Dave Emory’s entire lifetime of work is available on a flash drive that can be obtained HERE. The new drive is a 32-gigabyte drive that is current as of the programs and articles posted by the fall of 2017. The new drive (available for a tax-deductible contribution of $65.00 or more.)
WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE.
You can subscribe to e‑mail alerts from Spitfirelist.com HERE.
You can subscribe to RSS feed from Spitfirelist.com HERE.
You can subscribe to the comments made on programs and posts–an excellent source of information in, and of, itself, HERE.
Please consider supporting THE WORK DAVE EMORY DOES.
This broadcast was recorded in one, 60-minute segment.
Introduction: The program begins with recap of the adaptation of IBM’s Hollerith machines to Nazi data compilation. (We concluded FTR #1075 with discussion of this.): ” . . . . Germany’s vast state bureaucracy and its military and rearmament programs, including the country’s growing concentration camp/slave labor system, also required data processing services. By the time the U.S. officially entered the war in 1941, IBM’s German subsidiary had grown to employ 10,000 people and served 300 different German government agencies. The Nazi Party Treasury; the SS; the War Ministry; the Reichsbank; the Reichspost; the Armaments Ministry; the Navy, Army and Air Force; and the Reich Statistical Office — the list of IBM’s clients went on and on.
” ‘Indeed, the Third Reich would open startling statistical venues for Hollerith machines never before instituted — perhaps never before even imagined,’ wrote Edwin Black in IBM and the Holocaust, his pioneering 2001 exposé of the forgotten business ties between IBM and Nazi Germany. ‘In Hitler’s Germany, the statistical and census community, overrun with doctrinaire Nazis, publicly boasted about the new demographic breakthroughs their equipment would achieve.’ . . . .
“Demand for Hollerith tabulators was so robust that IBM was forced to open a new factory in Berlin to crank out all the new machines. At the facility’s christening ceremony, which was attended by a top U.S. IBM executive and the elite of the Nazi Party, the head of IBM’s German subsidiary gave a rousing speech about the important role that Hollerith tabulators played in Hitler’s drive to purify Germany and cleanse it of inferior racial stock. . . .”
In that same article, Yasha Levine notes that the Trump administration’s proposed changes in the 2020 census sound as though they may portend something akin to the Nazi census of 1933: ” . . . . Based on a close reading of internal Department of Commerce documents tied to the census citizen question proposal, it appears the Trump administration wants to use the census to construct a first-of-its-kind citizenship registry for the entire U.S. population — a decision that arguably exceeds the legal authority of the census. ‘It was deep in the documentation that was released,’ Robert Groves, a former Census Bureau director who headed the National Academies committee convened to investigate the 2020 census, told me by telephone. ‘No one picked up on it much. But the term ‘registry’ in our world means not a collection of data for statistical purposes but rather to know the identity of particular people in order to use that knowledge to affect their lives.’ Given the administration’s posture toward immigration, the fact that it wants to build a comprehensive citizenship database is highly concerning. To Groves, it clearly signals ‘a bright line being crossed.’ . . .”
In the conclusion to Surveillance Valley, Yasha Levine notes how IBM computing technology facilitated the Nazi slave labor operations throughout the Third Reich. The epicenter of this was Mauthausen.
The systematic use of slave labor was central to Nazi Germany’s industrial infrastructure: ” . . . . But in the 1930s, Mauthausen had been a vital economic engine of Hitler’s genocidal plan to remake Europe and the Soviet Union into his own backyard utopia. It started out as a granite quarry but quickly grew into the largest slave labor complex in Nazi Germany, with fifty sub-camps that spanned most of modern-day Austria. Here, hundreds of thousands of prisoners–mostly European Jews but also Roma, Spaniards, Russians, Serbs, Slovenes, Germans, Bulgarians, even Cubans–were worked to death. They refined oil, built fighter aircraft, assembled cannons, developed rocket technology, and were leased out to private German businesses. Volkswagen, Siemens, Daimler-Benz, BMW, Bosch–all benefited from the camp’s slave labor pool. Mauthausen, the administrative nerve center, was centrally directed from Berlin using the latest in early computer technology: IBM punch card tabulators. . . .”
