Dave Emory’s entire lifetime of work is available on a flash drive that can be obtained HERE. The new drive is a 32-gigabyte drive that is current as of the programs and articles posted by the fall of 2017. The new drive (available for a tax-deductible contribution of $65.00 or more.)
WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE.
You can subscribe to e‑mail alerts from Spitfirelist.com HERE.
You can subscribe to RSS feed from Spitfirelist.com HERE.
Please consider supporting THE WORK DAVE EMORY DOES.
This broadcast was recorded in one, 60-minute segment.
Introduction: Continuing this series, we begin a dive into the meat of the vitally important book from which the program takes its title. Yasha Levine’s summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called “privacy community” include:
- The Internet is a weapon, developed for counter-insurgency purposes.
- Big Tech firms network with the very intelligence services they publicly decry.
- Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated.
- The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect.
- The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect.
- The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose.
- Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.
After detailing the history of the development of the Internet by the national security establishment, Levine presents the story of the development of the Tor network.
Key points of analysis and discussion:
- Tor’s Silicon Valley backing: ” . . . . Privacy groups funded by companies like Google and Facebook, including the Electronic Frontier Foundation and Fight for the Future, were some of Tor’s biggest and most dedicated backers. Google had directly bankrolled its development, paying out generous grants to college students who worked at Tor during their summer vacations. Why would an Internet company whose entire business rested on tracking people online promote and help develop a powerful privacy tool? Something didn’t add up. . . .”
- Not surprisingly, Tor does not shield users from orgiastic data mining by Silicon Valley tech giants: ” . . . . Tor works only if people are dedicated to maintaining a strict anonymous Internet routine: using only dummy email addresses and bogus accounts, carrying out all financial transactions in Bitcoin and other cryptocurrencies, and never mentioning their real name in emails or messages. For the vast majority of people on the Internet—those who use Gmail, interact with Facebook friends, and shop on Amazon—you reveal your identity. These companies know who you are. They know your name, your shipping address, your credit card information. They continue to scan your emails, map your social networks, and compile dossiers. Tor or not, once you enter your account name and password, Tor’s anonymity technology becomes useless. . . .”
- Silicon Valley’s support for Tor is something of a “false bromide”: ” . . . . After all, Snowden’s leaked documents revealed that anything Internet companies had, the NSA had as well. I was puzzled, but at least I understood why Tor had backing from Silicon Valley: it offered a false sense of privacy, while not posing a threat to the industry’s underlying surveillance model. . . .”
- Tor is, in fact, financed by elements of the very same intelligence community and national security establishment that supposedly frustrated/“locked out” by Tor! ” . . . . But as I analyzed the organization’s financial documents, I found that the opposite was true. Tor had come out of a joint US Navy—DARPA military project in the early 2000s and continued to rely on a series of federal contracts after it was spun off into a private nonprofit. This funding came from the Pentagon, the State Department, and at least one organization that derived from the CIA. These contracts added up to several million dollars a year and, most years, accounted for more than 90 percent of Tor’s operating budget. Tor was a federal military contractor. It even had its own federal contracting number. . . This included Tor’s founder, Roger Dingledine, who spent a summer working at the NSA and who had brought Tor to life under a series of DARPA and Navy contracts. . . .”
Widely regarded as a champion of Internet freedom and privacy, the Electronic Frontier Foundation helped finance Tor and championed its use.
Key elements of discussion and analysis of the EFF/Tor alliance include:
- EFF’s early financing of Tor: ” . . . . . . . . In 2004, [Roger] Dingledine struck out on his own, spinning the military onion routing project into a non-profit corporation called the Tor Project and, while still funded by DARPA and the Navy, began scratching around for private funding. He got help from an unexpected ally: the Electronic Frontier Foundation (EFF), which gave Tor almost a quarter million dollars to keep it going while Dingledine looked for other private sponsors. The EFF even hosted Tor’s website. . . .”
- The EFF’s effusive praise for the fundamentally compromised Tor Project: ” . . . . ‘The Tor Project is a perfect fit for EFF, because one of our primary goals is to protect the privacy and anonymity of Internet users. Tor can help people exercise their First Amendment right to free, anonymous speech online.’ EFF’s technology manager Chris Palmer explained in a 2004 press release, which curiously failed to mention that Tor was developed primarily for military intelligence use and was still actively funded by the Pentagon. . . .”
- The EFF’s history of working with elements of the national security establishment: ” . . . . In 1994, EFF worked with the FBI to pass the Communications Assistance for Law Enforcement Act, which required all telecommunications companies to build their equipment so that it could be wiretapped by the FBI. In 1999, EFF worked to support NATO’s bombing campaign in Kosovo with something called the ‘Kosovo Privacy Support,’ which aimed to keep the region’s Internet access open during military action. Selling a Pentagon intelligence project as a grassroots privacy tool—it didn’t seem all that wild. . . .”
- In FTR #854, we noted that EFF co-founder John Perry Barlow was far more than a Grateful Dead lyricist/hippie icon: ” . . . . Indeed, in 2002, a few years before it funded Tor, EFF cofounder [John] Perry Barlow casually admitted that he had been consulting for intelligence agencies for a decade. It seemed that the worlds of soldiers, spies, and privacy weren’t as far apart as they appeared. . . .”
- EFF’s gravitas in the online privacy community lent Tor great credibility: ” . . . . EFF’s support for Tor was a big deal. The organization commanded respect in Silicon Valley and was widely seen as the ACLU of the Internet Age. The fact that it backed Tor meant that no hard questions would be asked about the anonymity tool’s military origins as it transitioned to the civilian world. And that’s exactly what happened. . . .”
In FTR #‘s 891 and 895, we noted the primary position of the Broadcasting Board of Governors in the development of the so-called “privacy” networks. The BBG is a CIA offshoot: “. . . . The BBG might have had a bland sounding name and professed a noble mission to inform the world and spread democracy. In truth, the organization was an outgrowth of the Central Intelligence Agency. . . . The bulk of the BBG is no longer funded from the CIA’s black budget, but the agency’s original cold War goal and purpose—subversion and psychological operations directed against countries deemed hostile to US interests—remain the same. The only thing that did change about the BBG is that today, more of its broadcasts are taking place online . . . .”
After documenting Radio Free Europe’s growth from the Nazi/Vichy run Radio France during World War II and RCA’s David Sarnoff’s involvement with the Transradio Consortium (which communicated vital intelligence to the Axis during the war), the program highlights the involvement of Gehlen operatives in the operations of Radio Free Europe, the seminal CIA broadcasting outlets.
The BBG (read “CIA”) became a major backer of the Tor Project: ” . . . . . . . . It was Wednesday morning, February 8, 2006, when Roger Dingledine got the email he had been badly waiting for. The Broadcasting Board of Governors had finally agreed to back the Tor Project. . . . Within a year, the agency increased Tor’s contract to a quarter million dollars, and then bumped it up again to almost a million just a few years later. The relationship also led to major contracts with other federal agencies, boosting Tor’s meager operating budget to several million dollars a year. . . .”
