Spitfire List Web site and blog of anti-fascist researcher and radio personality Dave Emory.
The tag 'data privacy' is associated with 15 posts.

FTR #1077 Surveillance Valley, Part 3: Cambridge Analytica, Democracy and Counterinsurgency

Continuing the discussion from FTR #1076, the broadcast recaps key aspects of analysis of the Cambridge Analytica scandal.

In our last program, we noted that both the internet (DARPA projects including Project Agile) and the German Nazi Party had their origins as counterinsurgency gambits. Noting Hitler’s speech before The Industry Club of Dusseldorf, in which he equated communism with democracy, we highlight how the Cambridge Analytica scandal reflects the counterinsurgency origins of the Internet, and how the Cambridge Analytica affair embodies anti-Democracy/as counterinsurgency.

Key aspects of the Cambridge Analytica affair include:

1.–The use of psychographic personality testing on Facebook that is used for political advantage: ” . . . . For several years, a data firm eventually hired by the Trump campaign, Cambridge Analytica, has been using Facebook as a tool to build psychological profiles that represent some 230 million adult Americans. A spinoff of a British consulting company and sometime-defense contractor known for its counterterrorism ‘psy ops’ work in Afghanistan, the firm does so by seeding the social network with personality quizzes. Respondents — by now hundreds of thousands of us, mostly female and mostly young but enough male and older for the firm to make inferences about others with similar behaviors and demographics — get a free look at their Ocean scores. Cambridge Analytica also gets a look at their scores and, thanks to Facebook, gains access to their profiles and real names. . . .”
2.–The parent company of Cambridge Analytica–SCL–was deeply involved with counterterrorism “psy-ops” in Afghanistan, embodying the essence of the counterinsurgency dynamic at the root of the development of the Internet. The use of online data to subvert democracy recalls Hitler’s speech to the Industry Club of Dusseldorf, in which he equated democracy with communism: ” . . . . Cambridge Analytica was a company spun out of SCL Group, a British military contractor that worked in information operations for armed forces around the world. It was conducting research on how to scale and digitise information warfare – the use of information to confuse or degrade the efficacy of an enemy. . . . As director of research, Wylie’s original role was to map out how the company would take traditional information operations tactics into the online space – in particular, by profiling people who would be susceptible to certain messaging. This morphed into the political arena. After Wylie left, the company worked on Donald Trump’s US presidential campaign . . . .”
3.–Cambridge Analytica whistleblower Christopher Wylie’s observations on the anti-democratic nature of the firm’s work: ” . . . . It was this shift from the battlefield to politics that made Wylie uncomfortable. ‘When you are working in information operations projects, where your target is a combatant, the autonomy or agency of your targets is not your primary consideration. It is fair game to deny and manipulate information, coerce and exploit any mental vulnerabilities a person has, and to bring out the very worst characteristics in that person because they are an enemy,’ he says. ‘But if you port that over to a democratic system, if you run campaigns designed to undermine people’s ability to make free choices and to understand what is real and not real, you are undermining democracy and treating voters in the same way as you are treating terrorists.’ . . . .”
4.–Wylie’s observations on how Cambridge Analytica’s methodology can be used to build a fascist political movement: ” . . . . One of the reasons these techniques are so insidious is that being a target of a disinformation campaign is ‘usually a pleasurable experience’, because you are being fed content with which you are likely to agree. ‘You are being guided through something that you want to be true,’ Wylie says. To build an insurgency, he explains, you first target people who are more prone to having erratic traits, paranoia or conspiratorial thinking, and get them to ‘like’ a group on social media. They start engaging with the content, which may or may not be true; either way ‘it feels good to see that information’. When the group reaches 1,000 or 2,000 members, an event is set up in the local area. Even if only 5% show up, ‘that’s 50 to 100 people flooding a local coffee shop’, Wylie says. This, he adds, validates their opinion because other people there are also talking about ‘all these things that you’ve been seeing online in the depths of your den and getting angry about’. People then start to believe the reason it’s not shown on mainstream news channels is because ‘they don’t want you to know what the truth is’. As Wylie sums it up: ‘What started out as a fantasy online gets ported into the temporal world and becomes real to you because you see all these people around you.’ . . . .”
5.–Wylie’s observation that Facebook was “All In” on the Cambridge Analytica machinations: ” . . . . ‘Facebook has known about what Cambridge Analytica was up to from the very beginning of those projects,” Wylie claims. “They were notified, they authorised the applications, they were given the terms and conditions of the app that said explicitly what it was doing. They hired people who worked on building the app. I had legal correspondence with their lawyers where they acknowledged it happened as far back as 2016.’ . . . .”
6.–The decisive participation of “Spy Tech” firm Palantir in the Cambridge Analytica operation: Peter Thiel’s surveillance firm Palantir was apparently deeply involved with Cambridge Analytica’s gaming of personal data harvested from Facebook in order to engineer an electoral victory for Trump. Thiel was an early investor in Facebook, at one point was its largest shareholder and is still one of its largest shareholders. In addition to his opposition to democracy because it allegedly is inimical to wealth creation, Thiel doesn’t think women should be allowed to vote and holds Nazi legal theoretician Carl Schmitt in high regard. ” . . . . It was a Palantir employee in London, working closely with the data scientists building Cambridge’s psychological profiling technology, who suggested the scientists create their own app — a mobile-phone-based personality quiz — to gain access to Facebook users’ friend networks, according to documents obtained by The New York Times. The revelations pulled Palantir — co-founded by the wealthy libertarian Peter Thiel — into the furor surrounding Cambridge, which improperly obtained Facebook data to build analytical tools it deployed on behalf of Donald J. Trump and other Republican candidates in 2016. Mr. Thiel, a supporter of President Trump, serves on the board at Facebook. ‘There were senior Palantir employees that were also working on the Facebook data,’ said Christopher Wylie, a data expert and Cambridge Analytica co-founder, in testimony before British lawmakers on Tuesday. . . . The connections between Palantir and Cambridge Analytica were thrust into the spotlight by Mr. Wylie’s testimony on Tuesday. Both companies are linked to tech-driven billionaires who backed Mr. Trump’s campaign: Cambridge is chiefly owned by Robert Mercer, the computer scientist and hedge fund magnate, while Palantir was co-founded in 2003 by Mr. Thiel, who was an initial investor in Facebook. . . .”
7.–The use of “dark posts” by the Cambridge Analytica team. (We have noted that Brad Parscale has reassembled the old Cambridge Analytica team for Trump’s 2020 election campaign. It seems probable that AOC’s millions of online followers, as well as the “Bernie Bots,” will be getting “dark posts” crafted by AI’s scanning their online efforts.) ” . . . . One recent advertising product on Facebook is the so-called ‘dark post’: A newsfeed message seen by no one aside from the users being targeted. With the help of Cambridge Analytica, Mr. Trump’s digital team used dark posts to serve different ads to different potential voters, aiming to push the exact right buttons for the exact right people at the exact right times. . . .”

