Spitfire List Web site and blog of anti-fascist researcher and radio personality Dave Emory.
The tag 'internet' is associated with 6 posts.

FTR#‘s 1297 and1298: The End and The Beginning, Parts Four and Five

These pro­grams con­clude a five-part series set­ting forth why Mr. Emory feels we are head­ed for “Ye Ol’ Last Roundup” and offer­ing some insights into what he feels is the meta­phys­i­cal nature of real­i­ty and why that offers some hope. His out­look is heav­i­ly influ­enced by Bud­dhism.

Arti­fi­cial Intel­li­gence plays a large role in the analy­sis Mr. Emory presents, includ­ing a ter­ri­fy­ing devel­op­ment which will per­mit AI’s to read the human mind from afar!

The first pro­gram reviews the Third Reich and apartheid roots of the Schwab fam­i­ly and the Nazi intel­li­gence con­nec­tions of Hen­ry Kissinger’s work at Har­vard.

After not­ing that the Viet­nam-era defo­liant Agent Orange was part of an over­lap­ping series of DARPA projects whose strate­gic ratio­nale was “counter-insur­gency,” Mr. Emory notes the Nazi/Paperclip ori­gins of Agent Orange, as well as the prob­a­ble role of DARPA in the devel­op­ment of SARS CoV‑2.

After review of Biden’s new “can­cer moon­shot” and the strong prob­a­bil­i­ty that is will serve as a front for the use of syn­thet­ic biol­o­gy for the devel­op­ment of  bio­log­i­cal weapons, Mr. Emory reviews the ear­ly man­i­fes­ta­tion of glob­al­iza­tion that result­ed in the rise of glob­al fas­cism.

A paper writ­ten by a mem­ber of the New York Fed­er­al Reserve opines that the 1918 flu epi­dem­ic set the stage for the rise of Nazism in Ger­many. Was some­thing like that intend­ed with Covid-19?

Sub­sum­ing the theme of these pro­grams, Mr. Emory recounts the words of Chief Sit­ting Bull at the Pow­er Riv­er Coun­cil. Those words encap­su­late his view of what this soci­ety has become.

After review­ing a fas­ci­nat­ing sci­en­tif­ic dis­cus­sion about the “tone” that may very well have start­ed the Big Bang ori­gin of the uni­verse, Mr. Emory high­lights a book that has influ­enced him greatly–“The Physics of Immor­tal­i­ty.” It may, per­haps, be com­fort­ing to some to believe that it is prob­a­ble that, in the end, right­eous­ness will pre­vail.


YouTube Fascism in Brazil

In recent pro­grams, we have exam­ined the pro­found role of online tech­nol­o­gy in the pro­mo­tion of fas­cism, as well as over­lap­ping areas of intel­li­gence activ­i­ty. In that con­text, it is vital to remem­ber that the Inter­net was devel­oped as a weapon, with the focus of the tech­nol­o­gy being coun­terin­sur­gency. In Brazil, the rise of Jair Bol­sonaro’s fas­cist gov­ern­ment received deci­sive momen­tum from YouTube, which is trans­form­ing the polit­i­cal land­scape in Brazil, as it is in this coun­try.


FTR #1081 Surveillance Valley, Part 7: Yasha Levine Gets the Jim Garrison/Gary Webb Treatment

We empha­size the treat­ment afford­ed Yasha Levine. As might be expect­ed, Levine received the Jim Garrison/Gary Webb treat­ment. The ret­ri­bu­tion direct­ed at Yasha Levine epit­o­mizes why Mr. Emory refers to the so-called pro­gres­sive sec­tor as “so-called.”

” . . . . The threats and attacks had begun some­time overnight while I slept. By morn­ing, they had reached a vicious and mur­der­ous pitch. There were calls for my death—by fire, by suf­fo­ca­tion, by hav­ing my throat slit by razor blades. Peo­ple I had nev­er met called me a rapist, and alleged that I took delight in beat­ing women and forc­ing peo­ple to have sex with me. I was accused of homo­pho­bia. Anony­mous peo­ple filed bogus claims with my edi­tor. Alle­ga­tions that I was a CIA agent poured in, as did claims that I worked with British intel­li­gence. The fact that I had been born in the Sovi­et Union did­n’t do me any favors; nat­u­ral­ly, I was accused of being an FSB spy and of work­ing for Rus­si­a’s suc­ces­sor to the KGB. I was informed that my name was added to a dark net assas­si­na­tion list—a site where peo­ple could place anony­mous bids for my mur­der. The roam­ing eye of the Inter­net hate machine had sud­den­ly fixed on me. . . .”