Yasha Levine sums up the essence of the Tor Project: ” . . . . The Tor Project was not a radical indie organization fighting The Man. For all intents and purposes, it was The Man. Or, at least, The Man’s right hand. . . . internal correspondence reveals Tor’s close collaboration with the BBG and multiple other wings of the US government, in particular those that dealt with foreign policy and soft-power projection. Messages describe meetings, trainings, and conferences with the NSA, CIA, FBI and State Department. . . . The funding record tells the story even more precisely. . . . Tor was subsisting almost exclusively on government contracts. By 2008, that included contracts with DARPA, the Navy, the BBG, and the State Department as well as Stanford Research Institute’s Cyber-Threat Analytics program. . . .”
Next, we begin chronicling the career of Jacob Appelbaum. A devotee of Ayn Rand, he became one of Tor’s most important employees and promoters. “. . . . Within months of getting the job, he assumed the role of official Tor Project spokesman and began promoting Tor as a powerful weapon against government oppression. . . . Over the next several years, Dingledine’s reports back to the BBG [read “CIA”–D.E.] were filled with descriptions of Appelbaum’s successful outreach. . . .”
Introducing a topic to be more fully explored in our next program, we note Appelbaum’s pivotal role in the WikiLeaks operation and his role in the adoption of Tor by WikiLeaks: ” . . . . Appelbaum decided to attach himself to the WikiLeaks cause. He spent a few weeks with Assange and the original WikiLeaks crew in Iceland as they prepared their first major release and helped secure the site’s anonymous submissions system using Tor’s hidden service feature, which hid the physical location of WikiLeaks servers and in theory made them much less susceptible to surveillance and attack. From then on, the WikiLeaks site proudly advertised Tor: ‘secure, anonymous, distributed network for maximum security.’ . . . . Appelbaum did his best to be Assange’s right-hand man. He served as the organization’s official American representative and bailed the founder of WikiLeaks out of tough spots when the heat from US authorities got too hot. Appelbaum became so intertwined with WikiLeaks that apparently some staffers talked about him leading the organization if something were to happen to Assange. . . . Assange gave Appelbaum and Tor wide credit for helping WikiLeaks. ‘Jake has been a tireless promoter behind the scenes of our cause,’ he told a reporter. ‘Tor’s importance to WikiLeaks cannot be underestimated.’ With those words, Appelbaum and the Tor Project became central heroes in the WikiLeaks saga, right behind Assange. . . .”
1. This segment of our series on Surveillance Valley takes up the development and operations of the Tor Project–the development of a supposedly secure Internet network. Tor is, in fact, financed by elements of the very same intelligence community and national security establishment that supposedly frustrated/“locked out” by Tor!
Key points of analysis and discussion:
- Tor’s Silicon Valley backing: ” . . . . Privacy groups funded by companies like Google and Facebook, including the Electronic Frontier Foundation and Fight for the Future, were some of Tor’s biggest and most dedicated backers. Google had directly bankrolled its development, paying out generous grants to college students who worked at Tor during their summer vacations. Why would an Internet company whose entire business rested on tracking people online promote and help develop a powerful privacy tool? Something didn’t add up. . . .”
- Not surprisingly, Tor does not shield users from orgiastic data mining by Silicon Valley tech giants: ” . . . . Tor works only if people are dedicated to maintaining a strict anonymous Internet routine: using only dummy email addresses and bogus accounts, carrying out all financial transactions in Bitcoin and other cryptocurrencies, and never mentioning their real name in emails or messages. For the vast majority of people on the Internet—those who use Gmail, interact with Facebook friends, and shop on Amazon—you reveal your identity. These companies know who you are. They know your name, your shipping address, your credit card information. They continue to scan your emails, map your social networks, and compile dossiers. Tor or not, once you enter your account name and password, Tor’s anonymity technology becomes useless. . . .”
- Silicon Valley’s support for Tor is something of a “false bromide”: ” . . . . After all, Snowden’s leaked documents revealed that anything Internet companies had, the NSA had as well. I was puzzled, but at least I understood why Tor had backing from Silicon Valley: it offered a false sense of privacy, while not posing a threat to the industry’s underlying surveillance model. . . .”
- Tor is, in fact, financed by elements of the very same intelligence community and national security establishment that supposedly frustrated/“locked out” by Tor! ” . . . . But as I analyzed the organization’s financial documents, I found that the opposite was true. Tor had come out of a joint US Navy—DARPA military project in the early 2000s and continued to rely on a series of federal contracts after it was spun off into a private nonprofit. This funding came from the Pentagon, the State Department, and at least one organization that derived from the CIA. These contracts added up to several million dollars a year and, most years, and, most years, accounted for more than 90 percent of Tor’s operating budget. Tor was a federal military contractor. It even had its own federal contracting number. . . This included Tor’s founder, Roger Dingledine, who spent a summer working at the NSA and who had brought Tor to life under a series of DARPA and Navy contracts. . . .”
- Far from frustrating intelligence surveillance, Tor augments that effort! ” . . . . Tor, as well as the larger app-obsessed privacy movement that rallied around it after Snowden’s NSA leaks, does not thwart the power of the US government. It enhances it. The disclosures about Tor’s inner workings I obtained from the Broadcasting Board of Governors have never been made public before now. The story they tell is vital to our understanding of the Internet; they reveal that American military and intelligence interests are so deeply embedded in the fabric of the network that they dominate the very encryption tools and privacy organizations that are supposed to be in opposition to them. There is no escape. . . .”
. . . . My problems had begun when I started digging into the Tor Project. I investigated Tor’s central role in the privacy movement after Edward Snowden presented the project as a panacea to surveillance on the Internet. I wasn’t convinced, and it didn’t take long to find a basis for my initial suspicions.
The first red flag was its Silicon Valley support. Privacy groups funded by companies like Google and Facebook, including the Electronic Frontier Foundation and Fight for the Future, were some of Tor’s biggest and most dedicated backers. Google had directly bankrolled its development, paying out generous grants to college students who worked at Tor during their summer vacations. Why would an Internet company whose entire business rested on tracking people online promote and help develop a powerful privacy tool? Something didn’t add up.
As I dug into the technical details of how Tor worked, I quickly realized that the Tor Project offers no protection against the private tracking and profiling Internet companies carry out. Tor works only if people are dedicated to maintaining a strict anonymous Internet routine: using only dummy email addresses and bogus accounts, carrying out all financial transactions in Bitcoin and other cryptocurrencies, and never mentioning their real name in emails or messages. For the vast majority of people on the Internet—those who use Gmail, interact with Facebook friends, and shop on Amazon—you reveal your identity. These companies know who you are. They know your name, your shipping address, your credit card information. They continue to scan your emails, map your social networks, and compile dossiers. Tor or not, once you enter your account name and password, Tor’s anonymity technology becomes useless.
Tor’s ineffectiveness against Silicon Valley surveillance made it an odd program for Snowden and other privacy activists to embrace. After all, Snowden’s leaked documents revealed that anything Internet companies had, the NSA had as well. I was puzzled, but at least I understood why Tor had backing from Silicon Valley: it offered a false sense of privacy, while not posing a threat to the industry’s underlying surveillance model.
