'The Root': Can you solve our cipher?

Watch 'The Root: The Birth of Big Brother' and all of 'The Root' episodes HERE

Catch up on the research from segment 1 HERE

Segment 2: William Friedman; Edgar Allan Poe; Solve the Cipher

Friedman

In this segment, Glenn explained how Yardley’s operation was shut down – but the practice of domestic spying wasn’t. By 1929 surveillance, coding and decoding messages were established as a crucial skill to have, maintain, and advance. So, Secretary of State Stimson may have put an end to Yardley’s operation, but Yardley’s files were not destroyed. Instead, they were sent to the desk of one of the most brilliant minds in cryptology – William Friedman.

 

Edgar Allan Poe

Friedman was a pioneer in the field, and as you’ll see in the next segment, inspired the creation of the only known cipher machine to never be cracked. But how Friedman got his start in the field is an incredible tale all its own. Friedman was a big fan of Edgar Allan Poe, and Poe was a big fan of ciphers. In fact, he once bragged that he could decipher anything. Friedman loved deciphering messages, and one of his favorite Poe stories was ‘The Gold Bug’.

The code in Poe’s ‘Gold Bug’ is an example of a substitution cipher, which is a cipher where the letters of the alphabet are replaced by other letters or symbols. Calculating all possible combinations of 26 letters of the alphabet and 26 symbols the possible results are in the trillions. For hundreds of years, substitution ciphers were considered impossible to crack.

The secret to solving substitution ciphers is by analyzing syntax. Languages follow a set of rules. There’s only so many ways you can combine letters so that they form intelligible words. Even though the cipher uses symbols it still has to follow those rules. Pretty soon by looking for these rules we can start to see patterns within the message. All that’s needed is a key.

The foundation for all codebreaking is letter frequency analysis. As Poe's Legrand pointed out in the story, in English the most commonly used letter is the letter E. Locating the most frequently used vowels and consonants is the key to letter frequency analysis. Legrand argued that the letters of the alphabet ordered from most frequent to less frequent looked like this:

e a o i d h n r s t u y c f g l m w b k p q x z

Read the entire Edgar Allan Poe’s the Gold Bug – it’s a great story.

Here’s the section that contains the cipher and the explanation on how to decrypt it (this is the portion Glenn animated on the program):

Here Legrand submitted the parchment to my inspection. The following characters were rudely traced between the death's-head and the goat:

 

53‡‡†305))6*;4826)4‡.)4‡);806*;48†8 ¶60))85;1‡(;:‡*8†83(88)5*†;46(;88*96

*?;8)*‡(;485);5*†2:*‡(;4956*2(5*—4)8 ¶8*;4069285);)6†8)4‡‡;1(‡9;48081;8:8‡

1;48†85;4)485†528806*81(‡9;48;(88;4 (‡?34;48)4‡;161;:188;‡?;

"But," said I, returning him the slip, "I am as much in the dark as ever. Were all the jewels of Golconda awaiting me upon my solution of this enigma, I am quite sure that I should be unable to earn them."

"And yet," said Legrand, "the solution is by no means so difficult as you might be led to imagine from the first hasty inspection of the characters. These characters, as any one might readily guess, form a cipher — that is to say, they convey a meaning; but then, from what is known of Kidd, I could not suppose him capable of constructing any of the more abstruse cryptographs. I made up my mind, at once, that this was of a simple species — such, however, as would appear, to the crude intellect of the sailor, absolutely insoluble without the key."

"And you really solved it?"

"Readily; I have solved others of an abstruseness ten thousand times greater. Circumstances, and a certain bias of mind, have led me to take interest in such riddles, and it may well be doubted whether human ingenuity can construct an enigma of the kind which human ingenuity may not, by proper application, resolve. In fact, having once established connected and legible characters, I scarcely gave a thought to the mere difficulty of developing their import.

"In the present case — indeed in all cases of secret writing — the first question regards the language of the cipher; for the principles of solution, so far, especially, as the more simple ciphers are concerned, depend upon, and are varied by, the genius of the particular idiom. In general, there is no alternative but experiment (directed by probabilities) of every tongue known to him who attempts the solution, until the true one is attained. But, with the cipher now before us, all difficulty was removed by the signature. The pun upon the word 'Kidd' is appreciable in no other language than the English. But for this consideration I should have begun my attempts with the Spanish and French, as the tongues in which a secret of this kind would most naturally have been written by a pirate of the Spanish main. As it was, I assumed the cryptograph to be English.

