Dave Emory’s entire lifetime of work is available on a flash drive that can be obtained HERE. The new drive is a 32-gigabyte drive that is current as of the programs and articles posted by early winter of 2017. The new drive (available for a tax-deductible contribution of $65.00 or more.) (The previous flash drive was current through the end of May of 2012.)
WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE.
You can subscribe to e‑mail alerts from Spitfirelist.com HERE.
You can subscribe to RSS feed from Spitfirelist.com HERE.
You can subscribe to the comments made on programs and posts–an excellent source of information in, and of, itself HERE.
This broadcast was recorded in one, 60-minute segment.
Introduction: One of the illusions harbored by many–in particular, young people who have grown up with the internet, social networks and mobile technology–sees digital activity as private. Nothing could be further from the truth. Even before the cyber-libertarian policies advocated by individuals like John Perry Barlow, Eddie Snowden, Julian Assange and others became manifest in the Trump administration’s were implemented by the Trump administration and the GOP-controlled congress, digital affairs were subject to an extraordinary degree of manipulation by a multitude of interests.
We begin our examination of technocratic fascism with a look at the corporate foundation of Pokemon Go. Information about the background of Pokemon Go’s developer (Niantic) and the development of the firm is detailed in an article from Network World. In addition to the formidable nature of the intelligence agencies involved with generating the corporate foundation of Pokemon Go (Keyhole, Inc.; Niantic), note the unnerving nature of the information that can be gleaned from the Android phone of anyone who downloads the “app.”
Pokemon Go was seen as enhancing the “Cool Japan Strategy” of Prime Minister Shinzo Abe. The “Cool Japan Promotion Fund” was implemented by Abe (the grandson of Nobosuke Kishi, a Japanese war criminal who signed Japan’s declaration of war against the U.S. and became the country’s first postwar Prime Minister) to “raise the international profile of the country’s mass culture.”
The Finance Minister of Japan is Taro Aso, one of the enthusiasts of Nazi political strategy highlighted below. The “Cool Japan promotion Fund” would have been under his administration, with Tomomi Inada functioning as his administrator for the program. Now serving as Japan’s Defense Minister, Inada is another advocate of Nazi political strategy.
Next, we turn to another manifestation of Pokemon Go. The “Alt-Right” (read “Nazi”) movement is using Pokemon Go to recruit kids to the Nazi cause. Consider this against the background of Niantic, the Cool Japan strategy and the pro-Nazi figures involved with it. Consider this also, in conjunction with the Nazified AI developed and deployed by Robert and Rebekah Mercer, Steve Bannon, Cambridge Analytica and the “Alt-Right” milieu with which they associate.
A recent New Yorker article by Jane Mayer concerning Robert Mercer keys some interesting thoughts about Mercer, Bannon, the Alt-Right WikiLeaks and the Nazified AI we spoke of in FTR #‘s 948 and 949. In FTR #946, we noted this concatenation’s central place in the Facebook constellation, a position that has positioned them to act decisively on the political landscape.
We note several things about the Mayer piece:
- She writes of Mercer’s support for the Alt-Right–Mercer helps fund Bannon’s Breitbart: “. . . . In February, David Magerman, a senior employee at Renaissance, spoke out about what he regards as Mercer’s worrisome influence. Magerman, a Democrat who is a strong supporter of Jewish causes, took particular issue with Mercer’s empowerment of the alt-right, which has included anti-Semitic and white-supremacist voices. . . .”
- Mercer is racist, feeling that racism only exists in contemporary black culture: “. . . . Mercer, for his part, has argued that the Civil Rights Act, in 1964, was a major mistake. According to the onetime Renaissance employee, Mercer has asserted repeatedly that African-Americans were better off economically before the civil-rights movement. (Few scholars agree.) He has also said that the problem of racism in America is exaggerated. The source said that, not long ago, he heard Mercer proclaim that there are no white racists in America today, only black racists. . . .”
- His work at IBM was funded in part by DARPA, strongly implying that the DOD has applied some of the Mercer technology: “. . . . Yet, when I.B.M. failed to offer adequate support for Mercer and Brown’s translation project, they secured additional funding from DARPA, the secretive Pentagon program. Despite Mercer’s disdain for “big government,” this funding was essential to his early success. . . .”
- In a 2012 anti-Obama propaganda film funded by Citizens United, Steve Bannon borrowed from The Triumph of the Will: “. . . . Many of these [disillusioned Obama] voters became the central figures of “The Hope & the Change,” an anti-Obama film that Bannon and Citizens United released during the 2012 Democratic National Convention. After Caddell saw the film, he pointed out to Bannon that its opening imitated that of ‘Triumph of the Will,’ the 1935 ode to Hitler, made by the Nazi filmmaker Leni Riefenstahl. Bannon laughed and said, ‘You’re the only one that caught it!’ In both films, a plane flies over a blighted land, as ominous music swells; then clouds in the sky part, auguring a new era. . . .
Next, we return to the subject of Bitcoin and cyber-libertarian policy. We have explored Bitcoin in a number of programs–FTR #‘s 760, 764, 770 and 785.
An important new book by David Golumbia sets forth the technocratic fascist politics underlying Bitcoin. Known to veteran listeners/readers as the author of an oft-quoted article dealing with technocratic fascism, Golumbia has published a short, important book about the right-wing extremism underlying Bitcoin. (Programs on technocratic fascism include: FTR #‘s 851, 859, 866, 867.)
In an excerpt from the book, we see disturbing elements of resonance with the views of Stephen Bannon and some of the philosophical influences on him. Julius Evola, “Mencius Moldbug” and Bannon himself see our civilization as in decline, at a critical “turning point,” and in need of being “blown up” (as Evola put it) or needing a “shock to the system.”
Note that the Cypherpunk’s Manifesto (published by the Electronic Frontier Foundation) and the 1996 “Declaration of the Independence of Cyberspace” written by the libertarian activist, Grateful Dead lyricist, Electronic Frontier Foundation founder John Perry Barlow decry governmental regulation of the digital system. (EFF is a leading “digital rights” and technology industry advocacy organization.)
The libertarian/fascist ethic of the digital world was articulated by Barlow.
Note how the “freedom” advocated by Barlow et al has played out: the Trump administration (implementing the desires of corporate America) has “deregulated” the internet. All this in the name of “freedom.”
In FTR #854, we noted the curious professional resume of Barlow, containing such disparate elements as–lyricist for the Grateful Dead (“Far Out!”); Dick Cheney’s campaign manager (not so “Far Out!”); a voter for white supremacist/segregationist George Wallace in the 1968 Presidential campaign (very “Un-Far Out!”).
For our purposes, his most noteworthy professional undertaking is his founding of the EFF–The Electronic Frontier Foundation. A leading ostensible advocate for internet freedom, the EFF has endorsed technology and embraced personnel inextricably linked with a CIA-derived milieu embodied in Radio Free Asia’s Open Technology Fund. (For those who are, understandably, surprised and/or skeptical, we discussed this at length and in detail in FTR #‘s 891 and 895.)
Next, we present an article that brings to the fore some interesting questions about Barlow, the CIA and the very genesis of social media.
We offer Ms. Sunderson’s observations, stressing that Barlow’s foreshadowing of the communication functions inherent in social media and his presence at CIA headquarters (by invitation!) suggest that Barlow not only has strong ties to CIA but may have been involved in the conceptual genesis that spawned CIA-connected entities such as Facebook.
In FTR #951, we observed that Richard B. Spencer, one of Trump’s Nazi backers, has begun a website with Swedish Alt-Righter Daniel Friberg, part of the Swedish fascist milieu to which Carl Lundstrom belongs. In FTR #732 (among other programs), we noted that it was Lundstrom who financed the Pirate Bay website, on which WikiLeaks held forth for quite some time. In FTR #745, we documented that top Assange aide and Holocaust-denier Joran Jermas (aka “Israel Shamir”) arranged the Lundstrom/WikiLeaks liaison. (Jermas handles WikiLeaks Russian operations, a point of interest in the wake of the 2016 campaign.)
It is a good bet that Lundstrom/Pirate Bay/WikiLeaks et al were data mining the many people who visited the WikiLeaks site.
Might Lundstrom/Jermas/Assange et al have shared the voluminous data they may well have mined with Mercer/Cambridge Analytica/Bannon’s Nazified AI?
We conclude with recap of Microsoft researcher Kate Crawford’s observations at the SXSW event. Crawford gave a speech about her work titled “Dark Days: AI and the Rise of Fascism,” the presentation highlighted the social impact of machine learning and large-scale data systems. The take home message? By delegating powers to Bid Data-driven AIs, those AIs could become fascist’s dream: Incredible power over the lives of others with minimal accountability: ” . . . .‘This is a fascist’s dream,’ she said. ‘Power without accountability.’ . . . .”
We reiterate, in closing, that ” . . . . Palantir is building an intelligence system to assist Donald Trump in deporting immigrants. . . .”
In FTR #757 we noted that Palantir is a firm dominated by Peter Thiel, a main backer of Donald Trump.
Program Highlights Include:
- WikiLeaks’ continued propagation of Alt-Right style Anti-Semitic propaganda: ” . . . . Now it is the darling of the alt-right, revealing hacked emails seemingly to influence a presidential contest, claiming the US election is ‘rigged.’ and descending into conspiracy. Just this week on Twitter, it described the deaths by natural causes of two of its supporters as a ‘bloody year for WikiLeaks.’ and warned of media outlets ‘controlled by’ members of the Rothschild family – a common anti-Semitic trope. . . .”
- Assessing all of the data-mining potential (certainty) of WikiLeaks, Pokemon Go and the (perhaps) Barlow-inspired Social Media world against the background of the Mercer/Bannon/Cambridge analytica Nazified AI.
1a. Information about the background of Pokemon Go’s developer (Niantic) and the development of the firm is detailed in an article from Network World. In addition to the formidable nature of the intelligence agencies involved with generating the corporate foundation of Pokemon Go (Keyhole, Inc.; Niantic), note the unnerving nature of the information that can be gleaned from the Android phone of anyone who downloads the “app.”
“The CIA, NSA and Pokemon Go” by Linux Tycoon; Network World; 7/22/2016.
. . . . Way back in 2001, Keyhole, Inc. was founded by John Hanke (who previously worked in a “foreign affairs” position within the U.S. government). The company was named after the old “eye-in-the-sky” military satellites. One of the key, early backers of Keyhole was a firm called In-Q-Tel.
In-Q-Tel is the venture capital firm of the CIA. Yes, the Central Intelligence Agency. Much of the funding purportedly came from the National Geospatial-Intelligence Agency (NGA). The NGA handles combat support for the U.S. Department of Defense and provides intelligence to the NSA and CIA, among others.
Keyhole’s noteworthy public product was “Earth.” Renamed to “Google Earth” after Google acquired Keyhole in 2004.
In 2010, Niantic Labs was founded (inside Google) by Keyhole’s founder, John Hanke.
Over the next few years, Niantic created two location-based apps/games. The first was Field Trip, a smartphone application where users walk around and find things. The second was Ingress, a sci-fi-themed game where players walk around and between locations in the real world.
In 2015, Niantic was spun off from Google and became its own company. Then Pokémon Go was developed and launched by Niantic. It’s a game where you walk around in the real world (between locations suggested by the service) while holding your smartphone.
Data the game can access
Let’s move on to what information Pokémon Go has access to, bearing the history of the company in mind as we do.
When you install Pokémon Go on an Android phone, you grant it the following access (not including the ability to make in-app purchases):
Identity
- Find accounts on the device
Contacts
- Find accounts on the device
Location
- Precise location (GPS and network-based)
- Approximate location (network-based)
Photos/Media/Files
- Modify or delete the contents of your USB storage
- Read the contents of your USB storage
Storage
- Modify or delete the contents of your USB storage
- Read the contents of your USB storage
Camera
- Take pictures and videos
Other
- Receive data from the internet
- Control vibration
- Pair with Bluetooth devices
- Access Bluetooth settings
- Full network access
- Use accounts on the device
- View network connections
- Prevent the device from sleeping
Based on the access to your device (and your information), coupled with the design of Pokémon Go, the game should have no problem discerning and storing the following information (just for a start):
- Where you are
- Where you were
- What route you took between those locations
- When you were at each location
- How long it took you to get between them
- What you are looking at right now
- What you were looking at in the past
- What you look like
- What files you have on your device and the entire contents of those files
1b. Pokemon Go was seen as enhancing the “Cool Japan Strategy” of Prime Minister Shinzo Abe. The “Cool Japan Promotion Fund” was implemented by Abe (the grandson of Nobosuke Kishi, a Japanese war criminal who signed Japan’s declaration of war against the U.S. and became the country’s first postwar Prime Minister) to “raise the international profile of the country’s mass culture.”
The Finance Minister of Japan is Taro Aso, one of the enthusiasts of Nazi political strategy highlighted below. The “Cool Japan promotion Fund” would have been under his administration, with Tomomi Inada functioning as his administrator for the program. Inada is another advocate of Nazi political strategy.
“Will Pokemon Go Power Up Japan’s ‘Cool Economy’” by Henry Laurence; The Diplomat; 7/29/2016.
Is Pokémon Go a game changer for the Japanese economy? Within days of its release in early July, a record 21 million people were playing at once, tracking down and capturing the cute little monsters on their smartphones. Creator Nintendo’s shares soared. But the phenomenal popularity of the game raises important questions, beyond just “where’s the nearest Pokégym?” Is it a sign that Silicon Valley-style innovation is reinvigorating corporate Japan’s notoriously insular management? Might this be the first big success story for Prime Minister Shinzo Abe’s “Cool Japan” initiative, a key element in the structural reforms promised but so far undelivered by Abenomics . . .
. . . . In 2013, amid great fanfare, Prime Minister Shinzo Abe announced a “Cool Japan Promotion Fund” to raise the international profile of the country’s mass culture. The need for such a fund, currently set at about $1 billion, is itself an interesting reflection on how little faith policymakers seem to have in the economic clout of the nation’s artists. Questions also remain about the helpfulness of elderly politicians dabbling in the creative sector. [The Finance Minister of Japan is Taro Aso, one of the enthusiasts of Nazi political strategy highlighted below. The “Cool Japan promotion Fund” would have been under his administration, with Tomomi Inada fundtioning as his administrator for the program. Inada is another advocate of Nazi political strategy.–D.E.] . .
1c. Abe is turning back the Japanese historical and political clock. Japanese government officials are openly sanctioning anti-Korean racism and networking with organizations that promote that doctrine. Several members of Abe’s government network with Japanese neo-Nazis, some of whom advocate using the Nazi method for seizing power in Japan. Is Abe’s government doing just that?
“For Top Pols In Japan Crime Doesn’t Pay, But Hate Crime Does” by Jake Adelstein and Angela Erika Kubo; The Daily Beast; 9/26/2014.
. . . . According to the magazine “Sunday Mainichi,” Ms. Tomomi Inada, Minister Of The “Cool Japan” Strategy, also received donations from Masaki and other Zaitokukai associates.
Apparently, racism is cool in Japan.
Inada made news earlier this month after photos circulated of her and another female in the new cabinet posing with a neo-Nazi party leader. Both denied knowing the neo-Nazi well but later were revealed to have contributed blurbs for an advertisement praising the out-of-print book Hitler’s Election Strategy. Coincidentally, Vice-Prime Minister [and Finance Minister–D.E.],Taro Aso, is also a long-time admirer of Nazi political strategy, and has suggested Japan follow the Nazi Party template to sneak constitutional change past the public. . . .
. . . In August, Japan’s ruling party, which put Abe into power organized a working group to discuss laws that would restrict hate-crime, although the new laws will probably also be used to clamp down on anti-nuclear protests outside the Diet building.
Of course, it is a little worrisome that Sanae Takaichi, who was supposed to oversee the project, is the other female minister who was photographed with a neo-Nazi leader and is a fan of Hitler. . .
1d. Devotee of Hitler’s political strategy Tomomi Inada is now the defense minister of Japan.
Japanese Prime Minister Shinzo Abe appointed a conservative ally as defense minister in a cabinet reshuffle on Wednesday that left most key posts unchanged, and he promised to hasten the economy’s escape from deflation and boost regional ties.
New defense minister Tomomi Inada, previously the ruling party policy chief, shares Abe’s goal of revising the post-war, pacifist constitution, which some conservatives consider a humiliating symbol of Japan’s World War Two defeat.
She also regularly visits Tokyo’s Yasukuni Shrine for war dead, which China and South Korea see as a symbol of Japan’s past militarism. Japan’s ties with China and South Korea have been frayed by the legacy of its military aggression before and during World War Two. . . .
1e. The “Alt-Right” (read “Nazi”) movement is using Pokemon Go to recruit kids to the Nazi cause. Consider this against the background of Niantic, the Cool Japan strategy and the pro-Nazi figures involved with it. Consider this also, in conjunction with the Nazified AI developed and deployed by Robert and Rebekah Mercer, Steve Bannon, Cambridge Analytica and the “Alt-Right” milieu with which they associate.
Alt-right neo-Nazis are targeting kids as young as 10 years old with Pikachu dressed as Hitler
The racist fringe of the now-mainstream alt-right movement is seizing on the popularity of Pokémon Go to recruit kids who congregate at “gyms” to play the mobile game, according to one of the group’s most outspoken leaders.
Andrew Anglin, the neo-Nazi wordsmith behind the alt-right Daily Stormer blog, posted a story on Tuesday about an “enterprising Stormer” (a follower of Anglin’s blog) who is finding Pokémon Go gyms, which serve as battle grounds for players, and distributing recruitment fliers to kids with the hope of “converting children and teens to HARDCORE NEO-NAZISM!”
“The Daily Stormer was designed to appeal to teenagers, but I have long thought that we needed to get pre-teens involved in the movement,” Anglin wrote in the blog post. “At that age, you can really brainwash someone easily. Anyone who accepts Nazism at the age of 10 or 11 is going to be a Nazi for life.” He added, “And it isn’t hard. It’s just a matter of pulling them in. And what better way to do it than with Pokémon fliers at the Pokémon GO gym???”
Anglin declined to identify the “stormer” behind the fliers by name, nor did he disclose where these fliers have been distributed—saying only that it is in an “American town.” Vocativ could not find any media or law enforcement reports of neo-Nazis handing out the fliers in any city. Nor could experts who monitor people like Anglin and groups like the alt-right.
…
The flier features run-of-the-mill neo-Nazi propaganda—it rails on Jews, African-Americans, and claims a “white genocide” is happening and white people need to stand up and prepare for the impending race war. The first step, the flier explains, is electing Donald Trump president. Step two is to “get active in the Nazi movement” because the “alt-right Nazis are the only ones who can save this country from the kikes.”
“Adolph Hitler was a great man,” the flier, under the title “Hey White Boy!” explains. “Just as you want to catch all the Pokemon, he hunted a different type of monster: Jews.”
The alt-right movement isn’t new but made national headlines last month when Hillary Clinton gave a scathing speech linking Trump to the oft-racist movement. Alt-righters generally fall into one of two categories: those who disguise their racism as “white nationalism” and don’t embrace the racist label in an effort to be taken seriously, and those—like Anglin and his followers—who wear their bigotry on their sleeves, as Vocativ has previously reported.
Clinton’s speech came just days after a shakeup in the Trump campaign led to the appointment of Stephen Bannon, the former head of the alt-right website Breitbart.com, as the CEO of the campaign. As Clinton mentioned in her speech, Breitbart.com is responsible for white nationalist propaganda like a story titled “Hoist It High And Proud: The Confederate Flag Proclaims A Glorious Heritage,” and a sexist rant with the headline, “Birth Control Makes Women Unattractive And Crazy.”
