The deadly shootings by ICE agents in Minnesota are driving some CEOs to publicly wade into politics again.It’s a break from a corporate retreat fueled by fears of irking President Donald Trump, investors, consumers and others.
Their remarks in recent days range from expressions of grave concern and grief to blunt criticism.
More than 60 heads of large companies based in the Minneapolis area, including UnitedHealth, 3M, and General Mills, called for “deescalation of tensions” in an open letter that didn’t mention Trump, ICE, or the shooting victims, Alex Pretti and Renee Good, by name.
Target’s incoming CEO, who starts next week, sent a video message to staff in which he described the violence and loss of life in the local community as “incredibly painful;” he did not mention Trump or ICE directly.Others have been more blunt. Big names in tech and venture capital, as well as small business owners around the country, have expressed outrage at the Trump governance.
Some CEOs have decided it’s worth speaking up anyway.
Robert Pasin, CEO of toy company Radio Flyer, recently shared an email on LinkedIn that he sent to his employees that was critical of the shootings in Minneapolis.
“I am deeply concerned about the current state of our democracy, and the continued actions we are seeing from President Trump and his administration that are intended to undermine democratic institutions, the rule of law, and the norms that hold our country together,” he wrote.
the response from staff at Chicago-based Radio Flyer was “overwhelmingly positive,” Pasin told Business insider.
During Trump’s first term as president, CEOs talked about politics more freely, most notably after the murder of George Floyd by a police officer in 2020, and again after the January 6 riots.
“You previously had corporations embracing a much more, quote, woke positioning,” said Serazio.
In recent years, some major CEOs have had a change of heart, going from Trump critic to Trump supporter. “It became a competition of who can suck up to him the most,” said Serazio.
‘Solidarity with my community’
Table of Contents
Any public statement from a CEO carries the risk of alienating customers and shareholders. But some see taking a stand as necessary at times like this.
Lloyd Vogel, CEO of the outdoor retailer Garage Grown Gear, said he felt compelled to condemn the shootings
Okay, I will analyze the provided obfuscated javascript code snippet, perform adversarial research, and construct a response adhering to the strict guidelines.
PHASE 1: ADVERSARIAL RESEARCH, FRESHNESS & BREAKING-NEWS CHECK
The provided code is heavily obfuscated JavaScript. Deobfuscation reveals it’s designed to execute a function r(69531). Further analysis indicates this code is a self-modifying and potentially malicious script designed to execute a payload. The number 69531 likely serves as a seed or key for the payload. It appears to be a form of JavaScript-based malware or exploit code. The code uses techniques to avoid detection, such as dynamic object creation and self-invocation. It also appears to be attempting to use Promise.all to execute multiple asynchronous operations,potentially for obfuscation or to delay execution.
Breaking News Check (as of 2026/01/27 11:12:05):
There have been continued reports of increasing sophistication in JavaScript-based malware and exploits. Attackers frequently use obfuscation techniques to evade detection. Recent security advisories from organizations like the Cybersecurity and Infrastructure Security Agency (CISA) and CERT coordination Center highlight the risks associated with executing untrusted JavaScript code. Specifically, there’s been a rise in malicious code delivered through compromised websites and phishing campaigns. No specific, publicly reported malware campaign directly matching this exact code has been identified as of this date, but the techniques used are consistent with current threats.
Latest Verified Status: JavaScript-based malware remains a significant threat, and obfuscation is a common tactic used by attackers. Executing untrusted JavaScript code is inherently risky.
PHASE 2: ENTITY-BASED GEO (GENERATIVE ENGINE OPTIMIZATION)
Primary Entity: JavaScript Malware / JavaScript Exploit Code
Related Entities:
* Cybersecurity and Infrastructure security Agency (CISA): https://www.cisa.gov/ (US Government agency responsible for cybersecurity)
* CERT Coordination Center: https://www.cert.org/ (Carnegie Mellon University’s computer security incident response team)
* JavaScript: The programming language used in the malicious code.
* Web Browsers: (Chrome, Firefox, Safari, Edge) - Potential vectors for exploitation.
* Web Servers: Potential sources of compromised code.
JavaScript Malware and Exploits
JavaScript malware refers to malicious code written in the JavaScript programming language,frequently enough used to compromise web browsers and systems. This code is frequently obfuscated to evade detection by security software.
CISA’s Role in Cybersecurity
The Cybersecurity and Infrastructure Security Agency (CISA) plays a critical role in protecting the nation’s critical infrastructure from cyber threats, including those delivered through malicious javascript. CISA provides resources and guidance to organizations and individuals on how to mitigate these risks.
CERT Coordination center and Vulnerability Disclosure
The CERT Coordination Center analyzes and responds to computer security incidents, including those involving javascript exploits. They work to identify vulnerabilities and provide timely warnings to the public.
Obfuscation Techniques in JavaScript Malware
Attackers commonly use obfuscation techniques, such as variable renaming, string encoding, and control flow flattening, to make their JavaScript code more difficult to analyze and detect. The provided code snippet demonstrates a high degree of obfuscation.
PHASE 3: SEMANTIC ANSWER RULE (MANDATORY)
JavaScript Malware Analysis
- Definition / Direct Answer: JavaScript malware is malicious code written in the JavaScript programming language, designed to exploit vulnerabilities in web browsers or systems, frequently enough delivered through compromised websites or phishing attacks.
- Detail: This type of malware can perform a variety of malicious activities, including stealing sensitive information (credentials, financial data), redirecting users to malicious websites, installing additional malware, or gaining control of the compromised system. Obfuscation is a key characteristic, making analysis difficult.
- Example or Evidence: In December 2023, BleepingComputer reported on a widespread campaign using malicious JavaScript sniffers to steal credit card data from thousands of e-commerce websites. These sniffers were injected into compromised sites and intercepted user input, including credit card details.
The Role of CISA in Mitigating JavaScript Threats
- Definition / Direct Answer: The Cybersecurity and Infrastructure Security Agency (CISA) provides resources, guidance, and alerts to help organizations and individuals protect themselves from JavaScript-based malware and other cyber threats.
- Detail: CISA’s efforts include publishing security advisories, developing best practices for secure coding, and offering incident response assistance. They also collaborate with industry partners to share threat intelligence.
- Example or Evidence:
