In FTR#718, we noted the intelligence community and fascist underpinnings of the genesis of Facebook, including the central role of Peter Thiel in the firm’s beginning. In numerous programs since, we have chronicled the anti-democratic and fascist manifestations of Facebook, including the company’s decisive role in the Cambridge Analytica gambit, in which elements of Peter Thiel’s Palantir–the Alpha predator of the electronic surveillance landscape–helped to “game” the 2016 election in favor of Trump. With contemporary discussion of attempts to “rein-in” Big Tech, we are reminded of an element of discussion in FTR#1021, among other programs. Although she has left the company, former DARPA chief Regina Dugan was working on a Facebook project to operate the social media platform by utilizing brain-to-computer interface. This work was underway at Facebook’s “secretive” R & D Building 8, described as patterned after DARPA itself. This disturbing detail suggests that the firm’s significant national security connections may well embrace the advancing of military research per se. As we noted, this technology will permit the tapping and databasing of Facebook users’ thoughts!
We begin a series of programs highlighting various aspects of the “three-dimensional chess” aspect of the Covid-19 “bio-psy-op” we feel is underway. Actually six or seven dimensional chess might be a better way of expressing this analytical concept.
It is of paramount importance for listeners/readers to understand that the conceptual breakdown is for cognitive clarity only. The bio-psy-op” is multi-dimensional in its entirety and must be understood to be a type of “fascist/totalitarian lasagna” with many layers to be consumed.
In this program, we present ways in which the Covid-19 outbreak is subverting democracy, both inside and outside of the United States.
Although he has only flirted with exercising them, to date, Trump does indeed have some emergency powers that can be invoked to further his agenda” ” . . . . The most notable aspect of presidential emergency action documents might be their extreme secrecy. It’s not uncommon for the government to classify its plans or activities in the area of national security. . . . By contrast, we know of no evidence that the executive branch has ever consulted with Congress — or even informed any of its members — regarding the contents of presidential emergency action documents. . . . That is a dangerous state of affairs. The coronavirus pandemic is fast becoming the most serious crisis to face this country since World War II. And it is happening under the watch of a president who has claimed that Article II of the Constitution gives him ‘the right to do whatever I want.’ It is not far-fetched to think that we might see the deployment of these documents for the first time and that they will assert presidential powers beyond those granted by Congress or recognized by the courts as flowing from the Constitution. . . .”
Next, we add that the Bio-Psy-Op Apocalypse is spawning totalitarian manifestations–not surprisingly–at the Department of Justice headed by “ex” CIA officer William Barr. ” . . . . The request raised eyebrows because of its potential implications for habeas corpus — the constitutional right to appear before a judge after arrest and seek release. ‘Not only would it be a violation of that, but it says ‘affecting pre-arrest,’” said Norman L. Reimer, executive director of the National Association of Criminal Defense Lawyers. ‘So that means you could be arrested and never brought before a judge until they decide that the emergency or the civil disobedience is over. I find it absolutely terrifying. Especially in a time of emergency, we should be very careful about granting new powers to the government.’ . . .”
It will come as no surprise to veteran listeners, the Pentagon has contingency plans for varying degrees of governmental and/or civic disability. ” . . . . But Coronavirus is also new territory, where the military itself is vulnerable and the disaster scenarios being contemplated — including the possibility of widespread domestic violence as a result of food shortages — are forcing planners to look at what are called ‘extraordinary circumstances’. Above-Top Secret contingency plans already exist for what the military is supposed to do if all the Constitutional successors are incapacitated. Standby orders were issued more than three weeks ago to ready these plans, not just to protect Washington but also to prepare for the possibility of some form of martial law. . . .”
The military’s contingency plans have been partially activated: ” . . . . While being hit with coronavirus at rates equivalent to the civilian population, the U.S. military has activated its ‘defense support of civil authorities’ apparatus, establishing liaisons in all 50 states, activating units and command posts, and moving forces to provide medical, transportation, logistics, and communications support in New York and Washington states. Lt. Gen. Laura Richardson, the command of Army North (ARNORTH), has requested and received approval for the deployment of ground units in response to the now declared national emergency. . . .”
We note, in passing, that, although not in effect at this point, discussion of “martial law” are far more than just social media fodder, to coin a term. ” . . . . Because of so many rumors flying in social media, the Pentagon established a ‘rumor control’ website to beat down stories of military-imposed quarantines and even martial law. And it said it was going to limit details of both the specific numbers of coronavirus cases and operational details. . . .”
Martial law discussion has been spurred by, among other things, Trump’s ruminations about what he can and will do: “. . . . Earlier Saturday, Mr. Trump said that he is considering declaring an ‘enforceable’ quarantine affecting some residents of the New York metropolitan area, possibly including New Jersey and Connecticut. He called the region a ‘hot spot’ of the coronavirus outbreak sweeping the country. . . . Mr. Trump reiterated in his remarks before the send off of the USNS Comfort that he was considering a quarantine of the area. The Comfort is a naval hospital boat which is carrying over 1,000 beds and 1,200 medical personnel to New York City. . . . Using active duty troops to enforce a quarantine would require the president to suspend the Posse Comitatus Act, which forbids the use of the armed services for law enforcement. . . .”
Trump has plenty of company: ” . . . . In Hungary, a new law has granted Prime Minister Viktor Orban the power to sidestep Parliament and suspend existing laws. Mr. Orban, who declared a state of emergency this month, now has the sole power to end the emergency. Parliament, where two-thirds of the seats are controlled by his party, approved the legislation on Monday. . . .‘The draft law is alarming,’ said Daniel Karsai, a lawyer in Budapest who said the new legislation had created ‘a big fear’ among Hungarians that ‘the Orban administration will be a real dictatorship.’ . . .”
Orban’s Hungary has been joined by, among others, the long-standing British democracy: ” . . . . some of the provisions . . . . will give the government unchecked control. The legislation gives sweeping powers to border agents and the police, which could lead to indefinite detention and reinforce ‘hostile environment’ policies against immigrants, critics said. ‘Each clause could have had months of debate, and instead it’s all being debated in a few days,’ said Adam Wagner, a lawyer who advises a parliamentary committee on human rights. . . . ‘These are eye-watering powers that would have not been really imaginable in peacetime in this country before,’ said Silkie Carlo, the director of Big Brother Watch, a rights group. She called the measures ‘draconian.’ . . . .”
Privacy is being dramatically curtailed under cover of combatting the virus: ” . . . . As Thomas Gaulkin of the Bulletin of the Atomic Scientists noted earlier this month, many Americans— often fierce in their objections to perceived government overreach into their lives—might normally object to dystopian images of flying robots policing lockdowns. But these, of course, are not normal times. ‘If drones do begin to hover over U.S. streets to help control this pandemic,’ Gaulkin wrote, ‘it will be yet another visible reminder that we’ve entered a public health Twilight Zone where Americans have no better option than to embrace what was once only imaginable, and never real.’ . . . ”
The alpha predator of the electronic surveillance landscape is Peter Thiel’s Palantir. They have landed two key government contracts in connection with the Covid-19 outbreak:” . . . . Palantir, the $20 billion-valued Palo Alto tech company backed by Facebook-funder Peter Thiel, has been handed a $17.3 million contract with one of the leading health bodies leading the charge against COVID-19. It’s the biggest contract handed to a Silicon Valley company to assist America’s COVID-19 response, according to Forbes’ review of public contracts, and comes as other Californian giants like Apple and Google try to figure out how best to help governments fight the deadly virus. . . . The money, from the federal government’s COVID-19 relief fund, is for Palantir Gotham licenses, according to a contract record reviewed by Forbes. That technology is designed to draw in data from myriad sources and, regardless of what form or size, turn the information into a coherent whole. The ‘platform’ is customized for each client, so it meets with their mission needs, according to Palantir. . . . Palantir Gotham is slightly different to Foundry, a newer product that’s aimed more at general users rather than data science whizzes, with more automation than Gotham. As Forbes previously reported, Foundry is being used by the Centers for Disease Control and Prevention (CDC) to ingest information from all manner of hospitals across America to see where best to provide more or less resource. . . . Palantir is now working with at least 12 governments on their responses to coronavirus, according to two sources with knowledge of its COVID-19 work. That includes the U.K.’s National Health Service, which is using Foundry for similar purposes as the CDC. . . .”
Exemplifying the multi-dimensional chess scenario in connection with the “bio-psy-op” is the GOP’s plan to use the Covid-19 outbreak to scapegoat China and tar the Democrats and Joe Biden with the same brush. Of particular note in this regard is the Steve Bannon‑J. Kyle Bass-Tommy Hicks, Jr. triumvirate discussed in–among other programs–FTR #‘s 1111 and 1112.
At the epicenter of the anti-China effort, Bannon is networked with Bass, who is asymmetrically invested with regard to the Hong Kong and Chinese economies. Hicks, in turn, is a co-investor with Bass, co-chairman of the RNC, and one of the prime movers of the interagency governmental networks involved in the anti-China destabilization operation. This networked relationship affords investors like Bass and Hicks the ultimate position from which to profit from “insider” information.