Supplementing the discussion about Cambridge Analytica, the program reviews information from FTR #718 about Facebook’s apparent involvement with elements and individuals linked to CIA and DARPA: ” . . . . Facebook’s most recent round of funding was led by a company called Greylock Venture Capital, who put in the sum of $27.5m. One of Greylock’s senior partners is called Howard Cox, another former chairman of the NVCA, who is also on the board of In-Q-Tel. What’s In-Q-Tel? Well, believe it or not (and check out their website), this is the venture-capital wing of the CIA. After 9/11, the US intelligence community became so excited by the possibilities of new technology and the innovations being made in the private sector, that in 1999 they set up their own venture capital fund, In-Q-Tel, which ‘identifies and partners with companies developing cutting-edge technologies to help deliver these solutions to the Central Intelligence Agency and the broader US Intelligence Community (IC) to further their missions’. . . .”

More about the CIA/DARPA links to the development of Facebook: ” . . . . The second round of funding into Facebook ($US12.7 million) came from venture capital firm Accel Partners. Its manager James Breyer was formerly chairman of the National Venture Capital Association, and served on the board with Gilman Louie, CEO of In-Q-Tel, a venture capital firm established by the Central Intelligence Agency in 1999. One of the company’s key areas of expertise are in ‘data mining technologies’. Breyer also served on the board of R&D firm BBN Technologies, which was one of those companies responsible for the rise of the internet. Dr Anita Jones joined the firm, which included Gilman Louie. She had also served on the In-Q-Tel’s board, and had been director of Defence Research and Engineering for the US Department of Defence. She was also an adviser to the Secretary of Defence and overseeing the Defence Advanced Research Projects Agency (DARPA), which is responsible for high-tech, high-end development. . . .”

