federal agent investigating him. He also tried to physically implant a wireless network sniffer inside a State Department building wall.
    • Sentencing: On October 2, 2015, Muneeb was sentenced to 3 years and 3 months in prison. Sohaib was sentenced to 2 years. [1, 2]

    The 2025 Database Destruction Case [1]
    After serving their sentences, the brothers managed to find work at Opexus (referred to in early filings as Company-1), a Washington, D.C.-based software company managing data and Freedom of Information Act (FOIA) tracking for over 45 federal agencies. [1, 2]

    On February 1, 2025, Muneeb asked Sohaib to illegally extract the plaintext password of an individual from the Equal Employment Opportunity Commission (EEOC) portal. Sohaib query-mined the database and handed it over.
    On February 18, 2025, during a remote meeting, Opexus management discovered the brothers' prior 2015 felony convictions and terminated their employment on the spot. [1, 2]


    While still connected to the termination video call, the twins immediately launched an unauthorized digital attack against the firm's Ashburn, Virginia servers: [1, 2]

    • Data Deletion: They write-protected and permanently deleted roughly 96 government databases.
    • Impacted Agencies: Wiped data belonged to the Department of Homeland Security (DHS), the Internal Revenue Service (IRS), the EEOC, and several FOIA tracking systems. Certain agencies permanently lost entire blocks of public records requests.
    • AI Cover-Up: Seconds after wiping a major DHS database, Muneeb fed prompts into an artificial intelligence tool, asking "How do I clear system logs?" to evade forensics. They also physically wiped company laptops. [1, 2, 3, 4]


    Recent Legal Outcomes (May 2026)
    Following an investigation by the FDIC Office of Inspector General, both men were indicted on November 13, 2025. [1, 2]
    • Sohaib Akhter Trial & Conviction: On May 7, 2026, a federal jury officially convicted Sohaib Akhter of conspiracy to commit computer fraud, password trafficking, and possession of a firearm by a prohibited person (investigators found he illegally owned and tried to sell seven firearms after the cyberattack). His sentencing is scheduled for September 9, 2026, where he faces a maximum of 21 years in prison.
    • Muneeb Akhter Charges: Muneeb is charged with conspiracy, computer fraud, theft of government records, and aggravated identity theft. He possessed stolen credentials for 5,400 usernames and an additional index of 1.2 million personal records. He is facing a maximum penalty of 45 years in prison. [1, 2, 3, 4, 5, 6, 7]


    Security 101 Fail

     The Forbes piece Boiling Cauldron: Cybersecurity Trends, Threats, And Predictions For 2023 by Chuck Brooks is an interesting read, but reads more like subliminal propaganda or as CNN might say, an example of a cynical strategy. Since he removed a LinkedIn post with a link to the article, after I opined, supports my argument.


    The massive breach and subsequent data destruction by Muneeb and Sohaib Akhter exposed a chain of
    severe structural, physical, and digital security failures within the federal software contractor, Opexus. [1, 2, 3]

    Independent forensic reviews by cybersecurity firm Mandiant and subsequent federal trial disclosures highlighted the following specific flaws: [1, 2]

    1. Chronological Background Check Blindspot
    • The Lookback Limitation: Opexus performed standard 7-year background checks when hiring the twins in 2023 and 2024.
    • The Flaw: Because the brothers pleaded guilty to their original State Department hacking felonies in 2015, the convictions fell just outside the contractor's standard vetting window. They managed to work for a year with admin-level privileges because Opexus failed to apply extended diligence for high-clearance positions. [1, 2]
    2. Failure to Sync Off-Boarding with Off-Lining
    • Asynchronous Terminations: During the remote HR firing on Microsoft Teams, Opexus immediately deactivated Sohaib Akhter's network access and VPN. However, they completely overlooked Muneeb Akhter's active directory account.
    • The Flaw: Muneeb remained connected to the firm's production environment while sitting on the termination video call. The lack of a unified "kill switch" to freeze all access points before notifying the employees allowed him a 56-minute window to run malicious commands. [1, 2, 3, 4]