The synthesis of covert operations and electoral politics reminds us of the 1952 election, in which Arthur Bliss Lane occupied a key position in the Crusade For Freedom, as well as the GOP. (We discussed this in AFA #37, and utilized information from, among other sources, Blowback by Christopher Simpson.
Exemplary, as well, of the bio-psy-op as synthesis of covert operation and political crusading is the GOP’s cynical manipulation of emergency appropriations to achieve their longstanding objective of crippling state and local governments, as well as driving the Postal Service into bankruptcy. Privatizing postal service has been a right-wing/GOP objective for a long time. ” . . . . Everyone, and I mean everyone, knows what is really happening: McConnell is trying to get more money for businesses while continuing to shortchange state and local governments. After all, “starve the beast” — forcing governments to cut services by depriving them of resources — has been Republican strategy for decades. This is just more of the same. . . . Oh, and Trump personally has ruled out aid for the Postal Service. . . .”
Continuing the discussion from FTR #1076, the broadcast recaps key aspects of analysis of the Cambridge Analytica scandal.
In our last program, we noted that both the internet (DARPA projects including Project Agile) and the German Nazi Party had their origins as counterinsurgency gambits. Noting Hitler’s speech before The Industry Club of Dusseldorf, in which he equated communism with democracy, we highlight how the Cambridge Analytica scandal reflects the counterinsurgency origins of the Internet, and how the Cambridge Analytica affair embodies anti-Democracy/as counterinsurgency.
Key aspects of the Cambridge Analytica affair include:
1.–The use of psychographic personality testing on Facebook that is used for political advantage: ” . . . . For several years, a data firm eventually hired by the Trump campaign, Cambridge Analytica, has been using Facebook as a tool to build psychological profiles that represent some 230 million adult Americans. A spinoff of a British consulting company and sometime-defense contractor known for its counterterrorism ‘psy ops’ work in Afghanistan, the firm does so by seeding the social network with personality quizzes. Respondents — by now hundreds of thousands of us, mostly female and mostly young but enough male and older for the firm to make inferences about others with similar behaviors and demographics — get a free look at their Ocean scores. Cambridge Analytica also gets a look at their scores and, thanks to Facebook, gains access to their profiles and real names. . . .”
2.–The parent company of Cambridge Analytica–SCL–was deeply involved with counterterrorism “psy-ops” in Afghanistan, embodying the essence of the counterinsurgency dynamic at the root of the development of the Internet. The use of online data to subvert democracy recalls Hitler’s speech to the Industry Club of Dusseldorf, in which he equated democracy with communism: ” . . . . Cambridge Analytica was a company spun out of SCL Group, a British military contractor that worked in information operations for armed forces around the world. It was conducting research on how to scale and digitise information warfare – the use of information to confuse or degrade the efficacy of an enemy. . . . As director of research, Wylie’s original role was to map out how the company would take traditional information operations tactics into the online space – in particular, by profiling people who would be susceptible to certain messaging. This morphed into the political arena. After Wylie left, the company worked on Donald Trump’s US presidential campaign . . . .”
3.–Cambridge Analytica whistleblower Christopher Wylie’s observations on the anti-democratic nature of the firm’s work: ” . . . . It was this shift from the battlefield to politics that made Wylie uncomfortable. ‘When you are working in information operations projects, where your target is a combatant, the autonomy or agency of your targets is not your primary consideration. It is fair game to deny and manipulate information, coerce and exploit any mental vulnerabilities a person has, and to bring out the very worst characteristics in that person because they are an enemy,’ he says. ‘But if you port that over to a democratic system, if you run campaigns designed to undermine people’s ability to make free choices and to understand what is real and not real, you are undermining democracy and treating voters in the same way as you are treating terrorists.’ . . . .”
4.–Wylie’s observations on how Cambridge Analytica’s methodology can be used to build a fascist political movement: ” . . . . One of the reasons these techniques are so insidious is that being a target of a disinformation campaign is ‘usually a pleasurable experience’, because you are being fed content with which you are likely to agree. ‘You are being guided through something that you want to be true,’ Wylie says. To build an insurgency, he explains, you first target people who are more prone to having erratic traits, paranoia or conspiratorial thinking, and get them to ‘like’ a group on social media. They start engaging with the content, which may or may not be true; either way ‘it feels good to see that information’. When the group reaches 1,000 or 2,000 members, an event is set up in the local area. Even if only 5% show up, ‘that’s 50 to 100 people flooding a local coffee shop’, Wylie says. This, he adds, validates their opinion because other people there are also talking about ‘all these things that you’ve been seeing online in the depths of your den and getting angry about’. People then start to believe the reason it’s not shown on mainstream news channels is because ‘they don’t want you to know what the truth is’. As Wylie sums it up: ‘What started out as a fantasy online gets ported into the temporal world and becomes real to you because you see all these people around you.’ . . . .”
