Spitfire List Web site and blog of anti-fascist researcher and radio personality Dave Emory.
The tag 'Facebook' is associated with 66 posts.

Latest Patreon Talk: Russian “Interference” in 2016 Election–A Dog That Won’t Hunt

Exem­pli­fy­ing the dis­in­for­ma­tion sur­round­ing Ukraine, Rus­sia et al is the remark­able charge that Putin/Russia influ­enced the out­come of the 2016 elec­tion. Hillary Clin­ton got almost three mil­lion more votes than Don­ald Trump. Putin/Russia did not cre­ate the elec­toral col­lege. Face­book posts from Rus­sia were 40,000 out of 3 tril­lion posts–a few hun­dreds of one per­cent of the posts in that peri­od. THAT influ­enced the elec­tion?!! Cam­bridge Ana­lyt­i­ca, Peter Thiel, Face­book, Palan­tir helped keep poten­tial Clin­ton vot­ers at home, tar­get­ing poten­tial Sanders vot­ers. Ukrain­ian tele­vi­sion anchor quotes Adolf Eich­mann ver­ba­tim in this video from UKRAINE 24. WFMU-FM is pod­cast­ing For The Record–You can sub­scribe to the pod­cast HERE. Mr. Emory emphat­i­cal­ly rec­om­mends that listeners/readers get the 32GB flash dri­ve con­tain­ing all of Mr. Emory’s 43 years on the air, plus a library of old anti-fas­cist books on easy-to-down­load PDF files.


Who Are the Brain Police? Facebook’s Building 8 and The End of Our Civilization

In FTR#718, we not­ed the intel­li­gence com­mu­ni­ty and fas­cist under­pin­nings of the gen­e­sis of Face­book, includ­ing the cen­tral role of Peter Thiel in the fir­m’s begin­ning. In numer­ous pro­grams since, we have chron­i­cled the anti-demo­c­ra­t­ic and fas­cist man­i­fes­ta­tions of Face­book, includ­ing the com­pa­ny’s deci­sive role in the Cam­bridge Ana­lyt­i­ca gam­bit, in which ele­ments of Peter Thiel’s Palantir–the Alpha preda­tor of the elec­tron­ic sur­veil­lance landscape–helped to “game” the 2016 elec­tion in favor of Trump. With con­tem­po­rary dis­cus­sion of attempts to “rein-in” Big Tech, we are remind­ed of an ele­ment of dis­cus­sion in FTR#1021, among oth­er pro­grams. Although she has left the com­pa­ny, for­mer DARPA chief Regi­na Dugan was work­ing on a Face­book project to oper­ate the social media plat­form by uti­liz­ing brain-to-com­put­er inter­face. This work was under­way at Face­book’s “secre­tive” R & D Build­ing 8, described as pat­terned after DARPA itself. This dis­turb­ing detail sug­gests that the fir­m’s sig­nif­i­cant nation­al secu­ri­ty con­nec­tions may well embrace the advanc­ing of mil­i­tary research per se. As we not­ed, this tech­nol­o­gy will per­mit the tap­ping and data­bas­ing of Face­book users’ thoughts!


“FascisBook” Update

In FTR#718, we not­ed the intel­li­gence com­mu­ni­ty and fas­cist under­pin­nings of the gen­e­sis of Face­book, includ­ing the cen­tral role of Peter Thiel in the fir­m’s begin­ning. In numer­ous pro­grams since, we have chron­i­cled the anti-demo­c­ra­t­ic and fas­cist man­i­fes­ta­tions of Face­book, includ­ing the com­pa­ny’s deci­sive role in the Cam­bridge Ana­lyt­i­ca gam­bit, in which ele­ments of Peter Thiel’s Palantir–the Alpha preda­tor of the elec­tron­ic sur­veil­lance landscape–helped to “game” the 2016 elec­tion in favor of Trump. Updat­ing that cov­er­age, we note that an enor­mous Face­book bot farm, decep­tive­ly not­ed as “Russ­ian,” was assem­bled to swing the 2020 elec­tion to Don­ald Trump. ” . . . . Accord­ing to Paul Bischoff of Com­par­itech, a British cyber­se­cu­ri­ty com­pa­ny, the net­work includes 13,775 unique Face­book accounts that each post­ed rough­ly 15 times per month, for an out­put of more than 50,000 posts a week. The accounts appear to have been used for ‘polit­i­cal manip­u­la­tion,’ Bischoff says, with rough­ly half the posts being relat­ed to polit­i­cal top­ics and anoth­er 17 per­cent relat­ed to COVID-19. . . .” Face­book has also imple­ment­ed a low-pro­file, high-dol­lar finan­cial sup­port pro­gram for major news out­lets that have suf­fered because of Face­book’s incur­sion into the infor­ma­tion busi­ness. ” . . . . Less well known, and poten­tial­ly far more dan­ger­ous, is a secre­tive, mul­ti­mil­lion-dol­lar-a-year pay­out scheme aimed at the most influ­en­tial news out­lets in Amer­i­ca. Under the cov­er of launch­ing a fea­ture called Face­book News, Face­book has been fun­nel­ing mon­ey to The “New York Times”, “The Wash­ing­ton Post”, “The Wall Street Jour­nal’, ‘ABC News’, ‘Bloomberg’, and oth­er select paid part­ners since late 2019. . .”


Thiel and Bannon: “Yellow Peril” in Silicon Valley

Peter Thiel–lynchpin of pow­er in the Trump admin­is­tra­tion, the top dog in Palan­tir (the alpha preda­tor of the elec­tron­ic sur­veil­lance milieu), a key play­er in Facebook–has dis­sem­i­nat­ed anti-Chi­nese vit­ri­ol about the “yel­low per­il” in Sil­i­con Val­ley. He has been joined in that effort by Steve Ban­non, a coor­di­na­tor of anti-Chi­na activ­i­ty in Wash­ing­ton D.C. Ban­non’s state­ments and actions are par­tic­u­lar­ly iron­ic in light of his cyn­i­cal use of rem­nants of “the old Chi­na” in his “Gold Farm­ing” busi­ness the first decade of this cen­tu­ry. “. . . . From 2007 to 2012, he had been the CEO of a mul­ti­mil­lion-dol­lar video-game gold-farm­ing scheme. “Gold farm­ing” was a term for let­ting third-world labor­ers to do; the same repet­i­tive tasks in mas­sive­ly mul­ti­play­er online role-play­ing games (MORPGs) to acquire in-game cur­ren­cy. . . . . The self-pro­claimed anti-glob­al­ist Ban­non ran the scheme by sub­con­tract­ing Chi­nese labor. Accord­ing to Wired writer Julian Dibbel, who vis­it­ed one of the Chi­nese busi­ness part­ners who employed min­ers for Bannon’s com­pa­ny in 2009, the dig­i­tal labor­ers “slept upstairs on ply­wood bunks, day-shift work­ers sat in the hot, dim­ly-lit work­shop.” They earned about four dol­lars a day with eighty-four-hour work­weeks. . . .”


FTR #1083 AOC and The Immigrant “Psy-Op”: More about Socialists for Trump and Hitler (“The Assistance”)

Resum­ing analy­sis of AOC’s high­ly ques­tion­able cre­den­tials, we note the shady cir­cum­stances of her vic­to­ry over long-time incum­bent Joe Crow­ley: ” . . . . she cap­i­tal­ized on an extreme­ly low pri­ma­ry turnout to eek out a 57% vs. 43% (15,897 vs. 11,761) vic­to­ry. And while it is true that the young can­di­date deployed an impres­sive grass­roots can­vass­ing strat­e­gy, the dev­il is in the details— includ­ing dirty local pol­i­tics, vit­ri­olic cam­paign rhetoric, far left agi­ta­tors, and an inten­sive Face­book adver­tis­ing blitz in the lead up to the pri­ma­ry. . . .”

She drew on the sup­port of dis­graced and con­vict­ed abuser Hiram Mon­ser­rate, and deflect­ed crit­i­cism with her stan­dard retreat into iden­ti­ty pol­i­tics: ” . . . . Part of the local con­tro­ver­sy revolved around the involve­ment of dis­graced ex-Queens politi­cian Hiram Mon­ser­rate. A domes­tic abuser who spent time in prison on a cor­rup­tion con­vic­tion, Mon­ser­rate has feud­ed with Crow­ley for years. Dur­ing their con­tentious pri­ma­ry, Crow­ley accused Oca­sio-Cortez of seek­ing sup­port from the ex-con, even speak­ing at an event held at a Demo­c­rat Club he runs in Queens. . . . Mon­ser­rate told the New York Post ‘there were a group of us, in the (club) and oth­er com­mu­ni­ty activists I have been work­ing with for years who under­stood that we would do our part to get rid of Joe Crowley…We were in sup­port of Alexandria’s cam­paign.’ . . . .”

In our series on Sur­veil­lance Val­ley (FTR #‘s 1075 through 1081) we not­ed that the Inter­net is an infor­ma­tion weapon, con­ceived in the con­text of coun­terin­sur­gency and solid­i­fied in appli­ca­tions of counter-democ­ra­cy. The rise and oper­a­tions of AOC are inex­tri­ca­bly linked with the Inter­net, social media, in par­tic­u­lar.

AOC’s cam­paign drew on Inter­net resources, and inter­ests out­side of her dis­trict: ” . . . . In fact, the vast major­i­ty of Oca­sio-Cortez cam­paign dona­tions have come from out-of-dis­trict and out-of-state. Of par­tic­u­lar note is Blue Amer­i­ca PAC, a “col­lab­o­ra­tion between the authors/publishers of DownWithTyranny.com, Hullabaloo.com and CrooksandLiars.com.” The PAC made an $11,000 inde­pen­dent expen­di­ture in oppo­si­tion to Joe Crow­ley, cre­at­ing the web­site QueensAgainstCrowley.com. . . . The meme-heavy social media pages for the PAC’s var­i­ous web­sites pushed out vit­ri­olic blog and social media posts dur­ing the pri­ma­ry, using bud­get graph­ics with British-Eng­lish copy to pro­mote hash­tags like #Abol­ishICE #Berniewould­have­won and #Mob­Boss­Crow­ley. . . .”