Program Highlights Include: Review of Facebook’s plans to use brain-to-computer technology to operate its platform, thereby the enabling of recording and databasing people’s thoughts; Review of Facebook’s employment of former DARPA head Regina Dugan to implement the brain-to-computer technology; Review of Facebook’s building 8–designed to duplicate DARPA; Review of Facebook’s hiring of the Atlantic Council to police the social medium’s online content; Review of Facebook’s partnering with Narendra Modi’s Hindutva fascist government in India; Review of Facebook’s emloyment of Ukrainian fascist Kateryna Kruk to manage the social medium’s Ukrainian content.


FTR #1076 Surveillance Valley, Part 2: Mauthausen on Our Mind

The program begins with recap of the adaptation of IBM’s Hollerith machines to Nazi data compilation. (We concluded FTR #1075 with discussion of this.): ” . . . . Germany’s vast state bureaucracy and its military and rearmament programs, including the country’s growing concentration camp/slave labor system, also required data processing services. By the time the U.S. officially entered the war in 1941, IBM’s German subsidiary had grown to employ 10,000 people and served 300 different German government agencies. The Nazi Party Treasury; the SS; the War Ministry; the Reichsbank; the Reichspost; the Armaments Ministry; the Navy, Army and Air Force; and the Reich Statistical Office — the list of IBM’s clients went on and on.

” ‘Indeed, the Third Reich would open startling statistical venues for Hollerith machines never before instituted — perhaps never before even imagined,’ wrote Edwin Black in IBM and the Holocaust, his pioneering 2001 exposé of the forgotten business ties between IBM and Nazi Germany. ‘In Hitler’s Germany, the statistical and census community, overrun with doctrinaire Nazis, publicly boasted about the new demographic breakthroughs their equipment would achieve.’ . . . .

“Demand for Hollerith tabulators was so robust that IBM was forced to open a new factory in Berlin to crank out all the new machines. At the facility’s christening ceremony, which was attended by a top U.S. IBM executive and the elite of the Nazi Party, the head of IBM’s German subsidiary gave a rousing speech about the important role that Hollerith tabulators played in Hitler’s drive to purify Germany and cleanse it of inferior racial stock. . . .”

In that same article, Yasha Levine notes that the Trump administration’s proposed changes in the 2020 census sound as though they may portend something akin to the Nazi census of 1933: ” . . . . Based on a close reading of internal Department of Commerce documents tied to the census citizen question proposal, it appears the Trump administration wants to use the census to construct a first-of-its-kind citizenship registry for the entire U.S. population — a decision that arguably exceeds the legal authority of the census. ‘It was deep in the documentation that was released,’ Robert Groves, a former Census Bureau director who headed the National Academies committee convened to investigate the 2020 census, told me by telephone. ‘No one picked up on it much. But the term ‘registry’ in our world means not a collection of data for statistical purposes but rather to know the identity of particular people in order to use that knowledge to affect their lives.’ Given the administration’s posture toward immigration, the fact that it wants to build a comprehensive citizenship database is highly concerning. To Groves, it clearly signals ‘a bright line being crossed.’ . . .”

In the conclusion to Surveillance Valley, Yasha Levine notes how IBM computing technology facilitated the Nazi slave labor operations throughout the Third Reich. The epicenter of this was Mauthausen.

The systematic use of slave labor was central to Nazi Germany’s industrial infrastructure: ” . . . . But in the 1930s, Mauthausen had been a vital economic engine of Hitler’s genocidal plan to remake Europe and the Soviet Union into his own backyard utopia. It started out as a granite quarry but quickly grew into the largest slave labor complex in Nazi Germany, with fifty sub-camps that spanned most of modern-day Austria. Here, hundreds of thousands of prisoners–mostly European Jews but also Roma, Spaniards, Russians, Serbs, Slovenes, Germans, Bulgarians, even Cubans–were worked to death. They refined oil, built fighter aircraft, assembled cannons, developed rocket technology, and were leased out to private German businesses. Volkswagen, Siemens, Daimler-Benz, BMW, Bosch–all benefited from the camp’s slave labor pool. Mauthausen, the administrative nerve center, was centrally directed from Berlin using the latest in early computer technology: IBM punch card tabulators. . . .”