Anglin has created a PDF file of the flier so other “stormers” can print them out and distribute them at Pokémon Go gyms and even provided a map showing the locations of gyms across the country.
“These hotspots are packed,” he wrote. “No doubt, you’ll be able to hand-out a hundred in 30 minutes easy if you live in a decent-sized urban area. Get in and get out. Take a buddy with you.”
2. A recent New Yorker article by Jane Mayer concerning Robert Mercer keys some interesting thoughts about Mercer, Bannon, the Alt-Right WikiLeaks and the Nazified AI we spoke of in FTR #‘s 948 and 949. In FTR #946, we noted this concatenation’s central place in the Facebook constellation, a position that has positioned them to act decisively on the political landscape.
We note several things about the Mayer piece:
- She writes of Mercer’s support for the Alt-Right–Mercer helps fund Bannon’s Breitbart: “. . . . In February, David Magerman, a senior employee at Renaissance, spoke out about what he regards as Mercer’s worrisome influence. Magerman, a Democrat who is a strong supporter of Jewish causes, took particular issue with Mercer’s empowerment of the alt-right, which has included anti-Semitic and white-supremacist voices. . . .”
- Mercer is racist, feeling that racism only exists in contemporary black culture: “. . . . Mercer, for his part, has argued that the Civil Rights Act, in 1964, was a major mistake. According to the onetime Renaissance employee, Mercer has asserted repeatedly that African-Americans were better off economically before the civil-rights movement. (Few scholars agree.) He has also said that the problem of racism in America is exaggerated. The source said that, not long ago, he heard Mercer proclaim that there are no white racists in America today, only black racists. . . .”
- His work at IBM was funded in part by DARPA, strongly implying that the DOD has applied some of the Mercer technology: “. . . . Yet, when I.B.M. failed to offer adequate support for Mercer and Brown’s translation project, they secured additional funding from DARPA, the secretive Pentagon program. Despite Mercer’s disdain for “big government,” this funding was essential to his early success. . . .”
- In a 2012 anti-Obama propaganda film funded by Citizens United, Steve Bannon borrowed from The Triumph of the Will: “. . . . Many of these [disillusioned Obama] voters became the central figures of “The Hope & the Change,” an anti-Obama film that Bannon and Citizens United released during the 2012 Democratic National Convention. After Caddell saw the film, he pointed out to Bannon that its opening imitated that of ‘Triumph of the Will,’ the 1935 ode to Hitler, made by the Nazi filmmaker Leni Riefenstahl. Bannon laughed and said, ‘You’re the only one that caught it!’ In both films, a plane flies over a blighted land, as ominous music swells; then clouds in the sky part, auguring a new era. . . .
. . . . In February, David Magerman, a senior employee at Renaissance, spoke out about what he regards as Mercer’s worrisome influence. Magerman, a Democrat who is a strong supporter of Jewish causes, took particular issue with Mercer’s empowerment of the alt-right, which has included anti-Semitic and white-supremacist voices. . . .
. . . . Mercer, for his part, has argued that the Civil Rights Act, in 1964, was a major mistake. According to the onetime Renaissance employee, Mercer has asserted repeatedly that African-Americans were better off economically before the civil-rights movement. (Few scholars agree.) He has also said that the problem of racism in America is exaggerated. The source said that, not long ago, he heard Mercer proclaim that there are no white racists in America today, only black racists. . . .
. . . . Yet, when I.B.M. failed to offer adequate support for Mercer and Brown’s translation project, they secured additional funding from DARPA, the secretive Pentagon program. Despite Mercer’s disdain for “big government,” this funding was essential to his early success. . . .
. . . . Many of these [disillusioned Obama] voters became the central figures of “The Hope & the Change,” an anti-Obama film that Bannon and Citizens United released during the 2012 Democratic National Convention. After Caddell saw the film, he pointed out to Bannon that its opening imitated that of “Triumph of the Will,” the 1935 ode to Hitler, made by the Nazi filmmaker Leni Riefenstahl. Bannon laughed and said, “You’re the only one that caught it!” In both films, a plane flies over a blighted land, as ominous music swells; then clouds in the sky part, auguring a new era. . . .
3a.We have explored Bitcoin in a number of programs–FTR #‘s 760, 764, 770 and 785.
An important new book by David Golumbia sets forth the technocratic fascist politics underlying Bitcoin. Known to veteran listeners/readers as the author of an oft-quoted article dealing with technocratic fascism, Golumbia has published a short, important book about the right-wing extremism underlying Bitcoin. (Programs on technocratic fascism include: FTR #‘s 851, 859, 866, 867.)
In the excerpt below, we see disturbing elements of resonance with the views of Stephen Bannon and some of the philosophical influences on him. Julius Evola, “Mencius Moldbug” and Bannon himself see our civilization as in decline, at a critical “turning point,” and in need of being “blown up” (as Evola put it) or needing a “shock to the system.”
. . . . As objects of discourse, Bitcoin and the blockchain do a remarkable job of reinforcing the view that the entire global history of political thought and action needs to be jettisoned, or, even worse, that it has already been jettisoned through the introduction of any number of technologies. Thus, in the introduction to a bizarrely earnest and destructive volume called From Bitcoin to Burning Man and Beyond (Clippinger and Bollier 2014), the editors, one of whom is a research scientist at MIT, write, “Enlightenment ideals of democratic rule seem to have run their course. A continuous flow of scientific findings are undermining many foundational claims about human rationality and perfectibility while exponential technological changes and exploding global demographics overwhelm the capacity of democratic institutions to rule effectively, and ultimately, their very legitimacy.” Such abrupt dismissals of hundreds of years of thought, work, and lives follows directly from cyberlibertarian thought and extremist reinterpretations of political institutions:” What once required the authority of a central bank or a sovereign authority can now be achieved through open, distributed crypto-algorithms. National borders, traditional legal regimes, and human intervention are increasingly moot.” Like most ideological formations, these sentiments are highly resistant to being proven false by facts. . . .
. . . . Few attitudes typify the paradoxical cyberlibertarian mind-set of Bitcoin promoters (and many others) more than do those of “Sanjuro,” the alias of the person who created a Bitcoin “assassination market” (Greenberg 2013). Sanjuro believes that by incentivizing people to kill politicians, he will destroy “all governments, everywhere.” This anarchic apocalypse “will change the world for the better,” producing “a world without wars, dragnet Panopticon-style surveillance, nuclear weapons, armies, repression, money manipulation, and limits to trade.” Only someone so blinkered by their ideological tunnel vision could look at world history and imagine that murdering the representatives of democratically elected governments and thus putting the governments themselves out of existence would do anything but make every one of these problems immeasurably worse than they already are. Yet this, in the end, is the extreme rightist–anarcho-capitalist, winner-take-all, even neo-feudalist–political vision too many of those in the Bitcoin (along with other cryptocurrency) and blockchain communities, whatever they believe their political orientation to be, are working actively to bring about. . . .
3b. Note that the Cypherpunk’s Manifesto (published by the Electronic Frontier Foundation) and the 1996 “Declaration of the Independence of Cyberspace” written by the libertarian activist, Grateful Dead lyricist, Electronic Frontier Foundation founder John Perry Barlow decry governmental regulation of the digital system. (EFF is a leading “digital rights” and technology industry advocacy organization.)
. . . . Among the clearest targets of these movements (see both the Cypherpunk’s Manifesto, Hughes 1993; and the closely related Crypto-Anarchist Manifesto, May 1992) has always specifically been governmental oversight of financial (and other) transactions. No effort is made to distinguish between legitimate and illegitimate use of governmental power; rather, all governmental power is inherently taken to be illegitimate. Further, despite occasional rhetorical nods toward corporate abuses, just as in Murray Rothbard’s work, strictly speaking no mechanisms whatsoever are posited that actually might constrain corporate power. Combined with either an explicit commitment toward, or at best an extreme naivete about, the operation of concentrated capital, this political theory works to deprive the people of their only proven mechanism for that constraint. This is why an august an antigovernment thinker as Noam Chomsky (2015) can have declared that libertarian theories, despite surface appearances, promote “corporate tyranny, meaning tyranny by unaccountable private concentrations of power, the worst kind of tyranny you can imagine.” . . .
3c. The libertarian/fascist ethic of the digital world was articulated by John Perry Barlow.
Note how the “freedom” advocated by John Perry Barlow et al has played out: the Trump administration (implementing the desires of corporate America) has “deregulated” the internet. All this in the name of “freedom.”
. . . . In its most basic and limited form, cyberlibertarianism is sometimes summarized as the principle that “governments should not regulate the internet” (Malcom 2013.) This belief was articulated with particular force in the 1996 “Declaration of the Independence of Cyberspace” written by the libertarian activist, Grateful Dead lyricist, Electronic Frontier Foundation founder (EFF is a leading “digital rights” and technology industry advocacy organization) John Perry Barlow, which declared that “governments of our industrial world” are “not welcome” in and “have no sovereignty” over the digital system. . . .
4a. In FTR #854, we noted the curious professional resume of John Perry Barlow, containing such disparate elements as–lyricist for the Grateful Dead (“Far Out!”); Dick Cheney’s campaign manager (not so “Far Out!”); a voter for white supremacist/segregationist George Wallace in the 1968 Presidential campaign (very “Un-Far Out!”).
Barlow introduced the Grateful Dead to Timothy Leary, who was inextricably linked with the CIA. We discussed this at length in AFA #28.
AFA 28: The CIA, the Military & Drugs, Pt. 5
The CIA & LSD
Part 5a 46:15 | Part 5b 45:52 | Part 5c 42:56 | Part 5d 45:11 | Part 5e 11:25
(Recorded April 26, 1987)
” . . . . Timothy Leary’s early research into LSD was subsidized, to some extent, by the CIA. Later, Leary’s LSD proselytization was greatly aided by William Mellon Hitchcock, a member of the powerful Mellon family. The financing of the Mellon-Leary collaboration was effected through the Castle Bank, a Caribbean operation that was deeply involved in the laundering of CIA drug money.