Draw­ing momen­tum, in part, from for­eign trolls and bots, AOC’s sig­na­ture “Abol­ish Ice” cam­paign plays right into the hands of Team Trump and the racist/xenophobic right. ” . . . . . For any­one engag­ing with Oca­sio-Cortez’ social media posts, the for­eign bot and troll activ­i­ty is notice­ably syn­chro­nized and per­va­sive. There’s no bet­ter exam­ple than the #Abol­ishICE cam­paign she cham­pi­oned as her num­ber one pri­ma­ry issue and has helped take nation­al. Much of her social media con­tent has focused on the “Abol­ish ICE solu­tion” to immi­gra­tion reform while accus­ing “Boss Crow­ley” and oth­er Democ­rats of being “Pro-ICE”. In the one month lead up to the June pri­ma­ry, Oca­sio-Cortez’ cam­paign spent over $80,000 on Face­book adver­tis­ing — the largest of her expen­di­tures. . . .”

Next, we note AOC has quot­ed and defend­ed Eva Per­on. Although this may well just be anoth­er man­i­fes­ta­tion of iden­ti­ty pol­i­tics, it is worth not­ing that Eva Per­on (nee Eva Duarte) was a Nazi spy pri­or to, and dur­ing, World War II, and a Bormann/Vatican agent after that:

” . . . . . . . .The all-con­quer­ing Evi­ta left Spain for Rome on June 25, 1947. Father Ben­itez would smooth her way in the Vat­i­can with the aid of Bish­op Alois Hudal [one of the key mem­bers of the Vatican/Nazi “Rat­line”]. Two days after she arrived she was giv­en an audi­ence with pope Pius XII, spend­ing twen­ty min­utes with the Holy Father–“a time usu­al­ly allot­ted by Vat­i­can pro­to­col to queens.” How­ev­er, there was a more sin­is­ter side to the Rome trip. Using Bish­op Hudal as an inter­me­di­ary, she arranged to meet Bor­mann in an Ital­ian vil­la at Rapal­lo pro­vid­ed for her use by [Argen­tine ship­ping bil­lion­aire Alber­to] Dodero. The shipown­er was also present at the meet­ing, as was Eva’s broth­er Juan Duarte. There, she and her for­mer pay­mas­ter cut the deal that guar­an­teed that his Fuhrer’s safe haven would con­tin­ue to remain safe, and allowed Bor­mann to leave Europe at last for a new life in South Amer­i­ca. . . . ”

Next, the dis­cus­sion turns to Peter Thiel and his Palan­tir firm, the alpha preda­tor of the high-tech sur­veil­lance jun­gle. As we have seen and as we will review, there is rea­son to sus­pect that “Mr. AOC”–“Subhas Chan­dra” Chakrabarti–is a Thiel pro­tege.

Palan­tir is one of the firms piv­otal­ly involved with facil­i­tat­ing ICE’s activ­i­ties: ” . . . . The data­base cre­at­ed by Palan­tir uses infor­ma­tion pulled from the DHS, FBI and oth­er sources to build pro­files of peo­ple who have crossed the bor­der, includ­ing ‘school­ing, fam­i­ly rela­tion­ships, employ­ment infor­ma­tion, phone records, immi­gra­tion his­to­ry, for­eign exchange pro­gram sta­tus, per­son­al con­nec­tions, bio­met­ric traits, crim­i­nal records, and home and work address­es,’ the Inter­cept report­ed last year. . . . . Polic­ing soft­ware pro­vid­ed by Palan­tir and Foren­sic Logic’s COPLINK pro­gram enables Infor­ma­tion shar­ing between ICE and state and local law enforce­ment. . . . Palan­tir soft­ware has been imple­ment­ed by DHS fusion cen­ters across Cal­i­for­nia, as well as by police depart­ments in Los Ange­les, Long Beach, and Bur­bank; and sheriff’s depart­ments in Sacra­men­to, Ven­tu­ra, and Los Ange­les coun­ties. The com­pa­ny has received more than $50 mil­lion from these agen­cies since 2009, most­ly financed by DHS grants, the report shows. . . .”

We then review sub­stan­tive evi­dence of Thiel/Palantir/Chakrabarti net­work­ing:

1.–Chakrabarti worked for Bridge­wa­ter Asso­ciates: ” . . . . After grad­u­at­ing from Har­vard, Mr. Chakrabar­ti worked for a year as a tech­nol­o­gy asso­ciate at the hedge fund Bridge­wa­ter Asso­ciates, and then moved to Sil­i­con Val­ley to help found the tech­nol­o­gy com­pa­ny Stripe. . . .”
2.–Bridgewater Asso­ciates was a major source of the ven­ture cap­i­tal to launch Palan­tir.
3.–Former FBI direc­tor James Comey was the chief coun­sel for Bridge­wa­ter Asso­ciates. As FBI direc­tor, Comey was instru­men­tal in han­dling the elec­tion to Trump.
4.–It appears that Chakrabar­ti’s stint as head of prod­uct devel­op­ment at Stripe may well have been as a Thiel pro­tege.

Review­ing infor­ma­tion from past broad­casts, there are indi­ca­tions that the scape­goat­ing of ille­gal immi­grants by Team Trump is part of a “psy-op,” with AOC help­ing to gen­er­ate “black pro­pa­gan­da” by brand­ing the Demo­c­ra­t­ic Par­ty as “Ille­gal Immi­grants R Us.”

In FTR #718, we warned [back in 2010] that Face­book was not the cud­dly lit­tle enti­ty it was per­ceived to be but a poten­tial engine of fas­cism enabling. Momen­tum for the remark­ably timed immi­grant car­a­van that became a focal point for Trump/GOP/Fox News pro­pa­gan­da dur­ing the 2018 midterm elec­tions was gen­er­at­ed by a fake Face­book account, which mim­ic­ked a Hon­duran politician/human rights activist, Bar­to­lo Fuentes. Sig­nif­i­cant aspects of the event:

1.–” . . . . Face­book has admit­ted the account was an imposter account imper­son­at­ing a promi­nent Hon­duran politi­cian. But it is refus­ing to release infor­ma­tion about the account, who may have set it up or what coun­try it orig­i­nat­ed from. . . .”
2.–” . . . . In response to a query from Buz­zFeed News, a Face­book spokesper­son said the pho­ny account ‘was removed for vio­lat­ing [the company’s] mis­rep­re­sen­ta­tion pol­i­cy,’ but declined to share any fur­ther infor­ma­tion, such as what coun­try it orig­i­nat­ed from, what email address was used to open it, or any oth­er details that might reveal who was behind it. Face­book added that, bar­ring a sub­poe­na or request from law enforce­ment, it does not share such infor­ma­tion out of respect for the pri­va­cy of its users. Fuentes said he believes it’s impor­tant to find out who was behind the rogue account — but hasn’t got­ten any answers from Face­book. ‘Who knows how many mes­sages could have been sent and who received them?’ . . . .”
4.–” . . . . Fuentes has been unable to get any infor­ma­tion from Face­book about the account, but one small detail stood out. Who­ev­er cre­at­ed it list­ed the Hon­duran cap­i­tal of Tegu­ci­gal­pa as Fuentes’s home­town, rather than the San Pedro Sula sub­urb of El Pro­gre­so. That might seem like a minor error, but it’s the sort of mis­take a for­eign­er — not a Hon­duran — would make about the well-known for­mer law­mak­er, whose left-wing par­ty stands in oppo­si­tion to the cur­rent president’s admin­is­tra­tion. . . . ”
5.–” . . . . It oper­at­ed entire­ly in Span­ish and pre­cise­ly tar­get­ed influ­encers with­in the migrant rights com­mu­ni­ty. And rather than crit­i­cize or under­mine the car­a­van — as oth­er online cam­paigns would lat­er attempt to do — it was used to legit­imize the event, mak­ing a loose­ly struc­tured grass­roots event appear to be a well-orga­nized effort by an estab­lished migrant group with a proven track record of suc­cess­ful­ly bring­ing Cen­tral Amer­i­can peo­ple to the US bor­der. . . .”
6.–” . . . . before the account got start­ed not many peo­ple seemed to be join­ing. Only after the account kicked into gear did enthu­si­asm and par­tic­i­pa­tion spike. The account also claimed false­ly that the car­a­van was being led by a migrant rights orga­ni­za­tion called Pueblo Sin Fron­teras. Lat­er, once the car­a­van swelled to a mas­sive scale, the Pueblo Sin Fron­teras did get involved, though in a sup­port rather than lead­er­ship role. . . .”
7.–” . . . . It appears that this account helped the car­a­van gain key momen­tum to the point where its size became a self-ful­fill­ing prophe­cy, spurring even more to join and groups which hadn’t been sup­port­ive to get involved. . . .”
8.–” . . . . It’s hard to believe one Face­book account could play that deci­sive a role. But the account seems to have been sophis­ti­cat­ed. And it is equal­ly dif­fi­cult to believe that a sophis­ti­cat­ed oper­a­tor or orga­ni­za­tion would have gone to such trou­ble and lim­it­ed their efforts to a sin­gle imposter account. . . .”

In the sum­mer of 2018, we high­light­ed the first degree mur­der charge laid against an “ille­gal” Mex­i­can migrant work­er fol­low­ing the dis­cov­ery of a deceased white Iowa col­lege girl Mol­lie Tib­betts. This became pro­pa­gan­da fod­der for Team Trump.

