The foundations of the current information war were laid in response to a sequence of events that took place in 2014. First Russia tried to suppress the U.S.-backed Euromaidan movement in Ukraine; a few months later Russia invaded Crimea; and several months after that the Islamic State captured the city of Mosul in northern Iraq and declared it the capital of a new caliphate. In three separate conflicts, an enemy or rival power of the United States was seen to have successfully used not just military might but also social media messaging campaigns designed to confuse and demoralize its enemies—a combination known as “hybrid warfare.” These conflicts convinced U.S. and NATO security officials that the power of social media to shape public perceptions had evolved to the point where it could decide the outcome of modern wars—outcomes that might be counter to those the United States wanted. They concluded that the state had to acquire the means to take control over digital communications so that they could present reality as they wanted it to be, and prevent reality from becoming anything else.
Technically, hybrid warfare refers to an approach that combines military and non-military means—overt and covert operations mixed with cyberwarfare and influence operations—to both confuse and weaken a target while avoiding direct, full-scale conventional war. In practice, it is notoriously vague. “The term now covers every type of discernible Russian activity, from propaganda to conventional warfare, and most that exists in between,” wrote Russia analyst Michael Kofman in March 2016.
Over the past decade, Russia has indeed repeatedly employed tactics associated with hybrid warfare, including a push to target Western audiences with messaging on channels like RT and Sputnik News and with cyber operations such as the use of “troll” accounts. But this was not new even in 2014, and it was something the United States, as well as every other major power, engaged in as well. As early as 2011, the United States was building its own “troll armies” online by developing software to “secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda.”
“If you torture hybrid warfare long enough, it will tell you anything,” Kofman had admonished, which is precisely what began happening a few months later when Trump critics popularized the idea that a hidden Russian hand was the puppeteer of political developments inside the United States.
The leading voice promoting that claim was a former FBI officer and counterterrorism analyst named Clint Watts. In an article from August 2016, “How Russia Dominates Your Twitter Feed to Promote Lies (And, Trump, Too),” Watts and his co-author, Andrew Weisburd, described how Russia had revived its Cold War-era “Active Measures” campaign, using propaganda and disinformation to influence foreign audiences. As a result, according to the article, Trump voters and Russian propagandists were promoting the same stories on social media that were intended to make America look weak and incompetent. The authors made the extraordinary claim that the “melding of Russian-friendly accounts and Trumpkins has been going on for some time.” If that was true, it meant that anyone expressing support for Donald Trump might be an agent of the Russian government, whether or not the person intended to play that role. It meant that the people they called “Trumpkins,” who made up half the country, were attacking America from within. It meant that politics was now war, as it is in many parts of the world, and tens of millions of Americans were the enemy.
Watts made his name as a counterterrorism analyst by studying the social media strategies used by ISIS, but with articles like this, he became the media’s go-to expert on Russian trolls and Kremlin disinformation campaigns. It seems he also had powerful backers.
In his book The Assault on Intelligence, retired CIA chief Michael Hayden called Watts “the one man, who more than any other was trying to ring the alarm more than two years before the 2016 elections.”
Hayden credited Watts in his book with teaching him the power of social media: “Watts pointed out to me that Twitter makes falsehoods seem more believable through sheer repetition and volume. He labeled it a kind of ‘computational propaganda.’ Twitter in turn drives mainstream media.”
A false story algorithmically amplified by Twitter and disseminated by the media—it’s no coincidence that this perfectly describes the “bullshit” spread on Twitter about Russian influence operations: In 2017, it was Watts who came up with the idea for the Hamilton 68 dashboard and helped spearhead the initiative.
facebookII. Trump’s Election: “It’s Facebook’s Fault”
No one thought Trump was a normal politician. Being an ogre, Trump horrified millions of Americans who felt a personal betrayal in the possibility that he would occupy the same office held by George Washington and Abe Lincoln. Trump also threatened the business interests of the most powerful sectors of society. It was the latter offense, rather than his putative racism or flagrant un-presidentialness, that sent the ruling class into a state of apoplexy.
Given his focus in office on lowering the corporate tax rate, it’s easy to forget that Republican officials and the party’s donor class saw Trump as a dangerous radical who threatened their business ties with China, their access to cheap imported labor, and the lucrative business of constant war. But, indeed, that is how they saw him, as reflected in the unprecedented response to Trump’s candidacy recorded by The Wall Street Journal in September 2016: “No chief executive at the nation’s 100 largest companies had donated to Republican Donald Trump’s presidential campaign through August, a sharp reversal from 2012, when nearly a third of the CEOs of Fortune 100 companies supported GOP nominee Mitt Romney.”
The phenomenon was not unique to Trump. Bernie Sanders, the left-wing populist candidate in 2016, was also seen as a dangerous threat by the ruling class. But whereas the Democrats successfully sabotaged Sanders, Trump made it past his party’s gatekeepers, which meant that he had to be dealt with by other means.
Two days after Trump took office, a smirking Senator Chuck Schumer told MSNBC’s Rachel Maddow that it was “really dumb” of the new president to get on the bad side of the security agencies that were supposed to work for him: “Let me tell you, you take on the intelligence community, they have six ways from Sunday of getting back at you.”
Trump had used sites like Twitter to bypass his party’s elites and connect directly with his supporters. Therefore, to cripple the new president and ensure that no one like him could ever come to power again, the intel agencies had to break the independence of the social media platforms. Conveniently, it was the same lesson that many intelligence and defense officials had drawn from the ISIS and Russian campaigns of 2014—namely, that social media was too powerful to be left outside of state control—only applied to domestic politics, which meant the agencies would now have help from politicians who stood to benefit from the effort.
Immediately after the election, Hillary Clinton started blaming Facebook for her loss. Until this point, Facebook and Twitter had tried to remain above the political fray, fearful of jeopardizing potential profits by alienating either party. But now a profound change occurred, as the operation behind the Clinton campaign reoriented itself not simply to reform the social media platforms, but to conquer them. The lesson they took from Trump’s victory was that Facebook and Twitter—more than Michigan and Florida—were the critical battlegrounds where political contests were won or lost. “Many of us are beginning to talk about what a big problem this is,” Clinton’s chief digital strategist Teddy Goff told Politico the week after the election, referring to Facebook’s alleged role in boosting Russian disinformation that helped Trump. “Both from the campaign and from the administration, and just sort of broader Obama orbit…this is one of the things we would like to take on post-election,” Goff said.
The press repeated that message so often that it gave the political strategy the appearance of objective validity:
“Donald Trump Won Because of Facebook”; New York Magazine, Nov. 9, 2016.
“Facebook, in Cross Hairs After Election, Is Said to Question Its Influence”; The New York Times, Nov. 12, 2016.
“Russian propaganda effort helped spread ‘fake news’ during election, experts say”; The Washington Post, Nov. 24, 2016.
“Disinformation, Not Fake News, Got Trump Elected, and It Is Not Stopping”; The Intercept, Dec. 6, 2016.
And on it went in countless articles that dominated the news cycle for the next two years.
At first, Facebook’s CEO Mark Zuckerberg dismissed the charge that fake news posted on his platform had influenced the outcome of the election as “pretty crazy.” But Zuckerberg faced an intense pressure campaign in which every sector of the American ruling class, including his own employees, blamed him for putting a Putin agent in the White House, effectively accusing him of high treason. The final straw came a few weeks after the election when Obama himself “publicly denounced the spread of fake news on Facebook.” Two days later, Zuckerberg folded: “Facebook announces new push against fake news after Obama comments.”
The false yet foundational claim that Russia hacked the 2016 election provided a justification—just like the claims about weapons of mass destruction that triggered the Iraq War—to plunge America into a wartime state of exception. With the normal rules of constitutional democracy suspended, a coterie of party operatives and security officials then installed a vast, largely invisible new architecture of social control on the backend of the internet’s biggest platforms.
Though there was never a public order given, the U.S. government began enforcing martial law online.
Adam Maida
dataIII. Why Do We Need All This Data About People?
The American doctrine of counterinsurgency (COIN) warfare famously calls for “winning hearts and minds.” The idea is that victory against insurgent groups depends on gaining the support of the local population, which cannot be accomplished by brute force alone. In places like Vietnam and Iraq, support was secured through a combination of nation-building and appealing to locals by providing them with goods they were presumed to value: money and jobs, for instance, or stability.
Because cultural values vary and what is prized by an Afghan villager may appear worthless to a Swedish accountant, successful counterinsurgents must learn what makes the native population tick. To win over a mind, first you have to get inside it to understand its wants and fears. When that fails, there is another approach in the modern military arsenal to take its place: counterterrorism. Where counterinsurgency tries to win local support, counterterrorism tries to hunt down and kill designated enemies.
Despite the apparent tension in their contrasting approaches, the two strategies have often been used in tandem. Both rely on extensive surveillance networks to gather intelligence on their targets, whether that is figuring out where to dig wells or locating terrorists in order to kill them. But the counterinsurgent in particular imagines that if he can learn enough about a population, it will be possible to reengineer its society. Obtaining answers is just a matter of using the right resources: a combination of surveillance tools and social scientific methods, the joint output of which feeds into all-powerful centralized databases that are believed to contain the totality of the war.
I have observed, reflecting on my experiences as a U.S. Army intelligence officer in Afghanistan, how, “data analytics tools at the fingertips of anyone with access to an operations center or situation room seemed to promise the imminent convergence of map and territory,” but ended up becoming a trap as “U.S. forces could measure thousands of different things that we couldn’t understand.” We tried to cover for that deficit by acquiring even more data. If only we could gather enough information and harmonize it with the correct algorithms, we believed, the database would divine the future.
Not only is that framework foundational in modern American counterinsurgency doctrine, but also it was part of the original impetus for building the internet. The Pentagon built the proto-internet known as ARPANET in 1969 because it needed a decentralized communications infrastructure that could survive nuclear war—but that was not the only goal. The internet, writes Yasha Levine in his history of the subject, Surveillance Valley, was also “an attempt to build computer systems that could collect and share intelligence, watch the world in real time, and study and analyze people and political movements with the ultimate goal of predicting and preventing social upheaval. Some even dreamed of creating a sort of early warning radar for human societies: a networked computer system that watched for social and political threats and intercepted them in much the same way that traditional radar did for hostile aircraft.”
In the days of the internet “freedom agenda,” the popular mythology of Silicon Valley depicted it as a laboratory of freaks, self-starters, free thinkers, and libertarian tinkerers who just wanted to make cool things without the government slowing them down. The alternative history, outlined in Levine’s book, highlights that the internet “always had a dual-use nature rooted in intelligence gathering and war.” There is truth in both versions, but after 2001 the distinction disappeared.
As Shoshana Zuboff writes in The Age of Surveillance Capitalism, at the start of the war on terror “the elective affinity between public intelligence agencies and the fledgling surveillance capitalist Google blossomed in the heat of emergency to produce a unique historical deformity: surveillance exceptionalism.”
In Afghanistan, the military had to employ costly drones and “Human Terrain Teams” staffed with adventurous academics to survey the local population and extract their relevant sociological data. But with Americans spending hours a day voluntarily feeding their every thought directly into data monopolies connected to the defense sector, it must have seemed trivially easy for anyone with control of the databases to manipulate the sentiments of the population at home.