What wasn’t clear, and what became apparent as I investigated Tor further, was why the US government supported it.
A big part of Tor’s mystique and appeal was that it was supposedly a fiercely independent and radical organization—an enemy of the state. Its official story was that it was funded by a wide variety of sources, which gave it total freedom to do whatever it wanted. But as I analyzed the organization’s financial documents, I found that the opposite was true. Tor had come out of a joint US Navy—DARPA military project in the early 2000s and continued to rely on a series of federal contracts after it was spun off into a private nonprofit. This funding came from the Pentagon, the State Department, and at least one organization that derived from the CIA. These contracts added up to several million dollars a year and, most years, accounted for more than 90 percent of Tor’s operating budget. Tor was a federal military contractor. It even had its own federal contracting number.
The deeper I went, the stranger it got. I learned that just about everyone involved in developing Tor was in some way tied up with the very state that they were supposed to be protecting people from. This included Tor’s founder, Roger Dingledine, who spent a summer working at the NSA and who had brought Tor to life under a series of DARPA and Navy contracts. I even uncovered an old audio copy of a talk Dingledine gave in 2004, right as he was setting up Tor as an independent organization. “I contract for the United States Government to build an anonymity technology for them and deploy it,” he admitted at the time. . . .
2. Far from frustrating intelligence surveillance, Tor augments that effort! ” . . . . Tor, as well as the larger app-obsessed privacy movement that rallied around it after Snowden’s NSA leaks, does not thwart the power of the US government. It enhances it. The disclosures about Tor’s inner workings I obtained from the Broadcasting Board of Governors have never been made public before now. The story they tell is vital to our understanding of the Internet; they reveal that American military and intelligence interests are so deeply embedded in the fabric of the network that they dominate the very encryption tools and privacy organizations that are supposed to be in opposition to them. There is no escape. . . .”
Surveillance Valley by Yasha Levine; Public Affairs Books [HC]; Copyright 2018 by Yasha Levine; ISBN 978–1‑61039–802‑2; pp. 223–234.
. . . . If Tor was truly the heart of the modern privacy movement and a real threat to the surveillance power of agencies like the NSA, why would the federal government—including the Pentagon, the parent of the NSA—continue to fund the organization? Why would the Pentagon support a technology that subverted its own power? It did not make any sense.
The documents in the box waiting on my doorstep contained the answer. Combined with other information unearthed during my investigation, they showed that Tor, as well as the larger app-obsessed privacy movement that rallied around it after Snowden’s NSA leaks, does not thwart the power of the US government. It enhances it.
The disclosures about Tor’s inner workings I obtained from the Broadcasting Board of Governors have never been made public before now. The story they tell is vital to our understanding of the Internet; they reveal that American military and intelligence interests are so deeply embedded in the fabric of the network that they dominate the very encryption tools and privacy organizations that are supposed to be in opposition to them. There is no escape. . . .
3. Widely regarded as a champion of Internet freedom and privacy, the Electronic Frontier Foundation helped finance Tor and championed its use.
Key elements of discussion and analysis of the EFF/Tor alliance include:
- EFF’s early financing of Tor: ” . . . . . . . . In 2004, [Roger] Dingledine struck out on his own, spinning the military onion routing project into a non-profit corporation called the Tor Project and, while still funded by DARPA and the Navy, began scratching around for private funding. He got help from an unexpected ally: the Electronic Frontier Foundation (EFF), which gave Tor almost a quarter million dollars to keep it going while Dingledine looked for other private sponsors. The EFF even hosted Tor’s website. . . .”
- The EFF’s effusive praise for the fundamentally compromised Tor Project: ” . . . . ‘The Tor Project is a perfect fit for EFF, because one of our primary goals is to protect the privacy and anonymity of Internet users. Tor can help people exercise their First Amendment right to free, anonymous speech online.’ EFF’s technology manager Chris Palmer explained in a 2004 press release, which curiously failed to mention that Tor was developed primarily for military intelligence use and was still actively funded by the Pentagon. . . .”
- The EFF’s history of working with elements of the national security establishment: ” . . . . In 1994, EFF worked with the FBI to pass the Communications Assistance for Law Enforcement Act, which required all telecommunications companies to build their equipment so that it could be wiretapped by the FBI. In 1999, EFF worked to support NATO’s bombing campaign in Kosovo with something called the ‘Kosovo Privacy Support,’ which aimed to keep the region’s Internet access open during military action. Selling a Pentagon intelligence project as a grassroots privacy tool—it didn’t seem all that wild. . . .”
- In FTR #854, we noted that EFF co-founder John Perry Barlow was far more than a Grateful Dead lyricist/hippie icon: ” . . . . Indeed, in 2002, a few years before it funded Tor, EFF cofounder [John] Perry Barlow casually admitted that he had been consulting for intelligence agencies for a decade. It seemed that the worlds of soldiers, spies, and privacy weren’t as far apart as they appeared. . . .”
- EFF’s gravitas in the online privacy community lent Tor great credibility: ” . . . . EFF’s support for Tor was a big deal. The organization commanded respect in Silicon Valley and was widely seen as the ACLU of the Internet Age. The fact that it backed Tor meant that no hard questions would be asked about the anonymity tool’s military origins as it transitioned to the civilian world. And that’s exactly what happened. . . .”
Surveillance Valley by Yasha Levine; Public Affairs Books [HC]; Copyright 2018 by Yasha Levine; ISBN 978–1‑61039–802‑2; pp. 227–228.
. . . . In 2004, [Roger] Dingledine struck out on his own, spinning the military onion routing project into a non-profit corporation called the Tor Project and, while still funded by DARPA and the Navy, began scratching around for private funding. He got help from an unexpected ally: the Electronic Frontier Foundation (EFF), which gave Tor almost a quarter million dollars to keep it going while Dingledine looked for other private sponsors. The EFF even hosted Tor’s website. To download the app, users had to browse to tor.eff.org, where they’d see a reassuring message from the EFF: “Your traffic is safe when you use Tor.”
Announcing its support, the EFF sang Tor’s praises. “The Tor Project is a perfect fit for EFF, because one of our primary goals is to protect the privacy and anonymity of Internet users. Tor can help people exercise their First Amendment right to free, anonymous speech online.” EFF’s technology manager Chris Palmer explained in a 2004 press release, which curiously failed to mention that Tor was developed primarily for military intelligence use and was still actively funded by the Pentagon.
Why would the EFF, a Silicon Valley advocacy group that positioned itself as a staunch critic of government surveillance programs, help sell a military intelligence communications tool to unsuspecting Internet users? Well, it wasn’t as strange as it seems.