We note in this con­text that:

1.–The announce­ment of River­a’s arrest for the Tib­betts mur­der hap­pened on the same day that Paul Man­afort’s con­vic­tion was announced and Michael Cohen plead­ed guilty. Might we be look­ing at an “op,” intend­ed to eclipse the neg­a­tive pub­lic­i­ty from the the Manafort/Cohen judi­cial events?
2.–Rivera exhib­it­ed pos­si­ble symp­toms of being sub­ject­ed to mind con­trol, not unlike Sirhan Sirhan. ” . . . . Inves­ti­ga­tors say Rivera fol­lowed Mol­lie in his dark Chevy Mal­ibu as she went for a run around 7.30pm on July 18. He ‘blacked out’ and attacked her after she threat­ened to call the police unless he left her alone, offi­cers said. . . . It is not yet clear how Mol­lie died. . . . Rivera told police that after see­ing her, he pulled over and parked his car to get out and run with her. . . . Mol­lie grabbed her phone and threat­ened to call the police before run­ning off ahead. The sus­pect said that made him ‘pan­ic’ and he chased after her. That’s when he ‘blacked out.’ He claims he remem­bers noth­ing from then until he was back in his car, dri­ving. He then noticed one of her ear­phones sit­ting on his lap and blood in the car then remem­bered he’d stuffed her in the truck. . . . ‘He fol­lowed her and seemed to be drawn to her on that par­tic­u­lar day. For what­ev­er rea­son he chose to abduct her,’ Iowa Depart­ment of Crim­i­nal Inves­ti­ga­tion spe­cial agent Rick Ryan said on Tues­day after­noon. . . . ‘Rivera stat­ed that she grabbed her phone and said: ‘I’m gonna call the police.’ . . . . ‘Rivera said he then pan­icked and he got mad and that he ‘blocked’ his mem­o­ry which is what he does when he gets very upset and does­n’t remem­ber any­thing after that until he came to at an inter­sec­tion.’ . . .”
4.–Just as Sirhan had been in a right-wing milieu pri­or to the Robert Kennedy assas­si­na­tion, so, too, was Rivera: ” . . . . The promi­nent Repub­li­can fam­i­ly which owns the farm where Mol­lie Tib­betts’ alleged killer worked have insist­ed that he passed back­ground checks for migrant work­ers. Christhi­an Rivera, 24, who is from Mex­i­co, was charged with first degree mur­der on Tues­day after lead­ing police to a corn field where Mol­lie’s body was dumped. Dane Lang, co-own­er of Yarrabee Farms along with Eric Lang, con­firmed that Rivera had worked there for four years and was an employ­ee ‘of good stand­ing.’ Dane’s broth­er is Craig Lang, for­mer pres­i­dent of the Iowa Farm Bureau Fed­er­a­tion and the Iowa Board of Regents, and a 2018 Repub­li­can can­di­date for state sec­re­tary of agri­cul­ture. . . .”
5.–Trump cit­ed the Tib­betts mur­der in a Charleston, West Vir­ginia, ral­ly that day: ” . . . . Pres­i­dent Don­ald Trump chirped in dur­ing his Tues­day address at a ral­ly in Charleston, West Vir­ginia, blam­ing immi­gra­tion laws for Mol­lie’s death. ‘You heard about today with the ille­gal alien com­ing in very sad­ly from Mex­i­co,’ he said. ‘And you saw what hap­pened to that incred­i­ble beau­ti­ful young woman. ‘Should’ve nev­er hap­pened, ille­gal­ly in our coun­try. We’ve had a huge impact but the laws are so bad. The immi­gra­tion laws are such a dis­grace. ‘We are get­ting them changed but we have to get more Repub­li­cans.’ Gov. Kim Reynolds com­plained about the ‘bro­ken’ immi­gra­tion sys­tem that allowed a ‘preda­tor’ to live in her state. . . .”

In a tran­si­tion to our next pro­gram, we under­score the deci­sive role of Glenn Green­wald in paving the legal road for the real­iza­tion of the “Lead­er­less Resis­tance” strat­e­gy that dom­i­nates the con­tem­po­rary polit­i­cal land­scape.

We note in this con­text:

Cit­i­zen Green­wald’s views on immi­gra­tion echo those of Don­ald Trump: “ . . . . ‘The parade of evils caused by ille­gal immi­gra­tion is wide­ly known,’ Green­wald wrote in 2005. The facts, to him, were indis­putable: ‘ille­gal immi­gra­tion wreaks hav­oc eco­nom­i­cal­ly, social­ly, and cul­tur­al­ly; makes a mock­ery of the rule of law; and is dis­grace­ful just on basic fair­ness grounds alone.’ Defend­ing the nativist con­gress­man Tom Tan­cre­do from charges of racism, Green­wald wrote of ‘unman­age­ably end­less hordes of peo­ple [who] pour over the bor­der in num­bers far too large to assim­i­late, and who con­se­quent­ly have no need, moti­va­tion or abil­i­ty to assim­i­late.’ Those hordes, Green­wald wrote, posed a threat to ‘mid­dle-class sub­ur­ban vot­ers.’ . . . .”


FTR #1080 Surveillance Valley, Part 6: Double Agents, Part 2 (Foxes Guarding the Online Privacy Henhouse, Part 3)

In this pro­gram, we resume dis­cus­sion and analy­sis of the con­sum­mate­ly impor­tant recent book Sur­veil­lance Val­ley: The Secret Mil­i­tary His­to­ry of the Inter­net by Yasha Levine. In the pre­vi­ous pro­gram, we not­ed, among oth­er points of analy­sis, the deci­sive role of Eddie “The Friend­ly Spook” Snow­den in pro­mot­ing the intel­li­gence-agency craft­ed Tor net­work.

In addi­tion to Tor, the Open Tech­nol­o­gy Fund (read “CIA”) helped finance the Sig­nal app for mobile phones. It, too, is fun­da­men­tal­ly com­pro­mised. ” . . . . . . . . The Tor project remained the best-known pri­va­cy app fund­ed by the Open Tech­nol­o­gy Fund, but it was quick­ly joined by anoth­er: Sig­nal, an encrypt­ed mobile phone mes­sag­ing app for the iPhone and Android. . . .”

Not sur­pris­ing­ly, the CIA’s Eddie “The Friend­ly Spook” Snow­den was a big pro­mot­er of Sig­nal, as well as Tor: ” . . . . Peo­ple at the ACLU claimed that Sig­nal made fed­er­al agents weep. The Elec­tron­ic Fron­tier Foun­da­tion added Sig­nal along­side Tor to its Sur­veil­lance Self-Defense guide. Fight for the Future, a Sil­i­con Val­ley-fund­ed pri­va­cy activist orga­ni­za­tion, described Sig­nal and Tor as ‘NSA-proof’ and urged peo­ple to use them. Edward Snow­den was the com­bo’s biggest and most famous boost­er and repeat­ed­ly took to Twit­ter to tell his three mil­lion fol­low­ers that he used Sig­nal and Tor every day, and that they should do the same to pro­tect them­selves from gov­ern­ment sur­veil­lance. ‘Use Tor, Use Sig­nal,’ he tweet­ed out.

“With endorse­ments like these, Sig­nal quick­ly became the go-to app for polit­i­cal activists around the world. Egypt, Rus­sia, Syr­ia, and even the Unit­ed States—millions down­loaded Sig­nal, and it became the com­mu­ni­ca­tion app of choice for those who hoped to avoid police sur­veil­lance. Fem­i­nist col­lec­tives, anti-Pres­i­dent Don­ald Trump pro­test­ers, com­mu­nists, anar­chists, rad­i­cal ani­mal rights orga­ni­za­tions, Black Lives Mat­ter activists—all flocked to Sig­nal. Many were heed­ing Snow­den’s advice: ‘Orga­nize. Com­part­men­tal­ize to lim­it com­pro­mise. Encrypt every­thing, from calls to texts (use Sig­nal as a first step.)’ . . . .”

Yasha Levine sums up the fun­da­men­tal con­tra­dic­tions inher­ent  in this dynam­ic: ” . . . . If you stepped back to sur­vey the scene, the entire land­scape of this new Inter­net Free­dom pri­va­cy move­ment looked absurd. Cold War-era orga­ni­za­tions spun off from the CIA now fund­ing the glob­al move­ment against gov­ern­ment sur­veil­lance? Google and Face­book, com­pa­nies that ran pri­vate sur­veil­lance net­works and worked hand in hand with the NSA, deploy­ing gov­ern­ment-fund­ed pri­va­cy tech to pro­tect their users from gov­ern­ment sur­veil­lance? Pri­va­cy activists work­ing with Sil­i­con Val­ley and the US gov­ern­ment to fight gov­ern­ment surveillance—and with the sup­port of Edward Snow­den him­self? . . . .”

Fol­low­ing Snow­den’s pro­mo­tion of OTF’s Tor and Sig­nal tech­nolo­gies, OTF was at a zenith: ” . . . . After Edward Snow­den, OTF was tri­umphant. It did­n’t men­tion the leak­er by name in its pro­mo­tion­al mate­ri­als, but it prof­it­ed from the cryp­to cul­ture he pro­mot­ed and ben­e­fit­ed from his direct endorse­ment of the cryp­to tools it financed. It boast­ed that its part­ner­ship with both Sil­i­con Val­ley and respect­ed pri­va­cy activists meant that hun­dreds of mil­lions of peo­ple could use the pri­va­cy tools the US gov­ern­ment had brought to mar­ket. And OTF promised that this was just a start: ‘By lever­ag­ing social net­work effects, we expect to expand to a bil­lion reg­u­lar users tak­ing advan­tage of OTF-sup­port­ed tools and Inter­net Free­dom tech­nolo­gies by 2015. . . .’

As even­tu­al­ly became clear, the Tor net­work was eas­i­ly breached. It is a safe bet that the fas­cists grouped around the Pirate Bay site (on which Wik­iLeaks held forth), had breached Tor’s “secre­cy,” in addi­tion to the obvi­ous fact that intel­li­gence ser­vices could pen­e­trate it at will.

With this in mind, John Young’s rumi­na­tion about Wik­iLeaks sound more and more sub­stan­tive.

In all prob­a­bil­i­ty, Wik­iLeaks was a huge data min­ing oper­a­tion both by the very intel­li­gence agen­cies who were osten­si­bly tar­get­ed by Wik­iLeaks, and the Fas­cist Inter­na­tion­al net­work around Carl Lund­strom, Daniel Friberg, David Duke et al.

In FTR #‘s 756 and 831 we not­ed Snow­den’s fas­cist views and con­nec­tions. Levine mere­ly char­ac­ter­izes him as a “right-wing lib­er­tar­i­an,” but there is MUCH MORE TO IT THAN  THAT!