5.–Wylie’s observation that Facebook was “All In” on the Cambridge Analytica machinations: ” . . . . ‘Facebook has known about what Cambridge Analytica was up to from the very beginning of those projects,” Wylie claims. “They were notified, they authorised the applications, they were given the terms and conditions of the app that said explicitly what it was doing. They hired people who worked on building the app. I had legal correspondence with their lawyers where they acknowledged it happened as far back as 2016.’ . . . .”
6.–The decisive participation of “Spy Tech” firm Palantir in the Cambridge Analytica operation: Peter Thiel’s surveillance firm Palantir was apparently deeply involved with Cambridge Analytica’s gaming of personal data harvested from Facebook in order to engineer an electoral victory for Trump. Thiel was an early investor in Facebook, at one point was its largest shareholder and is still one of its largest shareholders. In addition to his opposition to democracy because it allegedly is inimical to wealth creation, Thiel doesn’t think women should be allowed to vote and holds Nazi legal theoretician Carl Schmitt in high regard. ” . . . . It was a Palantir employee in London, working closely with the data scientists building Cambridge’s psychological profiling technology, who suggested the scientists create their own app — a mobile-phone-based personality quiz — to gain access to Facebook users’ friend networks, according to documents obtained by The New York Times. The revelations pulled Palantir — co-founded by the wealthy libertarian Peter Thiel — into the furor surrounding Cambridge, which improperly obtained Facebook data to build analytical tools it deployed on behalf of Donald J. Trump and other Republican candidates in 2016. Mr. Thiel, a supporter of President Trump, serves on the board at Facebook. ‘There were senior Palantir employees that were also working on the Facebook data,’ said Christopher Wylie, a data expert and Cambridge Analytica co-founder, in testimony before British lawmakers on Tuesday. . . . The connections between Palantir and Cambridge Analytica were thrust into the spotlight by Mr. Wylie’s testimony on Tuesday. Both companies are linked to tech-driven billionaires who backed Mr. Trump’s campaign: Cambridge is chiefly owned by Robert Mercer, the computer scientist and hedge fund magnate, while Palantir was co-founded in 2003 by Mr. Thiel, who was an initial investor in Facebook. . . .”
7.–The use of “dark posts” by the Cambridge Analytica team. (We have noted that Brad Parscale has reassembled the old Cambridge Analytica team for Trump’s 2020 election campaign. It seems probable that AOC’s millions of online followers, as well as the “Bernie Bots,” will be getting “dark posts” crafted by AI’s scanning their online efforts.) ” . . . . One recent advertising product on Facebook is the so-called ‘dark post’: A newsfeed message seen by no one aside from the users being targeted. With the help of Cambridge Analytica, Mr. Trump’s digital team used dark posts to serve different ads to different potential voters, aiming to push the exact right buttons for the exact right people at the exact right times. . . .”
Supplementing the discussion about Cambridge Analytica, the program reviews information from FTR #718 about Facebook’s apparent involvement with elements and individuals linked to CIA and DARPA: ” . . . . Facebook’s most recent round of funding was led by a company called Greylock Venture Capital, who put in the sum of $27.5m. One of Greylock’s senior partners is called Howard Cox, another former chairman of the NVCA, who is also on the board of In-Q-Tel. What’s In-Q-Tel? Well, believe it or not (and check out their website), this is the venture-capital wing of the CIA. After 9/11, the US intelligence community became so excited by the possibilities of new technology and the innovations being made in the private sector, that in 1999 they set up their own venture capital fund, In-Q-Tel, which ‘identifies and partners with companies developing cutting-edge technologies to help deliver these solutions to the Central Intelligence Agency and the broader US Intelligence Community (IC) to further their missions’. . . .”
More about the CIA/DARPA links to the development of Facebook: ” . . . . The second round of funding into Facebook ($US12.7 million) came from venture capital firm Accel Partners. Its manager James Breyer was formerly chairman of the National Venture Capital Association, and served on the board with Gilman Louie, CEO of In-Q-Tel, a venture capital firm established by the Central Intelligence Agency in 1999. One of the company’s key areas of expertise are in ‘data mining technologies’. Breyer also served on the board of R&D firm BBN Technologies, which was one of those companies responsible for the rise of the internet. Dr Anita Jones joined the firm, which included Gilman Louie. She had also served on the In-Q-Tel’s board, and had been director of Defence Research and Engineering for the US Department of Defence. She was also an adviser to the Secretary of Defence and overseeing the Defence Advanced Research Projects Agency (DARPA), which is responsible for high-tech, high-end development. . . .”