Mauthausen’s IBM machines were, in turn, central to German industry’s use of slave labor: ” . . . . the camp had several IBM machines working overtime to handle the big churn of inmates and to make sure there were always enough bodies to perform the necessary work. These machines didn’t operate in isolation but were part of a larger slave labor control-and-accounting system that stretched across Nazi-occupied Europe connecting Berlin to every major concentration and labor punch card, telegraph, telephone, and human courier. This wasn’t the automated type of computer network system that the Pentagon would begin to build in the United States just a decade later, but it was an information network nonetheless: an electromechanical web that fueled and sustained Nazi Germany’s war machine with blazing efficiency. It extended beyond the labor camps and reached into the cities and towns, crunching mountains of genealogical data to track down people with even the barest whiff of Jewish blood or perceived racial impurity in a mad rush to fulfill Adolf Hitler’s drive to purify the German people, but they made the Nazi death machine run faster and more efficiently, scouring the population and tracking down victims in ways that would never have been possible without them. . . .”
In his book–one of the most important in recent memory–Yasha Levine sets forth vital, revelatory information about the development and functioning of the Internet.
Born of the same overlapping DARPA projects that spawned Agent Orange, the Internet was never intended to be something good. Its generative function and purpose is counter-insurgency. ” . . . . In the 1960s, America was a global power overseeing an increasingly volatile world: conflicts and regional insurgencies against US-allied governments from South America to Southeast Asia and the Middle East. These were not traditional wars that involved big armies but guerilla campaigns and local rebellions, frequently fought in regions where Americans had little previous experience. Who were these people? Why were they rebelling? What could be done to stop them? In military circles, it was believed that these questions were of vital importance to America’s pacification efforts, and some argued that the only effective way to answer them was to develop and leverage computer-aided information technology. The Internet came out of this effort: an attempt to build computer systems that could collect and share intelligence, watch the world in real time, and study and analyze people and political movements with the ultimate goal of predicting and preventing social upheaval. . . .”
In this landmark volume, Levine makes numerous points, including:
- The harvesting of data by intelligence services is PRECISELY what the Internet was designed to do in the first place.
- The harvesting of data engaged in by the major tech corporations is an extension of the data gathering/surveillance that was–and is–the raison d’etre for the Internet in the first place.
- The big tech companies all collaborate with the various intelligence agencies they publicly scorn and seek to ostensibly distance themselves from.
- Edward Snowden, the Electronic Frontier Foundation, Jacob Appelbaum, the milieu of the Tor Network and WikiLeaks are complicit in the data harvesting and surveillance.
- Snowden and other privacy activists are double agents, consciously channeling people fearful of having their communications monitored into technologies that will facilitate that surveillance!
The program notes that counterinsurgency–the functional context of the origin of the Internet–is at the foundation of the genesis of Nazism. At the conclusion of World War I, Germany was beset by a series of socialist/Communist uprisings in a number of cities, including Munich. Responding to that, underground Reichswehr units commanded by Ernst Rohm (later head of the SA) systematically assassinated the leaders of the revolution, as well as prominent social democrats and Jews, such as Walther Rathenau. In Munich, an undercover agent for the political department of the Reichswehr under General Von Lossow infiltrated the revolutionaries, pretending to be one of them.
Following the crushing of the rebellion and occupation of the city by Reichswehr units, that infiltrator identified the leaders of the revolution, who were then summarily executed. The infiltrator’s name was Adolf Hitler.
After the suppression of the rebellion, Hitler, Rohm and undercover Reichswehr agents infiltrated a moribund political party and turned it into an intelligence front for the introduction of the supposedly de-mobilized German Army into German society for the purpose of generating political reaction. That front was the German National Social Workers Party.
The broadcast re-capitulates (from part of Miscellaneous Archive Show M11) Hitler’s speech to the Industry Club of Dusseldorf. This speech, which won the German industrial and financial elite over to the cause of the Nazi Party, equated democracy with Communism.
Manifesting a Social Darwinist perspective, Hitler opined that the [assembled] successful, accomplished were, by definition superior to others. If those, by definition, inferior people were allowed to control the political process, they would structure the social and economic landscape to their own benefit.
This, according to Hitler, would be counter-evolutionary.
1a. The program begins with recap of the adaptation of IBM’s Hollerith machines to Nazi data compilation. (We concluded FTR #1075 with discussion of this.)