After moving to the West Coast, Leary hooked up with a group of ex-surfers, the Brotherhood of Eternal Love. This group became the largest LSD synthesizing and distributing organization in the world. Their “chief chemist” was a curious individual named Ronald Hadley Stark. An enigmatic, multi-lingual and well-traveled individual, Stark worked for the CIA, and appears to have been with the agency when he was making the Brotherhood’s acid. The quality of his product projected the Brotherhood of Eternal Love into its leadership role in the LSD trade. Stark also operated in conjunction with the Italian intelligence/fascist milieu described in AFA #‘s 17–21.
The broadcast underscores the possibility that LSD and other hallucinogens may have been disseminated, in part, in order to diffuse the progressive political activism of the 1960’s.
Program Highlights Include: CIA director Allen Dulles’ promotion of psychological research by the Agency; the work of CIA physician Dr. Sidney Gottlieb for the Agency’s Technical Services Division; connections between Stark and the kidnapping and assassination of Italian Prime Minister Aldo Moro; Stark’s mysterious death in prison while awaiting trial; Leary’s connections to the milieu of the “left” CIA and the role those connections appear to have played in Leary’s flight from incarceration; the CIA’s intense interest in (and involvement with) the Haight-Ashbury scene of the 1960s. . . . .”
For our purposes, his most noteworthy professional undertaking is his founding of the EFF–The Electronic Frontier Foundation. A leading ostensible advocate for internet freedom, the EFF has endorsed technology and embraced personnel inextricably linked with a CIA-derived milieu embodied in Radio Free Asia’s Open Technology Fund. (For those who are, understandably, surprised and/or skeptical, we discussed this at length and in detail in FTR #‘s 891 and 895.)
Listener Tiffany Sunderson contributed an article in the “Comments” section that brings to the fore some interesting questions about Barlow, the CIA and the very genesis of social media.
We offer Ms. Sunderson’s observations, stressing that Barlow’s foreshadowing of the communication functions inherent in social media and his presence at CIA headquarters (by invitation!) suggest that Barlow not only has strong ties to CIA but may have been involved in the conceptual genesis that spawned CIA-connected entities such as Facebook:
“Fascinating article by John Perry Barlow, can’t believe I haven’t seen this before. From Forbes in 2002. Can’t accuse Barlow of hiding his intel ties, he’ll tell you all about it! To me, this is practically a historical document, as it hints at the thinking that inevitably lead to Inqtel, Geofeedia, Palantir, Facebook, etc. Including whole article, but here are a few passages that jumped out at me.
http://www.forbes.com/asap/2002/1007/042_print.html
This part cracks me up: it’s “mystical superstition” to imagine that wires leaving a building are also wires ENTERING a building? Seriously? For a guy who never shuts up about networking, he should get that there is nothing “mystical” about such a notion. It’s exactly how attackers get in. If you are connected to the internet, you are not truly secure. Period.
“All of their primitive networks had an ‘air wall,’ or physical separation, from the Internet. They admitted that it might be even more dangerous to security to remain abstracted from the wealth of information that had already assembled itself there, but they had an almost mystical superstition that wires leaving the agency would also be wires entering it, a veritable superhighway for invading cyberspooks. ”
Here, JPB brags about his connections and who he brought back to CIA. I’ve always had spooky feelings about Cerf, Dyson, and Kapor. Don’t know Rutkowski. But the other three are serious players, and Cerf and Kapor are heavily involved with EFF. You know, because the EFF is all about standing up for the little guy.
“They told me they’d brought Steve Jobs in a few weeks before to indoctrinate them in modern information management. And they were delighted when I returned later, bringing with me a platoon of Internet gurus, including Esther Dyson, Mitch Kapor, Tony Rutkowski, and Vint Cerf. They sealed us into an electronically impenetrable room to discuss the radical possibility that a good first step in lifting their blackout would be for the CIA to put up a Web site”
This next part SCREAMS of intel’s ties to the “social media explosion.” I think this passage is what qualifies Barlow’s article as a historical doc of some value.
“Let’s create a process of information digestion in which inexpensive data are gathered from largely open sources and condensed, through an open process, into knowledge terse and insightful enough to inspire wisdom in our leaders.
The entity I envision would be small, highly networked, and generally visible. It would be open to information from all available sources and would classify only information that arrived classified. It would rely heavily on the Internet, public media, the academic press, and an informal worldwide network of volunteers–a kind of global Neighborhood Watch–that would submit on-the-ground reports.
It would use off-the-shelf technology, and use it less for gathering data than for collating and communicating them. Being off-the-shelf, it could deploy tools while they were still state-of-the-art.
I imagine this entity staffed initially with librarians, journalists, linguists, scientists, technologists, philosophers, sociologists, cultural historians, theologians, economists, philosophers, and artists‑a lot like the original CIA, the OSS, under “Wild Bill” Donovan. Its budget would be under the direct authority of the President, acting through the National Security Adviser. Congressional oversight would reside in the committees on science and technology (and not under the congressional Joint Committee on Intelligence). ”
http://www.forbes.com/asap/2002/1007/042_2.html
“Why Spy?” by John Perry Barlow; Forbes; 10/07/02.
If the spooks can’t analyze their own data, why call it intelligence?
For more than a year now, there has been a deluge of stories and op-ed pieces about the failure of the American intelligence community to detect or prevent the September 11, 2001, massacre.Nearly all of these accounts have expressed astonishment at the apparent incompetence of America’s watchdogs.
I’m astonished that anyone’s astonished.
The visual impairment of our multitudinous spookhouses has long been the least secret of their secrets. Their shortcomings go back 50 years, when they were still presumably efficient but somehow failed to detect several million Chinese military “volunteers” heading south into Korea. The surprise attacks on the World Trade Center and the Pentagon were only the most recent oversight disasters. And for service like this we are paying between $30 billion and $50 billion a year. Talk about a faith-based initiative.
After a decade of both fighting with and consulting to the intelligence community, I’ve concluded that the American intelligence system is broken beyond repair, self-protective beyond reform, and permanently fixated on a world that no longer exists.
I was introduced to this world by a former spy named Robert Steele, who called me in the fall of 1992 and asked me to speak at a Washington conference that would be “attended primarily by intelligence professionals.” Steele seemed interesting, if unsettling. A former Marine intelligence officer, Steele moved to the CIA and served three overseas tours in clandestine intelligence, at least one of them “in a combat environment” in Central America.
After nearly two decades of service in the shadows, Steele emerged with a lust for light and a belief in what he calls, in characteristic spook-speak, OSINT, or open source intelligence. Open source intelligence is assembled from what is publicly available, in media, public documents, the Net, wherever. It’s a given that such materials–and the technological tools for analyzing them–are growing exponentially these days. But while OSINT may be a timely notion, it’s not popular in a culture where the phrase “information is power” means something brutally concrete and where sources are “owned.”
At that time, intelligence was awakening to the Internet, the ultimate open source. Steele’s conference was attended by about 600 members of the American and European intelligence establishment, including many of its senior leaders. For someone whose major claim to fame was hippie song-mongering, addressing such an audience made me feel as if I’d suddenly become a character in a Thomas Pynchon novel.
Nonetheless, I sallied forth, confidently telling the gray throng that power lay not in concealing information but in distributing it, that the Internet would endow small groups of zealots with the capacity to wage credible assaults on nation-states, that young hackers could easily run circles around old spies.
I didn’t expect a warm reception, but it wasn’t as if I was interviewing for a job.
Or so I thought. When I came offstage, a group of calm, alert men awaited. They seemed eager, in their undemonstrative way, to pursue these issues further. Among them was Paul Wallner, the CIA’s open source coordinator. Wallner wanted to know if I would be willing to drop by, have a look around, and discuss my ideas with a few folks.
A few weeks later, in early 1993, I passed through the gates of the CIA headquarters in Langley, Virginia, and entered a chilled silence, a zone of paralytic paranoia and obsessive secrecy, and a technological time capsule straight out of the early ’60s. The Cold War was officially over, but it seemed the news had yet to penetrate where I now found myself.
If, in 1993, you wanted to see the Soviet Union still alive and well, you’d go to Langley, where it was preserved in the methods, assumptions, and architecture of the CIA.
Where I expected to see computers, there were teletype machines. At the nerve core of The Company, five analysts sat around a large, wooden lazy Susan. Beside each of them was a teletype, chattering in uppercase. Whenever a message came in to, say, the Eastern Europe analyst that might be of interest to the one watching events in Latin America, he’d rip it out of the machine, put it on the turntable, and rotate it to the appropriate quadrant.
The most distressing discovery of my first expedition was the nearly universal frustration of employees at the intransigence of the beast they inhabited. They felt forced into incompetence by information hoarding and noncommunication, both within the CIA and with other related agencies. They hated their primitive technology. They felt unappreciated, oppressed, demoralized. “Somehow, over the last 35 years, there was an information revolution,” one of them said bleakly, “and we missed it.”
They were cut off. But at least they were trying. They told me they’d brought Steve Jobs in a few weeks before to indoctrinate them in modern information management. And they were delighted when I returned later, bringing with me a platoon of Internet gurus, including Esther Dyson, Mitch Kapor, Tony Rutkowski, and Vint Cerf. They sealed us into an electronically impenetrable room to discuss the radical possibility that a good first step in lifting their blackout would be for the CIA to put up a Web site.
They didn’t see how this would be possible without compromising their security. All of their primitive networks had an “air wall,” or physical separation, from the Internet. They admitted that it might be even more dangerous to security to remain abstracted from the wealth of information that had already assembled itself there, but they had an almost mystical superstition that wires leaving the agency would also be wires entering it, a veritable superhighway for invading cyberspooks.
We explained to them how easy it would be to have two networks, one connected to the Internet for gathering information from open sources and a separate intranet, one that would remain dedicated to classified data. We told them that information exchange was a barter system, and that to receive, one must also be willing to share. This was an alien notion to them. They weren’t even willing to share information among themselves, much less the world.