Mauthausen’s IBM machines were, in turn, central to German industry’s use of slave labor: ” . . . . the camp had several IBM machines working overtime to handle the big churn of inmates and to make sure there were always enough bodies to perform the necessary work. These machines didn’t operate in isolation but were part of a larger slave labor control-and-accounting system that stretched across Nazi-occupied Europe connecting Berlin to every major concentration and labor punch card, telegraph, telephone, and human courier. This wasn’t the automated type of computer network system that the Pentagon would begin to build in the United States just a decade later, but it was an information network nonetheless: an electromechanical web that fueled and sustained Nazi Germany’s war machine with blazing efficiency. It extended beyond the labor camps and reached into the cities and towns, crunching mountains of genealogical data to track down people with even the barest whiff of Jewish blood or perceived racial impurity in a mad rush to fulfill Adolf Hitler’s drive to purify the German people, but they made the Nazi death machine run faster and more efficiently, scouring the population and tracking down victims in ways that would never have been possible without them. . . .”

In his book–one of the most important in recent memory–Yasha Levine sets forth vital, revelatory information about the development and functioning of the Internet.

Born of the same overlapping DARPA projects that spawned Agent Orange, the Internet was never intended to be something good. Its generative function and purpose is counter-insurgency. ” . . . . In the 1960s, America was a global power overseeing an increasingly volatile world: conflicts and regional insurgencies against US-allied governments from South America to Southeast Asia and the Middle East. These were not traditional wars that involved big armies but guerilla campaigns and local rebellions, frequently fought in regions where Americans had little previous experience. Who were these people? Why were they rebelling? What could be done to stop them? In military circles, it was believed that these questions were of vital importance to America’s pacification efforts, and some argued that the only effective way to answer them was to develop and leverage computer-aided information technology. The Internet came out of this effort: an attempt to build computer systems that could collect and share intelligence, watch the world in real time, and study and analyze people and political movements with the ultimate goal of predicting and preventing social upheaval. . . .”

In this landmark volume, Levine makes numerous points, including:

1.–The harvesting of data by intelligence services is PRECISELY what the Internet was designed to do in the first place.
2.–The harvesting of data engaged in by the major tech corporations is an extension of the data gathering/surveillance that was–and is–the raison d’etre for the Internet in the first place.
3.–The big tech companies all collaborate with the various intelligence agencies they publicly scorn and seek to ostensibly distance themselves from.
4.–Edward Snowden, the Electronic Frontier Foundation, Jacob Appelbaum, the milieu of the Tor Network and WikiLeaks are complicit in the data harvesting and surveillance.
5.–Snowden and other privacy activists are double agents, consciously channeling people fearful of having their communications monitored into technologies that will facilitate that surveillance!

The program notes that counterinsurgency–the functional context of the origin of the Internet–is at the foundation of the genesis of Nazism. At the conclusion of World War I, Germany was beset by a series of socialist/Communist uprisings in a number of cities, including Munich. Responding to that, underground Reichswehr units commanded by Ernst Rohm (later head of the SA) systematically assassinated the leaders of the revolution, as well as prominent social democrats and Jews, such as Walther Rathenau. In Munich, an undercover agent for the political department of the Reichswehr under General Von Lossow infiltrated the revolutionaries, pretending to be one of them.

Following the crushing of the rebellion and occupation of the city by Reichswehr units, that infiltrator identified the leaders of the revolution, who were then summarily executed. The infiltrator’s name was Adolf Hitler.

After the suppression of the rebellion, Hitler, Rohm and undercover Reichswehr agents infiltrated a moribund political party and turned it into an intelligence front for the introduction of the supposedly de-mobilized German Army into German society for the purpose of generating political reaction. That front was the German National Social Workers Party.

The broadcast re-capitulates (from part of Miscellaneous Archive Show M11) Hitler’s speech to the Industry Club of Dusseldorf. This speech, which won the German industrial and financial elite over to the cause of the Nazi Party, equated democracy with Communism.

Manifesting a Social Darwinist perspective, Hitler opined that the [assembled] successful, accomplished were, by definition superior to others. If those, by definition, inferior people were allowed to control the political process, they would structure the social and economic landscape to their own benefit.

This, according to Hitler, would be counter-evolutionary.


FTR #1075 Surveillance Valley, Part 1: Eugenics, Racism and High Tech

Beginning a critically important series on a vitally important book titled Surveillance Valley: The Secret Military History of the Internet, this program explores the genesis of high tech and data processing, an origin that is inextricably linked with eugenics, anti-immigrant doctrine and–as is characteristic of fascism, the fear of the ubiquitous, malevolent “other.”