EFF was only a decade old at the time, but it already had developed a history of working with law enforcement agencies and aiding the military. In 1994, EFF worked with the FBI to pass the Communications Assistance for Law Enforcement Act, which required all telecommunications companies to build their equipment so that it could be wiretapped by the FBI. In 1999, EFF worked to support NATO’s bombing campaign in Kosovo with something called the “Kosovo Privacy Support,” which aimed to keep the region’s Internet access open during military action. Selling a Pentagon intelligence project as a grassroots privacy tool—it didn’t seem all that wild. Indeed, in 2002, a few years before it funded Tor, EFF cofounder [John] Perry Barlow casually admitted that he had been consulting for intelligence agencies for a decade. It seemed that the worlds of soldiers, spies, and privacy weren’t as far apart as they appeared.
EFF’s support for Tor was a big deal. The organization commanded respect in Silicon Valley and was widely seen as the ACLU of the Internet Age. The fact that it backed Tor meant that no hard questions would be asked about the anonymity tool’s military origins as it transitioned to the civilian world. And that’s exactly what happened. . . .
7a. In FTR #‘s 891 and 895, we noted the primary position of the Broadcasting Board of Governors in the development of the so-called “privacy” networks. The BBG is a CIA offshoot: “. . . . The BBG might have had a bland sounding name and professed a noble mission to inform the world and spread democracy. In truth, the organization was an outgrowth of the Central Intelligence Agency. . . . The bulk of the BBG is no longer funded from the CIA’s black budget, but the agency’s original cold War goal and purpose—subversion and psychological operations directed against countries deemed hostile to US interests—remain the same. The only thing that did change about the BBG is that today, more of its broadcasts are taking place online . . . .”
. . . . The BBG might have had a bland sounding name and professed a noble mission to inform the world and spread democracy. In truth, the organization was an outgrowth of the Central Intelligence Agency. . . .
. . . . The bulk of the BBG is no longer funded from the CIA’s black budget, but the agency’s original cold War goal and purpose—subversion and psychological operations directed against countries deemed hostile to US interests—remain the same. The only thing that did change about the BBG is that today, more of its broadcasts are taking place online . . . .
7b. In our long series of interviews with Jim DiEugenio about his masterwork Destiny Betrayed, we highlighted veteran intelligence officer Walter Sheridan’s broadcast hatchet job on New Orleans D.A. Jim Garrison’s investigation of the JFK assassination. The TV hit piece was broadcast on the NBC network.
In our discussion of the Sheridan broadcast, we noted the efforts of RCA chief David Sarnoff in resurrecting the Nazi-run Radio France station and presiding over its conversion to Radio Free Europe, precursor to the BBG. (RCA is the parent company of NBC, which aired the Sheridan broadcast.) In resurrecting Radio France and midwiving its conversion to Radio Free Europe, Sarnoff, who is Jewish, was building on profound and treasonous Axis connections he maintained during the war.
Key points of analysis and discussion include David Sarnoff’s successful efforts to restore and expand the Nazi Radio France Station and re-brand it as “Radio Free Europe.” (Radio France was taken over by the Nazis and the Vichy puppet regime, and then sabotaged as the Third Reich withdrew from France. ” . . . . In 1944, Sarnoff worked for the complete restoration of the Nazi destroyed Radio France station in Paris until its signal was able to reach throughout Europe. It was then retitled Radio Free Europe. He later lobbied the White House to expand the range and reach of Radio Free Europe. At about this point, Radio Free Europe became a pet project of Allen Dulles. Sarnoff’s company, Radio Corporation of America, became a large part of the technological core of the NSA. . . . Robert was president of RCA, NBC’s parent company, at the time Sheridan’s special aired. David was chairman. . . .”
. . . . It is relevant to note here that General David Sarnoff, founder of NBC, worked for the Signal Corps during World War II as a reserve officer. In 1944, Sarnoff worked for the complete restoration of the Nazi destroyed Radio France station in Paris until its signal was able to reach throughout Europe. It was then retitled Radio Free Europe. He later lobbied the White House to expand the range and reach of Radio Free Europe. At about this point, Radio Free Europe became a pet project of Allen Dulles. Sarnoff’s company, Radio Corporation of America, became a large part of the technological core of the NSA. During the war, David’s son Robert worked in the broadcast arm of the Office of Strategic Services (OSS), the forerunner of the CIA. Robert was president of RCA, NBC’s parent company, at the time Sheridan’s special aired. David was chairman. . .
7c. In Trading with the Enemy, Charles Higham chronicled the deep involvement of David Sarnoff with the Transradio Consortium, which joined the Axis nations with the Western Allies in a telecommunications cartel that provided vital–and lethal–intelligence to the Axis during the war.
Key points of analysis and discussion include:
- Sarnoff’s RCA was part of the Transradio Consortium, something of a broadcast cartel melding Axis and Western Allied broadcast establishments: ” . . . . RCA was in partnership before and after Pearl Harbor with British Cable and Wireless; with Telefunken, the Nazi company; with Italcable, wholly owned by the Mussolini government; and with Vichy’s Compagnie Generale, in an organization known as the Transradio Consortium, with General Robert C. Davis, head of the New York Chapter of the American Red Cross, as its chairman. In turn, RCA, British Cable and Wireless, and the German and Italian companies had a share with ITT in TTP (Telegrafica y Telefonica del Plata), an Axis-controlled company providing telegraph and telephone service between Buenos Aires and Montevideo. Nazis in Montevideo could telephone Buenos Aires through TTP without coming under the control of either the state-owned system in Uruguay or the ITT system in Argentina. Messages, often dangerous to American security, were transmitted directly to Berlin and Rome by Transradio. Another shareholder was ITT’s German ‘rival,’ Siemens, which linked cables and networks with Behn south of Panama. . . .”
- Transradio Consortium was the vehicle for lethally treasonous communications during the war: ” . . . . But the public, which thought of Sarnoff as a pillar of patriotism, would have been astonished to learn of his partnership with the enemy through Transradio and TTP. The British public, beleaguered and bombed, would have been equally shocked to learn that British Cable and Wireless, 10 percent owned by the British government, and under virtual government control in wartime, was in fact also in partnership with the Germans and Italians through the same companies and proxies. . . . Simultaneously, the Transradio stations, according to State Department reports with the full knowledge of David Sarnoff, kept up a direct line to Berlin. The amount of intelligence passed along the lines can scarcely be calculated. The London office was in constant touch with New York throughout the war, sifting through reports from Argentina, Brazil, and Chile and sending company reports to the Italian and German interests. . . .”
. . . . In South America, Sosthenes Behn was in partnership (as well as rivalry) with an even more powerful organism: the giant Radio Corporation of America, which owned the NBC radio network. RCA was in partnership before and after Pearl Harbor with British Cable and Wireless; with Telefunken, the Nazi company; with Italcable, wholly owned by the Mussolini government; and with Vichy’s Compagnie Generale, in an organization known as the Transradio Consortium, with General Robert C. Davis, head of the New York Chapter of the American Red Cross, as its chairman. In turn, RCA, British Cable and Wireless, and the German and Italian companies had a share with ITT in TTP (Telegrafica y Telefonica del Plata), an Axis-controlled company providing telegraph and telephone service between Buenos Aires and Montevideo. Nazis in Montevideo could telephone Buenos Aires through TTP without coming under the control of either the state-owned system in Uruguay or the ITT system in Argentina.