"You observe there are no divisions between the words. Had there been divisions, the task would have been comparatively easy. In such case I should have commenced with a collation and analysis of the shorter words, and, had a word of a single letter occurred, as is most likely, (a or I, for example,) I should have considered this solution as assured. But, there being no division, my first step was to ascertain the predominant letters, as well as the least frequent. Counting all, I constructed a table, thus:

Of the character 8 there are 33.

; " 26.

4 " 19.

‡ ) " 16.

* " 13.

5 " 12.

6 " 11.

†1 " 8.

0 " 6.

9 2 " 5.

: 3 " 4.

? " 3.

¶ " 2. —. " 1.

"Now, in English, the letter which most frequently occurs is e. Afterwards, the succession runs thus: a o i d h n r s t u y c f g l m w b k p q x z. E predominates so remarkably that an individual sentence of any length is rarely seen, in which it is not the prevailing character.

"Here, then, we have, in the very beginning, the groundwork for something more than a mere guess. The general use which may be made of the table is obvious — but, in this particular cipher, we shall only very partially require its aid. As our predominant character is 8, we will commence by assuming it as the e of the natural alphabet. To verify the supposition, let us observe if the 8 be seen often in couples — for e is doubled with great frequency in English — in such words, for example, as 'meet,' 'fleet,' 'speed,' 'seen,' 'been,' 'agree,' &c. In the present instance we see it doubled no less than five times, although the cryptograph is brief.

"Let us assume 8, then, as e. Now, of all words in the language, 'the' is most usual; let us see, therefore, whether there are not repetitions of any three characters, in the same order of collocation, the last of them being 8. If we discover repetitions of such letters, so arranged, they will most probably represent the word 'the.' Upon inspection, we find no less than seven such arrangements, the characters being ;48. We may, therefore, assume that ; represents t, 4 represents h, and 8 represents e — the last being now well confirmed. Thus a great step has been taken.

"But, having established a single word, we are enabled to establish a vastly important point; that is to say, several commencements and terminations of other words. Let us refer, for example, to the last instance, but one, in which the combination ;48 occurs — not far from the end of the cipher. We know that the ; immediately ensuing is the commencement of a word, and, of the six characters succeeding this 'the,' we are cognizant of no less than five. Let us set these characters down, thus, by the letters we know them to represent, leaving a space for the one unknown —

t eeth.

"Here we are enabled, at once, to discard the 'th' as forming no portion of the word commencing with the first t; since, by experiment of the entire alphabet for a letter adapted to the vacancy, we perceive that no word can be formed of which this th can be a part. We are thus narrowed into 

 

t ee,

and, going through the alphabet, if necessary, as before, we arrive at the word 'tree,' as the sole possible reading. We thus gain another letter, r, represented by (, with the words 'the tree' in juxtaposition.

; "Looking beyond these words, for a short distance, we again see the combination ;48, and employ it by way of termination to what immediately precedes. We have thus this arrangement:

the tree ;4(‡?34 the,

or, substituting the natural letters, where known, it reads thus:

the tree thr‡?3h the.

 

"Now, if, in place of the unknown characters, we leave blank spaces, or substitute dots, we read thus:

the tree thr...h the,

when the word 'through' makes itself evident at once. But this discovery gives us three new letters, o, u and g, represented by ‡ ? and 3.

 

"Looking, now, narrowly, through the cipher for combinations of known characters, we find, not very far from the beginning, this arrangement,

83(88, or egree,

 

which, plainly, is the conclusion of the word 'degree,' and gives us another letter, d, represented by †.

 

; "Four letters beyond the word 'degree,' we perceive the combination

 

­­;46(;88*.

; "Translating the known characters, and representing the unknown by dots, as before, we read thus:

 

th.rtee.

 

an arrangement immediately suggestive of the word 'thirteen,' and again furnishing us with two new characters, i and n, represented by 6 and *.

 

; "Referring, now, to the beginning of the cryptograph, we find the combination,

53‡‡†.

"Translating, as before, we obtain

. good,

which assures us that the first letter is A, and that the first two words are 'A good.'