” . . . . Germany’s vast state bureaucracy and its military and rearmament programs, including the country’s growing concentration camp/slave labor system, also required data processing services. By the time the U.S. officially entered the war in 1941, IBM’s German subsidiary had grown to employ 10,000 people and served 300 different German government agencies. The Nazi Party Treasury; the SS; the War Ministry; the Reichsbank; the Reichspost; the Armaments Ministry; the Navy, Army and Air Force; and the Reich Statistical Office — the list of IBM’s clients went on and on.
” ‘Indeed, the Third Reich would open startling statistical venues for Hollerith machines never before instituted — perhaps never before even imagined,’ wrote Edwin Black in IBM and the Holocaust, his pioneering 2001 exposé of the forgotten business ties between IBM and Nazi Germany. ‘In Hitler’s Germany, the statistical and census community, overrun with doctrinaire Nazis, publicly boasted about the new demographic breakthroughs their equipment would achieve.’ . . . .
“Demand for Hollerith tabulators was so robust that IBM was forced to open a new factory in Berlin to crank out all the new machines. At the facility’s christening ceremony, which was attended by a top U.S. IBM executive and the elite of the Nazi Party, the head of IBM’s German subsidiary gave a rousing speech about the important role that Hollerith tabulators played in Hitler’s drive to purify Germany and cleanse it of inferior racial stock. . . .”
CORRECTION: The date of the Yasha Levine article is ” . . . . 2019,” NOT 2018, as read in the program.
“The Racist Origins of America’s Tech Industry” by Yasha Levine; Zero One; 4/28/2019.
. . . . . Nazis and numbers
Hollerith tabulators were a big hit all over the world. But one country was particularly enamored with them: Nazi Germany.
Adolf Hitler came to power on the back of the economic devastation that followed Germany’s defeat in World War I. To Hitler, however, the problem plaguing Germany was not economic or political. It was racial. As he put it in Mein Kampf: “The state is a racial organism and not an economic organization.” The reason Germany had fallen so far, he argued, was its failure to tend to its racial purity. There were only about a half-million Jews in Germany in 1933 — less than 1% of the population — but he singled them out as the root cause of all of the nation’s problems.
Hitler and the Nazis drew much of their inspiration from the U.S. eugenics movement and the system of institutional racism that had arisen in slavery’s wake. Their solution was to isolate the so-called mongrels, then continuously monitor the racial purity of the German people to keep the volk free of further contamination.
The only problem: How to tell who is really pure and who is not?
The U.S. had a ready solution. IBM’s German subsidiary landed its first major contract the same year Hitler became chancellor. The 1933 Nazi census was pushed through by Hitler as an emergency genetic stock-taking of the German people. Along with numerous other data points, the census focused on collecting fertility data for German women — particularly women of good Aryan stock. Also included in the census was a special count of religiously observant Jews, or Glaubensjuden.
Nazi officials wanted the entire count, estimated to be about 65 million people, to be done in just four months. It was a monumental task, and German IBM officials worked around the clock to finish it. So important was the success of the contract to IBM that CEO Thomas J. Watson personally toured the giant Berlin warehouse where hundreds of female clerks worked in rotating seven-hour shifts 24 hours a day.
Watson came away greatly impressed with the work of his German managers. They had pulled off a seemingly impossible assignment, one that was complicated by a custom-enlarged punch card format necessary for “political considerations” — IBM’s coded explanation for the extra data demands the Nazi regime required.
As Hitler’s Nazi Party tightened its grip on Germany, it launched all sorts of additional data-gathering programs to purify the German nation. And IBM helped them do it.
“[T]he precondition for every deportation was accurate knowledge of how many Jews in a particular district fitted the racial and demographic descriptions in Berlin’s quotas,” write David Martin Luebke and Sybil Milton in “Locating the Victim,” a study into Nazi use of the tabulator machines. “Armed with these data,” they said, “the Gestapo often proved able to anticipate with remarkable accuracy the total number of deportees for each racial, status, and age category.”
Germany’s vast state bureaucracy and its military and rearmament programs, including the country’s growing concentration camp/slave labor system, also required data processing services. By the time the U.S. officially entered the war in 1941, IBM’s German subsidiary had grown to employ 10,000 people and served 300 different German government agencies. The Nazi Party Treasury; the SS; the War Ministry; the Reichsbank; the Reichspost; the Armaments Ministry; the Navy, Army and Air Force; and the Reich Statistical Office — the list of IBM’s clients went on and on.
This history reveals an uncomfortable and fundamental truth about computer technology.