More than a decade ago, the Pentagon began funding the development of a host of tools for detecting and countering terrorist messaging on social media. Some were part of a broader “memetic warfare” initiative inside the military that included proposals to weaponize memes to “defeat an enemy ideology and win over the masses of undecided noncombatants.” But most of the programs, launched in response to the rise of ISIS and the jihadist group’s adept use of social media, focused on scaling up automated means of detecting and censoring terrorist messaging online. Those efforts culminated in January 2016 with the State Department’s announcement that it would be opening the aforementioned Global Engagement Center, headed by Michael Lumpkin. Just a few months later, President Obama put the GEC in charge of the new war against disinformation. On the same day that the GEC was announced, Obama and “various high-ranking members of the national security establishment met with representatives from Facebook, Twitter, YouTube, and other Internet powerhouses to discuss how the United States can fight ISIS messaging via social media.”
In the wake of the populist upheavals of 2016, leading figures in America’s ruling party seized upon the feedback loop of surveillance and control refined through the war on terror as a method for maintaining power inside the United States. Weapons created to fight ISIS and al-Qaeda were turned against Americans who entertained incorrect thoughts about the president or vaccine boosters or gender pronouns or the war in Ukraine.
Former State Department official Mike Benz, who now runs an organization called the Foundation for Freedom Online that bills itself as a digital free-speech watchdog, describes how a company called Graphika, which is “essentially a U.S. Department of Defense-funded censorship consortium” that was created to fight terrorists, was repurposed to censor political speech in America. The company, “initially funded to help do social media counterinsurgency work effectively in conflict zones for the U.S. military,” was then “redeployed domestically both on Covid censorship and political censorship,” Benz told an interviewer. “Graphika was deployed to monitor social media discourse about Covid and Covid origins, Covid conspiracies, or Covid sorts of issues.”
The fight against ISIS morphed into the fight against Trump and “Russian collusion,” which morphed into the fight against disinformation. But those were just branding changes; the underlying technological infrastructure and ruling-class philosophy, which claimed the right to remake the world based on a religious sense of expertise, remained unchanged. The human art of politics, which would have required real negotiation and compromise with Trump supporters, was abandoned in favor of a specious science of top-down social engineering that aimed to produce a totally administered society.
For the American ruling class, COIN replaced politics as the proper means of dealing with the natives.
internetIV. The Internet: From Darling to Demon
Once upon a time, the internet was going to save the world. The first dot-com boom in the 1990s popularized the idea of the internet as a technology for maximizing human potential and spreading democracy. The Clinton administration’s 1997 “A Framework for Global Electronic Commerce” put forth the vision: “The Internet is a medium that has tremendous potential for promoting individual freedom and individual empowerment” and “[t]herefore, where possible, the individual should be left in control of the way in which he or she uses this medium.” The smart people in the West mocked the naive efforts in other parts of the world to control the flow of information. In 2000, President Clinton scoffed that China’s internet crackdown was “like trying to nail Jell-O to the wall.” The hype continued through the Bush administration, when internet companies were seen as crucial partners in the state’s mass surveillance program and its plan to bring democracy to the Middle East.
But the hype really went into overdrive when President Obama was elected through a “big data”-driven campaign that prioritized social media outreach. There appeared to be a genuine philosophical alignment between Obama’s political style as the “Hope” and ”Change” president whose guiding principle in foreign policy was “Don’t do dumb shit” and the internet search company whose original motto was “Do no evil.” There were also deep personal ties connecting the two powers, with 252 cases over the course of Obama’s presidency of people moving between jobs at the White House and Google. From 2009 to 2015, White House and Google employees were meeting, on average, more than once a week.
As Obama’s secretary of state, Hillary Clinton led the government’s “Internet freedom” agenda, which aimed to “promote online communications as a tool for opening up closed societies.” In a speech from 2010, Clinton issued a warning about the spread of digital censorship in authoritarian regimes: “A new information curtain is descending across much of the world,” she said. “And beyond this partition, viral videos and blog posts are becoming the samizdat of our day.”
It is a supreme irony that the very people who a decade ago led the freedom agenda for other countries have since pushed the United States to implement one of the largest and most powerful censorship machines in existence under the guise of fighting disinformation.
Or perhaps irony is not the right word to capture the difference between the freedom-loving Clinton of a decade ago and the pro-censorship activist of today, but it gets at what appears to be the about-face done by a class of people who were public standard-bearers for radically different ideas barely 10 years earlier. These people—politicians, first and foremost—saw (and presented) internet freedom as a positive force for humanity when it empowered them and served their interests, but as something demonic when it broke down those hierarchies of power and benefited their opponents. That’s how to bridge the gap between the Hillary Clinton of 2013 and the Clinton of 2023: Both see the internet as an immensely powerful tool for driving political processes and effecting regime change.
Which is why, in the Clinton and Obama worlds, the rise of Donald Trump looked like a profound betrayal—because, as they saw it, Silicon Valley could have stopped it but didn’t. As heads of the government’s internet policy, they had helped the tech companies build their fortunes on mass surveillance and evangelized the internet as a beacon of freedom and progress while turning a blind eye to their flagrant violations of antitrust statutes. In return, the tech companies had done the unthinkable—not because they had allowed Russia to “hack the election,” which was a desperate accusation thrown out to mask the stench of failure, but because they refused to intervene to prevent Donald Trump from winning.
In his book Who Owns the Future?, tech pioneer Jaron Lanier writes, “The primary business of digital networking has come to be the creation of ultra-secret mega-dossiers about what others are doing, and using this information to concentrate money and power.” Because digital economies produce ever-greater concentrations of data and power, the inevitable happened: The tech companies got too powerful.
What could the leaders of the ruling party do? They had two options. They could use the government’s regulatory power to counter-attack: Break up the data monopolies and restructure the social contract underwriting the internet so that individuals retained ownership of their data instead of having it ripped off every time they clicked into a public commons. Or, they could preserve the tech companies’ power while forcing them to drop the pretense of neutrality and instead line up behind the ruling party—a tempting prospect, given what they could do with all that power.
They chose option B.
Declaring the platforms guilty of electing Trump—a candidate every bit as loathsome to the highly educated elites in Silicon Valley as he was to the highly educated elites in New York and D.C.—provided the club that the media and the political class used to beat the tech companies into becoming more powerful and more obedient.
russiagateV. Russiagate! Russiagate! Russiagate!
If one imagines that the American ruling class faced a problem—Donald Trump appeared to threaten their institutional survival—then the Russia investigation didn’t just provide the means to unite the various branches of that class, in and out of government, against a common foe. It also gave them the ultimate form of leverage over the most powerful non-aligned sector of society: the tech industry. The coordination necessary to carry out the Russian collusion frame-up was the vehicle, fusing (1) the political goals of the Democratic Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture.
The secret FISA warrant that allowed U.S. security agencies to begin spying on the Trump campaign was based on the Steele dossier, a partisan hatchet job paid for by Hillary Clinton’s team that consisted of provably false reports alleging a working relationship between Donald Trump and the Russian government. While a powerful short-term weapon against Trump, the dossier was also obvious bullshit, which suggested it might eventually become a liability.
Disinformation solved that problem while placing a nuclear-grade weapon in the arsenal of the anti-Trump resistance. In the beginning, disinformation had been only one among a half-dozen talking points coming from the anti-Trump camp. It won out over the others because it was capable of explaining anything and everything yet simultaneously remained so ambiguous it could not be disproved. Defensively, it provided a means to attack and discredit anyone who questioned the dossier or the larger claim that Trump colluded with Russia.
All the old McCarthyite tricks were new again. The Washington Post aggressively trumpeted the claim that disinformation swung the 2016 election, a crusade that began within days of Trump’s victory, with the article “Russian propaganda effort helped spread ‘fake news’ during election, experts say.” (The lead expert quoted in the article: Clint Watts.)
A steady flow of leaks from intelligence officials to national security reporters had already established the false narrative that there was credible evidence of collusion between the Trump campaign and the Kremlin. When Trump won in spite of those reports, the senior officials responsible for spreading them, most notably CIA chief John Brennan, doubled down on their claims. Two weeks before Trump took office, the Obama administration released a declassified version of an intelligence community assessment, known as an ICA, on “Russian Activities and Intentions in Recent Elections,” which asserted that “Putin and the Russian government developed a clear preference for President-elect Trump.”
The ICA was presented as the objective, nonpolitical consensus reached by multiple intelligence agencies. In the Columbia Journalism Review, Jeff Gerth writes that the assessment received “massive, and largely uncritical coverage” in the press. But, in fact, the ICA was just the opposite: a selectively curated political document that deliberately omitted contrary evidence to create the impression that the collusion narrative was not a widely disputed rumor, but an objective fact.
A classified report by the House Intelligence Committee on the creation of the ICA detailed just how unusual and nakedly political it was. “It wasn’t 17 agencies, and it wasn’t even a dozen analysts from the three agencies who wrote the assessment,” a senior intelligence official who read a draft version of the House report told the journalist Paul Sperry. “It was just five officers of the CIA who wrote it, and Brennan handpicked all five. And the lead writer was a good friend of Brennan’s.” An Obama appointee, Brennan had broken with precedent by weighing in on politics while serving as CIA director. That set the stage for his post-government career as an MSNBC analyst and “resistance” figure who made headlines by accusing Trump of treason.
Mike Pompeo, who succeeded Brennan at the CIA, said that as the agency’s director, he learned that “senior analysts who had been working on Russia for nearly their entire careers were made bystanders” when the ICA was being written. According to Sperry, Brennan “excluded conflicting evidence about Putin’s motives from the report, despite objections from some intelligence analysts who argued Putin counted on Clinton winning the election and viewed Trump as a ‘wild card.’” (Brennan was also the one who overrode the objections of other agencies to include the Steele dossier as part of the official assessment.)
Despite its irregularities, the ICA worked as intended: Trump began his presidency under a cloud of suspicion that he was never able to dispel. Just as Schumer promised, the intelligence officials wasted no time in taking their revenge.
And not only revenge, but also forward-planning action. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext of ensuring “election integrity.” People who expressed true and constitutionally protected opinions about the 2016 election (and later about issues like COVID-19 and the U.S. withdrawal from Afghanistan) were labeled un-American, racists, conspiracists, and stooges of Vladimir Putin and systematically removed from the digital public square to prevent their ideas from spreading disinformation. By an extremely conservative estimate based on public reporting, there have been tens of millions of such cases of censorship since Trump’s election.
And here’s the climax of this particular entry: On Jan. 6, 2017—the same day that Brennan’s ICA report lent institutional backing to the false claim that Putin helped Trump—Jeh Johnson, the outgoing Obama-appointed secretary of the Department of Homeland Security, announced that, in response to Russian electoral interference, he had designated U.S. election systems as “critical national infrastructure.” The move placed the property of 8,000 election jurisdictions across the country under the control of the DHS. It was a coup that Johnson had been attempting to pull off since the summer of 2016, but that, as he explained in a later speech, was blocked by local stakeholders who told him “that running elections in this country was the sovereign and exclusive responsibility of the states, and they did not want federal intrusion, a federal takeover, or federal regulation of that process.” So Johnson found a work-around by unilaterally rushing the measure through in his last days in office.
It’s clear now why Johnson was in such a rush: Within a few years, all of the claims used to justify the extraordinary federal seizure of the country’s electoral system would fall apart. In July 2019 the Mueller report concluded that Donald Trump did not collude with the Russian government—the same conclusion reached by the inspector general’s report into the origins of the Trump-Russia probe, released later that year. Finally, on Jan. 9, 2023, The Washington Post quietly published an addendum in its cybersecurity newsletter about New York University’s Center for Social Media and Politics study. Its conclusion: “Russian trolls on Twitter had little influence on 2016 voters.”