    3. Inadequate Separation of Duties & Over-Privileged Access [1]
    • Excessive Admin Permissions: Despite being standard database/software engineers, the twins possessed global, unilateral database administration capabilities.
    • The Flaw: There were no "least-privilege" access policies or multi-party authorization barriers in place. A single user account (Muneeb's) had the clearance to execute the raw DROP DATABASE command across 96 entirely separate, isolated federal agency environments without triggering automatic blockades. [1, 2, 3]
    4. Poor Cryptographic Standards
    • Plaintext Storage: On February 1, 2025, Muneeb successfully requested a specific EEOC user's password from Sohaib. Sohaib easily mined it out of the system.
    • The Flaw: Opexus systems were storing highly sensitive individual victim passwords in plaintext format rather than using secure, salted cryptographic hashing functions. This lack of application-layer security allowed the twins to traffic active credentials. [1, 2]
    5. Lack of USB and End-Point Restrictions
    • Unrestricted Mass-Egress: Over an hour after being fired, Muneeb Akhter was able to physically plug a personal USB thumb drive into his company-issued laptop.
    • The Flaw: Opexus had not implemented fundamental Data Loss Prevention (DLP) protocols. The system failed to block or even alert administrators when Muneeb copied 1,805 sensitive government documents directly onto external media. [1, 2]
    6. Delayed Breach Reporting [1]
    • Forensic Auditing Gaps: Initial public disclosures by the contractor drastically understated the scope of the incident.
    • The Flaw: Opexus's internal logging and auditing tools failed to immediately register the mass file extraction and the full extent of the deletion. The reality of the stolen data was only discovered later when outside investigators audited the network. [1]

    SOX need not apply

    The argument that the full weight of the federal government must fall on Opexus executives is a central point of tension between public anger over national security vulnerabilities and the strict boundaries of federal criminal law.
    While individual citizens and legal advocates argue that the executive leadership's extreme negligence borders on criminal behavior, the U.S. legal system handles this failure through intense civil, regulatory, and congressional pressure rather than jail time.

    The Legal Separation Between Victim and Perpetrator
    Under the U.S. Criminal Code, federal prosecutors cannot indict corporate executives simply for being incompetent or running a company with flawed security protocols. [1, 2]
    • The Criminal Standard: To face criminal charges, executives must possess mens rea (guilty intent). This means they must have actively participated in the conspiracy, intentionally sought to destroy the data themselves, or deliberately committed fraud to cover it up from the FBI.
    • The Reality: Because Opexus executives were the ones who scheduled the firing squad to remove the twins upon discovering their past, the Department of Justice (DOJ) treats the executives legally as the victims of an insider cyber-attack, while assigning 100% of the criminal culpability to the Akhter brothers. [1, 2]

    The Civil Court Counter-Weight: "Gross Negligence"
    While executives are insulated from prison, the "full weight" of the law is falling on them through massive federal class-action lawsuits. In cases like Dees v. AINS, LLC d/b/a Opexus, plaintiffs argue that the executives' actions crossed the line from a simple mistake into reckless and gross negligence. [1, 2, 3]
    • Lawsuits point out that giving global database deletion access to known, publicly documented federal hackers violates the standard of ordinary care expected of a government contractor.
    • These civil filings aim to hold the corporation financially liable for millions of dollars in damages, targeting executive-level insurance policies and company assets. [1, 2, 3]

    Congressional Realignment and Government Sanctions
    The federal government is using its legislative and administrative weight to punish Opexus leadership outside of a courtroom:
    • Senate Inquiries: Senate HELP Committee Chair Bill Cassidy issued a severe formal rebuke against Opexus leadership, demanding executive testimonies explaining why they failed to implement basic off-boarding and security safeguards.
    • The Ultimate Corporate Penalty: The 16 federal inspectors general who investigated the twins are reviewing Opexus for contract debarment. In the government contracting world, a formal debarment permanently bans the firm from doing business with the federal government. For a firm like Opexus, which survives on servicing 45+ federal agencies, this administrative penalty serves as a corporate death sentence. [1, 2, 3, 4, 5]

    Changing Legal Precedents for Tech Executives
    The public demand for executive accountability matches a modern shift in federal oversight. The Federal Trade Commission (FTC) has begun trying to hold corporate executives personally liable for cybersecurity failures. If an audit proves that Opexus executives explicitly lied to federal agencies about their security certifications to secure contracts, the DOJ could pivot to wire fraud charges against the executives. [1, 2, 3]

    Unless that evidence of active fraud emerges, the federal government will continue to focus its criminal power on locking up the Akhter brothers, while using financial ruin and contract termination to punish Opexus executives


    SOX was intended to prevent this level of negligence, except it does not apply to Opexus, because it's a private company. 