Snow­den down­played the fun­da­men­tal role of the Big Tech firms in aid­ing and abet­ting gov­ern­ment sur­veil­lance, in addi­tion to their own mas­sive sur­veil­lance and resul­tant data min­ing. ” . . . . There, while liv­ing under state pro­tec­tion at an undis­closed loca­tion in Moscow, he swept Sil­i­con Val­ley’s role in Inter­net sur­veil­lance under the rug. Asked about it by Wash­ing­ton Post reporter Bar­ton Gell­man, who had first report­ed on the NSA’s PRISM pro­gram, Snow­den shrugged off the dan­ger posed by com­pa­nies like Google and Face­book. The rea­son? Because pri­vate com­pa­nies do not have the pow­er to arrest, jail, or kill peo­ple. ‘Twit­ter does­n’t put war­heads on fore­heads,’ he joked. . . .”

Embody­ing his “cor­po­ratist” and Tech­no­crat­ic Fas­cist point of view, Snow­den cham­pi­oned the Big Tech firms as bul­warks against gov­ern­ment Inter­net sur­veil­lance, despite the only-too-obvi­ous fact (rein­forced by the doc­u­ments he leaked) that Big Tech is–and always has been–in bed with, and active­ly col­lab­o­rat­ing with, the very gov­ern­ment intel­li­gence agen­cies con­duct­ing that sur­veil­lance: ” . . . . The only islands of safe­ty were the pri­vate data cen­ters con­trolled by pri­vate companies—Google, Apple, Face­book. These were the cyber-fortress­es and walled cities that offered sanc­tu­ary to the mass­es. In this chaot­ic land­scape, com­put­er engi­neers and cryp­tog­ra­phers played the role of self­less gal­lop­ing knights and wiz­ard-war­riors whose job was to pro­tect the weak folk of the Inter­net: the young, the old and infirm, fam­i­lies. It was their duty to ride out, weapons aloft, and con­vey peo­ple and their pre­cious data safe­ly from fortress to fortress, not let­ting any of the infor­ma­tion fall into the hands of gov­ern­ment spies. He called on them to start a peo­ple’s pri­va­cy war, ral­ly­ing them to go forth and lib­er­ate the Inter­net, to reclaim it from the gov­ern­ments of the world. . . .”

The nau­se­at­ing head of Facebook–Mark Zuckerberg–has decried the intel­li­gence com­mu­ni­ty’s use of the Inter­net for data min­ing. In FTR #1077, we high­light­ed the Cam­bridge Ana­lyt­i­ca affair, and Face­book’s full coop­er­a­tion with that project at every turn.

Oth­er Big Tech firms had sim­i­lar reac­tions. “. . . . . ‘We had­n’t even heard of PRISM before yes­ter­day,’ Mark Zucker­berg wrote in a Face­book post. He blamed the gov­ern­ment and posi­tioned Face­book as a vic­tim. “I’ve called Pres­i­dent Oba­ma to express my frus­tra­tion over the dam­age the gov­ern­ment is cre­at­ing for all of our future. Unfor­tu­nate­ly, it seems like it will take a very long time for true full reform.’ Apple,  Microsoft, Google, and Yahoo! All react­ed in much the same way, deny­ing the alle­ga­tions and paint­ing them­selves as the vic­tims of gov­ern­ment over­reach. ‘It’s tremen­dous­ly dis­ap­point­ing that the gov­ern­ment sort of secret­ly did all this stuff and did­n’t tell us. We can’t have a democ­ra­cy if we’re hav­ing to pro­tect you and our users from the gov­ern­ment,’ Lar­ry Page told Char­lie Rose in an inter­view on CBS. . . . .”

We present the con­clu­sion of the main part of the book, with Levine’s sum­ma­tion of the inex­tri­ca­ble nature and sym­bio­sis between the Inter­net, the tech firms and the so-called “pri­va­cy com­mu­ni­ty.”

The key points of dis­cus­sion and analy­sis of Levine’s book (as a whole) include:

1.–The Inter­net is a weapon, devel­oped for counter-insur­gency pur­pos­es.
2.–Big Tech firms net­work with the very intel­li­gence ser­vices they pub­licly decry.
3.–Big Tech firms that data mine their cus­tomers on a near­ly unimag­in­able scale do so as a direct, oper­a­tional exten­sion of the very sur­veil­lance func­tion upon which  the Inter­net is pred­i­cat­ed.
4.–The tech­nolo­gies tout­ed by the so-called “Pri­va­cy Activists” such as Edward Snow­den and Jacob Apple­baum were devel­oped by the very intel­li­gence ser­vices they are sup­posed to deflect.
5.–The tech­nolo­gies tout­ed by the so-called “Pri­va­cy Activists” such as Edward Snow­den and Jacob Applebaum–such as the Tor Inter­net func­tion and the Sig­nal mobile phone app– are read­i­ly acces­si­ble to the very intel­li­gence ser­vices they are sup­posed to deflect.
6.–The orga­ni­za­tions that pro­mote the alleged virtues of Snow­den, Apple­baum, Tor, Sig­nal et al are linked to the very intel­li­gence ser­vices they would have us believe they oppose.
7.–Big Tech firms embrace “Inter­net Free­dom” as a dis­trac­tion from their own will­ful and all-embrac­ing data min­ing and their ongo­ing con­scious col­lab­o­ra­tion with the very intel­li­gence ser­vices they pub­licly decry.

NB: Mr. Levine does not go into the fascis­tic char­ac­ter of Snow­den, Assange, Green­wald et al. Some of those shows: Greenwald–FTR #888, Snowden–FTR #‘s 756, 831, Assange and WikiLeaks–FTR #‘s 732, 745, 755, 917.

“. . . . Then there was the fact that Sig­nal ran on Ama­zon’s servers, which meant that all its data were avail­able to a part­ner in the NSA’s PRISM sur­veil­lance pro­gram. Equal­ly prob­lem­at­ic, Sig­nal need­ed Apple and Google to install and run the app on peo­ple’s mobile phones. Both com­pa­nies were, and as far as we know still are, part­ners in PRISM as well. ‘Google usu­al­ly has root access to the phone, there’s the issue of integri­ty,’ writes Sander Ven­e­ma, a respect­ed devel­op­er and secure—technology train­er, in a blog post explain­ing why he no longer rec­om­mends peo­ple use Sig­nal for encrypt­ed chat. ‘Google is still coop­er­at­ing with the NSA and oth­er intel­li­gence agen­cies. PRISM is also still a thing. I’m pret­ty sure that Google could serve a spe­cial­ly mod­i­fied update or ver­sion of Sig­nal to spe­cif­ic tar­get for sur­veil­lance, and they would be none the wis­er that they installed mal­ware on their phones.’ . . .

. . . . So, although the app encrypt­ed the con­tent of peo­ple’s mes­sages, it also marked them with a flash­ing red sign: ‘Fol­low Me, I Have Some­thing to Hide.’ (Indeed, activists protest­ing at the Demo­c­ra­t­ic Nation­al Con­ven­tion in Philadel­phia in 2016 told me that they were bewil­dered by the fact that police seemed to know and antic­i­pate their every move despite their hav­ing used Sig­nal to orga­nize. . . .”

” . . . . For many Inter­net com­pa­nies, includ­ing Google and Face­book, sur­veil­lance is the busi­ness mod­el. It is the base on which their cor­po­rate and eco­nom­ic pow­er rests. Dis­en­tan­gle sur­veil­lance and prof­it, and these com­pa­nies would col­lapse. Lim­it data col­lec­tion, an the com­pa­nies would see investors flee and their stock prices plum­met. [Ital­ics are mine–D.E.]

“Sil­i­con Val­ley fears a polit­i­cal solu­tion to pri­va­cy. Inter­net Free­dom and cryp­to offer an accept­able alter­na­tive. Tools like Sig­nal and Tor pro­vide a false solu­tion to the pri­va­cy prob­lem, focus­ing people’s atten­tion on gov­ern­ment sur­veil­lance and dis­tract­ing them from the pri­vate spy­ing car­ried out by the Inter­net com­pa­nies they use every day. All the while, cryp­to tools give peo­ple a [false] sense that they’re doing some­thing to pro­tect them­selves, a feel­ing of per­son­al empow­er­ment and con­trol. And all those cryp­to rad­i­cals? Well, they just enhance the illu­sion, height­en­ing the impres­sion of risk and dan­ger. With Sig­nal or Tor installed, using an iPhone or Android sud­den­ly becomes edgy and rad­i­cal. So instead of push­ing for polit­i­cal and demo­c­ra­t­ic solu­tions to sur­veil­lance, we out­source our pri­va­cy pol­i­tics to cryp­to apps–software made by the very same pow­er­ful enti­ties that these apps are sup­posed to pro­tect us from. . . .”


FTR #1079 Surveillance Valley, Part 5: Double Agents (Foxes Guarding the Online Privacy Henhouse, Part 2)

Con­tin­u­ing with our exam­i­na­tion of Yasha Levine’s sem­i­nal vol­ume Sur­veil­lance Val­ley, we con­tin­ue our analy­sis of the indi­vid­u­als, insti­tu­tions and tech­nolo­gies cen­tral to the so-called “online pri­va­cy” effort. The Tor Project, the Elec­tron­ic Fron­tier Foun­da­tion, the Broad­cast­ing Board of Gov­er­nors and its Open Tech­nol­o­gy Fund and Jacob Appel­baum are all the oppo­site of what they have been rep­re­sent­ed as being.

We begin with infor­ma­tion over­lapped from our last pro­gram, high­light­ing how Jacob Appel­baum and the Tor net­work hooked up with Wik­iLeaks.