“Indeed, the Third Reich would open startling statistical venues for Hollerith machines never before instituted — perhaps never before even imagined,” wrote Edwin Black in IBM and the Holocaust, his pioneering 2001 exposé of the forgotten business ties between IBM and Nazi Germany. “In Hitler’s Germany, the statistical and census community, overrun with doctrinaire Nazis, publicly boasted about the new demographic breakthroughs their equipment would achieve.” (IBM has criticized Black’s reporting methods, and has said that its German subsidiary largely came under Nazi control before and during the war.)
Demand for Hollerith tabulators was so robust that IBM was forced to open a new factory in Berlin to crank out all the new machines. At the facility’s christening ceremony, which was attended by a top U.S. IBM executive and the elite of the Nazi Party, the head of IBM’s German subsidiary gave a rousing speech about the important role that Hollerith tabulators played in Hitler’s drive to purify Germany and cleanse it of inferior racial stock.
“We are very much like the physician, in that we dissect, cell by cell, the German cultural body,” he said. “We report every individual characteristic…on a little card. These are not dead cards, quite to the contrary, they prove later on that they come to life when the cards are sorted at a rate of 25,000 per hour according to certain characteristics. These characteristics are grouped like the organs of our cultural body, and they will be calculated and determined with the help of our tabulating machine.”
On the surface, it may seem like the story of Herman Hollerith and the U.S. census are historical relics, an echo from a bygone era. But this history reveals an uncomfortable and fundamental truth about computer technology. We can thank nativism and the census for helping to bring the computer age into existence. And as the battle over the 2020 census makes clear, the drive to tally up our neighbors, to sort them into categories and turn them into statistics, still carries the seed of our own dehumanization.
1b. The Trump administration’s framing of questions for the 2020 census appear aimed at creating a “national registry”–a concept reminiscent of the Third Reich’s use of IBM’s Hollerith-collected data:
“The Racist Origins of America’s Tech Industry” by Yasha Levine; Zero One; 4/28/2019.
” . . . . Based on a close reading of internal Department of Commerce documents tied to the census citizen question proposal, it appears the Trump administration wants to use the census to construct a first-of-its-kind citizenship registry for the entire U.S. population — a decision that arguably exceeds the legal authority of the census. ‘It was deep in the documentation that was released,’ Robert Groves, a former Census Bureau director who headed the National Academies committee convened to investigate the 2020 census, told me by telephone. ‘No one picked up on it much. But the term ‘registry’ in our world means not a collection of data for statistical purposes but rather to know the identity of particular people in order to use that knowledge to affect their lives.’ Given the administration’s posture toward immigration, the fact that it wants to build a comprehensive citizenship database is highly concerning. To Groves, it clearly signals ‘a bright line being crossed.’ . . .”
2. In the conclusion to Surveillance Valley, Yasha Levine notes how IBM computing technology facilitated the Nazi slave labor operations throughout the Third Reich. The epicenter of this was Mauthausen.
The systematic use of slave labor was central to Nazi Germany’s industrial infrastructure: ” . . . . But in the 1930s, Mauthausen had been a vital economic engine of Hitler’s genocidal plan to remake Europe and the Soviet Union into his own backyard utopia. It started out as a granite quarry but quickly grew into the largest slave labor complex in Nazi Germany, with fifty sub-camps that spanned most of modern-day Austria. Here, hundreds of thousands of prisoners–mostly European Jews but also Roma, Spaniards, Russians, Serbs, Slovenes, Germans, Bulgarians, even Cubans–were worked to death. They refined oil, built fighter aircraft, assembled cannons, developed rocket technology, and were leased out to private German businesses. Volkswagen, Siemens, Daimler-Benz, BMW, Bosch–all benefited from the camp’s slave labor pool. Mauthausen, the administrative nerve center, was centrally directed from Berlin using the latest in early computer technology: IBM punch card tabulators. . . .”