In the end, they acquiesced. They put up a Web site, and I started to get email from people @cia.gov, indicating that the Internet had made it to Langley. But the cultural terror of releasing anything of value remains. Go to their Web site today and you will find a lot of press releases, as well as descriptions of maps and publications that you can acquire only by buying them in paper. The unofficial al Qaeda Web site, http://www.almuhajiroun.com, is considerably more revealing.
This dogma of secrecy is probably the most persistently damaging fallout from “the Soviet factor” at the CIA and elsewhere in the intelligence “community.” Our spooks stared so long at what Churchill called “a mystery surrounded by a riddle wrapped in an enigma,” they became one themselves. They continue to be one, despite the evaporation of their old adversary, as well as a long series of efforts by elected authorities to loosen the white-knuckled grip on their secrets.
The most recent of these was the 1997 Commission on Protecting and Reducing Government Secrecy, led by Senator Patrick Moynihan. The Moynihan Commission released a withering report charging intelligence agencies with excessive classification and citing a long list of adverse consequences ranging from public distrust to concealed (and therefore irremediable) organizational failures.
That same year, Moynihan proposed a bill called the Government Secrecy Reform Act. Cosponsored by conservative Republicans Jesse Helms and Trent Lott, among others, this legislation was hardly out to gut American intelligence. But the spooks fought back effectively through the Clinton Administration and so weakened the bill that one of its cosponsors, Congressman Lee Hamilton (D‑Ind.), concluded that it would be better not to pass what remained.
A few of its recommendations eventually were wrapped into the Intelligence Authorization Act of 2000. But of these, the only one with any operational force–a requirement that a public-interest declassification board be established to advise the Administration in these matters-has never been implemented. Thanks to the vigorous interventions of the Clinton White House, the cult of secrecy remained unmolested.
One might be surprised to learn that Clintonians were so pro-secrecy. In fact, they weren’t. But they lacked the force to dominate their wily subordinates. Indeed, in 1994, one highly placed White House staffer told me that their incomprehensible crypto policies arose from being “afraid of the NSA.”
In May 2000, I began to understand what they were up against. I was invited to speak to the Intelligence Community Collaboration Conference (a title that contained at least four ironies). The other primary speaker was Air Force Lt. General Mike Hayden, the newly appointed director of the NSA. He said he felt powerless, though he was determined not to remain that way.
“I had been on the job for a while before I realized that I have no staff,” he complained. “Everything the agency does had been pushed down into the components…it’s all being managed several levels below me.” In other words, the NSA had developed an immune system against external intervention.
Hayden recognized how excessive secrecy had damaged intelligence, and he was determined to fix it. “We were America’s information age enterprise in the industrial age. Now we have to do that same task in the information age, and we find ourselves less adept,” he said.
He also vowed to diminish the CIA’s competitiveness with other agencies. (This is a problem that remains severe, even though it was first identified by the Hoover Commission in 1949.) Hayden decried “the stovepipe mentality” where information is passed vertically through many bureaucratic layers but rarely passes horizontally. “We are riddled with watertight information compartments,” he said. “At the massive agency level, if I had to ask, ‘Do we need blue gizmos?’ the only person I could ask was the person whose job security depended on there being more blue gizmos.”
Like the CIA I encountered, Hayden’s NSA was also a lot like the Soviet Union; secretive unto itself, sullen, and grossly inefficient. The NSA was also, by his account, as technologically maladroit as its rival in Langley. Hayden wondered, for example, why the director of what was supposedly one of the most sophisticated agencies in the world would have four phones on his desk. Direct electronic contact between him and the consumers of his information–namely the President and National Security staff–was virtually nil. There were, he said, thousands of unlinked, internally generated operating systems inside the NSA, incapable of exchanging information with one another.
Hayden recognized the importance of getting over the Cold War. “Our targets are no longer controlled by the technological limitations of the Soviet Union, a slow, primitive, underfunded foe. Now [our enemies] have access to state-of-the-art….In 40 years the world went from 5,000 stand-alone computers, many of which we owned, to 420 million computers, many of which are better than ours.”
But there wasn’t much evidence that it was going to happen anytime soon. While Hayden spoke, the 200 or so high-ranking intelligence officials in the audience sat with their arms folded defensively across their chests. When I got up to essentially sing the same song in a different key, I asked them, as a favor, not to assume that posture while I was speaking. I then watched a Strangelovian spectacle when, during my talk, many arms crept up to cross involuntarily and were thrust back down to their sides by force of embarrassed will.
That said, I draw a clear distinction between the institutions of intelligence and the folks who staff them.
All of the actual people I’ve encountered in intelligence are, in fact, intelligent. They are dedicated and thoughtful. How then, can the institutional sum add up to so much less than the parts? Because another, much larger, combination of factors is also at work: bureaucracy and secrecy.
Bureaucracies naturally use secrecy to immunize themselves against hostile investigation, from without or within. This tendency becomes an autoimmune disorder when the bureaucracy is actually designed to be secretive and is wholly focused on other, similar institutions. The counterproductive information hoarding, the technological backwardness, the unaccountability, the moral laxity, the suspicion of public information, the arrogance, the xenophobia (and resulting lack of cultural and linguistic sophistication), the risk aversion, the recruiting homogeneity, the inward-directedness, the preference for data acquisition over information dissemination, and the uselessness of what is disseminated-all are the natural, and now fully mature, whelps of bureaucracy and secrecy.
Not surprisingly, people who work there believe that job security and power are defined by the amount of information one can stop from moving. You become more powerful based on your capacity to know things that no one else does. The same applies, in concentric circles of self-protection, to one’s team, department, section, and agency. How can data be digested into useful information in a system like that?
How can we expect the CIA and FBI to share information with each other when they’re disinclined to share it within their own organizations? The resulting differences cut deep. One of the revelations of the House Report on Counterterrorism Intelligence Capabilities and Performance Prior to September 11 was that none of the responsible agencies even shared the same definition of terrorism. It’s hard to find something when you can’t agree on what you’re looking for.
The information they do divulge is also flawed in a variety of ways. The “consumers” (as they generally call policymakers) are unable to determine the reliability of what they’re getting because the sources are concealed. Much of what they get is too undigested and voluminous to be useful to someone already suffering from information overload. And it comes with strings attached. As one general put it, “I don’t want information that requires three security officers and a safe to move it in around the battlefield.”
As a result, the consumers are increasingly more inclined to get their information from public sources. Secretary of State Colin Powell says that he prefers “the Early Bird,” a compendium of daily newspaper stories, to the President’s Daily Brief (the CIA’s ultimate product).
The same is apparently true within the agencies themselves. Although their finished products rarely make explicit use of what’s been gleaned from the media, analysts routinely turn there for information. On the day I first visited the CIA’s “mission control” room, the analysts around the lazy Susan often turned their attention to the giant video monitors overhead. Four of these were showing the same CNN feed.
Secrecy also breeds technological stagnation. In the early ’90s, I was speaking to personnel from the Department of Energy nuclear labs about computer security. I told them I thought their emphasis on classification might be unnecessary because making a weapon was less a matter of information than of industrial capacity. The recipe for a nuclear bomb has been generally available since 1978, when John Aristotle Phillips published plans in The Progressive. What’s not so readily available is the plutonium and tritium, which require an entire nation to produce. Given that, I couldn’t see why they were being so secretive.
The next speaker was Dr. Edward Teller, who surprised me by not only agreeing but pointing out both the role of open discourse in scientific progress, as well as the futility of most information security. “If we made an important nuclear discovery, the Russians were usually able to get it within a year,” he said. He went on: “After World War II we were ahead of the Soviets in nuclear technology and about even with them in electronics. We maintained a closed system for nuclear design while designing electronics in the open. Their systems were closed in both regards. After 40 years, we are at parity in nuclear science, whereas, thanks to our open system in the study of electronics, we are decades ahead of the Russians.”
There is also the sticky matter of budgetary accountability. The director of Central Intelligence (DCI) is supposed to be in charge of all the functions of intelligence. In fact, he has control over less than 15% of the total budget, directing only the CIA. Several of the different intelligence-reform commissions that have been convened since 1949 have called for consolidating budgetary authority under the DCI, but it has never happened.
With such hazy oversight, the intelligence agencies naturally become wasteful and redundant. They spent their money on toys like satellite-imaging systems and big-iron computers (often obsolete by the time they’re deployed) rather than developing the organizational capacity for analyzing all those snapshots from space, or training analysts in languages other than English and Russian, or infiltrating potentially dangerous groups, or investing in the resources necessary for good HUMINT (as they poetically call information gathered by humans operating on the ground).
In fact, fewer than 10% of the millions of satellite photographs taken have ever been seen by anybody. Only one-third of the employees at the CIA speak any language besides English. Even if they do, it’s generally either Russian or some common European language. Of what use are the NSA’s humongous code-breaking computers if no one can read the plain text extracted from the encrypted stream?
Another systemic deficit of intelligence lies, interestingly enough, in the area of good old-fashioned spying. Although its intentions were noble, the ’70s Church Committee had a devastating effect on this necessary part of intelligence work. It caught the CIA in a number of dubious covert operations and took the guilty to task.
But rather than listen to the committee’s essential message that they should renounce the sorts of nefarious deeds the public would repudiate and limit secrecy to essential security considerations, the leadership responded by pulling most of its agents out of the field, aside from a few hired traitors.
Despite all the efforts aimed at sharpening their tools, intelligence officials have only become progressively duller and more expensive. We enter an era of asymmetrical threats, distributed over the entire globe, against which our most effective weapon is understanding. Yet we are still protected by agencies geared to gazing on a single, centralized threat, using methods that optimize obfuscation. What is to be done?
We might begin by asking what intelligence should do. The answer is simple: Intelligence exists to provide decision makers with an accurate, comprehensive, and unbiased understanding of what’s going on in the world. In other words, intelligence defines reality for those whose actions could alter it. “Given our basic mission,” one analyst said wearily, “we’d do better to study epistemology than missile emplacements.”