In addi­tion to online bul­ly­ing, slan­der and veiled and direct threats, the so-called “pri­va­cy activists” joined in pil­lo­ry­ing Yasha Levine: ” . . . . Mic­ah Lee, the for­mer EFF tech­nol­o­gist who helped Edward Snow­den com­mu­ni­cate secure­ly with jour­nal­ists and who now works at The Inter­cept, attacked me as a con­spir­a­cy the­o­rist and accused me and my col­leagues at Pan­do of being sex­ist bul­lies, he claimed that my report­ing was moti­vat­ed not by a desire to get at the truth but by a mali­cious impulse to harass a female Tor devel­op­er. Although Lee con­ced­ed that my infor­ma­tion about Tor’s gov­ern­ment fund­ing was cor­rect, he counter intu­itive­ly argued that it did­n’t mat­ter. . . .

” . . . . Jour­nal­ists, experts, and tech­nol­o­gists from groups like the ACLU, the EFF, Free­dom of the Press Foun­da­tion and The Inter­cept and employ­ees of the Tor Project joined in to attack my report­ing. Unlike Lee, most did not attempt to engage my report­ing but employed a range of famil­iar PR smear tactics—tactics you usu­al­ly see used by cor­po­rate flacks, not prin­ci­pled pri­va­cy activists. They took to social media, telling any­one who showed inter­est in my arti­cles that they should ignore them instead. Then, when that did­n’t work, they tried to dis­cred­it my report­ing with ridicule, mis­di­rec­tion, and crude insults. . . .

” . . . . A respect­ed ACLU pri­va­cy expert, who now works as a con­gres­sion­al staffer, called me “a con­spir­a­cy the­o­rist  who sees black heli­copters every­where” and com­pared my report­ing about Tor to the Pro­to­cols of the Elders of Zion. As some­one who escaped state-spon­sored anti-Semi­tism in the Sovi­et Union, I found the com­par­i­son extreme­ly offen­sive, espe­cial­ly com­ing from the ACLU. The Pro­to­cols were an anti-Semit­ic forgery dis­sem­i­nat­ed by the Russ­ian Tsar’s secret police that unleashed waves of dead­ly pogroms against Jews across the Russ­ian Empire in the ear­ly twen­ti­eth cen­tu­ry. Tor employ­ees put forth a tor­rent of child­ish insults, call­ing me a ‘dumb Stal­in­ist state-felch­er’ and a ‘fuck­tard’s fuck­tard.’ They accused me of being fund­ed by spies to under­mine faith in cryp­tog­ra­phy. One of them claimed that I was a rapist, and hurled homo­pho­bic insults about the var­i­ous ways in which I had sup­pos­ed­ly per­formed sex­u­al favors for a male col­league.

 “In the way that these Inter­net haz­ing ses­sions, go, the cam­paign evolved and spread. Strange peo­ple began threat­en­ing me and my col­leagues on social media. Some accused me of hav­ing blood on my hands and of rack­ing up an “activist body count”–that peo­ple were actu­al­ly dying because of my report­ing under­mined trust in Tor.The attacks widened to include reg­u­lar read­ers and social media users, any­one who had the nerve to ask ques­tions about Tor’s fund­ing sources. An employ­ee of the Tor Project went so far as to dox an anony­mous Twit­ter user, expos­ing his real iden­ti­ty and con­tact­ing his employ­er in the hopes of get­ting him fired from his job as a junior phar­ma­cist.

It was bizarre. I watched all this unfold in real time but had no idea how to respond. Even more dis­con­cert­ing was that the attacks soon expand­ed to include libelous sto­ries placed in rep­utable media out­lets. The Guardian pub­lished a sto­ry by a free­lancer accus­ing me of run­ning an online sex­u­al harass­ment and bul­ly­ing cam­paign. The Los Ange­les Review of Books, gen­er­al­ly a good jour­nal of arts and cul­ture, ran an essay by a free­lancer alleg­ing that my report­ing was fund­ed by the CIA. Paul Carr, my edi­tor at Pan­do, lodged offi­cial com­plaints and demand­ed to know how these reporters came to their con­clu­sions. Both pub­li­ca­tions ulti­mate­ly retract­ed their state­ments and print­ed cor­rec­tions. An edi­tor at the Guardian apol­o­gized and described the arti­cle as a ‘fuck up.’ But the online attacks con­tin­ued. . . .”