Messages, often dangerous to American security, were transmitted directly to Berlin and Rome by Transradio. Another shareholder was ITT’s German “rival,” Siemens, which linked cables and networks with Behn south of Panama.
The head of RCA during World War II was Colonel David Sarnoff, a stocky, square-set, determined man with a slow, subdued voice, who came from Russia as an immigrant at the turn of the century and began as a newspaper seller, messenger boy, and Marconi Wireless operator. . . .
. . . . After Pearl Harbor, Sarnoff cabled Roosevelt, “All of our facilities and personnel are ready and at your instant service. We await your command.” Sarnoff played a crucial role, as crucial as Behn’s, in the U.S. war effort, and, like Behn, he was given a colonelcy in the U.S. Signal Corps. He solved complex problems, dealt with a maze of difficult requirements by the twelve million members of the U.S. armed forces, and coordinated details related to the Normandy landings. He prepared the whole printed and electronic press-coverage of V‑J day; in London in 1944, with headquarters at Claridge’s Hotel, he was Eisenhower’s inspired consultant and earned the Medal of Merit for his help in the occupation of Europe.
Opening in 1943 with a chorus of praise from various generals, the new RCA laboratories had proved to be indispensable in time of war.
But the public, which thought of Sarnoff as a pillar of patriotism, would have been astonished to learn of his partnership with the enemy through Transradio and TTP. The British public, beleaguered and bombed, would have been equally shocked to learn that British Cable and Wireless, 10 percent owned by the British government, and under virtual government control in wartime, was in fact also in partnership with the Germans and Italians through the same companies and proxies. . . .
. . . . Simultaneously, the Transradio stations, according to State Department reports with the full knowledge of David Sarnoff, kept up a direct line to Berlin. The amount of intelligence passed along the lines can scarcely be calculated. The London office was in constant touch with New York throughout the war, sifting through reports from Argentina, Brazil, and Chile and sending company reports to the Italian and German interests.
7d. Relying on Gehlen “org” personnel and alumni, Radio Free Europe built effectively up from fascist foundations to corresponding functional reality:
Surveillance Valley by Yasha Levine; Public Affairs Books [HC]; Copyright 2018 by Yasha Levine; ISBN 978–1‑61039–802‑2; p. 232.
. . . . In some cases, the stations, especially those targeting Ukraine, Germany, and the Baltic States, were staffed by known Nazi collaborators and broadcast anti-Semitic propaganda. . . .
8. The BBG (read “CIA”) was a major backer of the Tor Project: ” . . . . . . . . It was Wednesday morning, February 8, 2006, when Roger Dingledine got the email he had been badly waiting for. The Broadcasting Board of Governors had finally agreed to back the Tor Project. . . . Within a year, the agency increased Tor’s contract to a quarter million dollars, and then bumped it up again to almost a million just a few years later. The relationship also led to major contracts with other federal agencies, boosting Tor’s meager operating budget to several million dollars a year. . . .”
. . . . It was Wednesday morning, February 8, 2006, when Roger Dingledine got the email he had been badly waiting for. The Broadcasting Board of Governors had finally agreed to back the Tor Project. . . .
. . . . The Broadcasting Board of Governors, or BBG, seemed to offer a compromise. A large federal agency with close ties to the State Department, BBG ran America’s foreign broadcasting operation: Voice of America, Radio Free Europe/Radio Liberty, and Radio Free Asia. It was a government agency, so that wasn’t ideal. But at least it had an altruistic-sounding mission: “to inform, engage, and connect people around the world in support of freedom and democracy.” Anyway, government or not, Dingledine didn’t have much choice. Money was tight and this seemed to be the best he could line up. So he said yes.
It was a smart move. The initial $80,000 was just the beginning. Within a year, the agency increased Tor’s contract to a quarter million dollars, and then bumped it up again to almost a million just a few years later. The relationship also led to major contracts with other federal agencies, boosting Tor’s meager operating budget to several million dollars a year. . . .
9. The essence of the Tor Project: ” . . . . The Tor Project was not a radical indie organization fighting The Man. For all intents and purposes, it was The Man. Or, at least, The Man’s right hand. . . . internal correspondence reveals Tor’s close collaboration with the BBG and multiple other wings of the US government, in particular those that dealt with foreign policy and soft-power projection. Messages describe meetings, trainings, and conferences with the NSA, CIA, FBI and State Department. . . . The funding record tells the story even more precisely. . . . Tor was subsisting almost exclusively on government contracts. By 2008, that included contracts with DARPA, the Navy, the BBG, and the State Department as well as Stanford Research Institute’s Cyber-Threat Analytics program. . . .”
. . . . The correspondence left little room for doubt. The Tor Project was not a radical indie organization fighting The Man. For all intents and purposes, it was The Man. Or, at least, The Man’s right hand. Intermixed with updates on new hires, status reports, chatty suggestions for hikes and vacation spots, and the usual office banter, internal correspondence reveals Tor’s close collaboration with the BBG and multiple other wings of the US government, in particular those that dealt with foreign policy and soft-power projection. Messages describe meetings, trainings, and conferences with the NSA, CIA, FBI and State Department. There are strategy sessions and discussions about the need to influence news coverage and control bad press. The correspondence also shows Tor employees taking orders from their handlers in the federal government, including plans to deploy their anonymity tool in countries deemed hostile to US interests; China, Iran, Vietnam, and, of course, Russia. . . .
. . . . The funding record tells the story even more precisely. . . . Tor was subsisting almost exclusively on government contracts. By 2008, that included contracts with DARPA, the Navy, the BBG, and the State Department as well as Stanford Research Institute’s Cyber-Threat Analytics program. . . .
10. Next, we highlight the career of Jacob Appelbaum, the American WikiLeaker. This supposed “progressive” is a devotee of Ayn Rand.
Surveillance Valley by Yasha Levine; Public Affairs Books [HC]; Copyright 2018 by Yasha Levine; ISBN 978–1‑61039–802‑2; p. 239.
. . . . Like most young libertarians, he was enchanted by Ayn Rand’s The Fountainhead, which he described as one of his favorite books. “I took up this book while I was traveling around Europe last year. Most of my super left wing friends really dislike Ayn Rand for some reason or another. I cannot even begin to fathom why, but hey, to each their own,” he wrote in his blog diary. “While reading The Fountainhead, I felt like I was reading a story about people that I knew in my everyday life. The characters were simple. The story was simple. What I found compelling was the moral behind the story. I suppose it may be summed up in one line . . . Those that seek to gather you together for selfless actions, wish to enslave you for their own gain.” . . . .
11. Appelbaum went to work for the Tor Project and did much to foster use of the network: “. . . . Within months of getting the job, he assumed the role of official Tor Project spokesman and began promoting Tor as a powerful weapon against government oppression. . . . Over the next several years, Dingledine’s reports back to the BBG [read “CIA”–D.E.] were filled with descriptions of Appelbaum’s successful outreach. . . .”