Program Highlights Include: Review of Facebook’s plans to use brain-to-computer technology to operate its platform, thereby the enabling of recording and databasing people’s thoughts; Review of Facebook’s employment of former DARPA head Regina Dugan to implement the brain-to-computer technology; Review of Facebook’s building 8–designed to duplicate DARPA; Review of Facebook’s hiring of the Atlantic Council to police the social medium’s online content; Review of Facebook’s partnering with Narendra Modi’s Hindutva fascist government in India; Review of Facebook’s emloyment of Ukrainian fascist Kateryna Kruk to manage the social medium’s Ukrainian content.
The program begins with recap of the adaptation of IBM’s Hollerith machines to Nazi data compilation. (We concluded FTR #1075 with discussion of this.): ” . . . . Germany’s vast state bureaucracy and its military and rearmament programs, including the country’s growing concentration camp/slave labor system, also required data processing services. By the time the U.S. officially entered the war in 1941, IBM’s German subsidiary had grown to employ 10,000 people and served 300 different German government agencies. The Nazi Party Treasury; the SS; the War Ministry; the Reichsbank; the Reichspost; the Armaments Ministry; the Navy, Army and Air Force; and the Reich Statistical Office — the list of IBM’s clients went on and on.
” ‘Indeed, the Third Reich would open startling statistical venues for Hollerith machines never before instituted — perhaps never before even imagined,’ wrote Edwin Black in IBM and the Holocaust, his pioneering 2001 exposé of the forgotten business ties between IBM and Nazi Germany. ‘In Hitler’s Germany, the statistical and census community, overrun with doctrinaire Nazis, publicly boasted about the new demographic breakthroughs their equipment would achieve.’ . . . .
“Demand for Hollerith tabulators was so robust that IBM was forced to open a new factory in Berlin to crank out all the new machines. At the facility’s christening ceremony, which was attended by a top U.S. IBM executive and the elite of the Nazi Party, the head of IBM’s German subsidiary gave a rousing speech about the important role that Hollerith tabulators played in Hitler’s drive to purify Germany and cleanse it of inferior racial stock. . . .”
In that same article, Yasha Levine notes that the Trump administration’s proposed changes in the 2020 census sound as though they may portend something akin to the Nazi census of 1933: ” . . . . Based on a close reading of internal Department of Commerce documents tied to the census citizen question proposal, it appears the Trump administration wants to use the census to construct a first-of-its-kind citizenship registry for the entire U.S. population — a decision that arguably exceeds the legal authority of the census. ‘It was deep in the documentation that was released,’ Robert Groves, a former Census Bureau director who headed the National Academies committee convened to investigate the 2020 census, told me by telephone. ‘No one picked up on it much. But the term ‘registry’ in our world means not a collection of data for statistical purposes but rather to know the identity of particular people in order to use that knowledge to affect their lives.’ Given the administration’s posture toward immigration, the fact that it wants to build a comprehensive citizenship database is highly concerning. To Groves, it clearly signals ‘a bright line being crossed.’ . . .”
In the conclusion to Surveillance Valley, Yasha Levine notes how IBM computing technology facilitated the Nazi slave labor operations throughout the Third Reich. The epicenter of this was Mauthausen.
The systematic use of slave labor was central to Nazi Germany’s industrial infrastructure: ” . . . . But in the 1930s, Mauthausen had been a vital economic engine of Hitler’s genocidal plan to remake Europe and the Soviet Union into his own backyard utopia. It started out as a granite quarry but quickly grew into the largest slave labor complex in Nazi Germany, with fifty sub-camps that spanned most of modern-day Austria. Here, hundreds of thousands of prisoners–mostly European Jews but also Roma, Spaniards, Russians, Serbs, Slovenes, Germans, Bulgarians, even Cubans–were worked to death. They refined oil, built fighter aircraft, assembled cannons, developed rocket technology, and were leased out to private German businesses. Volkswagen, Siemens, Daimler-Benz, BMW, Bosch–all benefited from the camp’s slave labor pool. Mauthausen, the administrative nerve center, was centrally directed from Berlin using the latest in early computer technology: IBM punch card tabulators. . . .”
Mauthausen’s IBM machines were, in turn, central to German industry’s use of slave labor: ” . . . . the camp had several IBM machines working overtime to handle the big churn of inmates and to make sure there were always enough bodies to perform the necessary work. These machines didn’t operate in isolation but were part of a larger slave labor control-and-accounting system that stretched across Nazi-occupied Europe connecting Berlin to every major concentration and labor punch card, telegraph, telephone, and human courier. This wasn’t the automated type of computer network system that the Pentagon would begin to build in the United States just a decade later, but it was an information network nonetheless: an electromechanical web that fueled and sustained Nazi Germany’s war machine with blazing efficiency. It extended beyond the labor camps and reached into the cities and towns, crunching mountains of genealogical data to track down people with even the barest whiff of Jewish blood or perceived racial impurity in a mad rush to fulfill Adolf Hitler’s drive to purify the German people, but they made the Nazi death machine run faster and more efficiently, scouring the population and tracking down victims in ways that would never have been possible without them. . . .”