Pro­gram High­lights Include:

1.–The role of Eddie Snow­den in mis­at­tribut­ing the Shad­ow Bro­kers non-hack to Rus­sia.
2.–Snowden’s fore­shad­ow­ing of the alleged Russ­ian “hack” of the Macron cam­paign”: ” . . . . ‘That could have sig­nif­i­cant for­eign pol­i­cy con­se­quences,’ Snow­den wrote on Twit­ter. ‘Par­tic­u­lar­ly if any of those oper­a­tions tar­get­ed US allies. Par­tic­u­lar­ly if any of those oper­a­tions tar­get­ed elec­tions.’ . . .”
3.–James Bam­ford’s analy­sis of WikiLeaker/Tor promoter/BBG asso­ciate Jacob Apel­baum as the most like­ly source of the Shad­ow Bro­kers non-hack. 
The ludi­crous nature of the “Rus­sia-did it” hypoth­e­sis con­cern­ing the Macron hacks: ” . . . . The hacked doc­u­ments in the ‘Macron hack’ not only con­tained Cyril­lic text in the meta­da­ta, but also con­tained the name of the last per­son to mod­i­fy the doc­u­ments. That name, ‘Rosh­ka Georgiy Petro­vichan’, is an employ­ee at Evri­ka, a large IT com­pa­ny that does work for the Russ­ian gov­ern­ment, includ­ing the FSB (Russ­ian intel­li­gence.) Also found in the meta­da­ta is the email of the per­son who uploaded the files to ‘archive.org’, and that email address, frankmacher1@gmx.de, is reg­is­tered with a Ger­man free web­mail provider used pre­vi­ous­ly in 2016 phish­ing attacks against the CDU in Ger­many that have been attrib­uted to APT28. It would appear that the ‘Russ­ian hack­ers’ not only left clues sug­gest­ing it was Russ­ian hack­ers behind the hack, but they decid­ed to name names this time–their own names. . . .”
4.–Neo-Nazi and Glenn Green­wald and Lau­ra Poitras asso­ciate Andrew Aueren­heimer’s role in mod­i­fy­ing the doc­u­ments in the Macron hack:  ” . . . . Short­ly after an anony­mous user of the 4chan.org dis­cus­sion forum post­ed fake doc­u­ments pur­port­ing to show Mr. Macron had set up an undis­closed shell com­pa­ny in the Caribbean, the user direct­ed peo­ple to vis­it nouveaumartel.com for updates on the French elec­tion. That web­site, accord­ing to research by web-secu­ri­ty provider Virtualroad.org, is reg­is­tered by ‘Wee­v­los,’ a known online alias of Andrew Auern­heimer, an Amer­i­can hack­er who gained noto­ri­ety three years ago when a U.S. appeals court vacat­ed his con­vic­tion for com­put­er fraud. The site also is host­ed by a serv­er in Latvia that hosts the Dai­ly Stormer, a neo-Nazi news site that iden­ti­fies its admin­is­tra­tor as ‘Weev,’ anoth­er online alias of Mr. Aeurn­heimer, Virtualroad.org says. ‘We strong­ly believe that the fake off­shore doc­u­ments were cre­at­ed by some­one with con­trol of the Dai­ly Stormer serv­er,’ said Tord Lund­ström, a com­put­er foren­sics inves­ti­ga­tor at Virtualroad.org. . . .”
5.–French cyber­se­cu­ri­ty chief Guil­laume Poupard negat­ed the asser­tion that Rus­sia hacked the Macron cam­paign: ” . . . . The head of the French government’s cyber secu­ri­ty agency, which inves­ti­gat­ed leaks from Pres­i­dent Emmanuel Macron’s elec­tion cam­paign, says they found no trace of a noto­ri­ous Russ­ian hack­ing group behind the attack. . . . ”


FTR #1077 Surveillance Valley, Part 3: Cambridge Analytica, Democracy and Counterinsurgency

Con­tin­u­ing the dis­cus­sion from FTR #1076, the broad­cast recaps key aspects of analy­sis of the Cam­bridge Ana­lyt­i­ca scan­dal.

In our last pro­gram, we not­ed that both the inter­net (DARPA projects includ­ing Project Agile) and the Ger­man Nazi Par­ty had their ori­gins as coun­terin­sur­gency gam­bits. Not­ing Hitler’s speech before The Indus­try Club of Dus­sel­dorf, in which he equat­ed com­mu­nism with democ­ra­cy, we high­light how the Cam­bridge Ana­lyt­i­ca scan­dal reflects the coun­terin­sur­gency ori­gins of the Inter­net, and how the Cam­bridge Ana­lyt­i­ca affair embod­ies anti-Democ­ra­cy/as coun­terin­sur­gency.

Key aspects of the Cam­bridge Ana­lyt­i­ca affair include:

1.–The use of psy­cho­graph­ic per­son­al­i­ty test­ing on Face­book that is used for polit­i­cal advan­tage: ” . . . . For sev­er­al years, a data firm even­tu­al­ly hired by the Trump cam­paign, Cam­bridge Ana­lyt­i­ca, has been using Face­book as a tool to build psy­cho­log­i­cal pro­files that rep­re­sent some 230 mil­lion adult Amer­i­cans. A spin­off of a British con­sult­ing com­pa­ny and some­time-defense con­trac­tor known for its coun­tert­er­ror­ism ‘psy ops’ work in Afghanistan, the firm does so by seed­ing the social net­work with per­son­al­i­ty quizzes. Respon­dents — by now hun­dreds of thou­sands of us, most­ly female and most­ly young but enough male and old­er for the firm to make infer­ences about oth­ers with sim­i­lar behav­iors and demo­graph­ics — get a free look at their Ocean scores. Cam­bridge Ana­lyt­i­ca also gets a look at their scores and, thanks to Face­book, gains access to their pro­files and real names. . . .”
2.–The par­ent com­pa­ny of Cam­bridge Analytica–SCL–was deeply involved with coun­tert­er­ror­ism “psy-ops” in Afghanistan, embody­ing the essence of the coun­terin­sur­gency dynam­ic at the root of the devel­op­ment of the Inter­net. The use of online data to sub­vert democ­ra­cy recalls Hitler’s speech to the Indus­try Club of Dus­sel­dorf, in which he equat­ed democ­ra­cy with com­mu­nism: ” . . . . Cam­bridge Ana­lyt­i­ca was a com­pa­ny spun out of SCL Group, a British mil­i­tary con­trac­tor that worked in infor­ma­tion oper­a­tions for armed forces around the world. It was con­duct­ing research on how to scale and digi­tise infor­ma­tion war­fare – the use of infor­ma­tion to con­fuse or degrade the effi­ca­cy of an ene­my. . . . As direc­tor of research, Wylie’s orig­i­nal role was to map out how the com­pa­ny would take tra­di­tion­al infor­ma­tion oper­a­tions tac­tics into the online space – in par­tic­u­lar, by pro­fil­ing peo­ple who would be sus­cep­ti­ble to cer­tain mes­sag­ing. This mor­phed into the polit­i­cal are­na. After Wylie left, the com­pa­ny worked on Don­ald Trump’s US pres­i­den­tial cam­paign . . . .”
3.–Cambridge Ana­lyt­i­ca whistle­blow­er Christo­pher Wylie’s obser­va­tions on the anti-demo­c­ra­t­ic nature of the fir­m’s work: ” . . . . It was this shift from the bat­tle­field to pol­i­tics that made Wylie uncom­fort­able. ‘When you are work­ing in infor­ma­tion oper­a­tions projects, where your tar­get is a com­bat­ant, the auton­o­my or agency of your tar­gets is not your pri­ma­ry con­sid­er­a­tion. It is fair game to deny and manip­u­late infor­ma­tion, coerce and exploit any men­tal vul­ner­a­bil­i­ties a per­son has, and to bring out the very worst char­ac­ter­is­tics in that per­son because they are an ene­my,’ he says. ‘But if you port that over to a demo­c­ra­t­ic sys­tem, if you run cam­paigns designed to under­mine people’s abil­i­ty to make free choic­es and to under­stand what is real and not real, you are under­min­ing democ­ra­cy and treat­ing vot­ers in the same way as you are treat­ing ter­ror­ists.’ . . . .”
4.–Wylie’s obser­va­tions on how Cam­bridge Ana­lyt­i­ca’s method­ol­o­gy can be used to build a fas­cist polit­i­cal move­ment: ” . . . . One of the rea­sons these tech­niques are so insid­i­ous is that being a tar­get of a dis­in­for­ma­tion cam­paign is ‘usu­al­ly a plea­sur­able expe­ri­ence’, because you are being fed con­tent with which you are like­ly to agree. ‘You are being guid­ed through some­thing that you want to be true,’ Wylie says. To build an insur­gency, he explains, you first tar­get peo­ple who are more prone to hav­ing errat­ic traits, para­noia or con­spir­a­to­r­i­al think­ing, and get them to ‘like’ a group on social media. They start engag­ing with the con­tent, which may or may not be true; either way ‘it feels good to see that infor­ma­tion’. When the group reach­es 1,000 or 2,000 mem­bers, an event is set up in the local area. Even if only 5% show up, ‘that’s 50 to 100 peo­ple flood­ing a local cof­fee shop’, Wylie says. This, he adds, val­i­dates their opin­ion because oth­er peo­ple there are also talk­ing about ‘all these things that you’ve been see­ing online in the depths of your den and get­ting angry about’. Peo­ple then start to believe the rea­son it’s not shown on main­stream news chan­nels is because ‘they don’t want you to know what the truth is’. As Wylie sums it up: ‘What start­ed out as a fan­ta­sy online gets port­ed into the tem­po­ral world and becomes real to you because you see all these peo­ple around you.’ . . . .”
5.–Wylie’s obser­va­tion that Face­book was “All In” on the Cam­bridge Ana­lyt­i­ca machi­na­tions: ” . . . . ‘Face­book has known about what Cam­bridge Ana­lyt­i­ca was up to from the very begin­ning of those projects,” Wylie claims. “They were noti­fied, they autho­rised the appli­ca­tions, they were giv­en the terms and con­di­tions of the app that said explic­it­ly what it was doing. They hired peo­ple who worked on build­ing the app. I had legal cor­re­spon­dence with their lawyers where they acknowl­edged it hap­pened as far back as 2016.’ . . . .”
6.–The deci­sive par­tic­i­pa­tion of “Spy Tech” firm Palan­tir in the Cam­bridge Ana­lyt­i­ca oper­a­tion: Peter Thiel’s sur­veil­lance firm Palan­tir was appar­ent­ly deeply involved with Cam­bridge Ana­lyt­i­ca’s gam­ing of per­son­al data har­vest­ed from Face­book in order to engi­neer an elec­toral vic­to­ry for Trump. Thiel was an ear­ly investor in Face­book, at one point was its largest share­hold­er and is still one of its largest share­hold­ers. In addi­tion to his oppo­si­tion to democ­ra­cy because it alleged­ly is inim­i­cal to wealth cre­ation, Thiel does­n’t think women should be allowed to vote and holds Nazi legal the­o­reti­cian Carl Schmitt in high regard. ” . . . . It was a Palan­tir employ­ee in Lon­don, work­ing close­ly with the data sci­en­tists build­ing Cambridge’s psy­cho­log­i­cal pro­fil­ing tech­nol­o­gy, who sug­gest­ed the sci­en­tists cre­ate their own app — a mobile-phone-based per­son­al­i­ty quiz — to gain access to Face­book users’ friend net­works, accord­ing to doc­u­ments obtained by The New York Times. The rev­e­la­tions pulled Palan­tir — co-found­ed by the wealthy lib­er­tar­i­an Peter Thiel — into the furor sur­round­ing Cam­bridge, which improp­er­ly obtained Face­book data to build ana­lyt­i­cal tools it deployed on behalf of Don­ald J. Trump and oth­er Repub­li­can can­di­dates in 2016. Mr. Thiel, a sup­port­er of Pres­i­dent Trump, serves on the board at Face­book. ‘There were senior Palan­tir employ­ees that were also work­ing on the Face­book data,’ said Christo­pher Wylie, a data expert and Cam­bridge Ana­lyt­i­ca co-founder, in tes­ti­mo­ny before British law­mak­ers on Tues­day. . . . The con­nec­tions between Palan­tir and Cam­bridge Ana­lyt­i­ca were thrust into the spot­light by Mr. Wylie’s tes­ti­mo­ny on Tues­day. Both com­pa­nies are linked to tech-dri­ven bil­lion­aires who backed Mr. Trump’s cam­paign: Cam­bridge is chiefly owned by Robert Mer­cer, the com­put­er sci­en­tist and hedge fund mag­nate, while Palan­tir was co-found­ed in 2003 by Mr. Thiel, who was an ini­tial investor in Face­book. . . .”
7.–The use of “dark posts” by the Cam­bridge Ana­lyt­i­ca team. (We have not­ed that Brad Parscale has reassem­bled the old Cam­bridge Ana­lyt­i­ca team for Trump’s 2020 elec­tion cam­paign. It seems prob­a­ble that AOC’s mil­lions of online fol­low­ers, as well as the “Bernie Bots,” will be get­ting “dark posts” craft­ed by AI’s scan­ning their online efforts.) ” . . . . One recent adver­tis­ing prod­uct on Face­book is the so-called ‘dark post’: A news­feed mes­sage seen by no one aside from the users being tar­get­ed. With the help of Cam­bridge Ana­lyt­i­ca, Mr. Trump’s dig­i­tal team used dark posts to serve dif­fer­ent ads to dif­fer­ent poten­tial vot­ers, aim­ing to push the exact right but­tons for the exact right peo­ple at the exact right times. . . .”