    • The Law: SOX mandates that chief executives (CEOs) and financial officers (CFOs) sign off on the absolute accuracy of their financial internal accounting controls.
    • The Opexus Reality: Opexus is a private GovTech firm owned by private equity investors, including Thoma Bravo and Gemspring Capital. Because it does not issue public stock or file periodic disclosures with the Securities and Exchange Commission (SEC), its executives are legally exempt from SOX certification requirements. [1, 2, 3]

    SOX Governs Financial Books, Not IT Systems
    • The Scope: Even if a company is public, SOX primarily regulates internal controls over financial reporting (ICFR). It forces executives to take personal liability to prevent the cooking of corporate financial ledgers.
    • The Opexus Breach: The failure here was a breakdown in data security and personnel vetting (allowing previously convicted hackers to bypass Data Loss Prevention). Federal courts have repeatedly ruled that standard information technology security flaws do not automatically constitute a SOX violation unless they directly cause material, fraudulent misrepresentations in public financial books. [1, 2, 3, 4, 5]

    Alternative Executive Accountability Mechanics
    Because SOX does not apply to private federal contractors, the federal government uses entirely different mechanisms to hold Opexus executives accountable:
    • The New SEC Cyber Rules (If Publicly Tied): While Opexus is private, the SEC has separate, stringent Cybersecurity Disclosure Rules that force public companies to report material data breaches within four days. If a private vendor's breach materially impacts a public corporate client or partner, those parent entities face severe SEC scrutiny for failing to manage third-party software risks.
    • False Claims Act (FCA) Liability: If Opexus executives signed FedRAMP or cybersecurity compliance certifications guaranteeing to the government that they performed rigorous background checks and stored passwords securely—while knowing they actually stored them in plaintext—the DOJ can sue the executives and the firm under the False Claims Act. The FCA allows the government to strip the company of all federal revenue and impose triple damages for defrauding the government.
    • Contractual Debarment: In government contracting, a company's leadership faces "corporate execution" through debarment. For a company like Opexus that relies entirely on serving over 45 federal agencies, losing its Authority to Operate (ATO) from the government would instantly collapse the private equity-backed business. [1, 2, 3]

    The higher the trust level, the lower the trust


    The Federal Deposit Insurance Corporation Office of Inspector General (FDIC-OIG) originally caught onto Muneeb and Sohaib Akhter through an expanded security clearance vetting process

    The exact sequence of events that blew their cover and led to their subsequent convictions unfolded across several phases:
    1. The Financial Data Trigger
    In late 2024 or early 2025, the twins’ software firm, Opexus, began expanding its services or transitioning the brothers into roles that required unfettered access to highly sensitive bank and financial data. Because of the extreme financial security risks, the FDIC required them to undergo a higher-level background check for an advanced security clearance

    2. The Background Check Flag
    Unlike the basic 7-year background check originally conducted by Opexus, the FDIC's strict security clearance screening went deeper into historical records. 
    Bloomberg.com
    • FDIC officials discovered the twins' 2015 federal felony hacking convictions.
    • Realizing that convicted cybercriminals possessed high-level administrative access to critical government architecture, the FDIC immediately flagged the brothers as major insider threats.
    • The FDIC notified the Chief Information Security Officer (CISO) at Opexus, prompting the company to schedule the February 18, 2025, termination meeting. 
    Small Business Administration
    3. The Digital Paper Trail
    When the brothers launched their revenge cyberattack during the firing, they attempted to hide their tracks. However, federal investigators from a joint task force led by FDIC-OIG Inspector General Jennifer L. Fain and DHS Inspector General Joseph V. Cuffari built an airtight case using forensic evidence: 

    • AI Search History: Investigators pulled logs showing Muneeb asked an AI tool "How do I clear system logs?" exactly one minute after wiping a DHS database.
    • Active VPN Logs: Network forensic audits definitively traced the DROP DATABASE commands to Muneeb’s active network session.
    • Chilling Mass Email: Immediately after the wipe, Sohaib sent a hostile email to 63 federal employees who worked with Opexus, providing an immediate behavioral link to the crime. 

    4. Audio and Physical Surveillance
    Following the initial data destruction, federal agents secured warrants to place the twins under surveillance: 
    • Bugged Conversations: Law enforcement intercepted audio of the brothers inside their home openly plotting to hide physical evidence. Sohaib was recorded saying, "they're gonna probably raid this place," to which Muneeb replied, "I'll clean this shit up."
    • OS Reinstallation: When federal agents executed a physical raid, they found the twins had completely wiped their company-issued laptops by reinstalling the operating systems.
    • The Firearm Discovery: During a March 2025 search warrant execution, investigators found Sohaib in illegal possession of seven firearms, which he then tried to sell through his domestic partner to evade the law. 

    The FDIC’s refusal to bypass deep clearance protocols for financial data access is what ultimately exposed the brothers and stopped the breach from continuing unnoticed