In his book–one of the most important in recent memory–Yasha Levine sets forth vital, revelatory information about the development and functioning of the Internet.
Born of the same overlapping DARPA projects that spawned Agent Orange, the Internet was never intended to be something good. Its generative function and purpose is counter-insurgency. ” . . . . In the 1960s, America was a global power overseeing an increasingly volatile world: conflicts and regional insurgencies against US-allied governments from South America to Southeast Asia and the Middle East. These were not traditional wars that involved big armies but guerilla campaigns and local rebellions, frequently fought in regions where Americans had little previous experience. Who were these people? Why were they rebelling? What could be done to stop them? In military circles, it was believed that these questions were of vital importance to America’s pacification efforts, and some argued that the only effective way to answer them was to develop and leverage computer-aided information technology. The Internet came out of this effort: an attempt to build computer systems that could collect and share intelligence, watch the world in real time, and study and analyze people and political movements with the ultimate goal of predicting and preventing social upheaval. . . .”
In this landmark volume, Levine makes numerous points, including:
1.–The harvesting of data by intelligence services is PRECISELY what the Internet was designed to do in the first place.
2.–The harvesting of data engaged in by the major tech corporations is an extension of the data gathering/surveillance that was–and is–the raison d’etre for the Internet in the first place.
3.–The big tech companies all collaborate with the various intelligence agencies they publicly scorn and seek to ostensibly distance themselves from.
4.–Edward Snowden, the Electronic Frontier Foundation, Jacob Appelbaum, the milieu of the Tor Network and WikiLeaks are complicit in the data harvesting and surveillance.
5.–Snowden and other privacy activists are double agents, consciously channeling people fearful of having their communications monitored into technologies that will facilitate that surveillance!
The program notes that counterinsurgency–the functional context of the origin of the Internet–is at the foundation of the genesis of Nazism. At the conclusion of World War I, Germany was beset by a series of socialist/Communist uprisings in a number of cities, including Munich. Responding to that, underground Reichswehr units commanded by Ernst Rohm (later head of the SA) systematically assassinated the leaders of the revolution, as well as prominent social democrats and Jews, such as Walther Rathenau. In Munich, an undercover agent for the political department of the Reichswehr under General Von Lossow infiltrated the revolutionaries, pretending to be one of them.
Following the crushing of the rebellion and occupation of the city by Reichswehr units, that infiltrator identified the leaders of the revolution, who were then summarily executed. The infiltrator’s name was Adolf Hitler.
After the suppression of the rebellion, Hitler, Rohm and undercover Reichswehr agents infiltrated a moribund political party and turned it into an intelligence front for the introduction of the supposedly de-mobilized German Army into German society for the purpose of generating political reaction. That front was the German National Social Workers Party.
The broadcast re-capitulates (from part of Miscellaneous Archive Show M11) Hitler’s speech to the Industry Club of Dusseldorf. This speech, which won the German industrial and financial elite over to the cause of the Nazi Party, equated democracy with Communism.
Manifesting a Social Darwinist perspective, Hitler opined that the [assembled] successful, accomplished were, by definition superior to others. If those, by definition, inferior people were allowed to control the political process, they would structure the social and economic landscape to their own benefit.
This, according to Hitler, would be counter-evolutionary.
Beginning a critically important series on a vitally important book titled Surveillance Valley: The Secret Military History of the Internet, this program explores the genesis of high tech and data processing, an origin that is inextricably linked with eugenics, anti-immigrant doctrine and–as is characteristic of fascism, the fear of the ubiquitous, malevolent “other.”
Highlights of discussion and analysis include:
1.–The genesis of high tech was Herman Hollerith’s tabulating machine. ” . . . . A few years earlier, working for the U.S. Census Bureau, Hollerith had developed the world’s first functional mass-produced computer: the Hollerith tabulator. An electromechanical device about the size of large desk and dresser, it used punch cards and a clever arrangement of gears, sorters, electrical contacts, and dials to process data with blazing speed and accuracy. What had taken years by hand could be done in a matter of months. As one U.S. newspaper described it, ‘with [the device’s] aid some 15 young ladies can count accurately half a million of names in a day.’ . . .’