Mauthausen’s IBM machines were, in turn, central to German industry’s use of slave labor: ” . . . . the camp had several IBM machines working overtime to handle the big churn of inmates and to make sure there were always enough bodies to perform the necessary work. These machines didn’t operate in isolation but were part of a larger slave labor control-and-accounting system that stretched across Nazi-occupied Europe connecting Berlin to every major concentration and labor punch card, telegraph, telephone, and human courier. This wasn’t the automated type of computer network system that the Pentagon would begin to build in the United States just a decade later, but it was an information network nonetheless: an electromechanical web that fueled and sustained Nazi Germany’s war machine with blazing efficiency. It extended beyond the labor camps and reached into the cities and towns, crunching mountains of genealogical data to track down people with even the barest whiff of Jewish blood or perceived racial impurity in a mad rush to fulfill Adolf Hitler’s drive to purify the German people, but they made the Nazi death machine run faster and more efficiently, scouring the population and tracking down victims in ways that would never have been possible without them. . . .”
It is a crisp and sunny morning in late December 2015 when I take a right turn off a small country highway and drive into Mauthausen, a tiny medieval town in northern Austria about thirty-five miles from the border with the Czech Republic. I pass through a cluster of low-slung apartment buildings and continue on, driving through spotless green pastures and pretty little farmsteads.
I park on a hill overlooking the town. Below is the wide Danube River. Clusters of rural homes poke out from the cusp of two soft green hills, smoke lazily wafting out of their chimneys. A small group of cows is out to pasture, and I can hear the periodic braying of a flock of sheep. Out in the distance, the hills recede in layers of hazy green upon green, like the scales of a giant sleeping dragon. The whole scene is framed by the jagged white peaks of the Austrian Alps.
Mauthausen is an idyllic place. Calm, almost magical. Yet I drove here not to enjoy the view but to get close to something I came to fully understand only while writing this book.
Today, computer technology frequently operates unseen, hidden in gadgets, wires, chips, wireless signals, operating systems, and software. We are surrounded by computers and networks, yet we barely notice them. If we think about them at all, we tend to associate them with progress. We rarely stop to think about the dark side of information technology–all the ways it can be used and abused to control societies, to inflict pain and suffering. Here, in this quiet country setting, stands a forgotten monument to that power: the Mauthausen Concentration Camp.
Built on a mound above the town, it is amazingly well preserved: thick stone walls, squat guard towers, a pair of ominous smoke stacks connected to the camp’s gas chamber and crematorium. A few jagged metal bars stick out of the wall above the camp’s enormous gates, remnants of a giant iron Nazi eagle that was torn down immediately after liberation. It is quiet now, just a few solemn visitors. But in the 1930s, Mauthausen had been a vital economic engine of Hitler’s genocidal plan to remake Europe and the Soviet Union into his own backyard utopia. It started out as a granite quarry but quickly grew into the largest slave labor complex in Nazi Germany, with fifty sub-camps that spanned most of modern-day Austria. Here, hundreds of thousands of prisoners–mostly European Jews but also Roma, Spaniards, Russians, Serbs, Slovenes, Germans, Bulgarians, even Cubans–were worked to death. They refined oil, built fighter aircraft, assembled cannons, developed rocket technology, and were leased out to private German businesses. Volkswagen, Siemens, Daimler-Benz, BMW, Bosch–all benefited from the camp’s slave labor pool. Mauthausen, the administrative nerve center, was centrally directed from Berlin using the latest in early computer technology: IBM punch card tabulators.
No IBM machines are displayed at Mauthausen today. And, sadly the memorial makes no mention of them. But the camp had several IBM machines working overtime to handle the big churn of inmates and to make sure there were always enough bodies to perform the necessary work. These machines didn’t operate in isolation but were part of a larger slave labor control-and-accounting system that stretched across Nazi-occupied Europe connecting Berlin to every major concentration and labor punch card, telegraph, telephone, and human courier. This wasn’t the automated type of computer network system that the Pentagon would begin to build in the United States just a decade later, but it was an information network nonetheless: an electromechanical web that fueled and sustained Nazi Germany’s war machine with blazing efficiency. It extended beyond the labor camps and reached into the cities and towns, crunching mountains of genealogical data to track down people with even the barest whiff of Jewish blood or perceived racial impurity in a mad rush to fulfill Adolf Hitler’s drive to purify the German people, but they made the Nazi death machine run faster and more efficiently, scouring the population and tracking down victims in ways that would never have been possible without them. . . .
3. In his book–one of the most important in recent memory–Yasha Levine sets forth vital, revelatory information about the development and functioning of the Internet.