If we are serious about defining reality, we might look at the system that defines reality for most of us: scientific discourse. The scientific method is straightforward. Theories are openly advanced for examination and trial by others in the field. Scientists toil to create systems to make all the information available to one immediately available to all. They don’t like secrets. They base their reputations on their ability to distribute their conclusions rather than the ability to conceal them. They recognize that “truth” is based on the widest possible consensus of perceptions. They are committed free marketeers in the commerce of thought. This method has worked fabulously well for 500 years. It might be worth a try in the field of intelligence.
Intelligence has been focused on gathering information from expensive closed sources, such as satellites and clandestine agents. Let’s attempt to turn that proposition around. Let’s create a process of information digestion in which inexpensive data are gathered from largely open sources and condensed, through an open process, into knowledge terse and insightful enough to inspire wisdom in our leaders.
The entity I envision would be small, highly networked, and generally visible. It would be open to information from all available sources and would classify only information that arrived classified. It would rely heavily on the Internet, public media, the academic press, and an informal worldwide network of volunteers–a kind of global Neighborhood Watch–that would submit on-the-ground reports.
It would use off-the-shelf technology, and use it less for gathering data than for collating and communicating them. Being off-the-shelf, it could deploy tools while they were still state-of-the-art.
I imagine this entity staffed initially with librarians, journalists, linguists, scientists, technologists, philosophers, sociologists, cultural historians, theologians, economists, philosophers, and artists‑a lot like the original CIA, the OSS, under “Wild Bill” Donovan. Its budget would be under the direct authority of the President, acting through the National Security Adviser. Congressional oversight would reside in the committees on science and technology (and not under the congressional Joint Committee on Intelligence).
There are, of course, problems with this proposal. First, it does not address the pressing need to reestablish clandestine human intelligence. Perhaps this new Open Intelligence Office (OIO) could also work closely with a Clandestine Intelligence Bureau, also separate from the traditional agencies, to direct infiltrators and moles who would report their observations to the OIO through a technological membrane that would strip their identities from their findings. The operatives would be legally restricted to gathering information, with harsh penalties attached to any engagement in covert operations.
The other problem is the “Saturn” dilemma. Once this new entity begins to demonstrate its effectiveness in providing insight to policymakers that is concise, timely, and accurate (as I believe it would), almost certainly traditional agencies would try to haul it back into the mother ship and break it (as has happened to the Saturn division at General Motors). I don’t know how to deal with that one. It’s the nature of bureaucracies to crush competition. No one at the CIA would be happy to hear that the only thing the President and cabinet read every morning is the OIO report.
But I think we can deal with that problem when we’re lucky enough to have it. Knowing that it’s likely to occur may be sufficient. A more immediate problem would be keeping existing agencies from aborting the OIO as soon as someone with the power to create it started thinking it might be a good idea. And, of course, there’s also the unlikelihood that anyone who thinks that the Department of Homeland Security is a good idea would ever entertain such a possibility.
Right now, we have to do something, and preferably something useful. The U.S. has just taken its worst hit from the outside since 1941. Our existing systems for understanding the world are designed to understand a world that no longer exists. It’s time to try something that’s the right kind of crazy. It’s time to end the more traditional insanity of endlessly repeating the same futile efforts.
John Perry Barlow is cofounder of the Electronic Frontier Foundation.
4b. We note–again–that WikiLeaks is, and always was, an obviously fascist/Nazi institution. (In FTR #‘s 724, 725, 732, 745, 755 and 917, we have detailed the fascist and far right-wing ideology, associations and politics of Julian Assange and WikiLeaks.)
“Inside the Paranoid, Strange World of Julian Assange” by James Ball; BuzzFeed; 10/23/2016.
. . . . Spending those few months at such close proximity to Assange and his confidants, and experiencing first-hand the pressures exerted on those there, have given me a particular insight into how WikiLeaks has become what it is today.
To an outsider, the WikiLeaks of 2016 looks totally unrelated to the WikiLeaks of 2010. . . .
Now it is the darling of the alt-right, revealing hacked emails seemingly to influence a presidential contest, claiming the US election is “rigged”, and descending into conspiracy. Just this week on Twitter, it described the deaths by natural causes of two of its supporters as a “bloody year for WikiLeaks”, and warned of media outlets “controlled by” members of the Rothschild family – a common anti-Semitic trope. . .
5a. In FTR #951, we observed that Richard B. Spencer, one of Trump’s Nazi backers, has begun a website with Swedish Alt-Righter Daniel Friberg, part of the Swedish fascist milieu to which Carl Lundstrom belongs. In FTR #732 (among other programs), we noted that it was Lundstrom who financed the Pirate Bay website, on which WikiLeaks held forth for quite some time. In FTR #745, we documented that top Assange aide and Holocaust-denier Joran Jermas (aka “Israel Shamir”) arranged the Lundstrom/WikiLeaks liaison. (Jermas handles WikiLeaks Russian operations, a point of interest in the wake of the 2016 campaign.)
It is a good bet that Lundstrom/Pirate Bay/WikiLeaks et al were data mining the many people who visited the WikiLeaks site.
Might Lundstrom/Jermas/Assange et al have shared the voluminous data they may well have mined with Mercer/Cambridge Analytica/Bannon’s Nazified AI?
On Monday, Richard Spencer, New Jersey Institute of Technology lecturer Jason Jorjani, and Swedish New Right figure Daniel Friberg launched altright.com, a site aimed at bringing together “the best writers and analysts from Alt Right, in North America, Europe, and around the world.” . . .
. . . . As of now, most of the site’s content is recycled material from Friberg’s Arktos publishing house, Spencer’s other publication, Radix Journal, the alt-right online media network Red Ice, and Occidental Dissent, a white nationalist blog run by altright.com’s news editor Hunter Wallace. . . .
…. Still, Spencer’s intellectualism does little to hide the centrality of bigotry to his own worldview and the views of those he publishes. His previous site, Alternative Right, once ran an essay called, ‘Is Black Genocide Right?’” “Instead of asking how we can make reparations for slavery, colonialism, and Apartheid or how we can equalize academic scores and incomes,” Colin Liddell wrote, “we should instead be asking questions like, ‘Does human civilization actually need the Black race?’ ‘Is Black genocide right?’ and, if it is, ‘What would be the best and easiest way to dispose of them?’” It remains to be seen whether altright.com will employ similarly candid writers. . . .
5b. Pirate Bay sugar daddy Lundstrom has discussed his political sympathies. [The excerpt below is from Google translations. The Swedish sentence is followed by the English translation.] Note that he appears on the user/subscriber list for Nordic Publishers, the Nazi publishing outfit that handles the efforts produced by one of Jermas’s [aka “Shamir’s”] publishers.
“The Goal: Take over all Piracy” by Peter Karlsson; realtid.se; 3/10/2006.
. . . Lundström har inte gjort någon hemlighet av sina sympatier för främlingsfientliga grupper, och förra året fanns hans namn med på kundregistret hos det nazistiska bokförlaget Nordiska Förlaget. Lundstrom has made no secret of his sympathy for the xenophobic groups, and last year was his name with the customer code of the Nazi publishing house Nordic Publishers.
– Jag stöder dem genom att köpa böcker och musik. - I support them by buying books and music. Ni i media vill bara sprida missaktning om olika personer. You in the media just want to spread contempt for different people. Ni i media är fyllda av hat till Pirate Bay, avslutar en mycket upprörd Carl Lundström. You in the media is full of hatred to the Pirate Bay, finishing a very upset Carl Lundström.
Nordiska Förlaget säljer vit makt musik och böcker som hyllar rasistiska våldshandlingar. Nordic publishing company sells white power music and books that celebrates the racist violence. Förlaget stöder nazisternas demonstration i Salem och bjöd in Ku Klux Klan ledaren till en föredragturné i Sverige. Publisher supports the Nazi demonstration in Salem and invited the Ku Klux Klan leader [David Duke] for a lecture tour in Sweden. . . .
6c. Expo–founded by the late Stieg Larsson–revealed that Friberg’s Nordic Publishers has morphed into Arktos, one of the outfits associated with Spencer, et al.
“Right Wing Public Education” by Maria-Pia Cabero [Google Translation]; Expo; January of 2014.
. . . . When NF [Nordiska Forlaget–D.E.] were discontinued in 2010 founded the publisher Arktos by basically the same people. Arktos publishes New Right-inspired literature and CEO Daniel Friberg, who was driving in the NF, has played a key role in the establishment of ideas. . . .
7. At the SXSW event, Microsoft researcher Kate Crawford gave a speech about her work titled “Dark Days: AI and the Rise of Fascism,” the presentation highlighted the social impact of machine learning and large-scale data systems. The take home message? By delegating powers to Bid Data-driven AIs, those AIs could become fascist’s dream: Incredible power over the lives of others with minimal accountability: ” . . . .‘This is a fascist’s dream,’ she said. ‘Power without accountability.’ . . . .”
We reiterate, in closing, that ” . . . . Palantir is building an intelligence system to assist Donald Trump in deporting immigrants. . . .”
In FTR #757 we noted that Palantir is a firm dominated by Peter Thiel, a main backer of Donald Trump.
Microsoft’s Kate Crawford tells SXSW that society must prepare for authoritarian movements to test the ‘power without accountability’ of AI
As artificial intelligence becomes more powerful, people need to make sure it’s not used by authoritarian regimes to centralize power and target certain populations, Microsoft Research’s Kate Crawford warned on Sunday.
In her SXSW session, titled Dark Days: AI and the Rise of Fascism, Crawford, who studies the social impact of machine learning and large-scale data systems, explained ways that automated systems and their encoded biases can be misused, particularly when they fall into the wrong hands.
“Just as we are seeing a step function increase in the spread of AI, something else is happening: the rise of ultra-nationalism, rightwing authoritarianism and fascism,” she said.
All of these movements have shared characteristics, including the desire to centralize power, track populations, demonize outsiders and claim authority and neutrality without being accountable. Machine intelligence can be a powerful part of the power playbook, she said.