"To avoid confusion, it is now time that we arrange our key, as far as discovered, in a tabular form. It will stand thus:

5 represents a

† " d

8 " e

3 " g

4 " h

6 " i

* " n

‡ " o

( " r

; " t

"We have, therefore, no less than ten of the most important letters represented, and it will be unnecessary to proceed with the details of the solution. I have said enough to convince you that ciphers of this nature are readily soluble, and to give you some insight into the rationale of their development. But be assured that the specimen before us appertains to the very simplest species of cryptograph. It now only remains to give you the full translation of the characters upon the parchment, as unriddled. Here it is:

'A good glass in the bishop's hostel in the devil's seat forty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out.' "

And that’s how you solve a cipher. Easy, right? We thought we’d give you a little challenge, to see how you stack up against the brilliant cipher minds of history. Using the Gold Bug cipher can you decrypt our code?

 

 

Solve the Cipher

 

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395 95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8( )?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Write out the cipher on a piece of paper leaving enough space in between each line. You’ll need the space to write your solutions underneath. (example below)

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395

95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8(

 

)?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Count out the times each symbol/number is used in the cipher and write the results on a table ordered most to least frequently used. You’ll start to see that one of the symbols/numbers clearly stands out from the rest. This is your first and biggest clue and is most likely the most commonly used letter in the English language...E. Write in that letter next to each symbol in the cipher. (example below)

 

character 8 = 10 times

character ; = 5 times

character 4 = 2 times

 

Now we have, as Legrand said, “the groundwork” for more. Look for recurring combinations of symbols to try and guess words. Legrand identified the word THE as the most commonly used word. After that the most frequently used words in order are: OF, AND, TO, IN. Once you’ve spotted all the THE’s then you’ve discovered 2 more letters. Write them down on your table accordingly. Each new letter you decipher leads to more fragments of the message you’ll uncover. Eventually you’ll get the entire message decoded.

 

As technology progressed machines and advanced mathematics made these ciphers more and more complex. Amazingly the same principles that Poe’s Legrand used to break the Gold Bug cipher still apply today.

Good luck! If you successfully solve it, email the answer to goldbug@theblaze.com and the first responders will get a message from Glenn!

Note: This article originally said to send answers to goldbug@glennbeck.com. Please re-send to goldbug@theblaze.com

URGENT: FIVE steps to CONTROL AI before it's too late!

MANAURE QUINTERO / Contributor | Getty Images

By now, many of us are familiar with AI and its potential benefits and threats. However, unless you're a tech tycoon, it can feel like you have little influence over the future of artificial intelligence.

For years, Glenn has warned about the dangers of rapidly developing AI technologies that have taken the world by storm.

He acknowledges their significant benefits but emphasizes the need to establish proper boundaries and ethics now, while we still have control. But since most people aren’t Silicon Valley tech leaders making the decisions, how can they help keep AI in check?

Recently, Glenn interviewed Tristan Harris, a tech ethicist deeply concerned about the potential harm of unchecked AI, to discuss its societal implications. Harris highlighted a concerning new piece of legislation proposed by Texas Senator Ted Cruz. This legislation proposes a state-level moratorium on AI regulation, meaning only the federal government could regulate AI. Harris noted that there’s currently no Federal plan for regulating AI. Until the federal government establishes a plan, tech companies would have nearly free rein with their AI. And we all know how slowly the federal government moves.

This is where you come in. Tristan Harris shared with Glenn the top five actions you should urge your representatives to take regarding AI, including opposing the moratorium until a concrete plan is in place. Now is your chance to influence the future of AI. Contact your senator and congressman today and share these five crucial steps they must take to keep AI in check:

Ban engagement-optimized AI companions for kids

Create legislation that will prevent AI from being designed to maximize addiction, sexualization, flattery, and attachment disorders, and to protect young people’s mental health and ability to form real-life friendships.

Establish basic liability laws

Companies need to be held accountable when their products cause real-world harm.

Pass increased whistleblower protections

Protect concerned technologists working inside the AI labs from facing untenable pressures and threats that prevent them from warning the public when the AI rollout is unsafe or crosses dangerous red lines.

Prevent AI from having legal rights

Enact laws so AIs don’t have protected speech or have their own bank accounts, making sure our legal system works for human interests over AI interests.

Oppose the state moratorium on AI 

Call your congressman or Senator Cruz’s office, and demand they oppose the state moratorium on AI without a plan for how we will set guardrails for this technology.

Glenn: Only Trump dared to deliver on decades of empty promises

Tasos Katopodis / Stringer | Getty Images

The Islamic regime has been killing Americans since 1979. Now Trump’s response proves we’re no longer playing defense — we’re finally hitting back.