2.–Hollerith’s machine found its (arguably) greatest application with the compilation of the census and the application of the pseudo-science of eugenics to it: ” . . . . Grasping about for solutions, many settled on various strains of race science quackery. So-called social Darwinists relied on a twisted version of the theory of evolution to explain why the poor and marginalized should remain that way while the wealthy and successful deserved to rule unchallenged. Taking this notion a step further, adherents of eugenics fervently believed that naturally superior Anglo-Americans were on the verge of being wiped out due to the high birth rates of ‘degenerate’ and immigrant stock. To head off this threat, they advocated strict controls on reproduction — breeding humans for quality in the same way that farmers did cows and horses. . . .”
3.–Hollerith’s machine was seen as the perfect vehicle for realizing eugenic practice through refining the census: ” . . . . The census had been a racial instrument from its inception, beginning with the original constitutional clause that instructed census officials to count black slaves separately from whites and to assign them a value of only three-fifths of a person. With each decade, new ‘racial’ categories were invented and added to the mix: ‘free colored males and females’ and ‘mulatto’ were counted, including subdivisions like including ‘quadroon’ and ‘octoroon.’ Categories for Chinese, ‘Hindoo,’ and Japanese were added, as were ‘foreign’ and ‘native born’ designations for whites. The census slowly expanded to collect other demographic data, including literacy levels, unemployment statistics, and medical ailments, such as those who were ‘deaf, dumb, and blind’ and the ‘insane and idiotic.’ All of it was broken down by race. . . .The census needed to improve drastically. What it needed was a talented inventor, someone young and ambitious who would be able to come up with a method to automate tabulation and data analysis. Someone like Herman Hollerith. . . .”
4.–Hollerith’s technology–when applied to the census, anticipated the mass surveillance technology of the internet: ” . . . . Overnight, Hollerith’s tabulator technology had transformed census taking from a simple head count into something that looked very much like a crude form of mass surveillance. To the race-obsessed political class, it was a revolutionary development. They could finally put the nation’s ethnic makeup under the microscope. The data seemed to confirm the nativists’ worst fears: Poor, illiterate immigrants were swarming America’s cities, breeding like rabbits, and outstripping native Anglo-American birth rates. Immediately following the census, the states and the federal government passed a flurry of laws that heavily restricted immigration. . . .”
5.–As discussed in FTR #279, IBM’s Hollerith machines (acquired when Thomas J. Watson bought out Hollerith) were fundamental to the operations of the Third Reich: ” . . . . ‘Indeed, the Third Reich would open startling statistical venues for Hollerith machines never before instituted — perhaps never before even imagined,’ wrote Edwin Black in IBM and the Holocaust, his pioneering 2001 exposé of the forgotten business ties between IBM and Nazi Germany. ‘In Hitler’s Germany, the statistical and census community, overrun with doctrinaire Nazis, publicly boasted about the new demographic breakthroughs their equipment would achieve.’ . . . Demand for Hollerith tabulators was so robust that IBM was forced to open a new factory in Berlin to crank out all the new machines. At the facility’s christening ceremony, which was attended by a top U.S. IBM executive and the elite of the Nazi Party, the head of IBM’s German subsidiary gave a rousing speech about the important role that Hollerith tabulators played in Hitler’s drive to purify Germany and cleanse it of inferior racial stock. . . .”
6.–The Trump administration’s framing of questions for the 2020 census appear aimed at creating a “national registry”–a concept reminiscent of the Third Reich’s use of IBM’s Hollerith-collected data: ” . . . . Based on a close reading of internal Department of Commerce documents tied to the census citizen question proposal, it appears the Trump administration wants to use the census to construct a first-of-its-kind citizenship registry for the entire U.S. population — a decision that arguably exceeds the legal authority of the census. ‘It was deep in the documentation that was released,’ Robert Groves, a former Census Bureau director who headed the National Academies committee convened to investigate the 2020 census, told me by telephone. ‘No one picked up on it much. But the term ‘registry’ in our world means not a collection of data for statistical purposes but rather to know the identity of particular people in order to use that knowledge to affect their lives.’ Given the administration’s posture toward immigration, the fact that it wants to build a comprehensive citizenship database is highly concerning. To Groves, it clearly signals ‘a bright line being crossed.’ . . .”
Yasha Levine’s recent book “Surveillance Valley” is a MUST READ! Relatively short and very much to the point, this volume–subtitled “The Secret Military History of the Internet”–chronicles the fact that the Internet is a weapon, developed as part of the same group of overlapping DARPA/Pentagon projects as Agent Orange. In posts and programs to come, we will more fully develop the basic themes set forth in the excerpt recapped in this post: 1 )The Internet is a weapon, developed for counter-insurgency purposes. 2) Big Tech firms network with the very intelligence services they publicly decry. 3) Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated. 4) The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect. 5) The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect. 6) The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose. 7) Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.