But by then it didn’t matter. In the final two weeks of the Obama administration, the new counter-disinformation apparatus scored one of its most significant victories: the power to directly oversee federal elections that would have profound consequences for the 2020 contest between Trump and Joe Biden.
wotVI. Why the Post-9/11 “War on Terror” Never Ended
Clint Watts, who headed up the Hamilton 68 initiative, and Michael Hayden, the former Air Force general, CIA chief, and NSA director who championed Watts, are both veterans of the U.S. counterterrorism establishment. Hayden ranks among the most senior intelligence officers the United States has ever produced and was a principal architect of the post-9/11 mass surveillance system. Indeed, an astounding percentage of the key figures in the counter-disinformation complex cut their teeth in the worlds of counterterrorism and counterinsurgency warfare.
Michael Lumpkin, who headed the GEC, the State Department agency that served as the first command center in the war against disinformation, is a former Navy SEAL with a counterterrorism background. The GEC itself grew out of the Center for Strategic Counterterrorism Communications before being repurposed to fight disinformation.
Twitter had the chance to stop the Hamilton 68 hoax before it got out of hand, yet chose not to. Why? The answer can be seen in the emails sent by a Twitter executive named Emily Horne, who advised against calling out the scam. Twitter had a smoking gun showing that the Alliance for Securing Democracy, the neoliberal think tank behind the Hamilton 68 initiative, was guilty of exactly the charge it made against others: peddling disinformation that inflamed domestic political divisions and undermined the legitimacy of democratic institutions. But that had to be weighed against other factors, Horne suggested, such as the need to stay on the good side of a powerful organization. “We have to be careful in how much we push back on ASD publicly,” she wrote in February 2018.
The ASD was lucky to have someone like Horne on the inside of Twitter. Then again, maybe it wasn’t luck. Horne had previously worked at the State Department, handling the “digital media and think tank outreach” portfolio. According to her LinkedIn, she “worked closely with foreign policy reporters covering [ISIS] … and executed communications plans relating to Counter-[ISIS] Coalition activities.” Put another way, she had a background in counterterrorism operations similar to Watts’ but with more of an emphasis on spinning the press and civil society groups. From there she became the director for strategic communications for Obama’s National Security Council, only leaving to join Twitter in June 2017. Sharpen the focus on that timeline, and here’s what it shows: Horne joined Twitter one month before the launch of ASD, just in time to advocate for protecting a group run by the kind of power brokers who held the keys to her professional future.
It is no coincidence that the war against disinformation began at the very moment the Global War on Terror (GWOT) finally appeared to be coming to an end. Over two decades, the GWOT fulfilled President Dwight Eisenhower’s warnings about the rise of a military-industrial complex with “unwarranted influence.” It evolved into a self-interested, self-justifying industry that employed thousands of people in and out of government who operated without clear oversight or strategic utility. It might have been possible for the U.S. security establishment to declare victory and move from a permanent war footing to a peacetime posture, but as one former White House national security official explained to me, that was unlikely. “If you work in counterterrorism,” the former official said, “there’s no incentive to ever say that you’re winning, kicking their ass, and they’re a bunch of losers. It’s all about hyping a threat.” He described “huge incentives to inflate the threat” that have been internalized in the culture of the U.S. defense establishment and are “of a nature that they don’t require one to be particularly craven or intellectually dishonest.”
“This huge machinery was built around the war on terror,” the official said. “A massive infrastructure that includes the intelligence world, all the elements of DoD, including the combatant commands, CIA and FBI and all the other agencies. And then there are all the private contractors and the demand in think tanks. I mean, there are billions and billions of dollars at stake.”
The seamless transition from the war on terror to the war on disinformation was thus, in large measure, simply a matter of professional self-preservation. But it was not enough to sustain the previous system; to survive, it needed to continually raise the threat level.
In the months after the attacks of Sept. 11, 2001, George W. Bush promised to drain the swamps of radicalism in the Middle East. Only by making the region safe for democracy, Bush said, could he ensure that it would stop producing violent jihadists like Osama bin Laden.
Today, to keep America safe, it is no longer enough to invade the Middle East and bring its people democracy. According to the Biden White House and the army of disinformation experts, the threat is now coming from within. A network of right-wing domestic extremists, QAnon fanatics, and white nationalists is supported by a far larger population of some 70 million Trump voters whose political sympathies amount to a fifth column within the United States. But how did these people get radicalized into accepting the bitter and destructive white jihad of Trumpist ideology? Through the internet, of course, where the tech companies, by refusing to “do more” to combat the scourge of hate speech and fake news, allowed toxic disinformation to poison users’ minds.
After 9/11, the threat of terrorism was used to justify measures like the Patriot Act that suspended constitutional rights and placed millions of Americans under a shadow of mass surveillance. Those policies were once controversial but have come to be accepted as the natural prerogatives of state power. As journalist Glenn Greenwald observed, George W. Bush’s “‘with-us-or-with-the-terrorists’ directive provoked a fair amount of outrage at the time but is now the prevailing mentality within U.S. liberalism and the broader Democratic Party.”
The war on terror was a dismal failure that ended with the Taliban returning to power in Afghanistan. It also became deeply unpopular with the public. Why, then, would Americans choose to empower the leaders and sages of that war to be the stewards of an even more expansive war against disinformation? It is possible to venture a guess: Americans did not choose them. Americans are no longer presumed to have the right to choose their own leaders or to question decisions made in the name of national security. Anyone who says otherwise can be labeled a domestic extremist.
domestic_extremistsVII. The Rise of “Domestic Extremists”
A few weeks after Trump supporters rioted in the U.S. Capitol on Jan. 6, 2021, former director of the CIA’s Counterterrorism Center Robert Grenier wrote an article for The New York Times advocating for the United States to wage a “comprehensive counterinsurgency program” against its own citizens.
Counterinsurgency, as Grenier would know, is not a limited, surgical operation but a broad effort conducted across an entire society that inevitably involves collateral destruction. Targeting only the most violent extremists who attacked law enforcement officers at the Capitol would not be enough to defeat the insurgency. Victory would require winning the hearts and minds of the natives—in this case, the Christian dead-enders and rural populists radicalized by their grievances into embracing the Bin Laden-like cult of MAGA. Lucky for the government, there is a cadre of experts who are available to deal with this difficult problem: people like Grenier, who now works as a consultant in the private-sector counterterrorism industry, where he has been employed since leaving the CIA.
Of course there are violent extremists in America, as there have always been. However, if anything, the problem is less severe now than it was in the 1960s and 1970s, when political violence was more common. Exaggerated claims about a new breed of domestic extremism so dangerous it cannot be handled through existing laws, including domestic terrorism statutes, is itself a product of the U.S.-led information war, which has effaced the difference between speech and action.
“Civil wars don’t start with gunshots. They start with words,” Clint Watts proclaimed in 2017 when he testified before Congress. “America’s war with itself has already begun. We all must act now on the social media battlefield to quell information rebellions that can quickly lead to violent confrontations.” Watts is a career veteran of military and government service who seems to share the belief, common among his colleagues, that once the internet entered its populist stage and threatened entrenched hierarchies, it became a grave danger to civilization. But this was a fearful response, informed by beliefs widely, and no doubt sincerely, shared in the Beltway that mistook an equally sincere populist backlash termed “the revolt of the public” by former CIA analyst Martin Gurri for an act of war. The standard Watts and others introduced, which quickly became the elite consensus, treats tweets and memes—the primary weapons of disinformation—as acts of war.
Using the hazy category of disinformation allowed security experts to conflate racist memes with mass shootings in Pittsburgh and Buffalo and with violent protests like the one that took place at the Capitol. It was a rubric for catastrophizing speech and maintaining a permanent state of fear and emergency. And it received the full backing of the Pentagon, the intelligence community, and President Biden, all of whom, notes Glenn Greenwald, have declared that “the gravest menace to American national security” is not Russia, ISIS, China, Iran, or North Korea, but “‘domestic extremists’ in general—and far-right white supremacist groups in particular.”
The Biden administration has steadily expanded domestic terrorism and counter-extremism programs. In February 2021, DHS officials announced that they had received additional funding to boost department-wide efforts at “preventing domestic terrorism,” including an initiative to counter the spread of disinformation online, which uses an approach seemingly borrowed from the Soviet handbook, called “attitudinal inoculation.”
Adam Maida
ngoVIII. The NGO Borg
In November 2018, Harvard Kennedy School’s Shorenstein Center on Media Politics and Public Policy published a study titled “The Fight Against Disinformation in the U.S.: A Landscape Analysis.” The scope of the paper is comprehensive, but its authors are especially focused on the centrality of philanthropically funded nonprofit organizations and their relationship to the media. The Shorenstein Center is a key node in the complex the paper describes, giving the authors’ observations an insider’s perspective.
“In this landscape analysis, it became apparent that a number of key advocates swooping in to save journalism are not corporations or platforms or the U.S. government, but rather foundations and philanthropists who fear the loss of a free press and the underpinning of a healthy society. ... With none of the authoritative players—the government and platforms who push the content—stepping up to solve the problem quickly enough, the onus has fallen on a collective effort by newsrooms, universities, and foundations to flag what is authentic and what is not.”
To save journalism, to save democracy itself, Americans should count on the foundations and philanthropists—people like eBay founder Pierre Omidyar, Open Society Foundations’ George Soros, and internet entrepreneur and Democratic Party fundraiser Reid Hoffman. In other words, Americans were being asked to rely on private billionaires who were pumping billions of dollars into civic organizations—through which they would influence the American political process.
There is no reason to question the motivations of the staffers at these NGOs, most of whom were no doubt perfectly sincere in the conviction that their work was restoring the “underpinning of a healthy society.” But certain observations can be made about the nature of that work. First, it placed them in a position below the billionaire philanthropists but above hundreds of millions of Americans whom they would guide and instruct as a new information clerisy by separating truth from falsehood, as wheat from chaff. Second, this mandate, and the enormous funding behind it, opened up thousands of new jobs for information regulators at a moment when traditional journalism was collapsing. Third, the first two points placed the immediate self-interest of the NGO staffers perfectly in line with the imperatives of the American ruling party and security state. In effect, a concept taken from the worlds of espionage and warfare—disinformation—was seeded into academic and nonprofit spaces, where it ballooned into a pseudoscience that was used as an instrument of partisan warfare.
Virtually overnight, the “whole of society” national mobilization to defeat disinformation that Obama initiated led to the creation and credentialing of a whole new class of experts and regulators.
The modern “fact-checking” industry, for instance, which impersonates a well-established scientific field, is in reality a nakedly partisan cadre of compliance officers for the Democratic Party. Its leading organization, the International Fact-Checking Network, was established in 2015 by the Poynter Institute, a central hub in the counter-disinformation complex.
Everywhere one looks now, there is a disinformation expert. They are found at every major media publication, in every branch of government, and in academic departments, crowding each other out on cable news programs, and of course staffing the NGOs. There is enough money coming from the counter-disinformation mobilization to both fund new organizations and convince established ones like the Anti-Defamation League to parrot the new slogans and get in on the action.