The United States has taken direct military action against Iran’s nuclear program. Whatever you think of the strike, it’s over. It’s happened. And now, we have to predict what happens next. I want to help you understand the gravity of this situation: what happened, what it means, and what might come next. To that end, we need to begin with a little history.

Since 1979, Iran has been at war with us — even if we refused to call it that.

We are either on the verge of a remarkable strategic victory or a devastating global escalation. Time will tell.

It began with the hostage crisis, when 66 Americans were seized and 52 were held for over a year by the radical Islamic regime. Four years later, 17 more Americans were murdered in the U.S. Embassy bombing in Beirut, followed by 241 Marines in the Beirut barracks bombing.

Then came the Khobar Towers bombing in 1996, which killed 19 more U.S. airmen. Iran had its fingerprints all over it.

In Iraq and Afghanistan, Iranian-backed proxies killed hundreds of American soldiers. From 2001 to 2020 in Afghanistan and 2003 to 2011 in Iraq, Iran supplied IEDs and tactical support.

The Iranians have plotted assassinations and kidnappings on U.S. soil — in 2011, 2021, and again in 2024 — and yet we’ve never really responded.

The precedent for U.S. retaliation has always been present, but no president has chosen to pull the trigger until this past weekend. President Donald Trump struck decisively. And what our military pulled off this weekend was nothing short of extraordinary.

Operation Midnight Hammer

The strike was reportedly called Operation Midnight Hammer. It involved as many as 175 U.S. aircraft, including 12 B-2 stealth bombers — out of just 19 in our entire arsenal. Those bombers are among the most complex machines in the world, and they were kept mission-ready by some of the finest mechanics on the planet.

USAF / Handout | Getty Images

To throw off Iranian radar and intelligence, some bombers flew west toward Guam — classic misdirection. The rest flew east, toward the real targets.

As the B-2s approached Iranian airspace, U.S. submarines launched dozens of Tomahawk missiles at Iran’s fortified nuclear facilities. Minutes later, the bombers dropped 14 MOPs — massive ordnance penetrators — each designed to drill deep into the earth and destroy underground bunkers. These bombs are the size of an F-16 and cost millions of dollars apiece. They are so accurate, I’ve been told they can hit the top of a soda can from 15,000 feet.

They were built for this mission — and we’ve been rehearsing this run for 15 years.

If the satellite imagery is accurate — and if what my sources tell me is true — the targeted nuclear sites were utterly destroyed. We’ll likely rely on the Israelis to confirm that on the ground.

This was a master class in strategy, execution, and deterrence. And it proved that only the United States could carry out a strike like this. I am very proud of our military, what we are capable of doing, and what we can accomplish.

What comes next

We don’t yet know how Iran will respond, but many of the possibilities are troubling. The Iranians could target U.S. forces across the Middle East. On Monday, Tehran launched 20 missiles at U.S. bases in Qatar, Syria, and Kuwait, to no effect. God forbid, they could also unleash Hezbollah or other terrorist proxies to strike here at home — and they just might.

Iran has also threatened to shut down the Strait of Hormuz — the artery through which nearly a fifth of the world’s oil flows. On Sunday, Iran’s parliament voted to begin the process. If the Supreme Council and the ayatollah give the go-ahead, we could see oil prices spike to $150 or even $200 a barrel.

That would be catastrophic.

The 2008 financial collapse was pushed over the edge when oil hit $130. Western economies — including ours — simply cannot sustain oil above $120 for long. If this conflict escalates and the Strait is closed, the global economy could unravel.

The strike also raises questions about regime stability. Will it spark an uprising, or will the Islamic regime respond with a brutal crackdown on dissidents?

Early signs aren’t hopeful. Reports suggest hundreds of arrests over the weekend and at least one dissident executed on charges of spying for Israel. The regime’s infamous morality police, the Gasht-e Ershad, are back on the streets. Every phone, every vehicle — monitored. The U.S. embassy in Qatar issued a shelter-in-place warning for Americans.

Russia and China both condemned the strike. On Monday, a senior Iranian official flew to Moscow to meet with Vladimir Putin. That meeting should alarm anyone paying attention. Their alliance continues to deepen — and that’s a serious concern.

Now we pray

We are either on the verge of a remarkable strategic victory or a devastating global escalation. Time will tell. But either way, President Trump didn’t start this. He inherited it — and he took decisive action.

The difference is, he did what they all said they would do. He didn’t send pallets of cash in the dead of night. He didn’t sign another failed treaty.

He acted. Now, we pray. For peace, for wisdom, and for the strength to meet whatever comes next.