One of the key problems with artificial intelligence is that it is often invisibly coded with human biases. She described a controversial piece of research from Shanghai Jiao Tong University in China, where authors claimed to have developed a system that could predict criminality based on someone’s facial features. The machine was trained on Chinese government ID photos, analyzing the faces of criminals and non-criminals to identify predictive features. The researchers claimed it was free from bias.
“We should always be suspicious when machine learning systems are described as free from bias if it’s been trained on human-generated data,” Crawford said. “Our biases are built into that training data.”
In the Chinese research it turned out that the faces of criminals were more unusual than those of law-abiding citizens. “People who had dissimilar faces were more likely to be seen as untrustworthy by police and judges. That’s encoding bias,” Crawford said. “This would be a terrifying system for an autocrat to get his hand on.”
Crawford then outlined the “nasty history” of people using facial features to “justify the unjustifiable”. The principles of phrenology, a pseudoscience that developed across Europe and the US in the 19th century, were used as part of the justification of both slavery and the Nazi persecution of Jews.
With AI this type of discrimination can be masked in a black box of algorithms, as appears to be the case with a company called Faceception, for instance, a firm that promises to profile people’s personalities based on their faces. In its ownmarketing material, the company suggests that Middle Eastern-looking people with beards are “terrorists”, while white looking women with trendy haircuts are “brand promoters”.
Another area where AI can be misused is in building registries, which can then be used to target certain population groups. Crawford noted historical cases of registry abuse, including IBM’s role in enabling Nazi Germany to track Jewish, Roma and other ethnic groups with the Hollerith Machine, and the Book of Life used in South Africa during apartheid. [We note in passing that Robert Mercer, who developed the core programs used by Cambridge Analytica did so while working for IBM. We discussed the profound relationship between IBM and the Third Reich in FTR #279–D.E.]
Donald Trump has floated the idea of creating a Muslim registry. “We already have that. Facebook has become the default Muslim registry of the world,” Crawford said, mentioning research from Cambridge University that showed it is possible to predict people’s religious beliefs based on what they “like” on the social network. Christians and Muslims were correctly classified in 82% of cases, and similar results were achieved for Democrats and Republicans (85%). That study was concluded in 2013, since when AI has made huge leaps.
Crawford was concerned about the potential use of AI in predictive policing systems, which already gather the kind of data necessary to train an AI system. Such systems are flawed, as shown by a Rand Corporation study of Chicago’s program. The predictive policing did not reduce crime, but did increase harassment of people in “hotspot” areas. Earlier this year the justice department concluded that Chicago’s police had for years regularly used “unlawful force”, and that black and Hispanic neighborhoods were most affected.
Another worry related to the manipulation of political beliefs or shifting voters, something Facebook and Cambridge Analytica claim they can already do. Crawford was skeptical about giving Cambridge Analytica credit for Brexit and the election of Donald Trump, but thinks what the firm promises – using thousands of data points on people to work out how to manipulate their views – will be possible “in the next few years”.
“This is a fascist’s dream,” she said. “Power without accountability.”
Such black box systems are starting to creep into government. Palantir is building an intelligence system to assist Donald Trump in deporting immigrants.
“It’s the most powerful engine of mass deportation this country has ever seen,” she said. . . .
Here’s a twist to the GOP’s decision to give internet service providers the right to tell their customers’ browsing data that might actually give the Alt Right and other neo-Nazis a very big reason to be very pissed at Trump and the GOP: If you’re a neo-Nazi fan of websites like Stormfront, the fact that you visit these sites was going to be between you and Stormfront. And your ISP. And any other entities, government or otherwise, that be watching the traffic to those sites. And if there are any advertisers on those sites they might also be able to track your Stormfront viewing habits. Plus, if you used a search engine to get to the site then your search engine provider would presumably know. But that would mostly be it. But now, thanks to the GOP, that whole giant data harvesting industry that exists to build profiles on everyone is now going to get to learn about your Stormfront viewing habits too! Or maybe your love of 4Chan. Or all those horrible Reddit forums your visit and post to. All that will be even more available to add to the various Big Data profiles of your floating around in the data harvesting industry. And it’s all thanks to the GOP and Donald Trump:
“The only thing chan trolls care about as much as ethics in gaming journalism and securing a future for white children is access to an internet that’s unfettered by snooping corporate interlopers. The entire identity of a Trump-loving 4chan poster is wrapped up in the anonymity of the internet, and the ability to do whatever you want online without consequences, whether it’s telling elaborate inside jokes on message boards or harassing liberal journalists on Twitter. The elimination of the FCC’s Obama-era privacy protections is a major blow to the idea of a free and open internet.”
And just to be clear, Donald Trump did actually sign this into law, so it’s a done deal. And, of course, par for the course for the GOP:
The Alt Right wasn’t just betrayed by Trump and the GOP but by their own not just their own anti-government Libertarian ideology. Yeah, it’s definitely a ‘sad Pepe’ moment.
Considering what Hitler and the Nazis did with a ... I forget ... 80 character? punch card, what is out there today is monstrous.
The problem is, does anyone have any way to conceive this, frame it, or manage it so that there can be a consensus reached about laws and rights?
One thing I’ve wondered, is if we have all of this surveillance ability, why is there still organized crime? The Mafia should be gone, eviscerated, unless they own the surveillance machine or are in on it in some way?
Remember how Tay, Microsoft’s AI-powered twitterbot designed to learn from its human interactions, became a neo-Nazi in less than a day after a bunch of 4chan users decided to flood Tay with neo-Nazi-like tweets? Well, according to some recent research, the AI’s of the future might not need a bunch of 4chan to fill the AI with human bigotries. The AIs’ analysis of real-world human language usage will do that automatically:
“And the AI system was more likely to associate European American names with pleasant words such as “gift” or “happy”, while African American names were more commonly associated with unpleasant words.”
Yep, if we decide to teach our AIs by just exposing it to a large database of human activity, like a massive database of documents published online, those AIs are going to learn a few lessons that we might not want them to learn. Kind of like how each generation of humans instills and perpetuates the next generation with the dominant bigotries of that society simply through exposure. Great.
And while it’s possible to build systems to detect these kinds of biases and correct for it, doing so without stripping away the AIs’ powers of interpretation isn’t going to be easy:
At this point it’s looking like building non-bigoted AIs that’s learn simply by observing the world humans created is going to be a very difficult task. In other words, the easy and lazy thing to do is to just leave the learned bigotries intact. In other other words, the profitable thing to do is to just leave the learned bigotries intact. At least in many cases (because who wants to pay for the expensive non-bigoted AI?)
So while it shouldn’t be surprising if the AIs of the future have an anti-human bias, it’s possible that the next generation of AIs will have an anti-specific-types-of-humans bias. And that particular bias will depend on which human data set was used to train the AI. We wouldn’t expect an AI trained on American language usage to have the same biases as those trained on, say, a Japanese data set. So we could have a future where the same underlying AI-self-learning technology ends up creating wildly different AI bigotries due to the different societal data sets.
It all raises a creepy AI bigotry question: will the AIs be bigoted against AIs that don’t share their bigotries? For instance, will a white supremacist AI view an AI trained on, say, a Hebrew data set negatively? What about an AI taught primarily through exposure to religious fundamentalist writings? Will it view non-fundamentalist AIs as godless enemies? These are the creepy kind of questions we get to ask nowadays. They’re pretty similar to the questions societies should have been asking of themselves throughout history regarding the collective self-awareness of the bigotries getting passed on to the next generation, but somehow creepier.
And now you know: when you read about people like Elon Musk equating artificial intelligence with “summoning the demon”, that demon is us. At least in part.
Check out the explanation GOP Congressman James Sensenbrenner gave for why he supported the vote to allow US internet service providers to sell their customers’ browsing habits: “Nobody’s got to use the internet”:
“That’s when Sensenbrenner said, “Nobody’s got to use the Internet.” He praised ISPs for “invest[ing] an awful lot of money in having almost universal service now.” He then said, “I don’t think it’s my job to tell you that you cannot get advertising for your information being sold. My job, I think, is to tell you that you have the opportunity to do it, and then you take it upon yourself to make the choice.””
Rep. Sensenbrenner doesn’t think it’s his job to tell you that you cannot get advertising in exchange for having your information sold. Despite the fact that the privacy bill the GOP just killed explicitly gave people the option to have their browsing habits sold if they wanted to do that:
So it would probably be more accurate to say that Rep. Sensenbrenner thinks it is his job to explicitly tell you that you can’t not receive advertising for having your information sold. Or rather, to pass a law that says you can’t not have your information sold, and then frame it was a “freedom of choice” argument while simultaneously suggesting that the real choice you have is whether or not to use the internet at all because you’ll have no choice about whether or not your internet usage will be sold. Selling out his constituents, very directly in this case, and framing it as freedom. And then getting reelected. That appears to be his job.
He’s pretty good at his job.
FYI, those fancy new headphones you’re wearing might be listening to what you’re listening to. And your headphone manufacturer might be listening to what you’re headphones are telling them about what you’re listening to. And the data mining companies might be listening to what your headphone manufacturer is
tellingselling them about what your headphones are telling them you’re listening to. And that data mining companies’ clients might be listening to what the data mining company istellingselling them about what the headphone manufacturer is telling them about what your headphones is telling them you’re listening to. In other words, when your headphones talk about what you’re listening to, A LOT of different parties might be listening. Especially if those fancy new headphones are manufactured by Bose:““Customers were not getting notice or giving consent to have this type of data leave their phone to go to Bose, or to third-parties,” said Christopher Dore, a lawyer at Edelson. He added that because a data mining company was picking up the Bose information, the small details of what Zak and others have listened to could have been resold by that company far and wide — but it’s not clear to whom. “We don’t know where the data could have gone after that,” Dore said.”
That doesn’t sound good. Definitely not a ‘good vibes’ situation for Bose if this turns out to be true.
And in other ‘not good vibes’ news...