. . . . And in 2008, Appelbaum finally got his dream job—a position that could expand with his giant ego and ambition.
In April of that year, Dingledine hired him as a full-time Tor contractor. He had a starting salary of $96,000 plus benefits and was put to work making Tor more user-friendly. He was a good coder, but he didn’t stay focused on the technical side for long. As Dingledine discovered, Appelbaum proved better and much more useful at something else: branding and public relations. . . .
. . . . Within months of getting the job, he assumed the role of official Tor Project spokesman and began promoting Tor as a powerful weapon against government oppression. . . .
. . . . Over the next several years, Dingledine’s reports back to the BBG [read “CIA”–D.E.] were filled with descriptions of Appelbaum’s successful outreach. “Lots of Tor advocacy,” wrote Dingledine. “Another box of Tor stickers applied to many laptops. Lots of people were interested in Tor and many people installed Tor on both laptops and servers. This advocacy resulted in at least two new high bandwidth nodes that he helped the administrators configure.” Internal documents show that the proposed budget for Dingledine and Appelbaum’s global publicity program was $20,000 a year, which included a public relations strategy. “Crafting a message that the media can understand is a critical piece of this,” Dingledine explained in a 2008 proposal. “This isn’t so much about getting good press about Tor as it is about preparing journalists so if they see bad press and consider spreading it further, they’ll stop and think.” . . . .
12. Next, we discuss Appelbaum’s networking with Julian Assange, and how that liaison led to Tor being used for the allegedly secure, anonymous WikiLeaks operation.
” . . . . Appelbaum decided to attach himself to the WikiLeaks cause. He spent a few weeks with Assange and the original WikiLeaks crew in Iceland as they prepared their first major release and helped secure the site’s anonymous submissions system using Tor’s hidden service feature, which hid the physical location of WikiLeaks servers and in theory made them much less susceptible to surveillance and attack. From then on, the WikiLeaks site proudly advertised Tor: ‘secure, anonymous, distributed network for maximum security.’ . . . . Appelbaum did his best to be Assange’s right-hand man. He served as the organization’s official American representative and bailed the founder of WikiLeaks out of tough spots when the heat from US authorities got too hot. Appelbaum became so intertwined with WikiLeaks that apparently some staffers talked about him leading the organization if something were to happen to Assange. . . . Assange gave Appelbaum and Tor wide credit for helping WikiLeaks. ‘Jake has been a tireless promoter behind the scenes of our cause,’ he told a reporter. ‘Tor’s importance to WikiLeaks cannot be underestimated.’ With those words, Appelbaum and the Tor Project became central heroes in the WikiLeaks saga, right behind Assange. . . .”
. . . . Jacob Appelbaum and Julian Assange had met in Berlin sometime in 2005, just as the mysterious Australian hacker was getting ready to set WikiLeaks in motion. . . .
. . . . Appelbaum decided to attach himself to the WikiLeaks cause. He spent a few weeks with Assange and the original WikiLeaks crew in Iceland as they prepared their first major release and helped secure the site’s anonymous submissions system using Tor’s hidden service feature, which hid the physical location of WikiLeaks servers and in theory made them much less susceptible to surveillance and attack. From then on, the WikiLeaks site proudly advertised Tor: “secure, anonymous, distributed network for maximum security.” . . . .
. . . . Assange was suddenly one of the most famous people in he world—a fearless radical taking on the awesome power of the United States. Appelbaum did his best to be Assange’s right-hand man. He served as the organization’s official American representative and bailed the founder of WikiLeaks out of tough spots when the heat from US authorities got too hot. Appelbaum became so intertwined with WikiLeaks that apparently some staffers talked about him leading the organization if something were to happen to Assange. But Assange kept firm control of WikiLeaks, even after he was forced to go into hiding at the Ecuadorian embassy in London to escape extradition back to Sweden to face an investigation of rape allegations.
It’s not clear whether Assange knew that Appelbaum’s salary was being paid by the same government he was trying to destroy. What is clear is that Assange gave Appelbaum and Tor wide credit for helping WikiLeaks. “Jake has been a tireless promoter behind the scenes of our cause,” he told a reporter. “Tor’s importance to WikiLeaks cannot be underestimated.”
With those words, Appelbaum and the Tor Project became central heroes in the WikiLeaks saga, right behind Assange. . . .
Peter Thiel created news a couple days ago when he suggested during a speech at the National Conservatism Conference that Google should be investigated for possible treason over what Thiel describes as Google’s decision to cooperate with the Chinese government but not the US government and the infiltration of Google’s executive board by the Chinese government. Thiel’s charges were made in the context of a discussion about the potential military applications of AI and the nation-state AI race created by this potential military use and a reference to the parallel stories of Google agreeing to work with the Chinese government in building a censored search engine at the same time Google ended a contract with the US Department of Defense that allowed the DOD to use Google’s artificial intelligence tools to analyze drone footage. So it’s going to be interesting to see how Google responds. Not just a response defending itself from Thiel’s charges but also a response hitting back at Palantir.
What unpleasant things about Palantir and Thiel might Google decide to start talking about? We’ll see, but it looks like Thiel is itching to start a Silicon Valley Defense Contractor fight. Presumably part of the motive is to gain advantage in the bidding wars for national security AI government contracts.
But given that Thiel’s comments happened on Sunday, the same day President Trump’s high-profile pre-announced multi-city mass deportation ICE raids of undocumented immigrants started, it’s worth keeping in mind that part of the motive for Thiel’s decision to pick a fight with Google may have involved preemptively deflecting attention away from the role Palantir plays in providing mass databases of immigrants for ICE. Palantir’s software is used to build profiles on immigrants by merging databases from multiple sources including DHS and the FBI. So it’s going to be interesting to see if Google ends up finding a way to publicly bring up Palantir’s role building immigrant databases for ICE.
But as the following article makes clear, Palantir isn’t the only Silicon Valley contractor building large comprehensive databases about people for the US government. The Department of Homeland Security’s Office of Biometric Identity Management is replacing its biometric analysis platform. The current system, called the the Automated Biometric Identification System, or IDENT, is a database of biometric data and biographical data collected by government agencies, including the Transportation Security Administration, Customs and Border Protection, Secret Service and other DHS agencies. IDENT is billed as allowing officials to quickly identify suspected terrorists, immigration violators, criminals and anyone else included in their databases. So it’s worth keeping that mass biometrics could be part of any current of future mass immigration raids. The capability is already there in IDENT, and now that system is getting an upgrade.
The planned new biometrics system, the Homeland Advanced Recognition Technology System, or HART, will expand on those capabilities with tools that can identify individuals based on DNA, palm prints, scars, physical markings and tattoos.
Northrop Grumman won a $95 million contract to develop the first two stages of the HART system but that contract will expire in 2021. The government is going to be soliciting bids for the next phase of development, so that’s going to be a bidding war to watch since the winner is going to get to get access to that massive biometric database.