This article originally appeared on TheBlaze.com.

Globalize the Intifada? Why Mamdani’s plan spells DOOM for America

Bloomberg / Contributor | Getty Images

If New Yorkers hand City Hall to Zohran Mamdani, they’re not voting for change. They’re opening the door to an alliance of socialism, Islamism, and chaos.

It only took 25 years for New York City to go from the resilient, flag-waving pride following the 9/11 attacks to a political fever dream. To quote Michael Malice, “I'm old enough to remember when New Yorkers endured 9/11 instead of voting for it.”

Malice is talking about Zohran Mamdani, a Democratic Socialist assemblyman from Queens now eyeing the mayor’s office. Mamdani, a 33-year-old state representative emerging from relative political obscurity, is now receiving substantial funding for his mayoral campaign from the Council on American-Islamic Relations.

CAIR has a long and concerning history, including being born out of the Muslim Brotherhood and named an unindicted co-conspirator in the Holy Land Foundation terror funding case. Why would the group have dropped $100,000 into a PAC backing Mamdani’s campaign?

Mamdani blends political Islam with Marxist economics — two ideologies that have left tens of millions dead in the 20th century alone.

Perhaps CAIR has a vested interest in Mamdani’s call to “globalize the intifada.” That’s not a call for peaceful protest. Intifada refers to historic uprisings of Muslims against what they call the “Israeli occupation of Palestine.” Suicide bombings and street violence are part of the playbook. So when Mamdani says he wants to “globalize” that, who exactly is the enemy in this global scenario? Because it sure sounds like he's saying America is the new Israel, and anyone who supports Western democracy is the new Zionist.

Mamdani tried to clean up his language by citing the U.S. Holocaust Memorial Museum, which once used “intifada” in an Arabic-language article to describe the Warsaw Ghetto Uprising. So now he’s comparing Palestinians to Jewish victims of the Nazis? If that doesn’t twist your stomach into knots, you’re not paying attention.

If you’re “globalizing” an intifada, and positioning Israel — and now America — as the Nazis, that’s not a cry for human rights. That’s a call for chaos and violence.

Rising Islamism

But hey, this is New York. Faculty members at Columbia University — where Mamdani’s own father once worked — signed a letter defending students who supported Hamas after October 7. They also contributed to Mamdani’s mayoral campaign. And his father? He blamed Ronald Reagan and the religious right for inspiring Islamic terrorism, as if the roots of 9/11 grew in Washington, not the caves of Tora Bora.

Bloomberg / Contributor | Getty Images

This isn’t about Islam as a faith. We should distinguish between Islam and Islamism. Islam is a religion followed peacefully by millions. Islamism is something entirely different — an ideology that seeks to merge mosque and state, impose Sharia law, and destroy secular liberal democracies from within. Islamism isn’t about prayer and fasting. It’s about power.

Criticizing Islamism is not Islamophobia. It is not an attack on peaceful Muslims. In fact, Muslims are often its first victims.

Islamism is misogynistic, theocratic, violent, and supremacist. It’s hostile to free speech, religious pluralism, gay rights, secularism — even to moderate Muslims. Yet somehow, the progressive left — the same left that claims to fight for feminism, LGBTQ rights, and free expression — finds itself defending candidates like Mamdani. You can’t make this stuff up.

Blending the worst ideologies

And if that weren’t enough, Mamdani also identifies as a Democratic Socialist. He blends political Islam with Marxist economics — two ideologies that have left tens of millions dead in the 20th century alone. But don’t worry, New York. I’m sure this time socialism will totally work. Just like it always didn’t.

If you’re a business owner, a parent, a person who’s saved anything, or just someone who values sanity: Get out. I’m serious. If Mamdani becomes mayor, as seems likely, then New York City will become a case study in what happens when you marry ideological extremism with political power. And it won’t be pretty.

This is about more than one mayoral race. It’s about the future of Western liberalism. It’s about drawing a bright line between faith and fanaticism, between healthy pluralism and authoritarian dogma.

Call out radicalism

We must call out political Islam the same way we call out white nationalism or any other supremacist ideology. When someone chants “globalize the intifada,” that should send a chill down your spine — whether you’re Jewish, Christian, Muslim, atheist, or anything in between.

The left may try to shame you into silence with words like “Islamophobia,” but the record is worn out. The grooves are shallow. The American people see what’s happening. And we’re not buying it.

This article originally appeared on TheBlaze.com.