How is it that so many people could suddenly become experts in a field—“disinformation”—that not 1 in 10,000 of them could have defined in 2014? Because expertise in disinformation involves ideological orientation, not technical knowledge. For proof, look no further than the arc traced by Prince Harry and Meghan Markle, who pivoted from being failed podcast hosts to joining the Aspen Institute’s Commission on Information Disorder. Such initiatives flourished in the years after Trump and Brexit.
But it went beyond celebrities. According to former State Department official Mike Benz, “To create a ‘whole of society’ consensus on the censorship of political opinions online that were ‘casting doubt’ ahead of the 2020 election, DHS organized ‘disinformation’ conferences to bring together tech companies, civil society groups, and news media to all build consensus—with DHS prodding (which is meaningful: many partners receive government funds through grants or contracts, or fear government regulatory or retaliatory threats)—on expanding social media censorship policies.”
A DHS memo, first made public by journalist Lee Fang, describes a DHS official’s comment “during an internal strategy discussion, that the agency should use third-party nonprofits as a “clearing house for information to avoid the appearance of government propaganda.”
It is not unusual that a government agency would want to work with private corporations and civil society groups, but in this case the result was to break the independence of organizations that should have been critically investigating the government’s efforts. The institutions that claim to act as watchdogs on government power rented themselves out as vehicles for manufacturing consensus.
Perhaps it is not a coincidence that the fields that have been most aggressive in cheerleading the war against disinformation and calling for greater censorship—counterterrorism, journalism, epidemiology—share a public record of spectacular failure in recent years. The new information regulators failed to win over vaccine skeptics, convince MAGA diehards that the 2020 election was legitimate, or prevent the public from inquiring into the origins of the COVID-19 pandemic, as they tried desperately to do.
But they succeeded in galvanizing a wildly lucrative whole-of-society effort, providing thousands of new careers and a renewed mandate of heaven to the institutionalists who saw populism as the end of civilization.
covidIX. COVID-19
By 2020, the counter-disinformation machine had grown into one of the most powerful forces in American society. Then the COVID-19 pandemic dumped jet fuel into its engine. In addition to fighting foreign threats and deterring domestic extremists, censoring “deadly disinformation” became an urgent need. To take just one example, Google’s censorship, which applied to its subsidiary sites like YouTube, called for “removing information that is problematic” and “anything that would go against World Health Organization recommendations”—a category that at different points in the constantly evolving narrative would have included wearing masks, implementing travel bans, saying that the virus is highly contagious, and suggesting it might have come from a laboratory.
President Biden publicly accused social media companies of “killing people” by not censoring enough vaccine disinformation. Using its new powers and direct channels inside the tech companies, the White House began sending lists of people it wanted banned, such as journalist Alex Berenson. Berenson was kicked off Twitter after tweeting that mRNA vaccines don’t “stop infection. Or transmission.” As it turned out, that was a true statement. The health authorities at the time were either misinformed or lying about the vaccines’ ability to prevent the spread of the virus. In fact, despite claims from the health authorities and political officials, the people in charge of the vaccine knew this all along. In the record of a meeting in December 2020, Food and Drug Administration adviser Dr. Patrick Moore stated, “Pfizer has presented no evidence in its data today that the vaccine has any effect on virus carriage or shedding, which is the fundamental basis for herd immunity.”
Dystopian in principle, the response to the pandemic was also totalitarian in practice. In the United States, the DHS produced a video in 2021 encouraging “children to report their own family members to Facebook for ‘disinformation’ if they challenge US government narratives on Covid-19.”
“Due to both the pandemic and the disinformation about the election, there are increasing numbers of what extremism experts call ‘vulnerable individuals’ who could be radicalized,” warned Elizabeth Neumann, former assistant secretary of Homeland Security for Counterterrorism and Threat Reduction, on the one-year anniversary of the Capitol riots.
Klaus Schwab, head of the World Economic Forum and capo di tutti capi of the global expert class, saw the pandemic as an opportunity to implement a “Great Reset” that could advance the cause of planetary information control: “The containment of the coronavirus pandemic will necessitate a global surveillance network capable of identifying new outbreaks as soon as they arise.”
exceptionX. Hunter’s Laptops: The Exception to the Rule
The laptops are real. The FBI has known this since 2019, when it first took possession of them. When the New York Post attempted to report on them, dozens of the most senior national security officials in the United States lied to the public, claiming the laptops were likely part of a Russian “disinformation” plot. Twitter, Facebook, and Google, operating as fully integrated branches of the state security infrastructure, carried out the government’s censorship orders based on that lie. The press swallowed the lie and cheered on the censorship.
The story of the laptops has been framed as many things, but the most fundamental truth about it is that it was the successful culmination of the yearslong effort to create a shadow regulatory bureaucracy built specifically to prevent a repeat of Trump’s 2016 victory.
It may be impossible to know exactly what effect the ban on reporting about Hunter Biden’s laptops had on the 2020 vote, but the story was clearly seen as threatening enough to warrant an openly authoritarian attack on the independence of the press. The damage to the country’s underlying social fabric, in which paranoia and conspiracy have been normalized, is incalculable. As recently as February, Rep. Alexandria Ocasio-Cortez referred to the scandal as the “half-fake laptop story” and as “an embarrassment,” months after even the Bidens had been forced to acknowledge that the story is authentic.
While the laptop is the best-known case of the ruling party’s intervention in the Trump-Biden race, its brazenness was an exception. The vast majority of the interference in the election was invisible to the public and took place through censorship mechanisms carried out under the auspices of “election integrity.” The legal framework for this had been put in place shortly after Trump took office, when the outgoing DHS chief Jeh Johnson passed an 11th-hour rule—over the vehement objections of local stakeholders—declaring election systems to be critical national infrastructure, thereby placing them under the supervision of the agency. Many observers had expected that the act would be repealed by Johnson’s successor, Trump-appointed John Kelly, but curiously it was left in place.
In 2018, Congress created a new agency inside of the DHS called the Cybersecurity and Infrastructure Security Agency (CISA) that was tasked with defending America’s infrastructure—now including its election systems—from foreign attacks. In 2019, the DHS added another agency, the Foreign Influence and Interference Branch, which was focused on countering foreign disinformation. As if by design, the two roles merged. Russian hacking and other malign foreign-information attacks were said to threaten U.S. elections. But, of course, none of the officials in charge of these departments could say with certainty whether a particular claim was foreign disinformation, simply wrong, or merely inconvenient. Nina Jankowicz, the pick to lead the DHS’s short-lived Disinformation Governance Board, lamented the problem in her book How to Lose the Information War: Russia, Fake News and the Future of Conflict. “What makes this information war so difficult to win,” she wrote, “is not just the online tools that amplify and target its messages or the adversary that is sending them; it’s the fact that those messages are often unwittingly delivered not by trolls or bots, but by authentic local voices.”
The latitude inherent in the concept of disinformation enabled the claim that preventing electoral sabotage required censoring Americans’ political views, lest an idea be shared in public that was originally planted by foreign agents.
In January 2021, CISA “transitioned its Countering Foreign Influence Task Force to promote more flexibility to focus on general MDM [ed. note: an acronym for misinformation, disinformation, and malinformation],” according to an August 2022 report from the DHS’s Office of Inspector General. After the pretense of fighting a foreign threat fell away, what was left was the core mission to enforce a narrative monopoly over truth.
The new domestic-focused task force was staffed by 15 employees dedicated to finding “all types of disinformation”—but specifically that which related to “elections and critical infrastructure”—and being “responsive to current events,” a euphemism for promoting the official line of divisive issues, as was the case with the “COVID-19 Disinformation Toolkit” released to “raise awareness related to the pandemic.”
Kept a secret from the public, the switch was “plotted on DHS’s own livestreams and internal documents,” according to Mike Benz. “DHS insiders’ collective justification, without uttering a peep about the switch’s revolutionary implications, was that ‘domestic disinformation’ was now a greater ‘cyber threat to elections’ than falsehoods flowing from foreign interference.”
Just like that, without any public announcements or black helicopters flying in formation to herald the change, America had its own ministry of truth.
Together they operated an industrial-scale censorship machine in which the government and NGOs sent tickets to the tech companies that flagged objectionable content they wanted scrubbed. That structure allowed the DHS to outsource its work to the Election Integrity Project (EIP), a consortium of four groups: the Stanford Internet Observatory; private anti-disinformation company Graphika (which had formerly been employed by the Defense Department against groups like ISIS in the war on terror); Washington University’s Center for an Informed Public; and the Atlantic Council’s Digital Forensics Research Lab. Founded in 2020 in partnership with the DHS, the EIP served as the government’s “deputized domestic disinformation flagger,” according to congressional testimony from journalist Michael Shellenberger, who notes that the EIP claims it classified more than 20 million unique “misinformation incidents” between Aug. 15 and Dec. 12, 2020. As EIP head Alex Stamos explained, this was a work-around for the problem that the government “lacked both kinda the funding and the legal authorizations.”
Looking at the censorship figures that the DHS’s own partners reported for the 2020 election cycle in their internal audits, the Foundation for Freedom Online summarized the scope of the censorship campaign in seven bullet points:
- 22 million tweets labeled “misinformation” on Twitter;
- 859 million tweets collected in databases for “misinformation” analysis;
- 120 analysts monitoring social media “misinformation” in up to 20-hour shifts;
- 15 tech platforms monitored for “misinformation,” often in real-time;
- <1 hour average response time between government partners and tech platforms;
- Dozens of “misinformation narratives” targeted for platform-wide throttling; and
- Hundreds of millions of individual Facebook posts, YouTube videos, TikToks, and tweets impacted due to “misinformation” Terms of Service policy changes, an effort DHS partners openly plotted and bragged that tech companies would never have done without DHS partner insistence and “huge regulatory pressure” from government.
onepartyXI. The New One-Party State
In February 2021, a long article in Time magazine by journalist Molly Ball celebrated the “Shadow Campaign That Saved the 2020 Election.” Biden’s victory, wrote Ball, was the result of a “conspiracy unfolding behind the scenes” that drew together “a vast, cross-partisan campaign to protect the election” in an “extraordinary shadow effort.” Among the many accomplishments of the heroic conspirators, Ball notes, they “successfully pressured social media companies to take a harder line against disinformation and used data-driven strategies to fight viral smears.” It is an incredible article, like an entry from the crime blotter that somehow got slipped into the society pages, a paean to the saviors of democracy that describes in detail how they dismembered it.
Not so long ago, talk of a “deep state” was enough to mark a person as a dangerous conspiracy theorist to be summarily flagged for monitoring and censorship. But language and attitudes evolve, and today the term has been cheekily reappropriated by supporters of the deep state. For instance, a new book, American Resistance, by neoliberal national security analyst David Rothkopf, is subtitled The Inside Story of How the Deep State Saved the Nation.
The deep state refers to the power wielded by unelected government functionaries and their paragovernmental adjuncts who have administrative power to override the official, legal procedures of a government. But a ruling class describes a social group whose members are bound together by something deeper than institutional position: their shared values and instincts. While the term is often used loosely and sometimes as a pejorative rather than a descriptive label, in fact the American ruling class can be simply and straightforwardly defined.
Two criteria define membership in the ruling class. First, as Michael Lind has written, it is made up of people who belong to a “homogeneous national oligarchy, with the same accent, manners, values, and educational backgrounds from Boston to Austin and San Francisco to New York and Atlanta.” America has always had regional elites; what is unique about the present is the consolidation of a single, national ruling class.