DHS can also access the State Department’s Consular Consolidated Database of 500 million passport, visa, and expat records, along with the databases of “several foreign governments as well as state, local, tribal and territorial law enforcement agencies.” In addition, DHS shares its biometric database with other government agencies like the DOD and FBI, so the HART database is going to draw information in from more than just the DHS’s agencies and then shared with more than just DHS.
There’s another aspect of HART that’s going to be contracted out and the contractor has already been selected: while IDENT was hosted on government-run servers, the new HART system will be hosted on Amazon’s cloud for government services (the “GovCloud”), which should make accessing it much easier for all sorts of agencies. As the article notes, Amazon already provides cloud services for sensitive information for the CIA, DOD, NASA, and other federal agencies. So at this point we can be confident that Amazon is going to be really, really, really good at identifying specific individuals for the foreseeable future:
“Whereas IDENT stores records in government-run data centers, the Homeland Security solicitation states “HART will reside in the Amazon Web Services (AWS) FedRAMP certified GovCloud.” Further, “biometric matching capabilities for fingerprint, iris, and facial matching will be integrated with HART in the Amazon Web Services GovCloud.” Amazon Web Services will also store HART’s biometric image data.”
Well, let’s hope Amazon’s GovCloud doesn’t get hacked. And keeps its GovCloud employees happy.
when it comes to future mass deportation ICE raids, it sounds like the HART system will be central to that since it will allow officials to quickly identify suspected immigration law violators:
You have to wonder if Palantir’s database of profiles on immigrants will be incorporated into the HART system. You also have to wonder if Palantir is going to get access to the system. Based on Palantir’s business model is seems like exactly the kind of database Palantir would get access to. And that points towards one of the other big questions for this planned system: we know government agencies outside of DHS will be able to access it. But how about all the Silicon Valley contractors working for the government like Palantir, Google, and all the rest. Will they also get to access HART as part of their government work? If so, we should probably expect more than just Amazon to get really, really, really good at identifying people, including people targeted for politicized mass deportations.
Here’s a story worth keeping an regarding the growing role that Amazon’s cloud services has in hosting sensitive data for the US government, like the planned DHS biometric database that’s going to be hosted Amazon’s cloud: When it comes to the CIA’s existing $600 million cloud computing contract, Amazon has long been the exclusive provider. But the CIA has big plans for spending “tens of billions” on dollars on an upgrade to its cloud capabilities. But this time the contract is going to be going to multiple cloud service providers.
Interestingly, the documents for the planned contract indicate that the planned cloud will need to support cloud connections at “tactical edge locations,” implying that it’s going to be used for intelligence-gathering operations worldwide, something analogous to the vision of Project Agile in the 1960’s covered in Surveillance Valley.
So it sounds like there’s going to be multiple tech giants involved in hosting the CIA’s sensitive secrets going forward and the cloud is going to be built to touch the entire globe:
“The agency’s decision to award the contract to more than one company could prove to be a major departure from its past cloud computing efforts, which have almost exclusively involved Amazon. The C2E contract is sure to become a source of intense competition between the two leading U.S. commercial cloud providers, Amazon and Microsoft. And other competitors including IBM, Oracle and Google may see an opportunity to gain market share.”
Will competition between multiple cloud computing giants lead to a better and cheaper CIA cloud? We’ll find out. We’ll also find out, but not the the Department of Defense is sticking with just a single provider for its planned cloud (and it looks like Amazon will probably get that contract):
And note how the CIA’s cloud is going to have to be accessible at “tactical edge locations”, which implies that the cloud is going to have to be somehow accessible not just from battlefield locations but also from places like behind China’s internet firewall:
Given that the CIA is planning on its future cloud being used for intelligence-gathering purposes which implies accessing it over the internet in countries like China, we should probably expect a lot more boosting by the US government of services like Tor that were tailor made for spies.
As we can see, Amazon is definitely going to be much more closely fused with the overall US national security apparatus in the coming decades. And some yet-to-be-chosen cloud server competitors will also have a very cozy relationship with the CIA too.
So with all that in mind, here’s reminder that any spies embedded in workforce maintaining this vast national security cloud infrastructure are probably going to be involved in a lot of intelligence gathering of their own: Capital One just announced massive hack involving the personal data of over 100 million people. The data includes 140,000 Social Security numbers and 80,000 bank account numbers. The data was stolen from an Amazon Web Services server Capitol One was using. It appears that a misconfiguration of the server’s firewall by Capitol One was what left the server vulnerable, so it wasn’t a problem with Amazon’s actual infrastructure. But there was one part of Amazon’s infrastructure that was compromised: the hacker was a former Amazon Web Services engineer who worked on the same server business Capitol One was using:
“While the breach was possible because of a security lapse by Capital One, it was aided by Ms. Thompson’s expertise. Information posted on social media shows she worked at one time for Amazon, as an engineer for the same server business that court papers said Capital One was using.”
Being a former AWS engineer was no doubt quite helpful in executing this hack. And note that this isn’t the kind of thing Amazon can defend against since it was Capital One’s own staff who was responsible for configuring the firewall:
And if these kinds of technical mistakes seem like the thing defense contractors and national security employees working on these clouds with sensitive information aren’t likely to make, recall the story from 2017 about a top defense contractor leaving a cache of 60,000 files filled with sensitive information including passwords on an Amazon cloud server that was left exposed to the internet with no password protection. And, of course, there’s the whole Snowden affair. Keep in mind that CIA uses security contractors too, like Palantir, so that 2017 data breach nightmare story could be a prelude to a future deluge of similar stories. Along those lines, it’s worth asking how much access direct Palantir will have to the information in these upcoming CIA and DOD clouds.
Also note the hacker in this case, Paige Thompson, appears to have mental health issues and was seemingly trying to get caught. That’s the reason this hack was caught. The hacker openly bragged about it. The future hackers of these national security clouds presumably won’t be as open.
So at this point it’s clear that Amazon’s cozy relationship with the US national security state is poised to get a lot cozier and the company is going to be privy to a vast trove of highly sensitive national security information. Whether or not the rest of the world ends up getting access to this trove presumably depends on the security of those future clouds. Uh oh.
Tales of digital basketcases are nothing new for Silicon Valley. But if the latest Silicon Valley whistleblower’s claims are even partially true we really have to wonder just how bad it is inside the company. Because according to the company’s former security chief, Peter Zatko, the company is suffering from a pretty serious rogue employee problem. Rogue senior employees. In particular, the senior employees in charge of overseeing security issues. The way Zatko describes it, there’s a group of senior managers who routinely prioritize new-user growth over security. And these same managers hide information about subsequent security violations from the board of directors. Zatko was only hired in 2020, so he presumably witnessed a nightmare situation before quitting and going public.