Sup­ple­ment­ing the dis­cus­sion about Cam­bridge Ana­lyt­i­ca, the pro­gram reviews infor­ma­tion from FTR #718 about Face­book’s appar­ent involve­ment with ele­ments and indi­vid­u­als linked to CIA and DARPA: ” . . . . Face­book’s most recent round of fund­ing was led by a com­pa­ny called Grey­lock Ven­ture Cap­i­tal, who put in the sum of $27.5m. One of Grey­lock­’s senior part­ners is called Howard Cox, anoth­er for­mer chair­man of the NVCA, who is also on the board of In-Q-Tel. What’s In-Q-Tel? Well, believe it or not (and check out their web­site), this is the ven­ture-cap­i­tal wing of the CIA. After 9/11, the US intel­li­gence com­mu­ni­ty became so excit­ed by the pos­si­bil­i­ties of new tech­nol­o­gy and the inno­va­tions being made in the pri­vate sec­tor, that in 1999 they set up their own ven­ture cap­i­tal fund, In-Q-Tel, which ‘iden­ti­fies and part­ners with com­pa­nies devel­op­ing cut­ting-edge tech­nolo­gies to help deliv­er these solu­tions to the Cen­tral Intel­li­gence Agency and the broad­er US Intel­li­gence Com­mu­ni­ty (IC) to fur­ther their mis­sions’. . . .”