Second, to be a member of the ruling class is to believe that only other members of your class can be allowed to lead the country. That is to say, members of the ruling class refuse to submit to the authority of anyone outside the group, whom they disqualify from eligibility by casting them as in some way illegitimate.
Faced with an external threat in the form of Trumpism, the natural cohesion and self-organizing dynamics of the social class were fortified by new top-down structures of coordination that were the goal and the result of Obama’s national mobilization. In the run-up to the 2020 election, according to reporting by Lee Fang and Ken Klippenstein for The Intercept, “tech companies including Twitter, Facebook, Reddit, Discord, Wikipedia, Microsoft, LinkedIn, and Verizon Media met on a monthly basis with the FBI, CISA, and other government representatives … to discuss how firms would handle misinformation during the election.”
Historian Angelo Codevilla, who popularized the concept of an American “ruling class” in a 2010 essay and then became its primary chronicler, saw the new, national aristocracy as an outgrowth of the opaque power acquired by the U.S. security agencies. “The bipartisan ruling class that grew in the Cold War, who imagined themselves and who managed to be regarded as entitled by expertise to conduct America’s business of war and peace, protected its status against a public from which it continued to diverge by translating the commonsense business of war and peace into a private, pseudo-technical language impenetrable to the uninitiated,” he wrote in his 2014 book, To Make and Keep Peace Among Ourselves and with All Nations.
What do the members of the ruling class believe? They believe, I argue, “in informational and management solutions to existential problems” and in their “own providential destiny and that of people like them to rule, regardless of their failures.” As a class, their highest principle is that they alone can wield power. If any other group were to rule, all progress and hope would be lost, and the dark forces of fascism and barbarism would at once sweep back over the earth. While technically an opposition party is still permitted to exist in the United States, the last time it attempted to govern nationally, it was subjected to a yearslong coup. In effect, any challenge to the authority of the ruling party, which represents the interests of the ruling class, is depicted as an existential threat to civilization.
An admirably direct articulation of this outlook was provided recently by famous atheist Sam Harris. Throughout the 2010s, Harris’ higher-level rationalism made him a star on YouTube, where thousands of videos showcased him “owning” and “pwning” religious opponents in debates. Then Trump arrived. Harris, like so many others who saw in the former president a threat to all that was good in the world, abandoned his principled commitment to the truth and became a defender of propaganda.
In a podcast appearance last year, Harris acknowledged the politically motivated censorship of reporting related to Hunter Biden’s laptops and admitted “a left-wing conspiracy to deny the presidency to Donald Trump.” But, echoing Ball, he declared this a good thing.
“I don’t care what’s in the Hunter Biden laptop. … Hunter Biden could have had corpses of children in his basement, and I would not have cared,” Harris told his interviewers. He could overlook the murdered children because an even greater danger lurked in the possibility of Trump’s reelection, which Harris compared to “an asteroid hurtling toward Earth.”
With an asteroid hurtling toward Earth, even the most principled rationalists might end up asking for safety over truth. But an asteroid has been falling toward Earth every week for years now. The pattern in these cases is that the ruling class justifies taking liberties with the law to save the planet but ends up violating the Constitution to hide the truth and protect itself.
censorshipXII. The End of Censorship
The public’s glimpses into the early stages of the transformation of America from democracy to digital leviathan are the result of lawsuits and FOIAs—information that had to be pried from the security state—and one lucky fluke. If Elon Musk had not decided to purchase Twitter, many of the crucial details in the history of American politics in the Trump era would have remained secret, possibly forever.
But the system reflected in those disclosures may well be on its way out. It is already possible to see how the kind of mass censorship practiced by the EIP, which requires considerable human labor and leaves behind plenty of evidence, could be replaced by artificial intelligence programs that use the information about targets accumulated in behavioral surveillance dossiers to manage their perceptions. The ultimate goal would be to recalibrate people’s experiences online through subtle manipulations of what they see in their search results and on their feed. The aim of such a scenario might be to prevent censor-worthy material from being produced in the first place.
In fact, that sounds rather similar to what Google is already doing in Germany, where the company recently unveiled a new campaign to expand its “prebunking” initiative “that aims to make people more resilient to the corrosive effects of online misinformation,” according to the Associated Press. The announcement closely followed Microsoft founder Bill Gates’ appearance on a German podcast, during which he called for using artificial intelligence to combat “conspiracy theories” and “political polarization.” Meta has its own prebunking program. In a statement to the website Just The News, Mike Benz called prebunking “a form of narrative censorship integrated into social media algorithms to stop citizens from forming specific social and political belief systems” and compared it to the “pre-crime” featured in dystopian science-fiction movie Minority Report.
Meanwhile, the military is developing weaponized AI technology to dominate the information space. According to USASpending.gov, an official government website, the two largest contracts related to disinformation came from the Department of Defense to fund technologies for automatically detecting and defending against large-scale disinformation attacks. The first, for $11.9 million, was awarded in June 2020 to PAR Government Systems Corporation, a defense contractor in upstate New York. The second, issued in July 2020 for $10.9 million, went to a company called SRI International.
SRI International was originally connected to Stanford University before splitting off in the 1970s, a relevant detail considering that the Stanford Internet Observatory, an institution still directly connected to the school, led 2020’s EIP, which might well have been the largest mass censorship event in world history—a capstone of sorts to the record of pre-AI censorship.
Then there is the work going on at the National Science Foundation, a government agency that funds research in universities and private institutions. The NSF has its own program called the Convergence Accelerator Track F, which is helping to incubate a dozen automated disinformation-detection technologies explicitly designed to monitor issues like “vaccine hesitancy and electoral skepticism.”
“One of the most disturbing aspects” of the program, according to Benz, “is how similar they are to military-grade social media network censorship and monitoring tools developed by the Pentagon for the counterinsurgency and counterterrorism contexts abroad.”
In March, the NSF’s chief information officer, Dorothy Aronson, announced that the agency was “building a set of use cases” to explore how it could employ ChatGPT, the AI language model capable of a reasonable simulation of human speech, to further automate the production and dissemination of state propaganda.
The first great battles of the information war are over. They were waged by a class of journalists, retired generals, spies, Democratic Party bosses, party apparatchiks, and counterterrorism experts against the remnant of the American people who refused to submit to their authority.
Future battles fought through AI technologies will be harder to see.
democracyXIII. After Democracy
Less than three weeks before the 2020 presidential election, The New York Times published an important article titled “The First Amendment in the age of disinformation.” The essay’s author, Times staff writer and Yale Law School graduate Emily Bazelon, argued that the United States was “in the midst of an information crisis caused by the spread of viral disinformation” that she compares to the “catastrophic” health effects of the novel coronavirus. She quotes from a book by Yale philosopher Jason Stanley and linguist David Beaver: “Free speech threatens democracy as much as it also provides for its flourishing.”
So the problem of disinformation is also a problem of democracy itself—specifically, that there’s too much of it. To save liberal democracy, the experts prescribed two critical steps: America must become less free and less democratic. This necessary evolution will mean shutting out the voices of certain rabble-rousers in the online crowd who have forfeited the privilege of speaking freely. It will require following the wisdom of disinformation experts and outgrowing our parochial attachment to the Bill of Rights. This view may be jarring to people who are still attached to the American heritage of liberty and self-government, but it has become the official policy of the country’s ruling party and much of the American intelligentsia.
Former Clinton Labor Secretary Robert Reich responded to the news that Elon Musk was purchasing Twitter by declaring that preserving free speech online was “Musk’s dream. And Trump’s. And Putin’s. And the dream of every dictator, strongman, demagogue, and modern-day robber baron on Earth. For the rest of us, it would be a brave new nightmare.” According to Reich, censorship is “necessary to protect American democracy.”
To a ruling class that had already grown tired of democracy’s demand that freedom be granted to its subjects, disinformation provided a regulatory framework to replace the U.S. Constitution. By aiming at the impossible, the elimination of all error and deviation from party orthodoxy, the ruling class ensures that it will always be able to point to a looming threat from extremists—a threat that justifies its own iron grip on power.
A siren song calls on those of us alive at the dawn of the digital age to submit to the authority of machines that promise to optimize our lives and make us safer. Faced with the apocalyptic threat of the “infodemic,” we are led to believe that only superintelligent algorithms can protect us from the crushingly inhuman scale of the digital information assault. The old human arts of conversation, disagreement, and irony, on which democracy and much else depend, are subjected to a withering machinery of military-grade surveillance—surveillance that nothing can withstand and that aims to make us fearful of our capacity for reason.
If you work in the “disinformation” or “misinformation” fields for the government or in the private sector, and are interested in discussing your experiences, you can contact me securely at [email protected] or on Twitter @jacob__siegel. Source confidentiality is guaranteed.
Jacob Siegel is a Tablet contributing editor. He is writing a book for Henry Holt about the rise of the Information State that will be published in 2025. He co-hosts the Manifesto! podcast with the novelist Phil Klay.
Wearable “Solutions” and the Internet of Incarceration
A new push is underway to sell wearable devices and sensors as the solution to the opioid and prison crises in the US. However, this “solution” is set to come at a major cost to civil liberties and human freedom in general.
May 20, 2021
18 minute read
In recent years, calls for radical prison reform and a solution to the U.S.’ opioid crisis have come to permeate national politics in the United States. With over two million people behind bars and more than 400,000 people dead from opioid misuse in the last two decades, these topics are often on the front page of major newspapers in the U.S. and abroad.
However, at the same time, the marketing of wearable technology, or wearables, as a solution to both of these hot-button issues has become promoted by key players in both the public and private sectors. Especially since COVID-19, these electronic devices that can be worn as accessories, embedded in clothes or even implanted under the skin, are frequently heralded by corporations, academics and influential think tanks as “cost effective”, technological solutions to these deeply rooted problems.
Yet, as will be covered in this article, the shift towards wearables may offer more costs than benefits, particularly when it comes to matters of civil liberties and privacy.
The World Economic Forum and Wearables
Klaus Schwab, Founder of the World Economic Forum, Source: Moritz Hager, WEF
On paper, the World Economic Forum (WEF, also known as the International Organization for Public Private Cooperation) is an NGO and think tank “committed to improving the state of the world.” In reality, it’s an international network of some of the wealthiest and most powerful people on Earth. The organization is best known for its annual gathering of the (mostly white, European and North American) ruling class. Each year hedge fund managers, bankers, CEOs, media representatives and heads of state gather in Davos to “shape global, regional and industry agendas.” As Foreign Affairs once put it, “the WEF has no formal authority, but it has become a major forum for elites to discuss policy ideas and priorities.”
In 2017, WEF Founder Klaus Schwab put out a book called “The Fourth Industrial Revolution.” The WEF uses the term Fourth Industrial Revolution (4IR) to denote the current “technological revolution” that is changing the way people “live, work, and relate to one another,” and with implications “unlike anything humankind has experienced before.” The 4IR is characterized by new technologies like artificial intelligence (AI), robotics, 3D printing, and the “internet of things,” which essentially denotes embedding things with sensors – including human bodies in the form of wearables.
Like the industrial ‘revolutions’ that came before, the main theme for the WEF’s Fourth Industrial Revolution is that it will allow companies to produce more, more quickly and for far less money.
In the book, Schwab positions wearable technology as key to helping companies become organized around remote work by providing one’s employers “with a continuous exchange of data and insights about the things or tasks being worked on.” In a similar vein, Schwab emphasizes the “wealth of information that can be gathered from wearable devices and implantable technologies.”