With VW facing a final criminal fine from the US government of $2.8 billion over its use of software “defeat devices” designed to detect when regulators were examining the diesel fuel emissions and operate in a special regulator-friendly mode, it’s worth noting that Uber, the ride-sharing behemoth, appears to have a proclivity for defeat devices of its own. Defeat devices for both public and private regulators (law enforcement and Apple):
“So Mr. Kalanick told his engineers to “geofence” Apple’s headquarters in Cupertino, Calif., a way to digitally identify people reviewing Uber’s software in a specific location. Uber would then obfuscate its code for people within that geofenced area, essentially drawing a digital lasso around those it wanted to keep in the dark. Apple employees at its headquarters were unable to see Uber’s fingerprinting.”
That sure sounds like a “defeat device”. And note how simple it was to design: as long as Uber was within a certain range around Apple’s headquarters, the “defeat device” software was turn on. And that was just for Apple. Then there’s the law enforcement “defeat device”:
So how did “Greyball” work? Well, geofencing was one approach, where Uber would “geofence” the area around where city employees involved with regulating Uber worked. But for Greyball the geofencing got much more specific. Or, rather, personal. Uber would “tag” individuals working for law enforcement and “geofence” them:
“But unknown to Mr. England and other authorities, some of the digital cars they saw in the app did not represent actual vehicles. And the Uber drivers they were able to hail also quickly canceled. That was because Uber had tagged Mr. England and his colleagues — essentially Greyballing them as city officials — based on data collected from the app and in other ways. The company then served up a fake version of the app, populated with ghost cars, to evade capture.”
And how exactly did Uber “tag” these individuals working for city governments? There was using their credit card information to determine if they were for someone like the police. But if that didn’t work, they searched social media:
“If such clues did not confirm a user’s identity, Uber employees would search social media profiles and other information available online. If users were identified as being linked to law enforcement, Uber Greyballed them by tagging them with a small piece of code that read “Greyball” followed by a string of numbers.”
So Uber was search social media account to play “Where’s Cop Waldo?”, and that was only if their other methods of identifying the police or other government employees didn’t work. In other words, the “defeat device” for Uber in this case was Big Data. Big Data plus a simple “tagging” system that could activate Uber’s fake-mode for people on “Greyball” list. That’s quite a “defeat device”.
And as disturbing as this story is in terms of the growing privacy danger it highlights for anyone involved with law enforcement and government (or private regulators in the case of Apple), it also raises the question: if Uber was doing this “background check” in order to finding the police, doesn’t that mean it was doing this check for all its riders? At least in the cities where they had these disputes with the local government? Isn’t that what’s implied by this story? Mass back ground checks? It seems like that’s what it implies.
So that’s all one more example of the privacy dangers associated with the ‘anything goes’ barely-regulated Big Data industry: private companies now have an incentive to engage in Big Data searchers on basically everyone in order to identify all the people who might bust them for mass Big Data abuses.
Check out some of the features in the next version of Amazon’s Echo, the Echo Look which has a microphone and camera so it can take pictures of you and give you fashion advice. Yes, an AI-driven device designed to placed in your bedroom to capture audio and video is one the way. The images and videos are stored indefinitely in the Amazon cloud. And when Amazon was asked if the photos, videos, and the data gleaned from the Echo Look would be sold to third parties, Amazon didn’t address that question. So based on that non-response response, it would appear that selling off your private info collected from these devices is presumably another feature of the Echo Look:
“Motherboard also asked if Echo Look photos, videos, and the data gleaned from them would be sold to third parties; the company did not address that question.”
No comment. That’s quite a comment.
But it’s worth noting that Amazon did comment about this same question to a reporter from The Verge. Although it wasn’t an answer to exactly the same question. The question Amazon neglected to answer above was the general question of whether Amazon would sell the data “to third parties.” But for a report in The Verge, which came out a day after the above report from Vice, an Amazon representative did volunteer that it wouldn’t share any personal information gathered from the Echo Look to “advertisers or to third-party sites that display our interest-based ads”:
“The company did, though, say it wouldn’t share any personal information gleaned from the Echo Look to “advertisers or to third-party sites that display our interest-based ads.” That means Amazon could still use data from the Look to target ads at you itself, but at least third parties won’t.”
So based on the information, or lack thereof, that Amazon is willing to share at this point, the answer to the question of whether or not the data gathered by the Echo Look will be sold to third-parties depends on whether or not the phrase “advertisers or to third-party sites that display our interest-based ads” was intended to mean “all third-parties” or not. Because it seems like there should be plenty of non-advertising interest in exactly the same kind of data advertisers are interested in.
Only time, and likely a series of data-privacy horror stories, will tell whether or not the data collected by Amazon’s personal data collective device designed to go in your bedroom end up in third-party hands. At this point we can mostly just cynically speculate.
As to whether or not Amazon will be keeping all this harvested data for its own internal purposes, like cross-referencing the data gathered from the Echo Look with all the other data it has on us, we don’t need to cynically speculate quite as much since it’s pretty obvious from Amazon’s “we can’t speculate” response that the company is definitely speculating about cross-referencing all that data:
“But when asked whether the company would ever combine these two datasets, an Amazon rep only gave the same, canned answer: “Can’t speculate.””
That’s an ironically clear answer. Yes, Amazon is almost definitely speculating about cross-reference the data it collects from the Look with everything else it knows about you. And that raises another interesting question about the data it could potentially sell: the big edge that Big Data collectors like Facebook, Google, and Amazon have over the rest of the Big Data industry is all the insights they can make by putting two and two together. Insights that other Big Data competitors can’t generate themselves because of the relative exclusiveness of the data collected by social media/internet giants like Facebook, Google, and Amazon. So what about the sale of those insights? After all, they weren’t directly harvested data. They were instead inferred from harvested data. So will those insights be for sale? Like, if the Amazon infers that you’re depressed or pregnant or whatever based on the data collected from the Echo Look — and maybe some other data they have on you — are they going to be open to selling that data.
In other words, when Amazon claims that it won’t sell the data it harvests to third-party advertisers, does that include inferences Amazon makes based on that data too? Or is it just the raw data that Amazon says it won’t sell? Given the ambiguousness of Amazon’s answers we can only speculate at this point. Very cynically speculate.
It is rather ironic, at least I hope it is, that for decades, as long as I have been alive, certain people have “trumpeted” that what this country needs is a good businessman to take the helm and bring corporate order and fiscal sanity to the nation ... and now we get Trump.
I wonder, hope, expect, demand that Americans have their noses rubbed in the the toxic mess of this wispy-haired idiot who even George Will ( who I detest ) says cannot think or speak clearly and once and for all realize that the skills needed for making a lot of money are counter the skills needed to uphold the Constitution and represent fairly all of the American people.
Even the incompetence of private corporations in the market place has had a huge negative effect. Looking more closely at the Internet, when it began it was not supposed to be used for any commercial purposes and had it been more closely regulated there might have been a chance that it would not be such a threat vulnerability from both foreign and domestic entities.
A thing that surprised the other day was that I was browsing one of the local city websites which happened to have an article about growing legal pot and how cities were trying to regulate it. I was just browsing, not commenting or thumbs-upping or thumbs-downing. When I clicked away from the site for the first time on my browser ads on commercial pot cultivation? That unnerved me a bit.
It is not just that all this data is being stored, but that various searched and queries can be run against it and things that have no legal backing or judicial review are bypassed so that the security state is going to evolve to Big Brother, if it has not already.
Remember Uber’s “Greyball” project? That was the tool Uber developed to identify government and law enforcement officials in a city Uber was illegally operating in. Greyball was a special version of the Uber app that hide the existence of a Uber drivers in the area when these targeted officials tried to use the Uber app to determine whether or not Uber was indeed operating illegally in their city.
Well, not surprisingly it turns out that Uber has a backup plan in case “Greyball” doesn’t work and one of their offices end up getting raided: Ripley. That’s the name for the software Uber secretly installed on the computers in its hundreds of offices around the world that will immediately lock down all of the computers and make them basically inaccessible to law enforcement. Ripley allows the Uber HQ team to remotely change passwords and lock up data on company-owned smartphones, laptops, and desktops. And then remotely shut down the devices. Later versions of Ripley give Uber’s HQ the ability to selectively provide information to government agencies. Company lawyers can direct security engineers to select which information to share with officials when a warrant is issued. And this, of course, has law enforcement agencies wondering what they’ve missed in past raids. Because Ripley isn’t just a tool Uber developed ‘just in case’ and never actually used. Sources say it’s been used at least two dozen times so far:
“Like managers at Uber’s hundreds of offices abroad, they’d been trained to page a number that alerted specially trained staff at company headquarters in San Francisco. When the call came in, staffers quickly remotely logged off every computer in the Montreal office, making it practically impossible for the authorities to retrieve the company records they’d obtained a warrant to collect. The investigators left without any evidence.”
That’s the description of a corporate response to ‘unexpected visits’ from law enforcement that’s apparently been routine for Uber in recent years: a law enforcement raid prompts a call to Uber HQ, and all of a sudden all the computers are shut down, encrypted, and there’s basically no ability to gather evidence. And then after law enforcement demands access after showing its warrant, “Ripley” allows Uber HQ to decrypt and make available a selected subset of the data on Uber’s system. One version of Ripley even created a fake login screen, which presumably launch a ‘clean’ version of that computer with no sensitive files available:
So Uber has a system where is can lock down its data almost instantly, and then choose what data it wants to reveal after the warrant forces the company to comply. And this all might be legal because the fine line between obstruction and properly protecting your business is a legal greyzone:
Although it seems like the accusations of spying on government officials and rivals probably isn’t legal. Or is it?
Keep in mind that “Greyball” was all about spying on government officials. That’s how the system worked: Uber identified government officials in a city and then manipulated just their Uber apps to hide all the local Uber drivers. So was Uber spying on these government officials solely via the Uber app or was there a more invasive form of spying going on? This is seems like the kind of thing that should be investigated. Perhaps with a raid on Uber’s offices. Oh wait...