A THOUGHT EXPERIMENT FOR EVERY AMERICAN, REGARDLESS OF PARTY


The Founders called this republic an experiment. Madison said so explicitly. Hamilton opened the Federalist Papers asking whether societies of men are capable of governing themselves by “reflection and choice” — or whether they are forever destined to be governed by “accident and force.”

That question has never been permanently answered. It gets re-answered by each generation’s behavior.

Here is the experiment. Four variables. Be honest with yourself about all four.


Variable 1: The Constitution was built to change — but HOW you change it matters.

Article V provides two deliberate pathways for amendment. The Founders used them immediately — the Bill of Rights was ratified within three years of the Constitution itself. They were not building a frozen monument. They were building a process. Madison wrote that the greatness of the American people is that they “have not suffered a blind veneration for the past.”

The experiment: When you want the Constitution to mean something different, do you use the process — or do you use power to bypass the process? One is self-government. The other is the thing self-government was designed to prevent.


Variable 2: The Founders themselves were never unanimous — and they knew it.

Three delegates refused to sign the Constitution. Rhode Island boycotted the convention entirely. Ratification was close and contentious in nearly every state. Loyalists — perhaps a third of the colonial population — were never part of the founding consensus at all. Hamilton acknowledged in Federalist 1 that “wise and good men” would be found on both sides of the ratifying debate, and that honest opposition would “spring from sources blameless at least, if not respectable.”

The experiment: If the Founders — who had fought a war together, knew each other personally, and shared enormous common ground — could not achieve unanimity, why do we treat the other side’s disagreement as evidence of bad faith rather than honest difference?


Variable 3: Facts versus narrative — the one problem the Founders did not solve.

Madison’s great structural cure for faction was the extended republic — the idea that geographic distance and diversity would prevent any single passion from simultaneously inflaming the entire country. A pamphlet in Virginia took weeks to reach Massachusetts. The friction of distance cooled factional contagion.

That friction is gone. Every citizen now receives the same emotional signal simultaneously, curated for maximum reaction. Madison in Federalist 63 wrote that the Senate’s purpose was to protect the people “against their own temporary errors and delusions” until “reason, justice, and truth can regain their authority over the public mind.” He assumed truth would regain authority, given time and space.

The experiment: What happens to a republic designed around deliberation when the information environment is specifically engineered to prevent deliberation — and when “news” and “fact” have become functionally indistinguishable to millions of citizens? This is the one variable the Founders anticipated but could not design around. It is ours to solve or to fail.


Variable 4: The permanent political class — the pig at the trough problem.

Hamilton in Federalist 1 identified the most dangerous class of men in any republic: those who “aggrandize themselves by the confusions of their country” — men whose personal interest is permanently tied to the perpetuation of conflict rather than its resolution. He was describing the career politician before the career politician existed as a recognizable type.

The Constitution sets no term limits on Congress. The Founders debated this and chose not to impose them, trusting the election mechanism to rotate citizens in and out. What they did not anticipate was a professional class for whom holding office is the vocation — not a temporary sacrifice of a productive citizen, but a permanent extraction from the republic’s resources.

Madison in Federalist 47 called the accumulation of all power in the same hands “the very definition of tyranny.” A legislator who has held office for thirty years, whose personal wealth has multiplied through that tenure, who has converted public power into private benefit through earmarks and special interests — is not serving the republic. By Madison’s own definition, they are the faction.

The experiment: Does this apply only to the career politicians on the other side — or does it apply equally to the ones you keep re-electing?


The control variable — the one that determines whether the experiment succeeds or fails:

Orwell noticed, in Animal Farm, that the pigs did not become what they replaced by dramatic revolution. They became it gradually, by the slow logic of occupying power long enough that the distinction between serving the farm and owning the farm disappeared.

Hamilton’s question — reflection and choice, or accident and force — is not asked once at the founding and answered forever. It is asked again every time a citizen decides whether to apply their principles consistently or only when convenient.

The republic is not a partisan inheritance. It was built by people who disagreed profoundly, on a framework designed to contain disagreement without destroying the disagreers.

It will be kept — or lost — by whether we can still do the same.


Sources: Federalist No. 1 (Hamilton), Federalist No. 10, 47, 51, 63 (Madison) · Article V, United States Constitution · Madison, Federalist 14 on constitutional change · Hamilton, Federalist 1 on the permanent political class

Steady in the Signal: Faith, Work, and Building What Lasts

Back home from Comanche after a solid week on towers and microwave alignment. There is something grounding about standing under an 11 GHz path, watching signal levels lock in, knowing that invisible waves are carrying real conversations across miles of Texas pasture.