More about the CIA/DARPA links to the devel­op­ment of Face­book: ” . . . . The sec­ond round of fund­ing into Face­book ($US12.7 mil­lion) came from ven­ture cap­i­tal firm Accel Part­ners. Its man­ag­er James Brey­er was for­mer­ly chair­man of the Nation­al Ven­ture Cap­i­tal Asso­ci­a­tion, and served on the board with Gilman Louie, CEO of In-Q-Tel, a ven­ture cap­i­tal firm estab­lished by the Cen­tral Intel­li­gence Agency in 1999. One of the com­pa­ny’s key areas of exper­tise are in ‘data min­ing tech­nolo­gies’. Brey­er also served on the board of R&D firm BBN Tech­nolo­gies, which was one of those com­pa­nies respon­si­ble for the rise of the inter­net. Dr Ani­ta Jones joined the firm, which includ­ed Gilman Louie. She had also served on the In-Q-Tel’s board, and had been direc­tor of Defence Research and Engi­neer­ing for the US Depart­ment of Defence. She was also an advis­er to the Sec­re­tary of Defence and over­see­ing the Defence Advanced Research Projects Agency (DARPA), which is respon­si­ble for high-tech, high-end devel­op­ment. . . .”

Pro­gram High­lights Include: Review of Face­book’s plans to use brain-to-com­put­er tech­nol­o­gy to oper­ate its plat­form, there­by the enabling of record­ing and data­bas­ing peo­ple’s thoughts; Review of Face­book’s employ­ment of for­mer DARPA head Regi­na Dugan to imple­ment the brain-to-com­put­er tech­nol­o­gy; Review of Face­book’s build­ing 8–designed to dupli­cate DARPA; Review of Face­book’s hir­ing of the Atlantic Coun­cil to police the social medi­um’s online con­tent; Review of Face­book’s part­ner­ing with Naren­dra Mod­i’s Hin­dut­va fas­cist gov­ern­ment in India; Review of Face­book’s emloy­ment of Ukrain­ian fas­cist Katery­na Kruk to man­age the social medi­um’s Ukrain­ian con­tent.


FTR #1076 Surveillance Valley, Part 2: Mauthausen on Our Mind

The pro­gram begins with recap of the adap­ta­tion of IBM’s Hol­lerith machines to Nazi data com­pi­la­tion. (We con­clud­ed FTR #1075 with dis­cus­sion of this.): ” . . . . Germany’s vast state bureau­cra­cy and its mil­i­tary and rear­ma­ment pro­grams, includ­ing the country’s grow­ing con­cen­tra­tion camp/slave labor sys­tem, also required data pro­cess­ing ser­vices. By the time the U.S. offi­cial­ly entered the war in 1941, IBM’s Ger­man sub­sidiary had grown to employ 10,000 peo­ple and served 300 dif­fer­ent Ger­man gov­ern­ment agen­cies. The Nazi Par­ty Trea­sury; the SS; the War Min­istry; the Reichs­bank; the Reich­spost; the Arma­ments Min­istry; the Navy, Army and Air Force; and the Reich Sta­tis­ti­cal Office — the list of IBM’s clients went on and on.

” ‘Indeed, the Third Reich would open star­tling sta­tis­ti­cal venues for Hol­lerith machines nev­er before insti­tut­ed — per­haps nev­er before even imag­ined,’ wrote Edwin Black in IBM and the Holo­caust, his pio­neer­ing 2001 exposé of the for­got­ten busi­ness ties between IBM and Nazi Ger­many. ‘In Hitler’s Ger­many, the sta­tis­ti­cal and cen­sus com­mu­ni­ty, over­run with doc­tri­naire Nazis, pub­licly boast­ed about the new demo­graph­ic break­throughs their equip­ment would achieve.’ . . . .

“Demand for Hol­lerith tab­u­la­tors was so robust that IBM was forced to open a new fac­to­ry in Berlin to crank out all the new machines. At the facility’s chris­ten­ing cer­e­mo­ny, which was attend­ed by a top U.S. IBM exec­u­tive and the elite of the Nazi Par­ty, the head of IBM’s Ger­man sub­sidiary gave a rous­ing speech about the impor­tant role that Hol­lerith tab­u­la­tors played in Hitler’s dri­ve to puri­fy Ger­many and cleanse it of infe­ri­or racial stock. . . .”