So is Twitter just another irresponsible Silicon Valley entity prioritizing profits over user safety and security? Yes, but as we’re going to see in the MintPress report below from back in June, we shouldn’t necessarily assume that rampant greed and negligence are the only factors here. Because as that report describes, Twitter has been on a hiring spree. A national security hiring spree from agencies like the FBI, CIA, or think-tanks like the Atlantic Council for positions overseeing areas like cybercrime and disinformation. So when we learn that Twitter has filling its senior management in areas like cybercrime and disinformation with members of the national security community, and then learn that the senior management has been hiding rampant abuses from the board of directors, we have to ask: are these the same senior managers that we’re talking about in both stories? Because if so, this is a much larger and more complicated story:
“In July, he filed a complaint with the US Securities and Exchange Commission accusing Twitter of violating its 2011 agreement with the Federal Trade Commission (FTC) to maintain safe security practices. Somehow, the Washington Post got its hands on a copy and has made it available on the web. It’s 84 pages long, and heavily censored, but it makes for riveting reading.”
An 84 page long report on Twitter’s years of flagrant security violations. Sounds like a riveting read. And according to Peter Zaitko’s report, it’s senior Twitter executives who are leading the security coverups inside the company. So this isn’t an issue with negligent management allowing low-level employees to lackadaisically uphold Twitter’s internal security controls. This is about senior executives making the cynical decision to coverup security problems and priority user growth:
And note now Zaitko only joined Twitter in 2020. And yet his report reportedly details years of lapses. That suggests Zaitko walked into an absolute nightmare situation that many people in the company were already well aware of. He had to get all those historic details in that report from somewhere.
Also note that Zatko didn’t join Stripe until 2017, four years after Saikat Chakrabarti left the company. So while it would have been interesting to learn that Zakto’s and Chakrabarti’s time at Stripe overlapped, that’s not the case:
So with Twitter facing accusations of rampant internal security lapses that senior executives know about and are hiding this information from the board of directors, here’s an excerpt from a MintPress report back in June that puts this whistleblowing in an even more remarkable context. Because it turns out Twitter has been on a national security hiring spree, with dozens of senior personnel from agencies like the FBI and CIA and think-tanks like the Atlantic Council making up a number of senior positions inside the company. Positions directly involved with overseeing cybercrime and disinformation. This even involves the employment of active duty military officers, including active members of a UK psychological warfare unit. Beyond that, groups like the Stanford Internet Observatory and the Australian Strategic Policy Institute (ASPI) have direct feeds to the company with list of accounts they want taken down. And it’s not just Twitter. This is the Silicon Valley norm:
“When asked to comment by MintPress, former FBI agent and whistleblower Coleen Rowley said that she was “not surprised at all” to see FBI agents now working for the very tech companies the agency polices, stating that there now exists a “revolving door” between the FBI and the areas they are trying to regulate. This created a serious conflict of interests in her mind, as many agents have one eye on post-retirement jobs. “The truth is that at the FBI 50% of all the normal conversations that people had were about how you were going to make money after retirement,” she said.”
An FBI career as a stepping stone to corporate shilling. That’s the way FBI whistle-blower Coleen Rowley characterized her recollection of life inside the agency. It would be an alarming enough anecdote to hear on its own, but we hearing this in the context of a report on how Twitter has been hiring one senior FBI agent after another. As Rowley describes, it’s a troubling conflict of interest. A multi-faceted conflict of interest. And not just for FBI agents thinking dreaming about their corporate payouts. It’s a problem for Twitter, which appears to have an exceptionally close working relationship with the FBI. So close that the FBI was basically feeding the company lists of accounts to delete. Would this kind of FBI-to-Twitter-action pipeline exist if that cluster of former senior FBI agents weren’t in leadership roles at the company? It’s one of the questions raised by this report:
And as the report points out, the FBI is just one of the state security agencies Twitter has been aggressively recruiting from. For starters, there’s the Atlantic Council, which has been playing a leading role in recent years in providing ‘analysis’ regarding disinformation. Analysis that, itself, is basically weaponized disinformation put out by outfits like PropOrNot. And note how we can’t really say with 100% certainty that Atlantic Council employee Michael Weiss was the figure behind PropOrNot because it was rolled out anonymously back in 2016, and appears to also have ties to OUN-affiliated organizations in Ukraine. So Twitter was following the lead of anonymized Ukrainian fascist disinformation out operating in partnership with the the Atlantic Council, and later hired an Atlantic Council employee, Kanishk Karan, for a role controlling the disinformation allowed on the platform. It’s a problem:
And then there are the hires directly from NATO or an active British psychological warfare officer. How many other active duty military officers are directly employed by the company?
And as the article reminds us, we’ve known for over a decade that the US military had already developed sophisticated sock-puppet management software platforms designed to allowed for elaborate human-managed mass-sockpuppetry. How inclined would any of the former US national security employees be to flag sock puppetry emanating from US agencies? Presumably not very inclined:
But it’s not like Twitter has to actively hire figures from these kind of national security-connected groups to follow their lead. The company will just follow their lead ‘in partnership’ with these groups, like when it deleted dozens of accounts for “undermining faith in NATO” at the request of the Stanford Internet Observatory. Recall how the Stanford Internet Observatory is heading by Renee DiResta, the same person who wrote that Senate Report as part of her work at New Knowledge, the same firm that created the fake ‘Russian bot’ network in the 2017 Alabama Senate race. Let’s hope the observatory isn’t involved with any more fake ‘Russian bot’ campaigns, because they definitely won’t be flagging them as part of this partnership:
Similarly, we also find the Australian Strategic Policy Institute (ASPI) playing a special role when it comes to Twitter’s policies towards the banning of Chinese accounts. Recall how the ASPI is directly connected to the Australian military and has been sponsoring the ‘research’ of Adrian Zenz purporting to show mass genocide being perpetrated by the Chinese government against its Quighur population. Interestingly, we find that Chinese-own TikTok has also been hiring figures from the Atlantic Council, NATO, the CIA and the State Department. You have to wonder if these hires played a role in the US government’s decision to drop the Trump-era TikTok ban:
Finally, regarding the observation that Twitter only seems to ever find violations coming from countries on the US government, recall how this was basically the same pattern we saw when looking at Microsoft’s hacking campaign reports, where Russia, China, Iran, and North Korea were routinely declared the sole culprits of state-backed hacking. It sure sounds familiar:
You get what you pay for, and Twitter is clearly paying for the kind of selective policing that will keep it on the US government’s good side.
Sure, these hires do likely possess the skills Twitter is looking for to fill these roles. It’s not like they’re hired to do nothing. But it’s the fact that these roles appear to include the role of unofficial enforcers of US foreign policy that makes these hires problematic.
But also keep in mind that Twitter is one of the most valuable intelligence sources on the planet. So when we hear from figures like Zatko about the rampant internal security violations taking place with the awareness of these senior executives, we have to ask how much of that is to just facilitate the extraction of that data for intelligence purposes.
It’s all a reminder that the idea of ‘checks and balances’ in democratic societies includes a balance between public and private actors. Government officials aren’t supposed to be playing senior roles in private entities. And while these employees aren’t technically government employees anymore (with the exception of the active duty officers) it’s pretty clear that’s how they’re operating, which is why Twitter hired them in the first place. It’s a pretty serious conflict of interest. And one that isn’t making Twitter users any safer either.