Highlights of discussion and analysis include:

1.–The genesis of high tech was Herman Hollerith’s tabulating machine. ” . . . . A few years earlier, working for the U.S. Census Bureau, Hollerith had developed the world’s first functional mass-produced computer: the Hollerith tabulator. An electromechanical device about the size of large desk and dresser, it used punch cards and a clever arrangement of gears, sorters, electrical contacts, and dials to process data with blazing speed and accuracy. What had taken years by hand could be done in a matter of months. As one U.S. newspaper described it, ‘with [the device’s] aid some 15 young ladies can count accurately half a million of names in a day.’ . . .’
2.–Hollerith’s machine found its (arguably) greatest application with the compilation of the census and the application of the pseudo-science of eugenics to it: ” . . . . Grasping about for solutions, many settled on various strains of race science quackery. So-called social Darwinists relied on a twisted version of the theory of evolution to explain why the poor and marginalized should remain that way while the wealthy and successful deserved to rule unchallenged. Taking this notion a step further, adherents of eugenics fervently believed that naturally superior Anglo-Americans were on the verge of being wiped out due to the high birth rates of ‘degenerate’ and immigrant stock. To head off this threat, they advocated strict controls on reproduction — breeding humans for quality in the same way that farmers did cows and horses. . . .”
3.–Hollerith’s machine was seen as the perfect vehicle for realizing eugenic practice through refining the census: ” . . . . The census had been a racial instrument from its inception, beginning with the original constitutional clause that instructed census officials to count black slaves separately from whites and to assign them a value of only three-fifths of a person. With each decade, new ‘racial’ categories were invented and added to the mix: ‘free colored males and females’ and ‘mulatto’ were counted, including subdivisions like including ‘quadroon’ and ‘octoroon.’ Categories for Chinese, ‘Hindoo,’ and Japanese were added, as were ‘foreign’ and ‘native born’ designations for whites. The census slowly expanded to collect other demographic data, including literacy levels, unemployment statistics, and medical ailments, such as those who were ‘deaf, dumb, and blind’ and the ‘insane and idiotic.’ All of it was broken down by race. . . .The census needed to improve drastically. What it needed was a talented inventor, someone young and ambitious who would be able to come up with a method to automate tabulation and data analysis. Someone like Herman Hollerith. . . .”
4.–Hollerith’s technology–when applied to the census, anticipated the mass surveillance technology of the internet: ” . . . . Overnight, Hollerith’s tabulator technology had transformed census taking from a simple head count into something that looked very much like a crude form of mass surveillance. To the race-obsessed political class, it was a revolutionary development. They could finally put the nation’s ethnic makeup under the microscope. The data seemed to confirm the nativists’ worst fears: Poor, illiterate immigrants were swarming America’s cities, breeding like rabbits, and outstripping native Anglo-American birth rates. Immediately following the census, the states and the federal government passed a flurry of laws that heavily restricted immigration. . . .”
5.–As discussed in FTR #279, IBM’s Hollerith machines (acquired when Thomas J. Watson bought out Hollerith) were fundamental to the operations of the Third Reich: ” . . . . ‘Indeed, the Third Reich would open startling statistical venues for Hollerith machines never before instituted — perhaps never before even imagined,’ wrote Edwin Black in IBM and the Holocaust, his pioneering 2001 exposé of the forgotten business ties between IBM and Nazi Germany. ‘In Hitler’s Germany, the statistical and census community, overrun with doctrinaire Nazis, publicly boasted about the new demographic breakthroughs their equipment would achieve.’ . . . Demand for Hollerith tabulators was so robust that IBM was forced to open a new factory in Berlin to crank out all the new machines. At the facility’s christening ceremony, which was attended by a top U.S. IBM executive and the elite of the Nazi Party, the head of IBM’s German subsidiary gave a rousing speech about the important role that Hollerith tabulators played in Hitler’s drive to purify Germany and cleanse it of inferior racial stock. . . .”
6.–The Trump administration’s framing of questions for the 2020 census appear aimed at creating a “national registry”–a concept reminiscent of the Third Reich’s use of IBM’s Hollerith-collected data: ” . . . . Based on a close reading of internal Department of Commerce documents tied to the census citizen question proposal, it appears the Trump administration wants to use the census to construct a first-of-its-kind citizenship registry for the entire U.S. population — a decision that arguably exceeds the legal authority of the census. ‘It was deep in the documentation that was released,’ Robert Groves, a former Census Bureau director who headed the National Academies committee convened to investigate the 2020 census, told me by telephone. ‘No one picked up on it much. But the term ‘registry’ in our world means not a collection of data for statistical purposes but rather to know the identity of particular people in order to use that knowledge to affect their lives.’ Given the administration’s posture toward immigration, the fact that it wants to build a comprehensive citizenship database is highly concerning. To Groves, it clearly signals ‘a bright line being crossed.’ . . .”