In that same arti­cle, Yasha Levine notes that the Trump admin­is­tra­tion’s pro­posed changes in the 2020 cen­sus sound as though they may por­tend some­thing akin to the Nazi cen­sus of 1933: ” . . . . Based on a close read­ing of inter­nal Depart­ment of Com­merce doc­u­ments tied to the cen­sus cit­i­zen ques­tion pro­pos­al, it appears the Trump admin­is­tra­tion wants to use the cen­sus to con­struct a first-of-its-kind cit­i­zen­ship reg­istry for the entire U.S. pop­u­la­tion — a deci­sion that arguably exceeds the legal author­i­ty of the cen­sus. ‘It was deep in the doc­u­men­ta­tion that was released,’ Robert Groves, a for­mer Cen­sus Bureau direc­tor who head­ed the Nation­al Acad­e­mies com­mit­tee con­vened to inves­ti­gate the 2020 cen­sus, told me by tele­phone. ‘No one picked up on it much. But the term ‘reg­istry’ in our world means not a col­lec­tion of data for sta­tis­ti­cal pur­pos­es but rather to know the iden­ti­ty of par­tic­u­lar peo­ple in order to use that knowl­edge to affect their lives.’ Giv­en the administration’s pos­ture toward immi­gra­tion, the fact that it wants to build a com­pre­hen­sive cit­i­zen­ship data­base is high­ly con­cern­ing. To Groves, it clear­ly sig­nals ‘a bright line being crossed.’ . . .”

In the con­clu­sion to Sur­veil­lance Val­ley, Yasha Levine notes how IBM com­put­ing tech­nol­o­gy facil­i­tat­ed the Nazi slave labor oper­a­tions through­out the Third Reich. The epi­cen­ter of this was Mau­thausen.

The sys­tem­at­ic use of slave labor was cen­tral to Nazi Ger­many’s indus­tri­al infra­struc­ture: ” . . . . But in the 1930s, Mau­thausen had been a vital eco­nom­ic engine of Hitler’s geno­ci­dal plan to remake Europe and the Sovi­et Union into his own back­yard utopia. It start­ed out as a gran­ite quar­ry but quick­ly grew into the largest slave labor com­plex in Nazi Ger­many, with fifty sub-camps that spanned most of mod­ern-day Aus­tria. Here, hun­dreds of thou­sands of prisoners–mostly Euro­pean Jews but also Roma, Spaniards, Rus­sians, Serbs, Slovenes, Ger­mans, Bul­gar­i­ans, even Cubans–were worked to death. They refined oil, built fight­er air­craft, assem­bled can­nons, devel­oped rock­et tech­nol­o­gy, and were leased out to pri­vate Ger­man busi­ness­es. Volk­swa­gen, Siemens, Daim­ler-Benz, BMW, Bosch–all ben­e­fit­ed from the camp’s slave labor pool. Mau­thausen, the admin­is­tra­tive nerve cen­ter, was cen­tral­ly direct­ed from Berlin using the lat­est in ear­ly com­put­er tech­nol­o­gy: IBM punch card tab­u­la­tors. . . .”

Mau­thausen’s IBM machines were, in turn, cen­tral to Ger­man indus­try’s use of slave labor: ” . . . . the camp had sev­er­al IBM machines work­ing over­time to han­dle the big churn of inmates and to make sure there were always enough bod­ies to per­form the nec­es­sary work. These machines didn’t oper­ate in iso­la­tion but were part of a larg­er slave labor con­trol-and-account­ing sys­tem that stretched across Nazi-occu­pied Europe con­nect­ing Berlin to every major con­cen­tra­tion and labor punch card, tele­graph, tele­phone, and human couri­er. This wasn’t the auto­mat­ed type of com­put­er net­work sys­tem that the Pen­ta­gon would begin to build in the Unit­ed States just a decade lat­er, but it was an infor­ma­tion net­work nonethe­less: an electro­mechan­i­cal web that fueled and sus­tained Nazi Germany’s war machine with blaz­ing effi­cien­cy. It extend­ed beyond the labor camps and reached into the cities and towns, crunch­ing moun­tains of genealog­i­cal data to track down peo­ple with even the barest whiff of Jew­ish blood or per­ceived racial impu­ri­ty in a mad rush to ful­fill Adolf Hitler’s dri­ve to puri­fy the Ger­man peo­ple, but they made the Nazi death machine run faster and more effi­cient­ly, scour­ing the pop­u­la­tion and track­ing down vic­tims in ways that would nev­er have been pos­si­ble with­out them. . . .”

In his book–one of the most impor­tant in recent memory–Yasha Levine sets forth vital, rev­e­la­to­ry infor­ma­tion about the devel­op­ment and func­tion­ing of the Inter­net.