Tor, Appel­baum, Assange and Wik­iLeaks:

1.–Became increas­ing­ly inter­twined, enjoy­ing acco­lades from many, appar­ent­ly unsus­pect­ing, groups: ” . . . .  His [Appel­baum’s] asso­ci­a­tion with Wik­iLeaks and Assange boost­ed the Tor Pro­jec­t’s pub­lic pro­file and rad­i­cal cre­den­tials. Sup­port and acco­lades poured in from jour­nal­ists, pri­va­cy orga­ni­za­tions, and gov­ern­ment watch­dogs. The Amer­i­can Civ­il Lib­er­ties Union part­nered with Appel­baum on an Inter­net pri­va­cy project, and New York’s Whit­ney Museum—one of the lead­ing mod­ern art muse­ums in the world—invited him for a ‘Sur­veil­lance Teach-In.’ The Elec­tron­ic Fron­tier Foun­da­tion gave Tor its Pio­neer Award, and Roger Din­gle­dine made in on For­eign Pol­i­cy mag­a­zine’s Top 100 Glob­al Thinkers for pro­tect­ing ‘any­one and every­one from the dan­gers of Big Broth­er.’ . . . .”
2.– Dif­fered fun­da­men­tal­ly from the accept­ed text: ” . . . . With Julian Assange endors­ing Tor, reporters assumed that the US gov­ern­ment saw the anonymi­ty non­prof­it as a threat. But inter­nal doc­u­ments obtained through FOIA from the Broad­cast­ing Board of Gov­er­nors, as well as analy­sis of Tor’s gov­ern­ment con­tracts paint a dif­fer­ent pic­ture. They reveal that Appel­baum and Din­gle­dine worked with Assange on secur­ing Wik­iLeaks with Tor since late 2008 and that they kept their han­dlers at the BBG informed about their rela­tion­ship and even pro­vid­ed infor­ma­tion about the inner work­ings of Wik­iLeak­s’s secure sub­mis­sion sys­tem. . . .”
3.–Did not adverse­ly affect the gov­ern­ment fund­ing of Tor at all, as might be expect­ed by the super­fi­cial appar­ent real­i­ty of the sit­u­a­tion: ” . . . . Per­haps most telling was that sup­port from the BBG [read “CIA”–D.E.] con­tin­ued even after Wik­iLeaks began pub­lish­ing clas­si­fied gov­ern­ment infor­ma­tion and Appel­baum became the tar­get of a larg­er Depart­ment of Jus­tice inves­ti­ga­tion into Wik­iLeaks. For exam­ple, on July 31, 2010, CNET report­ed that Appel­baum had been detained at the Las Vegas air­port and ques­tioned about his rela­tion­ship with Wik­iLeaks. News of the deten­tion made head­lines around the world, once again high­light­ing Appel­baum’s close ties to Julian Assange. And a week lat­er, Tor’s exec­u­tive direc­tor Andrew Lew­man, clear­ly wor­ried that this might affect Tor’s fund­ing, emailed Ken Berman at the BBG in the hopes of smooth­ing things over and answer­ing ‘any ques­tions you may have about the recent press regard­ing Jake and Wik­iLeaks.’ But Lew­man was in for a pleas­ant sur­prise: Roger Din­gle­dine had been keep­ing folks at the BBG in the loop, and every­thing seemed to be okay. ‘Great stuff, thx. Roger answered a num­ber of ques­tions when he met us this week in DC,’ Berman replied. . . .”
4.–” . . . . In 2011 con­tracts came in with­out a hitch–$150,000 from the Broad­cast­ing Board of Gov­er­nors and $227,118 from the State Depart­ment. Tor was even able to snag a big chunk of mon­ey from the Pen­ta­gon: a new $503,706 annu­al con­tract from the Space and Naval War­fare Sys­tems Com­mand, an elite infor­ma­tion and intel­li­gence unit that hous­es a top-secret cyber-war­fare division.The Navy was passed through SRI, the old Stan­ford mil­i­tary con­trac­tor that had done coun­terin­sur­gency, net­work­ing, and chem­i­cal weapons work for ARPA back in the 1960s and 1970s. The funds were part of a larg­er Navy ‘Com­mand, Con­trol, Com­munca­tions, Com­put­ers, Intel­li­gence, Sur­veil­lance, and Recon­nais­sance’ pro­gram to improve mil­i­tary oper­a­tions. A year lat­er, Tor would see its gov­ern­ment con­tracts more than dou­ble to $2.2 mil­lion: $353,000 from the State Depart­ment, $876,099 from the US Navy, and $937,800 from the Broad­cast­ing Board of Gov­er­nors. . . .”

In this con­text, we recall some ear­li­er obser­va­tions about Wik­iLeaks. John Young, one of Wik­iLeaks’ founders turned crit­ic of the orga­ni­za­tion har­bors deep sus­pi­cions con­cern­ing the group. ” . . . they’re act­ing like a cult. They’re act­ing like a reli­gion. They’re act­ing like a gov­ern­ment. They’re act­ing like a bunch of spies. They’re hid­ing their iden­ti­ty. They don’t account for the mon­ey. They promise all sorts of good things. They sel­dom let you know what they’re real­ly up to. . .There was sus­pi­cion from day one that this was entrap­ment run by some­one unknown to suck a num­ber of peo­ple into a trap. So we actu­al­ly don’t know. But it’s cer­tain­ly a stan­dard coun­ter­in­tel­li­gence tech­nique. And they’re usu­al­ly pret­ty elab­o­rate and pret­ty care­ful­ly run. They’ll even pros­e­cute peo­ple as part of the cov­er sto­ry. That actu­al­ly was talked about at (Sunday’s) pan­el. They’ll try to con­ceal who was inform­ing and betray­ing oth­ers by pre­tend­ing to pros­e­cute them. . . .” The Tor/Appelbaum/BBG (read “CIA”)/WikiLeaks nexus may very well be proof of Young’s sus­pi­cions.

Appel­baum, Wik­iLeaks and Tor became fun­da­men­tal to the oper­a­tions of Eddie “The Friend­ly Spook” Snow­den. In past dis­cus­sion, we have not­ed that in the sum­mer of 2009, when Snow­den made his deci­sion to dis­close the NSA doc­u­ments, he was work­ing for the very same CIA from which the Broad­cast­ing Board of Gov­er­nors and its Open Tech­nol­o­gy Fund were derived. Jacob Appel­baum was fund­ed by BBG, as was Tor. ” . . . . From the start, the Tor Project stood at the cen­ter of Snow­den’s sto­ry. The leak­er’s endorse­ment and pro­mo­tion intro­duced the project to a glob­al audi­ence, boost­ing Tor’s world­wide user base from one mil­lion to six mil­lion almost overnight and inject­ing it into the heart of a bur­geon­ing pri­va­cy move­ment. In Rus­sia, where the BBG and Din­gle­dine had tried but failed to recruit activists for their Tor deploy­ment plan, use of the soft­ware increased from twen­ty thou­sand dai­ly con­nec­tions to some­where around two hun­dred thou­sand.

“Dur­ing a pro­mo­tion­al cam­paign for the Tor Project, Snow­den said: ‘With­out Tor, the streets of the Inter­net become like the streets of a very heav­i­ly sur­veilled city. There are sur­veil­lance cam­eras every­where, and if the adver­sary sim­ply takes enough time, they can fol­low the tapes back and see every­thing you’ve done. With Tor, we have pri­vate spaces and pri­vate lives, where we can choose who we want to asso­ciate with and how, with­out the fear of what that is going to look like if it is abused. The design of the Tor sys­tem is struc­tured in such a way that even if the US Gov­ern­ment want­ed to sub­vert it, it could­n’t.’ Snow­den did­n’t talk about Tor’s con­tin­ued gov­ern­ment fund­ing, nor did he address an appar­ent con­tra­dic­tion: why the US gov­ern­ment would fund a pro­gram that sup­pos­ed­ly lim­it­ed its own pow­er. What­ev­er Snow­den’s pri­vate thought on the mat­ter, his endorse­ment gave Tor the high­est pos­si­ble seal of approval. It was like a Hack­er’s Medal of Val­or. With Snow­den’s back­ing, no one even thought to ques­tion Tor’s rad­i­cal antigov­ern­ment bona fides. . . .”

Next, we review infor­ma­tion about the so-called “Arab Spring.” In FTR #‘s 733 through 739, we pre­sent­ed our view that the so-called Arab Spring was a U.S. intel­li­gence oper­a­tion, aimed at plac­ing the Broth­er­hood in pow­er in Mus­lim coun­tries dom­i­nat­ed either by a sec­u­lar dic­ta­tor or absolute monar­chy.

Yasha Levine has high­light­ed the role of U.S. tech per­son­nel in train­ing and prep­ping the Arab Spring online activists. As we have not­ed in the past, the so-called Arab Spring might have been bet­ter thought of as “The Mus­lim Broth­er­hood Spring,” as the neo-lib­er­al, pri­va­ti­za­tion ide­ol­o­gy of Broth­er­hood eco­nom­ic icon Ibn Khal­dun was fun­da­men­tal to the oper­a­tion.

The eco­nom­ic goals of the Arab Spring “op” were reviewed in, among oth­er pro­grams, FTR #‘s 1025 and 1026.

Recall while read­ing the fol­low­ing excerpts of this remark­able and impor­tant book, that:

1.–The Tor net­work was devel­oped by, and used and com­pro­mised by, ele­ments of U.S. intel­li­gence.
2.–One of the pri­ma­ry advo­cates and spon­sors of the Tor net­work is the Broad­cast­ing Board of Gov­er­nors. As we saw in FTR #‘s 891, 895, is an exten­sion of the CIA.
3.–Jacob Appel­baum has been financed by the Broad­cast­ing Board of Gov­er­nors, advo­cates use of the Tor net­work, has helped Wik­iLeaks with its exten­sive use of the Tor net­work, and is an ide­o­log­i­cal acolyte of Ayn Rand.

The Arab Spring pro­vid­ed moti­va­tion for enhanced U.S. fund­ing for Inter­net Free­dom. The Open Tech­nol­o­gy Fund, like the BBG a CIA “deriv­a­tive,” was at the cen­ter of this: ” . . . . The moti­va­tion for this expan­sion came out of the Arab Spring. The idea was to make sure the US gov­ern­ment would main­tain its tech­no­log­i­cal advan­tage in the cen­sor­ship arms race that began in the ear­ly 2000s, but the funds were also going into devel­op­ing a new gen­er­a­tion of tools aimed at lever­ag­ing the pow­er of the Inter­net to help for­eign oppo­si­tion activists orga­nize into cohe­sive polit­i­cal move­ments. The BBG’s $25.5 mil­lion cut of the cash more than dou­bled the agen­cy’s anti­cen­sor­ship tech­nol­o­gy bud­get from the pre­vi­ous year, and the BBG fun­neled the mon­ey into the Open Tech­nol­o­gy Fund, a new orga­ni­za­tion it had cre­at­ed with­in Radio Free Asia to fund Inter­net Free­dom tech­nolo­gies in the wake of the Arab Spring. . . .”