QUICK: Who said this?: “ ‘It seems like the [United States Dollar] and [Great Britain’s Pound] are both likely to go the way of the zimbabwe dollar,’ he suggested in March 2009. ‘Especially with that cockbag Bernanke deciding to magically print 1.2T more dollars.’ . . . Obama was ‘planning to devalue the currency absolutely as fast as theoretically possible,’ he wrote. . . .” Ted Cruz? Donald Trump? Marco Rubio? Paul Ryan? Rand Paul? No, it is Edward Snowden. Note how this jibes with Paul Krugman’s description of the GOP primary field: ” . . . . After all, Paul Ryan, the speaker of the House, not only berated Ben Bernanke, Ms. Yellen’s predecessor, for policies that allegedly risked inflation (which never materialized), but he also dabbled in conspiracy theorizing, accusing Mr. Bernanke of acting to “bail out fiscal policy.” . . . But Wall Street isn’t the only source of malign pressure on the Fed, and in the actually existing U.S. political situation, such a bill would essentially empower the cranks — the gold-standard-loving, hyperinflation-is-coming types who dominate the modern G.O.P., and have spent the past five or six years trying to bully monetary policy makers into ceasing and desisting from their efforts to prevent economic disaster.” This program highlights the far-right, fascistic forces underlying Eddie the Friendly Spook. Much of the program consists of excerpts of past programs, stretching back to the late 1990’s. The electronic “vacuum cleaner” approach of NSA and GCHQ has been on the public record for years. In the 1990’s NSA, GCHQ and the ECHELON/Five Eyes network came under joint assault by Germany and the Free Congress Foundation. The latter is very close to Nazi alumni of the Third Reich, the OUN/B in particular, and is an element deeply involved in projecting the Anti-Bolshevik Bloc of Nations back into the former U.S.S.R. and Eastern Europe. GOP bigwig Grover Norquist has been a vociferous opponent of NSA spying, as well as shepherding Muslim Brotherhood-linked elements in the United States. Program Highlights Include: Mr. Emory’s first post on “L’Affaire Snowden,” in which he wondered aloud what all the fuss was about, since this has been on the public record for years; review of the fact that other European countries do the same thing as NSA/GCHQ; Review of Snowden’s views on Social Security: ” . . . Snowden wrote that the elderly ‘wouldn’t be fucking helpless if you weren’t sending them fucking checks to sit on their ass and lay in hospitals all day.’ ”
Updating “L’Affaire Snowden,” this program analyzes the fundamental political/ideological principles that unite Eddie the Friendly Spook (Snowden) with the corporate entities comprising “Big Tech.” Taking advantage of the notion that “government is bad, but corporations are good” (“post-Reaganoid political dementia”), many of the individuals and companies in the tech world are pursuing and achieving goals that are fundamentally antithetical to democratic principles. Fundamental to the discussion is a brilliant analysis by David Golumbia in “Uncomputing.org” that distills the essence of “technocratic fascism”–the political and social philosophy that unites “coders”–Snowden, Assange and hackers of all stripes–with the corporate giants of Big Tech. Building on a viewpoint similar to that expressed in “The Decline of the West,” by Oswald Spengler (a text fundamental to much of 20th century fascism), they contend that society is broken, the political process is broken, and therefore they have the right–expressed as “natural law”–to do whatever they think is best. Democratic polities are to have no say in their actions, regardless of the potential consequences for the members of those polities. They do not feel that they need “the consent of the governed.” Program highlights include: the presence at the exclusive elite gathering of the Bilderbergers of key Silicon Valley techies including Peter Thiel and Alex Karp of Palanthir; review of the relationship between Ron Paul–Snowden’s political idol–and Thiel; the presence of Third Reich alumni in the Bilderberger gatherings; the anti-labor practices of Big Tech; the role of Big Tech in financing extreme right candidates like Ted Cruz; the drive by the Indian government of Narendra Modi (whose election was aided by EBay’s Pierre Omidyar) to undermine India’s laws against child labor, a synoptic overview of the key elements of our analysis of The Adventures of Eddie the Friendly Spook.
Snowden–whom we think is being directed by BND (as well as by an element of CIA)–engaged in his “op” in order to justify a pre-arranged economic offensive against the American IT sector. As we noted in our series on Eddie the Friendly Spook, the Snowden “op” is an act of economic and political warfare against the United States. Now, we note an article that chronicles serious damage to the U.S. high-tech economy as a result of Snowden’s “op.”
Recent Comments