Born of the same over­lap­ping DARPA projects that spawned Agent Orange, the Inter­net was nev­er intend­ed to be some­thing good. Its gen­er­a­tive func­tion and pur­pose is counter-insur­gency. ” . . . . In the 1960s, Amer­i­ca was a glob­al pow­er over­see­ing an increas­ing­ly volatile world: con­flicts and region­al insur­gen­cies against US-allied gov­ern­ments from South Amer­i­ca to South­east Asia and the Mid­dle East. These were not tra­di­tion­al wars that involved big armies but gueril­la cam­paigns and local rebel­lions, fre­quent­ly fought in regions where Amer­i­cans had lit­tle pre­vi­ous expe­ri­ence. Who were these peo­ple? Why were they rebelling? What could be done to stop them? In mil­i­tary cir­cles, it was believed that these ques­tions were of vital impor­tance to Amer­i­ca’s paci­fi­ca­tion efforts, and some argued that the only effec­tive way to answer them was to devel­op and lever­age com­put­er-aid­ed infor­ma­tion tech­nol­o­gy. The Inter­net came out of this effort: an attempt to build com­put­er sys­tems that could col­lect and share intel­li­gence, watch the world in real time, and study and ana­lyze peo­ple and polit­i­cal move­ments with the ulti­mate goal of pre­dict­ing and pre­vent­ing social upheaval. . . .”

In this land­mark vol­ume, Levine makes numer­ous points, includ­ing:

1.–The har­vest­ing of data by intel­li­gence ser­vices is PRECISELY what the Inter­net was designed to do in the first place.
2.–The har­vest­ing of data engaged in by the major tech cor­po­ra­tions is an exten­sion of the data gathering/surveillance that was–and is–the rai­son d’e­tre for the Inter­net in the first place.
3.–The big tech com­pa­nies all col­lab­o­rate with the var­i­ous intel­li­gence agen­cies they pub­licly scorn and seek to osten­si­bly dis­tance them­selves from.
4.–Edward Snow­den, the Elec­tron­ic Fron­tier Foun­da­tion, Jacob Appel­baum, the milieu of the Tor Net­work and Wik­iLeaks are com­plic­it in the data har­vest­ing and sur­veil­lance.
5.–Snowden and oth­er pri­va­cy activists are dou­ble agents, con­scious­ly chan­nel­ing peo­ple fear­ful of hav­ing their com­mu­ni­ca­tions mon­i­tored into tech­nolo­gies that will facil­i­tate that sur­veil­lance!

The pro­gram notes that counterinsurgency–the func­tion­al con­text of the ori­gin of the Internet–is at the foun­da­tion of the gen­e­sis of Nazism. At the con­clu­sion of World War I, Ger­many was beset by a series of socialist/Communist upris­ings in a num­ber of cities, includ­ing Munich. Respond­ing to that, under­ground Reich­swehr units com­mand­ed by Ernst Rohm (lat­er head of the SA) sys­tem­at­i­cal­ly assas­si­nat­ed the lead­ers of the rev­o­lu­tion, as well as promi­nent social democ­rats and Jews, such as Walther Rathenau. In Munich, an under­cov­er agent for the polit­i­cal depart­ment of the Reich­swehr under Gen­er­al Von Los­sow infil­trat­ed the rev­o­lu­tion­ar­ies, pre­tend­ing to be one of them.

Fol­low­ing the crush­ing of the rebel­lion and occu­pa­tion of the city by Reich­swehr units, that infil­tra­tor iden­ti­fied the lead­ers of the rev­o­lu­tion, who were then sum­mar­i­ly exe­cut­ed. The infil­tra­tor’s name was Adolf Hitler.

After the sup­pres­sion of the rebel­lion, Hitler, Rohm and under­cov­er Reich­swehr agents infil­trat­ed a mori­bund polit­i­cal par­ty and turned it into an intel­li­gence front for the intro­duc­tion of the sup­pos­ed­ly de-mobi­lized Ger­man Army into Ger­man soci­ety for the pur­pose of gen­er­at­ing polit­i­cal reac­tion. That front was the Ger­man Nation­al Social Work­ers Par­ty.

The broad­cast re-capit­u­lates (from part of Mis­cel­la­neous Archive Show M11) Hitler’s speech to the Indus­try Club of Dus­sel­dorf. This speech, which won the Ger­man indus­tri­al and finan­cial elite over to the cause of the Nazi Par­ty, equat­ed democ­ra­cy with Com­mu­nism.

Man­i­fest­ing a Social Dar­win­ist per­spec­tive, Hitler opined that the [assem­bled] suc­cess­ful, accom­plished were, by def­i­n­i­tion supe­ri­or to oth­ers. If those, by def­i­n­i­tion, infe­ri­or peo­ple were allowed to con­trol the polit­i­cal process, they would struc­ture the social and eco­nom­ic land­scape to their own ben­e­fit.

This, accord­ing to Hitler, would be counter-evo­lu­tion­ary.


Too Much of a Good Thing? The New EU Data Privacy Rules Have a Transparency Problem

There are some big changes head­ed towards the inter­net but we don’t know what they are yet. And that prob­a­bly won’t change any time soon. It’s a prob­lem.