Born of the same overlapping DARPA projects that spawned Agent Orange, the Internet was never intended to be something good. Its generative function and purpose is counter-insurgency. ” . . . . In the 1960s, America was a global power overseeing an increasingly volatile world: conflicts and regional insurgencies against US-allied governments from South America to Southeast Asia and the Middle East. These were not traditional wars that involved big armies but guerilla campaigns and local rebellions, frequently fought in regions where Americans had little previous experience. Who were these people? Why were they rebelling? What could be done to stop them? In military circles, it was believed that these questions were of vital importance to America’s pacification efforts, and some argued that the only effective way to answer them was to develop and leverage computer-aided information technology. The Internet came out of this effort: an attempt to build computer systems that could collect and share intelligence, watch the world in real time, and study and analyze people and political movements with the ultimate goal of predicting and preventing social upheaval. . . .”
In this landmark volume, Levine makes numerous points, including:
- The harvesting of data by intelligence services is PRECISELY what the Internet was designed to do in the first place.
- The harvesting of data engaged in by the major tech corporations is an extension of the data gathering/surveillance that was–and is–the raison d’etre for the Internet in the first place.
- The big tech companies all collaborate with the various intelligence agencies they publicly scorn and seek to ostensibly distance themselves from.
- Edward Snowden, the Electronic Frontier Foundation, Jacob Appelbaum and WikiLeaks are complicit in the data harvesting and surveillance.
- Snowden and other privacy activists are double agents, consciously channeling people fearful of having their communications monitored into technologies that will facilitate that surveillance!
. . . . In the 1960s, America was a global power overseeing an increasingly volatile world: conflicts and regional insurgencies against US-allied governments from South America to Southeast Asia and the Middle East. These were not traditional wars that involved big armies but guerilla campaigns and local rebellions, frequently fought in regions where Americans had little previous experience. Who were these people? Why were they rebelling? What could be done to stop them? In military circles, it was believed that these questions were of vital importance to America’s pacification efforts, and some argued that the only effective way to answer them was to develop and leverage computer-aided information technology.
The Internet came out of this effort: an attempt to build computer systems that could collect and share intelligence, watch the world in real time, and study and analyze people and political movements with the ultimate goal of predicting and preventing social upheaval. . . .
4. Again, Project Agile and overlapping projects spawned both Agent Orange and the Internet. ” . . . . Operation Ranch Hand was merciless, and in clear violation of the Geneva Conventions. It remains one of the most shameful episodes of the Vietnam War. Yet the defoliation project is notable for more than just its unimaginable cruelty. The government body at its lead was a Department of Defense outfit called the Advanced Research Projects Agency (DARPA). Born in 1958 as a cash program to protect the United States from a Soviet nuclear threat from space, it launched several groundbreaking initiatives tasked with developing advanced weapons and military technologies. Among them were project Agile and Command and Control Research, two overlapping ARPA initiatives that created the Internet. . . .”
. . . . Ranch Hand got going in 1962 and lasted until the war ended more than a decade later. In that time, American C‑123 transport planes doused an area equal in size to half of South Vietnam with twenty million gallons of toxic chemical defoliants. Agent Orange was fortified with other colors of the rainbow: Agent White, Agent Pink, Agent Purple, Agent Blue. The chemicals, produced by American companies like Dow and Monsanto, turned whole swaths of lush jungle into barren moonscapes, causing death and horrible suffering for hundreds of thousands.
Operation Ranch Hand was merciless, and in clear violation of the Geneva Conventions. It remains one of the most shameful episodes of the Vietnam War. Yet the defoliation project is notable for more than just its unimaginable cruelty. The government body at its lead was a Department of Defense outfit called the Advanced Research Projects Agency (DARPA). Born in 1958 as a cash program to protect the United States from a Soviet nuclear threat from space, it launched several groundbreaking initiatives tasked with developing advanced weapons and military technologies. Among them were project Agile and Command and Control Research, two overlapping ARPA initiatives that created the Internet. . . .
5. The program notes that counterinsurgency–the functional context of the origin of the Internet–is at the foundation of the genesis of Nazism. At the conclusion of World War I, Germany was beset by a series of socialist/Communist uprisings in a number of cities, including Munich. Responding to that, underground Reichswehr units commanded by Ernst Rohm (later head of the SA) systematically assassinated the leaders of the revolution, as well as prominent social democrats and Jews, such as Walther Rathenau. In Munich, an undercover agent for the political department of the Reichswehr under General Von Lossow infiltrated the revolutionaries, pretending to be one of them.
Following the crushing of the rebellion and occupation of the city by Reichswehr units, that infiltrator identified the leaders of the revolution, who were then summarily executed. The infiltrator’s name was Adolf Hitler.
After the suppression of the rebellion, Hitler, Rohm and undercover Reichswehr agents infiltrated a moribund political party and turned it into an intelligence front for the introduction of the supposedly de-mobilized German Army into German society for the purpose of generating political reaction. That front was the German National Social Workers Party.
6. Next, the broadcast re-capitulates (from part of Miscellaneous Archive Show M11) Hitler’s speech to the Industry Club of Dusseldorf. This speech, which won the German industrial and financial elite over to the cause of the Nazi Party, equated democracy with Communism.
Manifesting a Social Darwinist perspective, Hitler opined that the [assembled] successful, accomplished were, by definition superior to others. If those, by definition, inferior people were allowed to control the political process, they would structure the social and economic landscape to their own benefit.
This, according to Hitler, would be counter-evolutionary.
What could possibly go wrong? That’s the big question raised by a new artificial intelligence system — Global Information Dominance Experiment (GIDE) — tasked with...well, reading in all available information and asking the question of what could possibly go wrong. Or rather, an AI tasked with predicting the future. The relatively near future. Not minutes or hours, but up to a few days. That’s the promise of late GIDE results, described as a cross-command event involving representatives from all 11 combatant commands in the US Department of Defense.
The GIDE doesn’t rely on new technology or new sources of data. Instead it sounds like the big innovation is simply the the incorporation of a wide variety information sources — from military sensors scattered around the globe to commercially and publicly available information — and machine learning tools to identify areas where human analysts should investigate further.
So, in one sense, this whole system sounds like a updated version of Total Information Awareness. Or rather, an update of PRISM (which was itself an update for Total Information Awareness), although it’s unclear if the full scope of the NSA’s informational trove will be accessible to the system. And that’s a very big question in terms of the scope of this: are the ‘information sources’ involved going to include the real-time global digital surveillance systems that have managed to hack basically ever network and smartphone on the planet with some sort of malware? We don’t know.
But if this is a super-PRISM-like system that includes extensive real-time internet spying capabilities and disparate data sources like satellite imagery, it raises the question of who is actually going to be running this system? Is this going to be run by the US military? Or contracted out to a company like Palantir? More questions that we have no answers to but based on historical precedent we shouldn’t be surprised if Palantir is involved. Is Peter Thiel, arguably the worlds leading fascist, being given prediction capabilities by the US government? It one more unanswered question.
It’s also worth noting how remarkably similar this sounds to the original mission of the internet back when it was a DARPA project: A system for collecting an analyzing disparate sources of information from around the globe. But it wasn’t just for generic analysis reasons. It was for counter-insurgency purposes. That’s part of the historical context we have to keep in mind with the announcement of this new predictive Total Information Awareness program: it’s not like this is just going to be used to predict North Korean missile launches. All sorts of major events could be predicted, including events like the outcomes of democratic elections and large public protests. Outcomes that can potentially be averted with the right secret measures:
““What we’ve seen is the ability to get way further — what I call left — left of being reactive to actually being proactive,” Gen. Glen D. VanHerck, commander of North American Aerospace Defense Command, or NORAD, and US Northern Command told reporters at a briefing last week. “And I’m talking not minutes and hours — I’m talking days.””
By achieving global information dominance, the US Military can ‘move left of being reactive to actually being proactive’. It’s a particularly positive way to describe the system.
And since the examples given of the kind of diverse types of information sources that go into this system include parking lot satellite imagery, it’s also worth recalling the story about parking lot satellite imagery being used to infer an uptick in hospital cases in Wuhan in November of 2019. In that case, it was National Center for Medical Intelligence (NCMI), a part of the Defense Intelligence Agency (DIA), reportedly carrying out the analysis. It’s the kind of story that hints at the GIDE project potentially spanning across numerous US military and intelligence agencies well beyond just the 11 combatant commands in the US DOD:
It’s that vast scope of this project that’s part of what makes is so significant. It’s not just a project aiming to yield the US global information dominance. It’s a project that requires the project itself achieve information dominance within the US national security state. And that again raises the question: so are any private companies involved with the data collection and analysis of this project? Fascist-owned companies, perhaps? We don’t know the answer, but an analysis of available information suggests it’s a very possible future scenario.