The fun­da­men­tal posi­tion of BBG and OTF (read “CIA”) to the so-called online pri­va­cy com­mu­ni­ty was con­cise­ly expressed by Yasha Levine: ” . . . . From behind this hip and con­nect­ed exte­ri­or, BBG and Radio Free Asia built a ver­ti­cal­ly inte­grat­ed incu­ba­tor for Inter­net Free­dom tech­nolo­gies, pour­ing mil­lions into projects big and small, includ­ing every­thing from evad­ing cen­sor­ship to help­ing polit­i­cal orga­niz­ing, protests, and move­ment build­ing. With its deep pock­ets and its recruit­ment of big-name pri­va­cy activists, the Open Tech­nol­o­gy Fund did­n’t just thrust itself into the pri­va­cy move­ment. In many ways, it WAS the pri­va­cy move­ment. . . .”


FTR #1078 Surveillance Valley, Part 4: Tor Up (Foxes Guarding the Online Privacy Henhouse, Part 1.)

Yasha Levine’s sum­ma­tion of the inex­tri­ca­ble nature and sym­bio­sis between the Inter­net, the tech firms and the so-called “pri­va­cy com­mu­ni­ty” include:

1.–The Inter­net is a weapon, devel­oped for counter-insur­gency pur­pos­es.
2.–Big Tech firms net­work with the very intel­li­gence ser­vices they pub­licly decry.
3.–Big Tech firms that data mine their cus­tomers on a near­ly unimag­in­able scale do so as a direct, oper­a­tional exten­sion of the very sur­veil­lance func­tion upon which  the Inter­net is pred­i­cat­ed.
4.–The tech­nolo­gies tout­ed by the so-called “Pri­va­cy Activists” such as Edward Snow­den and Jacob Apple­baum were devel­oped by the very intel­li­gence ser­vices they are sup­posed to deflect.
5.–The tech­nolo­gies tout­ed by the so-called “Pri­va­cy Activists” such as Edward Snow­den and Jacob Applebaum–such as the Tor Inter­net func­tion and the Sig­nal mobile phone app– are read­i­ly acces­si­ble to the very intel­li­gence ser­vices they are sup­posed to deflect.
6.–The orga­ni­za­tions that pro­mote the alleged virtues of Snow­den, Apple­baum, Tor, Sig­nal et al are linked to the very intel­li­gence ser­vices they would have us believe they oppose.
7.–Big Tech firms embrace “Inter­net Free­dom” as a dis­trac­tion from their own will­ful and all-embrac­ing data min­ing and their ongo­ing con­scious col­lab­o­ra­tion with the very intel­li­gence ser­vices they pub­licly decry.

After detail­ing the his­to­ry of the devel­op­ment of the Inter­net by the nation­al secu­ri­ty estab­lish­ment, Levine presents the sto­ry of the devel­op­ment of the Tor net­work.

Key points of analy­sis and dis­cus­sion:

1.–Tor’s Sil­i­con Val­ley back­ing: ” . . . . Pri­va­cy groups fund­ed by com­pa­nies like Google and Face­book, includ­ing the Elec­tron­ic Fron­tier Foun­da­tion and Fight for the Future, were some of Tor’s biggest and most ded­i­cat­ed back­ers. Google had direct­ly bankrolled its devel­op­ment, pay­ing out gen­er­ous grants to col­lege stu­dents who worked at Tor dur­ing their sum­mer vaca­tions. Why would an Inter­net com­pa­ny whose entire busi­ness rest­ed on track­ing peo­ple online pro­mote and help devel­op a pow­er­ful pri­va­cy tool? Some­thing did­n’t add up. . . .”
2.–Not sur­pris­ing­ly, Tor does not shield users from orgias­tic data min­ing by Sil­i­con Val­ley tech giants: ” . . . . Tor works only if peo­ple are ded­i­cat­ed to main­tain­ing a strict anony­mous Inter­net rou­tine: using only dum­my email address­es and bogus accounts, car­ry­ing out all finan­cial trans­ac­tions in Bit­coin and oth­er cryp­tocur­ren­cies, and nev­er men­tion­ing their real name in emails or mes­sages. For the vast major­i­ty of peo­ple on the Internet—those who use Gmail, inter­act with Face­book friends, and shop on Amazon—you reveal your iden­ti­ty. These com­pa­nies know who you are. They know your name, your ship­ping address, your cred­it card infor­ma­tion. They con­tin­ue to scan your emails, map your social net­works, and com­pile dossiers. Tor or not, once you enter your account name and pass­word, Tor’s anonymi­ty tech­nol­o­gy becomes use­less. . . .”
3.–Silicon Val­ley’s sup­port for Tor is some­thing of a “false bro­mide”: ” . . . . After all, Snow­den’s leaked doc­u­ments revealed that any­thing Inter­net com­pa­nies had, the NSA had as well. I was puz­zled, but at least I under­stood why Tor had back­ing from Sil­i­con Val­ley: it offered a false sense of pri­va­cy, while not pos­ing a threat to the indus­try’s under­ly­ing sur­veil­lance mod­el. . . .”
4.–Tor is, in fact, financed by ele­ments of the very same intel­li­gence com­mu­ni­ty and nation­al secu­ri­ty estab­lish­ment that sup­pos­ed­ly frustrated/“locked out” by Tor! ” . . . . But as I ana­lyzed the orga­ni­za­tion’s finan­cial doc­u­ments, I found that the oppo­site was true. Tor had come out of a joint US Navy—DARPA mil­i­tary project in the ear­ly 2000s and con­tin­ued to rely on a series of fed­er­al con­tracts after it was spun off into a pri­vate non­prof­it. This fund­ing came from the Pen­ta­gon, the State Depart­ment, and at least one orga­ni­za­tion that derived from the CIA. These con­tracts added up to sev­er­al mil­lion dol­lars a year and, most years,  account­ed for more than 90 per­cent of Tor’s oper­at­ing bud­get. Tor was a fed­er­al mil­i­tary con­trac­tor. It even had its own fed­er­al con­tract­ing num­ber. . . This includ­ed Tor’s founder, Roger Din­gle­dine, who spent a sum­mer work­ing at the NSA and who had brought Tor to life under a series of DARPA and Navy con­tracts. . . .”

Wide­ly regard­ed as a cham­pi­on of Inter­net free­dom and pri­va­cy, the Elec­tron­ic Fron­tier Foun­da­tion helped finance Tor and cham­pi­oned its use.

Key ele­ments of dis­cus­sion and analy­sis of the EFF/Tor alliance include:

1.–EFF’s ear­ly financ­ing of Tor: ” . . . . . . . . In 2004, [Roger] Din­gle­dine struck out on his own, spin­ning the mil­i­tary onion rout­ing project into a non-prof­it cor­po­ra­tion called the Tor Project and, while still fund­ed by DARPA and the Navy, began scratch­ing around for pri­vate fund­ing. He got help from an unex­pect­ed ally: the Elec­tron­ic Fron­tier Foun­da­tion (EFF), which gave Tor almost a quar­ter mil­lion dol­lars to keep it going while Din­gle­dine looked for oth­er pri­vate spon­sors. The EFF even host­ed Tor’s web­site. . . .”
2.–The EFF’s effu­sive praise for the fun­da­men­tal­ly com­pro­mised Tor Project: ” . . . . ‘The Tor Project is a per­fect fit for EFF, because one of our pri­ma­ry goals is to pro­tect the pri­va­cy and anonymi­ty of Inter­net users. Tor can help peo­ple exer­cise their First Amend­ment right to free, anony­mous speech online.’ EFF’s tech­nol­o­gy man­ag­er Chris Palmer explained in a 2004 press release, which curi­ous­ly failed to men­tion that Tor was devel­oped pri­mar­i­ly for mil­i­tary intel­li­gence use and was still active­ly fund­ed by the Pen­ta­gon. . . .”
3.–The EFF’s his­to­ry of work­ing with ele­ments of the nation­al secu­ri­ty estab­lish­ment: ” . . . . In 1994, EFF worked with the FBI to pass the Com­mu­ni­ca­tions Assis­tance for Law Enforce­ment Act, which required all telecom­mu­ni­ca­tions com­pa­nies to build their equip­ment so that it could be wire­tapped by the FBI. In 1999, EFF worked to sup­port NATO’s bomb­ing cam­paign in Koso­vo with some­thing called the ‘Koso­vo Pri­va­cy Sup­port,’ which aimed to keep the region’s Inter­net access open dur­ing mil­i­tary action. Sell­ing a Pen­ta­gon intel­li­gence project as a grass­roots pri­va­cy tool—it did­n’t seem all that wild. . . .”
4.–In FTR #854, we not­ed that EFF co-founder John Per­ry Bar­low was far more than a Grate­ful Dead lyricist/hippie icon: ” . . . . Indeed, in 2002, a few years before it fund­ed Tor, EFF cofounder [John] Per­ry Bar­low casu­al­ly admit­ted that he had been con­sult­ing for intel­li­gence agen­cies for a decade. It seemed that the worlds of sol­diers, spies, and pri­va­cy weren’t as far apart as they appeared. . . .”
5.–EFF’s grav­i­tas in the online pri­va­cy com­mu­ni­ty lent Tor great cred­i­bil­i­ty: ” . . . . EFF’s sup­port for Tor was a big deal. The orga­ni­za­tion com­mand­ed respect in Sil­i­con Val­ley and was wide­ly seen as the ACLU of the Inter­net Age. The fact that it backed Tor meant that no hard ques­tions would be asked about the anonymi­ty tool’s mil­i­tary ori­gins as it tran­si­tioned to the civil­ian world. And that’s exact­ly what hap­pened. . . .”

In FTR #‘s 891 and 895, we not­ed the pri­ma­ry posi­tion of the Broad­cast­ing Board of Gov­er­nors in the devel­op­ment of the so-called “pri­va­cy” net­works. The BBG is a CIA off­shoot: “. . . .  The BBG might have had a bland sound­ing name and pro­fessed a noble mis­sion to inform the world and spread democ­ra­cy. In truth, the orga­ni­za­tion was an out­growth of the Cen­tral Intel­li­gence Agency. . . . The bulk of the BBG is no longer fund­ed from the CIA’s black bud­get, but the agen­cy’s orig­i­nal cold War goal and purpose—subversion and psy­cho­log­i­cal oper­a­tions direct­ed against coun­tries deemed hos­tile to US interests—remain the same. The only thing that did change about the BBG is that today, more of its broad­casts are tak­ing place online . . . .”