This morning we went deeper into John 4.

Jesus was tired. Dust on His feet. Thirst in His body. And still He chose to engage. He crossed ethnic lines, moral lines, religious lines, and personal pain lines. Not to win an argument. Not to prove a point. But to restore a person.

That matters right now.

We are living in a time where outrage travels faster than microwave backhaul. Blame is currency. Headlines are engineered for reaction. Facts are contested. Narratives are crafted. And too many people are exhausted.

But truth is not loud. It is steady.

At the well, Jesus did not shout the Samaritan woman down. He did not cancel her history. He named it honestly and then offered living water. Grace and truth, together. Not one without the other.

This week I worked on infrastructure — power, bandwidth, line of sight, reliability. I also wrote about AI, data centers, water supply, grid stability. All of it points to the same reality: the future will demand clarity, discipline, and stewardship. Power must be generated. Water must be sourced. Data must be moved. Systems must be resilient.

So must people.

As I step into a senior pastor role at Source of Old Faith, the call is not to build noise. It is to build a foundation. Order. Accountability. Spiritual maturity. A house built on the cornerstone, not on emotion or personality.

In a world of accusation, we need conviction without cruelty.
In a world of spin, we need truth without arrogance.
In a world of uncertainty, we need hope anchored in something older and stronger than the news cycle.

Jesus is still crossing barriers.


The Spirit is still building living stones.
The Church must still be salt and light.

Build strong networks.
Build strong families.
Build strong churches.
Tell the truth.
Refuse hate.
Stay steady.

The future is not secured by outrage. It is secured by faithfulness.

Press on.

Protecting Our Young People from Modern Extremism

764: A Critical Briefing for Ministry Leaders

Protecting Our Young People from Modern Extremism

Information for Pastors, Parents, and Youth Leaders

Executive Summary

The 764 network represents a critical threat to young people and has recently been classified by federal law enforcement as ‘modern-day terrorism.’ This briefing provides essential information for protecting the vulnerable youth in our communities, with particular sensitivity to the experiences of those in recovery or rebuilding their lives.

What Is the 764 Network?

The 764 network is a decentralized, international extremist organization that operates primarily online. Founded in 2021 by a teenager in Texas, 764 has expanded to become a coordinated network of predators that targets vulnerable youth globally. Federal law enforcement officials, including the FBI Director, now refer to 764 activities as modern-day terrorism.

Core Characteristics:

  • Nihilistic worldview rejecting moral norms and valuing chaos over society
  • Targets vulnerable youth, particularly those struggling with mental health, isolation, or trauma
  • Uses sexual exploitation, coercion, and psychological manipulation as primary tools
  • Members gain status by producing increasingly violent content and coercing victims

The Scale of the Problem

Current Law Enforcement Activity:

  • The FBI is conducting over 350 active investigations tied to 764 and similar networks
  • At least 28 people have been charged federally; some face terrorism charges
  • The National Center for Missing and Exploited Children is tracking nearly 2,000 abuse reports annually
  • Experts estimate 10,000 people worldwide are actively engaged in the 764 ecosystem

Where 764 Operates

The 764 network primarily uses mainstream gaming and social media platforms to find and target victims. These platforms are not inherently dangerous, but predators exploit them:

  • Discord – Gaming chat platform where 764 originally formed
  • Roblox – Youth-oriented gaming platform
  • Telegram – Encrypted messaging application
  • Instagram and other social media

How 764 Operates: The Grooming Process

Understanding the operational method is crucial for recognition and intervention. Predators follow a deliberate progression:

  1. Initial Contact – Members identify vulnerable youth in gaming servers or social platforms, often targeting those who appear lonely, isolated, or struggling
  2. Relationship Building – They establish trust by showing interest in the youth’s hobbies, struggles, and vulnerabilities
  3. Information Extraction – Personal information is gathered: family details, mental health struggles, insecurities
  4. Exploitation Escalation – Victims are coerced into producing sexual content or self-harm imagery
  5. Blackmail and Control – Material is used to extort further compliance and deeper harm
  6. Live Streaming – The most severe cases involve livestreaming self-harm or violence while the network watches and encourages escalation

Critical Warning Signs

Parents, pastors, and youth leaders should be alert to behavioral changes that may indicate a young person is being targeted or is already being exploited:

Behavioral Changes

Online Indicators

  • Sudden withdrawal from family and friends
  • Unusual secrecy about online activities
  • Unexplained injuries, especially self-harm marks
  • Significant mood swings or depression
  • Resistance to parental oversight
  • Excessive time online, especially late at night
  • Use of encrypted or private chat applications
  • Interest in disturbing, violent, or gore content
  • References to 764 or glorification of past violence
  • Requesting privacy on devices or hiding screens

Practical Guidance for Different Audiences

For Parents

Establish Open Communication

  • Have regular, non-judgmental conversations about online safety and the risks of predatory networks
  • Ask your teen to show you their games, online spaces, and social media—frame it as interest, not surveillance
  • Discuss current events and news stories about online predators in age-appropriate ways

Use Reasonable Monitoring and Limits

  • Implement parental controls on devices; balance privacy with safety
  • Consider device-free times or keeping devices out of bedrooms, especially at night
  • Know which platforms your teen uses and familiarize yourself with their features
  • Follow their social media accounts if possible; watch for sudden changes in friend groups

Strengthen Mental Health and Resilience

  • Predators target vulnerable youth—isolation, loneliness, and low self-esteem are risk factors
  • Encourage in-person friendships, activities, and involvement in faith communities
  • Seek professional counseling for teens struggling with mental health, trauma, or identity issues
  • Help your teen develop a strong sense of worth that isn’t dependent on online validation

Know What to Do If You’re Concerned

  • Report suspected exploitation to the National Center for Missing and Exploited Children (CyberTipline.org) or the FBI
  • Contact local law enforcement immediately if your child has been harmed or is in danger
  • Seek trauma-informed counseling for your teen; recovery will require professional support

For Pastors and Youth Leaders

Create a Trauma-Informed Ministry Culture

  • Establish a culture where teens feel safe disclosing struggles, concerns, and fears without judgment
  • Remember that young people targeted by 764 are often those carrying shame, struggling with identity, or rebuilding after hardship
  • Use trauma-sensitive language that recognizes vulnerability as a sign of courage, not weakness
  • Emphasize that God meets people in their current darkness, not after they’ve “fixed themselves”

Host Educational Discussions

  • Organize group conversations about online safety and the dangers of networks like 764
  • Use real-life (anonymized) examples to illustrate how predators operate and how quickly manipulation escalates
  • Discuss how isolation makes youth vulnerable and why faith community provides protection
  • Help young people develop spiritual discernment about truth, deception, and their own worth

Partner With Parents and Provide Resources

  • Provide parents with fact sheets and resources about 764 and online predator tactics
  • Host parent education events on digital safety and mental health support for teens
  • Create clear protocols for how to respond if a teen discloses exploitation or abuse
  • Know local counseling resources and have trusted professional referrals available

Understand Your Mandatory Reporting Obligations

  • Familiarize yourself with your state’s mandatory reporting laws regarding child abuse and exploitation
  • Know that in most states, clergy members are mandated reporters
  • If a teen discloses exploitation, do not promise confidentiality—explain that you are legally required to report
  • Report to child protective services or law enforcement immediately

Essential Resources

Reporting Suspected Exploitation

  • National Center for Missing and Exploited Children (NCMEC): CyberTipline.org – Submit suspected CSAM or exploitation
  • FBI: tips.fbi.gov – Report suspected extremism or violent threats
  • Local Law Enforcement: 911 or your local police non-emergency line
  • Childhelp National Child Abuse Hotline: 1-800-4-A-CHILD (1-800-422-4453)

Mental Health and Counseling Support

  • SAMHSA National Helpline: 1-800-662-4357 – Free, confidential, 24/7 referrals to mental health services
  • Crisis Text Line: Text HOME to 741741 – Text-based crisis support
  • National Suicide Prevention Lifeline: 988 – Call or text for immediate support

Educational and Advocacy Organizations

  • Institute for Countering Digital Extremism – Research and resources on online extremism
  • Anti-Defamation League (ADL) – Resources on extremism and hate groups
  • Kids Online Safety Act (KOSA) – Federal legislation to require platform safety tools for minors

Conclusion

The 764 network represents a modern threat to young people that requires vigilance, partnership, and compassion. The most vulnerable among us—those struggling with isolation, shame, mental health challenges, or past trauma—are precisely those whom Jesus called us to protect and heal.

As pastors, parents, and youth leaders, we have both a responsibility and an opportunity. By staying informed, maintaining open communication, creating safe communities, and responding swiftly when concerns arise, we can protect our young people and offer hope to those who have been harmed.

Let us be vigilant, compassionate, and proactive in safeguarding the next generation.