But unlike the industrial ‘revolutions’ of the past, the WEF’s 4IR aims to blur the distinction between the physical, digital, and biological spheres. And the WEF is a vocal advocate for wearables in their propensity to propel what it calls ‘human enhancement.’
In 2018, Schwab teamed up with WEF’s “Head of Society and Innovation” Nicholas Davis to write a follow up book entitled “Shaping the Future of the Fourth Industrial Revolution.”Having been with the organization for over a decade, Davis was the obvious choice to co-author this book as he now “lead[s] the theme of the Fourth Industrial Revolution” at the WEF.
Schwab and Davis see wearables as just a stepping stone for the 4IR, writing that wearable devices “will almost certainly become implantable” in the body and the brain. “External wearable devices, such as smart watches, intelligent earbuds and augmented reality glasses, are giving way to active implantable microchips that break the skin barrier of our bodies, creating intriguing possibilities that range from integrated treatment systems to opportunities for human enhancement,” they write.
The authors note the potential to “drive an industry of human enhancement” that would, in turn, enhance “worker productivity.” However, other groups, including those partnered with the WEF, see other potential applications for their use well beyond the workplace.
Wearables, the Opioid Crisis and the War on Drugs
Deloitte, the world’s largest accounting firm and a longstanding partner of the WEF, has promoted wearables as a way to resolve the opioid epidemic. In 2016, Deloitte’s Center for Government Insights put out a report outlining how to fight the opioid crisis. The authors make the case that “technologists” and “innovators” should be part of the solution to the opioid crisis. Then, in 2018, the firm put out an article called “Strategies For Stemming The Opioid Epidemic,” explaining how data analytics could be used to help pharmacy benefit managers chart their course.
Ryan O’Shea, Source: LinkedIn
Other WEF partners are more directly involved in this effort. For example, WEF ‘Global Shaper’ Ryan O’Shea is the co-founder of Behaivior, a company that says it’s creating “technology to predict and prevent addiction relapses” using wearables. O’Shea, in addition to his WEF ties, is also the social media manager for Humanity Plus, formerly the World Transhumanist Association, which received $100,000 from Jeffrey Epstein in 2018 in addition to previous donations from Epstein-linked charities. Epstein also donated significant sums to Humanity Plus’ chair, Ben Goertzel.
According to the Behaivior website, the company’s mission is described as follows:
“We are creating software that can take real-time data streams from wearable devices that detect heart rate, heart rate variability, skin temperature, motion, and galvanic skin response (which is related to stress levels). This data is combined with other digital information about behavior, such as GPS location. As behavior and physiology changes, our software screens users for whether or not they are in a pre-relapse craving state.”
The company markets itself as a solution for governments who want to cut down on costs. “Reducing addiction relapses not only saves lives, but it also saves significant amounts of money by reducing re-arrests, re-incarcerations,” the Behaivior site reads. According to government records, Behaivior has received $533,000 from the NIH since its founding. It also receives support from the National Institute on Drug Abuse and the National Science Foundation. Tellingly, the company describes their focus on opioid abuse as the company’s “initial use case,” implying that the technology may soon be applied to other illicit substances. In a section on their website entitled “Market Opportunities”, the company mentions the number of Americans “addicted to drugs and alcohol” and implies it could be used for any sort of substance addiction that people seek treatment for, including substances that are currently legal to purchase and consume.
Behaivior’s funding sources and partnerships- Source: https://www.behaivior.com
Last year, the NIH also gave another company, Emitech, $328,000 to make a “forearm bracelet for rapid, on-site opioid intake monitoring and alerting.” On their website, Emitech states that “our major target users will be law enforcement units”, but adds that they could be used at other facilities such as “drug treatment centers” and “anywhere drug tests are required.”
Not unlike the private companies they are funding, the federal government is also moving money towards wearables being used to detect other criminalized substances as well as ones that are legal in some or all states. The NIH has granted money to a few wearable alcohol sensors as well as a wearable cocaine sensor. Additionally, it’s made a grant available for “the research and development of digital markers for detection of acute marijuana intoxication.”
That the WEF network sees wearables as key to stemming the opioid epidemic is particularly significant given that the Biden admin has signalled that it will focus heavily on this crisis once the COVID-19 crisis subsides.
“The bottom line for the Biden administration is that the [opioid] crisis is going to come into full awareness once covid starts moving into the background, perhaps in the first half of 2021,” the Washington Post quoted a professor saying in December 2020.
From Private Prisons to Wearable Prisons
In a much related manner, the ruling class also seems to be marrying the issue of mass incarceration with the wearables revolution.
“In a digital world with ankle bracelets and GPS devices, there is no reason to believe that physical imprisonment is the only option for those convicted of nonviolent offenses,” Darrell West wrote for the Brookings Institute in 2015. “Compared to incarceration, ankle bracelets and GPS devices seem far more tolerable. They keep offenders in society, are less punitive than prisons, and are much less expensive.”
West frames this digital incarceration as a desirable alternative where governments can cut costs but continue imprisoning the same amount of people as they do now. “Unless we find alternatives to physical imprisonment, the social and economic costs of jails will continue to sky-rocket,” he writes.
Ankle Bracelet maker Corrisoft’s Alternative to Incarceration via Rehabilitation Program, Source: Corrisoft
In 2013, the WEF-partnered Deloitte published an article on what it calls “virtual incarceration.” It envisions an automated monitoring system where parole officers can track people’s locations and an automated system sends “notifications to them when they have impending appointments, if they enter high-crime zones, or if their movements indicate that they are becoming more likely to commit a crime.”
The article also sees the use of this system as extending past the prison industry:
“ … Existing applications can already estimate blood alcohol content nearly as accurately as a breathalyzer—and predict the onset of depression. In the near future, contact with peer support groups, push notifications from case managers, and access to employers and other networks could be available at the touch of a button.”
A 2017 Australian Broadcasting Corporation article introduced something called the Technological Incarceration Project (TIP), a venture created by law professor Dan Hunter. The TIP proposes a form of “home detention” using “electronic sensors that monitor convicted offenders on a 24-hour basis.” This system, which Australian Broadcast Corporation calls an “internet of incarceration,” is meant to replace wardens and physical prisons, instead using advanced AI and machine learning to detect if a crime is about to be committed – and ensure that it doesn’t.
“Offenders would be fitted with an electronic bracelet or anklet capable of delivering an incapacitating shock if an algorithm detects that a new crime or violation is about to be committed,” it explains.
In 2018, Hunter co-wrote an article in the Journal of Criminal Law and Criminology proposing this system as a “major revolution to the prison sector,” arguing that it would “result in the closure of nearly all prisons in the United States” and “end the prison crisis.” According to Swinburne University of Technology, where he is dean, Hunter’s work has been supported by theU.S. Government’s National Science Foundation.
The key to his revolution is an ankle bracelet with GPS tracking and an embedded conducted energy device, to administer the electric shock and incapacitate prisoners until the arrival of the police.
The article outlines the plan for technological incarceration in three components:
“First, offenders would be required to wear electronic ankle bracelets that monitor their location and ensure they do not move outside of the geographical areas to which they would be confined. Second, prisoners would be compelled to wear sensors so that unlawful or suspicious activity could be monitored remotely by computers. Third, conducted energy devices would be used remotely to immobilize prisoners who attempt to escape their areas of confinement or commit other crimes.”
Hunter and his co-authors argue that remote monitoring through wearable sensors is a superior alternative to traditional surveillance cameras. “ … Our proposal requires prisoners to wear a series of remote sensors—including those for sound, video, and movement—that are connected to central computer systems that can detect unauthorized behavior,” they write.
Hunter and his co-authors further insist that the third step, the “remote immobilization of offenders,” would actually make this technological incarceration more secure than a conventional prison, since there is no chance of prisoner escape.
Hunter’s model of incarceration is declared as a “system that can determine whether a prisoner is having a psychotic episode (from speech recognition and audio processing of a prisoner’s emotional states), is threatening another (from audio processing of the emotional states of all the people within the prisoner’s environment and video processing of the prisoner’s behavior), or is seeking to leave a designated zone (from GPS tracking).”
Of note is the fact that several prisons and jails in the US are already using biometric voice identification technology and geolocation tracking on prisoners and the non-prisoners they call on the phone.
Additionally, Hunter’s plan to use wearables to move away from traditional prisons, first outlined a number of years ago, seems closer to coming to fruition than it did a few years ago. For example, in 2019, the DOJ gave a grant to researchers at Purdue University, to help them develop a wearables-based monitoring system for those who would otherwise be in prison. The electronic monitoring system was deployed in Tippecanoe County Corrections in Indiana under a “home detention” program.
What’s more, the other half of Hunter’s plan, utilizing AI to process prisoner communications and prevent crime, is already underway across the U.S.
Amazon now markets its AI transcription services to both prisons and law enforcement. The company’s AI system employs speech-recognition technology and machine learning software to build a database of words. As reported by ABC News, “they then notify law enforcement partners when the system picks up suspicious language or phrasings.”
“A year from now, all that slang could be obsolete – so investigators are constantly feeding new intelligence about prison slang into databases tailored to their unique jurisdiction or regional area,” explained ABC.
“We’ve taught the system how to speak inmate,” said James Sexton, an executive at LEO Technologies, a company using Amazon’s transcription services.
“Solving” Crises By Surveilling Everything
Additionally, due to the COVID-19 crisis, the federal government has adjusted both opioid treatment policy and prison policy to cater more to new, wearables-based solutions.
Under the Trump Administration, the Federal Bureau of Prisons began prioritizing home confinement to limit the spread of COVID-19 in prisons. While those inmates were to report back to prison when the ‘coronavirus emergency’ was over, Biden recently extended the national emergency and the HHS expects the crisis to last at least through December.
Furthermore, also because of the COVID-19 crisis, the US Department of Health and Human Services amended its regulations in 2020 so that treatment for opioid addiction can now be done remotely. “The pandemic has made it possible to see a licensed provider from home,” reported the New York Times.
In addition, the use of these health-tracking wearables has grown by more than 35% during the pandemic. “All of these surveillance technologies, like many other COVID-19 mitigations, are being rolled out rapidly amidst the crisis,” explained the digital rights group Electronic Frontier Foundation (EFF).
Several wearable technologies have been marketed specifically as responses to the COVID-19 crisis, with a number focused solely on tracking the location of their users for social distancing or quarantining enforcement. “RightCrowd” is a lanyard employees can wear to help companies enforce social distancing and contact tracing at the office. “SafeZone” is a wearable sensor that emits a light when people get within six feet of one another, and is currently being used by the NFL. And, as reported by the Electronic Frontier Foundation (EFF), “Courts in Kentucky and West Virginia have mandated electronic ankle shackles for individuals who refused to submit to quarantine procedures after testing positive for COVID-19.”
The Oura Ring biometric tracker. Source: https://ouraring.com/
Yet many of today’s new wearables are capable of accessing data that goes far beyond one’s location. The Oura Ring, a finger worn sleep tracker, monitors your temperature in order to predict the onset of fever in COVID-19, and is currently being used by the NBA. Amazon’s Halo, a wristband, will soon be able to detect COVID-19 symptoms. Halo scans the user’s body and voice, monitors blood pressure, and is meant to “report back on your emotional state throughout the day.” And, in March 2020, the US FDA granted Emergency Use Authorization to armbands made by a company called Tiger Tech. The bands are designed to monitor blood flow and analyze pulse rate and hypercoagulation, an onset symptom of COVID-19.