After doc­u­ment­ing Radio Free Europe’s growth from the Nazi/Vichy run Radio France dur­ing World War II and RCA’s David Sarnof­f’s involve­ment with the Tran­sra­dio Con­sor­tium (which com­mu­ni­cat­ed vital intel­li­gence to the Axis dur­ing the war), the pro­gram high­lights the involve­ment of Gehlen oper­a­tives in the oper­a­tions of Radio Free Europe, the sem­i­nal CIA broad­cast­ing out­lets.

The BBG (read “CIA”) became a major backer of the Tor Project: ” . . . . . . . . It was Wednes­day morn­ing, Feb­ru­ary 8, 2006, when Roger Din­gle­dine got the email he had been bad­ly wait­ing for. The Broad­cast­ing Board of Gov­er­nors had final­ly agreed to back the Tor Project. . . . With­in a year, the agency increased Tor’s con­tract to a quar­ter mil­lion dol­lars, and then bumped it up again to almost a mil­lion just a few years lat­er. The rela­tion­ship also led to major con­tracts with oth­er fed­er­al agen­cies, boost­ing Tor’s mea­ger oper­at­ing bud­get to sev­er­al mil­lion dol­lars a year. . . .”

Yasha Levine sums up the essence of the Tor Project: ” . . . . The Tor Project was not a rad­i­cal indie orga­ni­za­tion fight­ing The Man. For all intents and pur­pos­es, it was The Man. Or, at least, The Man’s right hand. . . . inter­nal cor­re­spon­dence reveals Tor’s close col­lab­o­ra­tion with the BBG and mul­ti­ple oth­er wings of the US gov­ern­ment, in par­tic­u­lar those that dealt with for­eign pol­i­cy and soft-pow­er pro­jec­tion. Mes­sages describe meet­ings, train­ings, and con­fer­ences with the NSA, CIA, FBI and State Depart­ment. . . . The fund­ing record tells the sto­ry even more pre­cise­ly. . . . Tor was sub­sist­ing almost exclu­sive­ly on gov­ern­ment con­tracts. By 2008, that includ­ed  con­tracts with DARPA, the Navy, the BBG, and the State Depart­ment as well as Stan­ford Research Insti­tute’s Cyber-Threat Ana­lyt­ics pro­gram. . . .” 

Next, we begin chron­i­cling the career of Jacob Appel­baum. A devo­tee of Ayn Rand, he became one of Tor’s most impor­tant employ­ees and pro­mot­ers. “. . . . With­in months of get­ting the job, he assumed the role of offi­cial Tor Project spokesman and began pro­mot­ing Tor as a pow­er­ful weapon against gov­ern­ment oppres­sion. . . . Over the next sev­er­al years, Din­gledine’s reports back to the BBG [read “CIA”–D.E.] were filled with descrip­tions of Appel­baum’s suc­cess­ful out­reach. . . .”

Intro­duc­ing a top­ic to be more ful­ly explored in our next pro­gram, we note Appel­baum’s piv­otal role in the Wik­iLeaks oper­a­tion and his role in the adop­tion of Tor by Wik­iLeaks: ” . . . . Appel­baum decid­ed to attach him­self to the Wik­iLeaks cause. He spent a few weeks with Assange and the orig­i­nal Wik­iLeaks crew in Ice­land as they pre­pared their first major release and helped secure the site’s anony­mous sub­mis­sions sys­tem using Tor’s hid­den ser­vice fea­ture, which hid the phys­i­cal loca­tion of Wik­iLeaks servers and in the­o­ry made them much less sus­cep­ti­ble to sur­veil­lance and attack. From then on, the Wik­iLeaks site proud­ly adver­tised Tor: ‘secure, anony­mous, dis­trib­uted net­work for max­i­mum secu­ri­ty.’ . . . . Appel­baum did his best to be Assange’s right-hand man. He served as the orga­ni­za­tion’s offi­cial Amer­i­can rep­re­sen­ta­tive and bailed the founder of Wik­iLeaks out of tough spots when the heat from US author­i­ties got too hot. Appel­baum became so inter­twined with Wik­iLeaks that appar­ent­ly some staffers talked about him lead­ing the orga­ni­za­tion if some­thing were to hap­pen to Assange. . . . Assange gave Appel­baum and Tor wide cred­it for help­ing Wik­iLeaks. ‘Jake has been a tire­less pro­mot­er behind the scenes of our cause,’ he told a reporter. ‘Tor’s impor­tance to Wik­iLeaks can­not be under­es­ti­mat­ed.’ With those words, Appel­baum and the Tor Project became cen­tral heroes in the Wik­iLeaks saga, right behind Assange. . . .”


FTR #1077 Surveillance Valley, Part 3: Cambridge Analytica, Democracy and Counterinsurgency

Con­tin­u­ing the dis­cus­sion from FTR #1076, the broad­cast recaps key aspects of analy­sis of the Cam­bridge Ana­lyt­i­ca scan­dal.

In our last pro­gram, we not­ed that both the inter­net (DARPA projects includ­ing Project Agile) and the Ger­man Nazi Par­ty had their ori­gins as coun­terin­sur­gency gam­bits. Not­ing Hitler’s speech before The Indus­try Club of Dus­sel­dorf, in which he equat­ed com­mu­nism with democ­ra­cy, we high­light how the Cam­bridge Ana­lyt­i­ca scan­dal reflects the coun­terin­sur­gency ori­gins of the Inter­net, and how the Cam­bridge Ana­lyt­i­ca affair embod­ies anti-Democ­ra­cy/as coun­terin­sur­gency.

Key aspects of the Cam­bridge Ana­lyt­i­ca affair include:

1.–The use of psy­cho­graph­ic per­son­al­i­ty test­ing on Face­book that is used for polit­i­cal advan­tage: ” . . . . For sev­er­al years, a data firm even­tu­al­ly hired by the Trump cam­paign, Cam­bridge Ana­lyt­i­ca, has been using Face­book as a tool to build psy­cho­log­i­cal pro­files that rep­re­sent some 230 mil­lion adult Amer­i­cans. A spin­off of a British con­sult­ing com­pa­ny and some­time-defense con­trac­tor known for its coun­tert­er­ror­ism ‘psy ops’ work in Afghanistan, the firm does so by seed­ing the social net­work with per­son­al­i­ty quizzes. Respon­dents — by now hun­dreds of thou­sands of us, most­ly female and most­ly young but enough male and old­er for the firm to make infer­ences about oth­ers with sim­i­lar behav­iors and demo­graph­ics — get a free look at their Ocean scores. Cam­bridge Ana­lyt­i­ca also gets a look at their scores and, thanks to Face­book, gains access to their pro­files and real names. . . .”
2.–The par­ent com­pa­ny of Cam­bridge Analytica–SCL–was deeply involved with coun­tert­er­ror­ism “psy-ops” in Afghanistan, embody­ing the essence of the coun­terin­sur­gency dynam­ic at the root of the devel­op­ment of the Inter­net. The use of online data to sub­vert democ­ra­cy recalls Hitler’s speech to the Indus­try Club of Dus­sel­dorf, in which he equat­ed democ­ra­cy with com­mu­nism: ” . . . . Cam­bridge Ana­lyt­i­ca was a com­pa­ny spun out of SCL Group, a British mil­i­tary con­trac­tor that worked in infor­ma­tion oper­a­tions for armed forces around the world. It was con­duct­ing research on how to scale and digi­tise infor­ma­tion war­fare – the use of infor­ma­tion to con­fuse or degrade the effi­ca­cy of an ene­my. . . . As direc­tor of research, Wylie’s orig­i­nal role was to map out how the com­pa­ny would take tra­di­tion­al infor­ma­tion oper­a­tions tac­tics into the online space – in par­tic­u­lar, by pro­fil­ing peo­ple who would be sus­cep­ti­ble to cer­tain mes­sag­ing. This mor­phed into the polit­i­cal are­na. After Wylie left, the com­pa­ny worked on Don­ald Trump’s US pres­i­den­tial cam­paign . . . .”
3.–Cambridge Ana­lyt­i­ca whistle­blow­er Christo­pher Wylie’s obser­va­tions on the anti-demo­c­ra­t­ic nature of the fir­m’s work: ” . . . . It was this shift from the bat­tle­field to pol­i­tics that made Wylie uncom­fort­able. ‘When you are work­ing in infor­ma­tion oper­a­tions projects, where your tar­get is a com­bat­ant, the auton­o­my or agency of your tar­gets is not your pri­ma­ry con­sid­er­a­tion. It is fair game to deny and manip­u­late infor­ma­tion, coerce and exploit any men­tal vul­ner­a­bil­i­ties a per­son has, and to bring out the very worst char­ac­ter­is­tics in that per­son because they are an ene­my,’ he says. ‘But if you port that over to a demo­c­ra­t­ic sys­tem, if you run cam­paigns designed to under­mine people’s abil­i­ty to make free choic­es and to under­stand what is real and not real, you are under­min­ing democ­ra­cy and treat­ing vot­ers in the same way as you are treat­ing ter­ror­ists.’ . . . .”
4.–Wylie’s obser­va­tions on how Cam­bridge Ana­lyt­i­ca’s method­ol­o­gy can be used to build a fas­cist polit­i­cal move­ment: ” . . . . One of the rea­sons these tech­niques are so insid­i­ous is that being a tar­get of a dis­in­for­ma­tion cam­paign is ‘usu­al­ly a plea­sur­able expe­ri­ence’, because you are being fed con­tent with which you are like­ly to agree. ‘You are being guid­ed through some­thing that you want to be true,’ Wylie says. To build an insur­gency, he explains, you first tar­get peo­ple who are more prone to hav­ing errat­ic traits, para­noia or con­spir­a­to­r­i­al think­ing, and get them to ‘like’ a group on social media. They start engag­ing with the con­tent, which may or may not be true; either way ‘it feels good to see that infor­ma­tion’. When the group reach­es 1,000 or 2,000 mem­bers, an event is set up in the local area. Even if only 5% show up, ‘that’s 50 to 100 peo­ple flood­ing a local cof­fee shop’, Wylie says. This, he adds, val­i­dates their opin­ion because oth­er peo­ple there are also talk­ing about ‘all these things that you’ve been see­ing online in the depths of your den and get­ting angry about’. Peo­ple then start to believe the rea­son it’s not shown on main­stream news chan­nels is because ‘they don’t want you to know what the truth is’. As Wylie sums it up: ‘What start­ed out as a fan­ta­sy online gets port­ed into the tem­po­ral world and becomes real to you because you see all these peo­ple around you.’ . . . .”
5.–Wylie’s obser­va­tion that Face­book was “All In” on the Cam­bridge Ana­lyt­i­ca machi­na­tions: ” . . . . ‘Face­book has known about what Cam­bridge Ana­lyt­i­ca was up to from the very begin­ning of those projects,” Wylie claims. “They were noti­fied, they autho­rised the appli­ca­tions, they were giv­en the terms and con­di­tions of the app that said explic­it­ly what it was doing. They hired peo­ple who worked on build­ing the app. I had legal cor­re­spon­dence with their lawyers where they acknowl­edged it hap­pened as far back as 2016.’ . . . .”
6.–The deci­sive par­tic­i­pa­tion of “Spy Tech” firm Palan­tir in the Cam­bridge Ana­lyt­i­ca oper­a­tion: Peter Thiel’s sur­veil­lance firm Palan­tir was appar­ent­ly deeply involved with Cam­bridge Ana­lyt­i­ca’s gam­ing of per­son­al data har­vest­ed from Face­book in order to engi­neer an elec­toral vic­to­ry for Trump. Thiel was an ear­ly investor in Face­book, at one point was its largest share­hold­er and is still one of its largest share­hold­ers. In addi­tion to his oppo­si­tion to democ­ra­cy because it alleged­ly is inim­i­cal to wealth cre­ation, Thiel does­n’t think women should be allowed to vote and holds Nazi legal the­o­reti­cian Carl Schmitt in high regard. ” . . . . It was a Palan­tir employ­ee in Lon­don, work­ing close­ly with the data sci­en­tists build­ing Cambridge’s psy­cho­log­i­cal pro­fil­ing tech­nol­o­gy, who sug­gest­ed the sci­en­tists cre­ate their own app — a mobile-phone-based per­son­al­i­ty quiz — to gain access to Face­book users’ friend net­works, accord­ing to doc­u­ments obtained by The New York Times. The rev­e­la­tions pulled Palan­tir — co-found­ed by the wealthy lib­er­tar­i­an Peter Thiel — into the furor sur­round­ing Cam­bridge, which improp­er­ly obtained Face­book data to build ana­lyt­i­cal tools it deployed on behalf of Don­ald J. Trump and oth­er Repub­li­can can­di­dates in 2016. Mr. Thiel, a sup­port­er of Pres­i­dent Trump, serves on the board at Face­book. ‘There were senior Palan­tir employ­ees that were also work­ing on the Face­book data,’ said Christo­pher Wylie, a data expert and Cam­bridge Ana­lyt­i­ca co-founder, in tes­ti­mo­ny before British law­mak­ers on Tues­day. . . . The con­nec­tions between Palan­tir and Cam­bridge Ana­lyt­i­ca were thrust into the spot­light by Mr. Wylie’s tes­ti­mo­ny on Tues­day. Both com­pa­nies are linked to tech-dri­ven bil­lion­aires who backed Mr. Trump’s cam­paign: Cam­bridge is chiefly owned by Robert Mer­cer, the com­put­er sci­en­tist and hedge fund mag­nate, while Palan­tir was co-found­ed in 2003 by Mr. Thiel, who was an ini­tial investor in Face­book. . . .”
7.–The use of “dark posts” by the Cam­bridge Ana­lyt­i­ca team. (We have not­ed that Brad Parscale has reassem­bled the old Cam­bridge Ana­lyt­i­ca team for Trump’s 2020 elec­tion cam­paign. It seems prob­a­ble that AOC’s mil­lions of online fol­low­ers, as well as the “Bernie Bots,” will be get­ting “dark posts” craft­ed by AI’s scan­ning their online efforts.) ” . . . . One recent adver­tis­ing prod­uct on Face­book is the so-called ‘dark post’: A news­feed mes­sage seen by no one aside from the users being tar­get­ed. With the help of Cam­bridge Ana­lyt­i­ca, Mr. Trump’s dig­i­tal team used dark posts to serve dif­fer­ent ads to dif­fer­ent poten­tial vot­ers, aim­ing to push the exact right but­tons for the exact right peo­ple at the exact right times. . . .”

Sup­ple­ment­ing the dis­cus­sion about Cam­bridge Ana­lyt­i­ca, the pro­gram reviews infor­ma­tion from FTR #718 about Face­book’s appar­ent involve­ment with ele­ments and indi­vid­u­als linked to CIA and DARPA: ” . . . . Face­book’s most recent round of fund­ing was led by a com­pa­ny called Grey­lock Ven­ture Cap­i­tal, who put in the sum of $27.5m. One of Grey­lock­’s senior part­ners is called Howard Cox, anoth­er for­mer chair­man of the NVCA, who is also on the board of In-Q-Tel. What’s In-Q-Tel? Well, believe it or not (and check out their web­site), this is the ven­ture-cap­i­tal wing of the CIA. After 9/11, the US intel­li­gence com­mu­ni­ty became so excit­ed by the pos­si­bil­i­ties of new tech­nol­o­gy and the inno­va­tions being made in the pri­vate sec­tor, that in 1999 they set up their own ven­ture cap­i­tal fund, In-Q-Tel, which ‘iden­ti­fies and part­ners with com­pa­nies devel­op­ing cut­ting-edge tech­nolo­gies to help deliv­er these solu­tions to the Cen­tral Intel­li­gence Agency and the broad­er US Intel­li­gence Com­mu­ni­ty (IC) to fur­ther their mis­sions’. . . .”

More about the CIA/DARPA links to the devel­op­ment of Face­book: ” . . . . The sec­ond round of fund­ing into Face­book ($US12.7 mil­lion) came from ven­ture cap­i­tal firm Accel Part­ners. Its man­ag­er James Brey­er was for­mer­ly chair­man of the Nation­al Ven­ture Cap­i­tal Asso­ci­a­tion, and served on the board with Gilman Louie, CEO of In-Q-Tel, a ven­ture cap­i­tal firm estab­lished by the Cen­tral Intel­li­gence Agency in 1999. One of the com­pa­ny’s key areas of exper­tise are in ‘data min­ing tech­nolo­gies’. Brey­er also served on the board of R&D firm BBN Tech­nolo­gies, which was one of those com­pa­nies respon­si­ble for the rise of the inter­net. Dr Ani­ta Jones joined the firm, which includ­ed Gilman Louie. She had also served on the In-Q-Tel’s board, and had been direc­tor of Defence Research and Engi­neer­ing for the US Depart­ment of Defence. She was also an advis­er to the Sec­re­tary of Defence and over­see­ing the Defence Advanced Research Projects Agency (DARPA), which is respon­si­ble for high-tech, high-end devel­op­ment. . . .”

Pro­gram High­lights Include: Review of Face­book’s plans to use brain-to-com­put­er tech­nol­o­gy to oper­ate its plat­form, there­by the enabling of record­ing and data­bas­ing peo­ple’s thoughts; Review of Face­book’s employ­ment of for­mer DARPA head Regi­na Dugan to imple­ment the brain-to-com­put­er tech­nol­o­gy; Review of Face­book’s build­ing 8–designed to dupli­cate DARPA; Review of Face­book’s hir­ing of the Atlantic Coun­cil to police the social medi­um’s online con­tent; Review of Face­book’s part­ner­ing with Naren­dra Mod­i’s Hin­dut­va fas­cist gov­ern­ment in India; Review of Face­book’s emloy­ment of Ukrain­ian fas­cist Katery­na Kruk to man­age the social medi­um’s Ukrain­ian con­tent.


Facebook’s Public Policy Manager for Ukraine Kateryna Kruk’s Nazi and Fascist Manifestations

In FTR #1074, we high­light­ed Face­book’s appoint­ment of Katery­na Kruk to be its Pub­lic Pol­i­cy Man­ag­er in Ukraine. Kruk is very close to the Atlantic Coun­cil, which was effec­tive­ly posi­tioned by Face­book to han­dle its man­age­ment of “Fake News.” The Atlantic Coun­cil is a foun­da­tion­al ele­ment of the push for a new Cold War and has pro­found links to both U.S. intel­li­gence and the fascist/Nazi milieu that grew out of the Rein­hard Gehlen spy orga­ni­za­tion. In addi­tion to hav­ing worked with Svo­bo­da dur­ing the Euro­maid­an protests, Kruk has man­i­fest­ed oth­er Nazi and fas­cist affil­i­a­tions: 1.) In 2014, she tweet­ed that a man had asked her to con­vince his grand­son not to join the Azov Bat­tal­ion, a neo-Nazi mili­tia. “I couldn’t do it,” she said. “I thanked that boy and blessed him.” And he then trav­eled to Luhan­sk to fight pro-Russ­ian rebels. 2.) In March 2018, a 19-year neo-Nazi named Andriy “Dil­ly” Krivich was shot and killed by a sniper. Krivich–pictured above, at right–had been fight­ing with the fas­cist Ukrain­ian group Right Sec­tor, and had post­ed pho­tos on social media wear­ing Nazi Ger­man sym­bols. After he was killed, Kruk tweet­ed an homage to the teenage Nazi. (The Nazi was also lion­ized on Euro­maid­an Press’ Face­book page.) 3.) Kruk has staunch­ly defend­ed the use of the slo­gan “Sla­va Ukraini,”which was first coined and pop­u­lar­ized by Nazi-col­lab­o­rat­ing fas­cists, and is now the offi­cial salute of Ukraine’s army. 4.) She has also said that the Ukrain­ian fas­cist politi­cian Andriy Paru­biy, who co-found­ed a neo-Nazi par­ty before lat­er becom­ing the chair­man of Ukraine’s par­lia­ment the Rada, is “act­ing smart,” writ­ing, “Paru­biy touche.” . . . .