Could China OWN our National Parks?

Jonathan Newton / Contributor | Getty Images

The left’s idea of stewardship involves bulldozing bison and barring access. Lee’s vision puts conservation back in the hands of the people.

The media wants you to believe that Sen. Mike Lee (R-Utah) is trying to bulldoze Yellowstone and turn national parks into strip malls — that he’s calling for a reckless fire sale of America’s natural beauty to line developers’ pockets. That narrative is dishonest. It’s fearmongering, and, by the way, it’s wrong.

Here’s what’s really happening.

Private stewardship works. It’s local. It’s accountable. It’s incentivized.

The federal government currently owns 640 million acres of land — nearly 28% of all land in the United States. To put that into perspective, that’s more territory than France, Germany, Poland, and the United Kingdom combined.

Most of this land is west of the Mississippi River. That’s not a coincidence. In the American West, federal ownership isn’t just a bureaucratic technicality — it’s a stranglehold. States are suffocated. Locals are treated as tenants. Opportunities are choked off.

Meanwhile, people living east of the Mississippi — in places like Kentucky, Georgia, or Pennsylvania — might not even realize how little land their own states truly control. But the same policies that are plaguing the West could come for them next.

Lee isn’t proposing to auction off Yellowstone or pave over Yosemite. He’s talking about 3 million acres — that’s less than half of 1% of the federal estate. And this land isn’t your family’s favorite hiking trail. It’s remote, hard to access, and often mismanaged.

Failed management

Why was it mismanaged in the first place? Because the federal government is a terrible landlord.

Consider Yellowstone again. It’s home to the last remaining herd of genetically pure American bison — animals that haven’t been crossbred with cattle. Ranchers, myself included, would love the chance to help restore these majestic creatures on private land. But the federal government won’t allow it.

So what do they do when the herd gets too big?

They kill them. Bulldoze them into mass graves. That’s not conservation. That’s bureaucratic malpractice.

And don’t even get me started on bald eagles — majestic symbols of American freedom and a federally protected endangered species, now regularly slaughtered by wind turbines. I have pictures of piles of dead bald eagles. Where’s the outrage?

Biden’s federal land-grab

Some argue that states can’t afford to manage this land themselves. But if the states can’t afford it, how can Washington? We’re $35 trillion in debt. Entitlements are strained, infrastructure is crumbling, and the Bureau of Land Management, Forest Service, and National Park Service are billions of dollars behind in basic maintenance. Roads, firebreaks, and trails are falling apart.

The Biden administration quietly embraced something called the “30 by 30” initiative, a plan to lock up 30% of all U.S. land and water under federal “conservation” by 2030. The real goal is 50% by 2050.

That entails half of the country being taken away from you, controlled not by the people who live there but by technocrats in D.C.

You think that won’t affect your ability to hunt, fish, graze cattle, or cut timber? Think again. It won’t be conservatives who stop you from building a cabin, raising cattle, or teaching your grandkids how to shoot a rifle. It’ll be the same radical environmentalists who treat land as sacred — unless it’s your truck, your deer stand, or your back yard.

Land as collateral

Moreover, the U.S. Treasury is considering putting federally owned land on the national balance sheet, listing your parks, forests, and hunting grounds as collateral.

What happens if America defaults on its debt?

David McNew / Stringer | Getty Images

Do you think our creditors won’t come calling? Imagine explaining to your kids that the lake you used to fish in is now under foreign ownership, that the forest you hunted in belongs to China.

This is not hypothetical. This is the logical conclusion of treating land like a piggy bank.

The American way

There’s a better way — and it’s the American way.

Let the people who live near the land steward it. Let ranchers, farmers, sportsmen, and local conservationists do what they’ve done for generations.

Did you know that 75% of America’s wetlands are on private land? Or that the most successful wildlife recoveries — whitetail deer, ducks, wild turkeys — didn’t come from Washington but from partnerships between private landowners and groups like Ducks Unlimited?

Private stewardship works. It’s local. It’s accountable. It’s incentivized. When you break it, you fix it. When you profit from the land, you protect it.

This is not about selling out. It’s about buying in — to freedom, to responsibility, to the principle of constitutional self-governance.

So when you hear the pundits cry foul over 3 million acres of federal land, remember: We don’t need Washington to protect our land. We need Washington to get out of the way.

Because this isn’t just about land. It’s about liberty. And once liberty is lost, it doesn’t come back easily.

This article originally appeared on TheBlaze.com.