Another company, BioIntellisense, calls itself a “new era of wearable devices that are medical grade that will allow doctors and nurses to collect data from patients that are outside of a hospital.” Its first product, the BioSticker, is the “first FDA-cleared single-use device for up to 30 days of continuous vital signs monitoring.” It’s a patch designed to be worn on the chest for what the company calls an “effortless remote data capture” experience. The company received $2.8 million from the DoD in December 2020 to make these wearable products available to both the military and the public.
As the New York Times put it last November, “the hot new covid tech is wearable and constantly tracks you.”
“The necessity to address the pandemic with any means available removed some of the regulatory and legislative impediments related to the adoption of telemedicine,” Klaus Schwab and French economist Thierry Malleret wrote in their book “COVID-19: The Great Reset,” published in July 2020. “In the future, it is certain that more medical care will be delivered remotely. It will in turn accelerate the trend towards more wearable[s],” they continue.
Policy alignment between the WEF and the current Biden administration here is clear. Former Secretary of State John Kerry – Biden’s special presidential envoy for climate – firmly declared in December that the Biden administration will support the Great Reset and that the Great Reset ‘will happen with greater speed and with greater intensity than a lot of people might imagine.’”
Alignment between the WEF and the U.S. federal government in this area can also be seen at the FDA. In September 2020, the U.S. FDA launched The Digital Health Center of Excellence, with the objective of “innovat[ing] regulatory approaches to provide efficient and least burdensome oversight.”
The head director of this new FDA project is Bakul Patel, who’s been “leading regulatory and scientific efforts related to digital health devices at the FDA since 2010,” according to the FDA.
Like many figures in the US federal government, Patel has close ties to the very industries he’s been tasked with regulating. He currently leads the Scientific Leadership Board of the Medicine Society (DMS), an organization which exemplifies the objective of the ruling class to integrate wearable technology into people’s daily lives. The group recently moderated a WEF panel on the “Wearable Data Trove” and is sponsoring an upcoming conference called “Wearable injectors and Connected Devices.”
The FDA’s Bakul Patel, Source: YouTube
One way the FDA’s new Digital Health Center of Excellence’s propensity towards wearables can be inferred is by examining the activity of some of the DMS’, and thus Patel’s, corporate funders – Deloitte, Takeda, Biogen, and Pfizer – all “strategic partners” of the WEF.
Takeda is piloting an app that functions on consumer wearables that collects cognitive and behavioral data to assess people for depression. Biogen recently began working with Apple to “test the value” of consumer wearables to collect and transmit biometric data on cognitive performance and brain activity to predict future ailments.
Pfizer CEO Albert Bourla authored an article featured on the WEF site, writing that wearable devices are “poised to become a valuable tool for incentivising healthy behavior,” and citing the examples of ‘smart’ eye contact lenses, skin patches, and “ear worn trackers.”
Bourla also wrote:
“Our Oncology business recently launched a free app, LivingWith, that helps cancer patients connect with loved ones, manage appointments and record how they’re feeling. The app also syncs with fitness wearables, allowing patients to share a more complete portrait of their health with doctors. And for patients with haemophilia, our Rare Disease business developed HemMobile Striiv Wearable, a device for tracking activity and heart rate, and logging infusions and bleeding episodes. Such detailed information will truly allow healthcare providers to deliver personalised care, and also empower patients to assume a more active role in managing their own health.”
In 2019, pharmaceutical giant Pfizer went as far as calling wearable tech a revolution, via sponsored content on STAT News. The company also collaborated with IBM and Amazon to develop an IoT (Internet of Things) system of wearable sensors that can measure patient indicators 24/7 “with the same clinical accuracy that a doctor collects in the office.”
As such, aside from rolling out wearables through programs targeting prisoners and drug users, the ruling class has indicated a desire to “mainstream” wearables by marrying them with the “future of healthcare.” In “COVID-19: The Great Reset,”Schwab and Malleret write that eventually, the use of AI and wearable technology will cause the distinction between public health systems and “personalized health creation systems” to break down.
Digital Serfdom as Prison Reform
Given that industry players like Pfizer and Biogen are at the forefront of the push for wearables, and that these players have traditionally been profit-centric in their motives, the trend towards wearable technology is virtually guaranteed to come at a cost.
Perhaps the most obvious cost will be the further degradation of privacy. Without a doubt, the adoption of these technologies will intensify the tendency for governments and corporations to spy on citizens and consumers.
For some, the ongoing public health crisis has mitigated much of the negative stigma around ‘wearing technology.’ “As tech analyst Rajit Atwal told ZDNET in October, “what may have been a market for this pre-COVID, there’s likely to be a potentially bigger market post-COVID or even during COVID in terms of people wanting to be more active in monitoring their health.”
“Do you give access to what is happening inside your body and brain in exchange for far better healthcare? People will give up their privacy in exchange for healthcare,” said Yuval Noah Harari, a history professor frequently featured at the WEF, in 2018. “And in many places, they won’t have a choice.” However, two years later, at the 2020 annual meeting of the WEF, Harari stated that the mass use of wearables would be a “watershed” moment that would herald the beginning of the era of “digital dictatorships.”
Source: The WEF’s Internet of Bodies Briefing Paper
The potential misuse of wearables by the public and private sectors have led critics to argue that the appeal of monitoring your own health shouldn’t detract from the fact that wearables are essentially wearable trackers. “It should not feel normal to be tracked everywhere or to have to prove your location,” wrote the EFF in June 2020.
From the New York Times:
“Civil rights and privacy experts warn that the spread of such wearable continuous-monitoring devices could lead to new forms of surveillance that outlast the pandemic — ushering into the real world the same kind of extensive tracking that companies like Facebook and Google have instituted online. They also caution that some wearable sensors could enable employers, colleges or law enforcement agencies to reconstruct people’s locations or social networks, chilling their ability to meet and speak freely. And they say these data-mining risks could disproportionately affect certain workers or students, like undocumented immigrants or political activists.”
“It’s chilling that these invasive and unproven devices could become a condition for keeping our jobs, attending school or taking part in public life,” Albert Fox Cahn, executive director of the Surveillance Technology Oversight Project, told the New York Times.
Furthermore, wearables that track and contain one’s health data carry a particular threat. “Wearable technologies risk generating burdens of anxiety and stigma for their users and reproducing existing health inequalities,” wrote John Owens and Alan Cribb in the journal “Philosophy & Technology” in 2017. “Wearable technologies that subject their users to biomedical and consumerist epistemologies, norms and values also risk undermining processes of genuinely autonomous deliberation.”
What’s more, critics say that while ‘digital incarceration’ may seem like a desirable alternative to ‘mass incarceration,’ it’s simply incarceration by another name.
As author Michelle Alexander wrote in the New York Times in response to similar ‘e-carceration’ models that were popping up in 2018:
“Even if you’re lucky enough to be set “free” from a brick-and-mortar jail thanks to a computer algorithm, an expensive monitoring device likely will be shackled to your ankle — a GPS tracking device provided by a private company that may charge you around $300 per month, an involuntary leasing fee. Your permitted zones of movement may make it difficult or impossible to get or keep a job, attend school, care for your kids or visit family members. You’re effectively sentenced to an open-air digital prison, one that may not extend beyond your house, your block or your neighborhood. One false step (or one malfunction of the GPS tracking device) will bring cops to your front door, your workplace, or wherever they find you and snatch you right back to jail.”
“I find it difficult to call this progress,” Alexander explains. “As I see it, digital prisons are to mass incarceration what Jim Crow was to slavery … If the goal is to end mass incarceration and mass criminalization, digital prisons are not an answer. They’re just another way of posing the question.”
Some even see digital incarceration as a system worse than the physical system, in terms of privacy. “At first glance, these alternatives may seem like a win-win,” wrote Maya Schenwar in Truthout. “Instead of taking place in a hellish institution, prison happens “in the comfort of your own home” (the ultimate American ad for anything). However, this change threatens to transform the very definition of ‘home’ into one in which privacy, and possibly ‘comfort’ as well, are subtracted from the equation.”
“In a world of electronic monitors, predictive policing, interagency data sharing, hidden cameras, and registries, imprisonment extends not only beyond the walls of the jail or penitentiary, but beyond any contained space,” Schenwar continues. “In the new world of incarceration, your house is your prison. Your block is your prison. Your school is your prison. Your neighborhood… your city… your state… your country is your prison.”
Surveillance Stakeholder Capitalism
Still from the Wearable Data Troves presentation at the WEF’s Global Technology Governance Summit.
Aside from privacy concerns, a less obvious side-effect of the wearables ‘revolution’ is its potential to fuel and propel the WEF’s broader vision for the future – something it calls stakeholder capitalism.
The WEF is committed to “advancing stakeholder capitalism,” a system in which private corporations are the “trustees of society.” (According to Schwab, the very reason he created the WEF in the first place was to “help business and political leaders implement [stakeholder capitalism].”)
Schwab’s model dictates that corporations should start expanding their definition of “value” away from shareholder returns. As such, the cornerstone to ‘stakeholder capitalism’ is data. In order for corporations to start making decisions that ‘benefit society,’ they need comprehensive metrics on what decisions would prove ‘valuable.’
Naturally, having people walking around wearing technology with one’s location data, medical history, real time vital signs, oral conversations, current emotional state and thus their “behavior” is a dream come true for the model.
And while the most marginalized populations, i.e. those likely to be locked up for drug offenses in the US, will be the first to be hit by this pervasive surveillance, the WEF network sees this as the vision of the future for us all.
Featured image: Still from RAND video “What is the Internet of Bodies”
Author
Jeremy Loffredo is a journalist and researcher based in Washington, DC. He is formerly a segment producer for RT AMERICA and is currently an investigative reporter for Children’s Health Defense.
“Americans deserve the freedom to choose a life without surveillance and the government regulation that would make that possible. While we continue to believe the sentiment, we fear it may soon be obsolete or irrelevant. We deserve that freedom, but the window to achieve it narrows a little more each day. If we don’t act now, with great urgency, it may very well close for good.”—Charlie Warzel and Stuart A. Thompson, New York Times
Databit by databit, we are building our own electronic concentration camps.
With every new smart piece of smart technology we acquire, every new app we download, every new photo or post we share online, we are making it that much easier for the government and its corporate partners to identify, track and eventually round us up.
Saint or sinner, it doesn’t matter because we’re all being swept up into a massive digital data dragnet that does not distinguish between those who are innocent of wrongdoing, suspects, or criminals.
This is what it means to live in a suspect society.
The government’s efforts to round up those who took part in the Capitol riots shows exactly how vulnerable we all are to the menace of a surveillance state that aspires to a God-like awareness of our lives.
Relying on selfies, social media posts, location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing, government agents are compiling a massive data trove on anyone and everyone who may have been anywhere in the vicinity of the Capitol on January 6, 2021.
The amount of digital information is staggering: 15,000 hours of surveillance and body-worn camera footage; 1,600 electronic devices; 270,000 digital media tips; at least 140,000 photos and videos; and about 100,000 location pings for thousands of smartphones.
And that’s just what we know.
More than 300 individuals from 40 states have already been charged and another 280 arrested in connection with the events of January 6. As many as 500 others are still being hunted by government agents.