Birds of a Feather: The So-Called Internet “Privacy Activists,” the Intelligence Services and Big Tech

Yasha Levine’s recent book “Surveillance Valley” is a MUST READ! Relatively short and very much to the point, this volume–subtitled “The Secret Military History of the Internet”–chronicles the fact that the Internet is a weapon, developed as part of the same group of overlapping DARPA/Pentagon projects as Agent Orange. In posts and programs to come, we will more fully develop the basic themes set forth in the excerpt recapped in this post: 1 )The Internet is a weapon, developed for counter-insurgency purposes. 2) Big Tech firms network with the very intelligence services they publicly decry. 3) Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated. 4) The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect. 5) The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect. 6) The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose. 7) Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.


Agent Orange and the Internet: The Spawn of Project Agile

In his book–one of the most important in recent memory–Yasha Levine sets forth vital, revelatory information about the development and functioning of the Internet. Born of the same DARPA project that spawned Agent Orange, the Internet was never intended to be something good. Its generative function and purpose is counter-insurgency. In this landmark volume, Levine makes numerous points, including: The harvesting of data by intelligence services is PRECISELY what the Internet was designed to do in the first place. The harvesting of data engaged in by the major tech corporations is an extension of the data gathering/surveillance that was–and is–the raison d’etre for the Internet in the first place. The big tech companies all collaborate with the various intelligence agencies they publicly scorn and seek to ostensibly distance themselves from. Edward Snowden, the Electronic Frontier Foundation, Jacob Appelbaum and WikiLeaks are complicit in the data harvesting and surveillance. Snowden and other privacy activists are double agents, consciously channeling people fearful of having their communications monitored into technologies that will facilitate that surveillance!


FTR #890 Tracking from the Far Right: Update on the Adventures of Eddie the Friendly Spook

QUICK: Who said this?: “ ‘It seems like the [United States Dollar] and [Great Britain’s Pound] are both likely to go the way of the zim­babwe dol­lar,’ he sug­gested in March 2009. ‘Espe­cially with that cock­bag Bernanke decid­ing to mag­i­cally print 1.2T more dollars.’ . . . Obama was ‘plan­ning to devalue the cur­rency absolutely as fast as the­o­ret­i­cally pos­si­ble,’ he wrote. . . .” Ted Cruz? Donald Trump? Marco Rubio? Paul Ryan? Rand Paul? No, it is Edward Snowden. Note how this jibes with Paul Krugman’s description of the GOP primary field: ” . . . . After all, Paul Ryan, the speaker of the House, not only berated Ben Bernanke, Ms. Yellen’s predecessor, for policies that allegedly risked inflation (which never materialized), but he also dabbled in conspiracy theorizing, accusing Mr. Bernanke of acting to “bail out fiscal policy.” . . . But Wall Street isn’t the only source of malign pressure on the Fed, and in the actually existing U.S. political situation, such a bill would essentially empower the cranks — the gold-standard-loving, hyperinflation-is-coming types who dominate the modern G.O.P., and have spent the past five or six years trying to bully monetary policy makers into ceasing and desisting from their efforts to prevent economic disaster.” This program highlights the far-right, fascistic forces underlying Eddie the Friendly Spook. Much of the program consists of excerpts of past programs, stretching back to the late 1990’s. The electronic “vacuum cleaner” approach of NSA and GCHQ has been on the public record for years. In the 1990’s NSA, GCHQ and the ECHELON/Five Eyes network came under joint assault by Germany and the Free Congress Foundation. The latter is very close to Nazi alumni of the Third Reich, the OUN/B in particular, and is an element deeply involved in projecting the Anti-Bolshevik Bloc of Nations back into the former U.S.S.R. and Eastern Europe. GOP bigwig Grover Norquist has been a vociferous opponent of NSA spying, as well as shepherding Muslim Brotherhood-linked elements in the United States. Program Highlights Include: Mr. Emory’s first post on “L’Affaire Snowden,” in which he wondered aloud what all the fuss was about, since this has been on the public record for years; review of the fact that other European countries do the same thing as NSA/GCHQ; Review of Snowden’s views on Social Security: ” . . . Snow­den wrote that the elderly ‘wouldn’t be fuck­ing help­less if you weren’t send­ing them fuck­ing checks to sit on their ass and lay in hos­pi­tals all day.’ ”


FTR #851 Technocratic Fascism and Post-Reaganoid Political Dementia: Update on the Adventures of Eddie the Friendly Spook

Updating “L’Affaire Snowden,” this program analyzes the fundamental political/ideological principles that unite Eddie the Friendly Spook (Snowden) with the corporate entities comprising “Big Tech.” Taking advantage of the notion that “government is bad, but corporations are good” (“post-Reaganoid political dementia”), many of the individuals and companies in the tech world are pursuing and achieving goals that are fundamentally antithetical to democratic principles. Fundamental to the discussion is a brilliant analysis by David Golumbia in “Uncomputing.org” that distills the essence of “technocratic fascism”–the political and social philosophy that unites “coders”–Snowden, Assange and hackers of all stripes–with the corporate giants of Big Tech. Building on a viewpoint similar to that expressed in “The Decline of the West,” by Oswald Spengler (a text fundamental to much of 20th century fascism), they contend that society is broken, the political process is broken, and therefore they have the right–expressed as “natural law”–to do whatever they think is best. Democratic polities are to have no say in their actions, regardless of the potential consequences for the members of those polities. They do not feel that they need “the consent of the governed.” Program highlights include: the presence at the exclusive elite gathering of the Bilderbergers of key Silicon Valley techies including Peter Thiel and Alex Karp of Palanthir; review of the relationship between Ron Paul–Snowden’s political idol–and Thiel; the presence of Third Reich alumni in the Bilderberger gatherings; the anti-labor practices of Big Tech; the role of Big Tech in financing extreme right candidates like Ted Cruz; the drive by the Indian government of Narendra Modi (whose election was aided by EBay’s Pierre Omidyar) to undermine India’s laws against child labor, a synoptic overview of the key elements of our analysis of The Adventures of Eddie the Friendly Spook.


Update on Eddie the Friendly Spook’s Economic Warfare against the U.S.

Snowden–whom we think is being directed by BND (as well as by an element of CIA)–engaged in his “op” in order to justify a pre-arranged economic offensive against the American IT sector. As we noted in our series on Eddie the Friendly Spook, the Snowden “op” is an act of economic and political warfare against the United States. Now, we note an article that chronicles serious damage to the U.S. high-tech economy as a result of Snowden’s “op.”


Update on The Adventures of Eddie the Friendly Spook

Updating our long, detailed discussion of The Adventures of Eddie the Friendly Spook [Snowden] aka “The Peach Fuzz Fascist”, we note a number of things, including: more information that Snowden’s so-called “disclosures” were actually intended to justify a pre-arranged German, EU and Brazilian IT economic warfare offensive against the United States; Snowden’s consummate hypocrisy in disclosing information to Nazi fellow-travelers Glenn Greenwald and Julian Assange that neither should possess; Greenwald’s flacking for the Muslim Brotherhood; German protege and Luxembourg EU Commissioner Viviane Reding’s championing of an EU intelligence agency designed to do exactly what the hypocritical EU complains about when done by the NSA and GCHQ; the recent (declined) offer of inclusion of Germany into the Five Eyes Club; Palantir’s role in spying on Facebook users for the military.


Edward Snowden, Unplugged: The Elderly “Wouldn’t be Fucking Helpless If You Weren’t Sending Them Fucking Checks to Sit on their Ass and Lay in Hospitals all Day”

Excerpting some of Snowden’s 2009 online musings–crafted during the same time period in which he decided to leak NSA documents–gives us insight into his true nature. We’ve mentioned Snowden’s embrace of the gold standard, belief that we should eliminate Social Security and deep affinity for Ron Paul. Perhaps examining his actual pronouncements will prove educational. Snowden [at right] is a nasty little fascist. People should carefully consider the rest of his behavior in the context of his ideological statements.