Also included in this data roundup are individuals who may have had nothing to do with the riots but whose cell phone location data identified them as being in the wrong place at the wrong time.
Forget about being innocent until proven guilty.
In a suspect society such as ours, the burden of proof has been flipped: now, you start off guilty and have to prove your innocence.
For instance, you didn’t even have to be involved in the Capitol riots to qualify for a visit from the FBI: investigators have reportedly been tracking—and questioning—anyone whose cell phones connected to wi-fi or pinged cell phone towers near the Capitol. One man, who had gone out for a walk with his daughters only to end up stranded near the Capitol crowds, actually had FBI agents show up at his door days later. Using Google Maps, agents were able to pinpoint exactly where they were standing and for how long.
All of the many creepy, calculating, invasive investigative and surveillance tools the government has acquired over the years are on full display right now in the FBI’s ongoing efforts to bring the rioters to “justice.”
FBI agents are matching photos with drivers’ license pictures; tracking movements by way of license plate toll readers; and zooming in on physical identifying marks such as moles, scars and tattoos, as well as brands, logos and symbols on clothing and backpacks. They’re poring over hours of security and body camera footage; scouring social media posts; triangulating data from cellphone towers and WiFi signals; layering facial recognition software on top of that; and then cross-referencing footage with public social media posts.
It’s not just the FBI on the hunt, however.
They’ve enlisted the help of volunteer posses of private citizens, such as Deep State Dogs, to collaborate on the grunt work. As Dinah Voyles Pulver reports, once Deep State Dogs locates a person and confirms their identity, they put a package together with the person’s name, address, phone number and several images and send it to the FBI.
According to USA Today, the FBI is relying on the American public and volunteer cybersleuths to help bolster its cases.
This takes See Something, Say Something snitching programs to a whole new level.
The lesson to be learned: Big Brother, Big Sister and all of their friends are watching you.
They see your every move: what you read, how much you spend, where you go, with whom you interact, when you wake up in the morning, what you’re watching on television and reading on the internet.
Every move you make is being monitored, mined for data, crunched, and tabulated in order to form a picture of who you are, what makes you tick, and how best to control you when and if it becomes necessary to bring you in line.
Simply liking or sharing this article on Facebook, retweeting it on Twitter, or merely reading it or any other articles related to government wrongdoing, surveillance, police misconduct or civil liberties might be enough to get you categorized as a particular kind of person with particular kinds of interests that reflect a particular kind of mindset that might just lead you to engage in a particular kinds of activities and, therefore, puts you in the crosshairs of a government investigation as a potential troublemaker a.k.a. domestic extremist.
Chances are, as the Washington Post reports, you have already been assigned a color-coded threat score—green, yellow or red—so police are forewarned about your potential inclination to be a troublemaker depending on whether you’ve had a career in the military, posted a comment perceived as threatening on Facebook, suffer from a particular medical condition, or know someone who knows someone who might have committed a crime.
In other words, you might already be flagged as potentially anti-government in a government database somewhere—Main Core, for example—that identifies and tracks individuals who aren’t inclined to march in lockstep to the police state’s dictates.
The government has the know-how.
It took days, if not hours or minutes, for the FBI to begin the process of identifying, tracking and rounding up those suspected of being part of the Capitol riots.
Imagine how quickly government agents could target and round up any segment of society they wanted to based on the digital trails and digital footprints we leave behind.
Of course, the government has been hard at work for years acquiring these totalitarian powers.
Long before the January 6 riots, the FBI was busily amassing the surveillance tools necessary to monitor social media posts, track and identify individuals using cell phone signals and facial recognition technology, and round up “suspects” who may be of interest to the government for one reason or another.
As The Intercept reported, the FBI, CIA, NSA and other government agencies have increasingly invested in corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior.
All it needs is the data, which more than 90% of young adults and 65% of American adults are happy to provide.
When the government sees all and knows all and has an abundance of laws to render even the most seemingly upstanding citizen a criminal and lawbreaker, then the old adage that you’ve got nothing to worry about if you’ve got nothing to hide no longer applies.
As for the Fourth Amendment and its prohibitions on warrantless searches and invasions of privacy without probable cause, those safeguards have been rendered all but useless by legislative end-runs, judicial justifications, and corporate collusions.
We now find ourselves in the unenviable position of being monitored, managed and controlled by our technology, which answers not to us but to our government and corporate rulers.
Consider that on any given day, the average American going about his daily business will be monitored, surveilled, spied on and tracked in more than 20 different ways, by both government and corporate eyes and ears. A byproduct of this new age in which we live, whether you’re walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency, whether the NSA or some other entity, is listening in and tracking your behavior.
This doesn’t even begin to touch on the corporate trackers that monitor your purchases, web browsing, social media posts and other activities taking place in the cyber sphere.
For example, police have been using Stingray devices mounted on their cruisers to intercept cell phone calls and text messages without court-issued search warrants. Doppler radar devices, which can detect human breathing and movement within a home, are already being employed by the police to deliver arrest warrants.
License plate readers, yet another law enforcement spying device made possible through funding by the Department of Homeland Security, can record up to 1800 license plates per minute. Moreover, these surveillance cameras can also photograph those inside a moving car. Reports indicate that the Drug Enforcement Administration has been using the cameras in conjunction with facial recognition software to build a “vehicle surveillance database” of the nation’s cars, drivers and passengers.
Sidewalk and “public space” cameras, sold to gullible communities as a sure-fire means of fighting crime, is yet another DHS program that is blanketing small and large towns alike with government-funded and monitored surveillance cameras. It’s all part of a public-private partnership that gives government officials access to all manner of surveillance cameras, on sidewalks, on buildings, on buses, even those installed on private property.
Couple these surveillance cameras with facial recognition and behavior-sensing technology and you have the makings of “pre-crime” cameras, which scan your mannerisms, compare you to pre-set parameters for “normal” behavior, and alert the police if you trigger any computerized alarms as being “suspicious.”
State and federal law enforcement agencies are pushing to expand their biometric and DNA databases by requiring that anyone accused of a misdemeanor have their DNA collected and catalogued. However, technology is already available that allows the government to collect biometrics such as fingerprints from a distance, without a person’s cooperation or knowledge. One system can actually scan and identify a fingerprint from nearly 20 feet away.
Developers are hard at work on a radar gun that can actually show if you or someone in your car is texting. Another technology being developed, dubbed a “textalyzer” device, would allow police to determine whether someone was driving while distracted. Refusing to submit one’s phone to testing could result in a suspended or revoked driver’s license.
It’s a sure bet that anything the government welcomes (and funds) too enthusiastically is bound to be a Trojan horse full of nasty, invasive surprises.
Case in point: police body cameras. Hailed as the easy fix solution to police abuses, these body cameras—made possible by funding from the Department of Justice—turn police officers into roving surveillance cameras. Of course, if you try to request access to that footage, you’ll find yourself being led a merry and costly chase through miles of red tape, bureaucratic footmen and unhelpful courts.
The “internet of things” refers to the growing number of “smart” appliances and electronic devices now connected to the internet and capable of interacting with each other and being controlled remotely. These range from thermostats and coffee makers to cars and TVs. Of course, there’s a price to pay for such easy control and access. That price amounts to relinquishing ultimate control of and access to your home to the government and its corporate partners. For example, while Samsung’s Smart TVs are capable of “listening” to what you say, thereby allowing users to control the TV using voice commands, it also records everything you say and relays it to a third party, e.g., the government.
Then again, the government doesn’t really need to spy on you using your smart TV when the FBI can remotely activate the microphone on your cellphone and record your conversations. The FBI can also do the same thing to laptop computers without the owner knowing any better.
Drones, which are taking to the skies en masse, are the converging point for all of the weapons and technology already available to law enforcement agencies. In fact, drones can listen in on your phone calls, see through the walls of your home, scan your biometrics, photograph you and track your movements, and even corral you with sophisticated weaponry.
All of these technologies add up to a society in which there’s little room for indiscretions, imperfections, or acts of independence, especially not when the government can listen in on your phone calls, monitor your driving habits, track your movements, scrutinize your purchases and peer through the walls of your home.
These digital trails are everywhere.
As investigative journalists Charlie Warzel and Stuart A. Thompson explain, “This data—collected by smartphone apps and then fed into a dizzyingly complex digital advertising ecosystem … provided an intimate record of people whether they were visiting drug treatment centers, strip clubs, casinos, abortion clinics or places of worship.”
In such a surveillance ecosystem, we’re all suspects and databits to be tracked, catalogued and targeted.
As Warzel and Thompson warn:
“To think that the information will be used against individuals only if they’ve broken the law is naïve; such data is collected and remains vulnerable to use and abuse whether people gather in support of an insurrection or they justly protest police violence… This collection will only grow more sophisticated… It gets easier by the day… it does not discriminate. It harvests from the phones of MAGA rioters, police officers, lawmakers and passers-by. There is no evidence, from the past or current day, that the power this data collection offers will be used only to good ends. There is no evidence that if we allow it to continue to happen, the country will be safer or fairer.”
As I point out in my book Battlefield America: The War on the American People, this is the creepy, calculating yet diabolical genius of the American police state: the very technology we hailed as revolutionary and liberating has become our prison, jailer, probation officer, Big Brother and Father Knows Best all rolled into one.
There is no gray area any longer.
So why do we know so little about it?
The U.S. Department of Homeland Security (DHS) is quietly building what will likely become the largest database of biometric and biographic data on citizens and foreigners in the United States. The agency’s new Homeland Advanced Recognition Technology (HART) database will include multiple forms of biometrics—from face recognition to DNA, data from questionable sources, and highly personal data on innocent people. It will be shared with federal agencies outside of DHS as well as state and local law enforcement and foreign governments. And yet, we still know very little about it.
The records DHS plans to include in HART will chill and deter people from exercising their First Amendment protected rights to speak, assemble, and associate. Data like face recognition makes it possible to identify and track people in real time, including at lawful political protests and other gatherings. Other data DHS is planning to collect—including information about people’s “relationship patterns” and from officer “encounters” with the public—can be used to identify political affiliations, religious activities, and familial and friendly relationships. These data points are also frequently colored by conjecture and bias.
In late May, EFF filed comments criticizing DHS’s plans to collect, store, and share biometric and biographic records it receives from external agencies and to exempt this information from the federal Privacy Act. These newly-designated “External Biometric Records” (EBRs) will be integral to DHS’s bigger plans to build out HART. As we told the agency in our comments, DHS must do more to minimize the threats to privacy and civil liberties posed by this vast new trove of highly sensitive personal data.
DHS Biometrics Systems—From IDENT to HART
DHS slide showing growth of its legacy IDENT biometric database
DHS currently collects a lot of data. Its legacy IDENT fingerprint database contains information on 220-million unique individuals and processes 350,000 fingerprint transactions every day. This is an exponential increase from 20 years ago when IDENT only contained information on 1.8-million people. Between IDENT and other DHS-managed databases, the agency manages over 10-billion biographic records and adds 10-15 million more each week.
DHS slide showing breadth of DHS biometric and biographic data
DHS’s new HART database will allow the agency to vastly expand the types of records it can collect and store. HART will support at least seven types of biometric identifiers, including face and voice data, DNA, scars and tattoos, and a blanket category for “other modalities.” It will also include biographic information, like name, date of birth, physical descriptors, country of origin, and government ID numbers. And it will include data we know to by highly subjective, including information collected from officer “encounters” with the public and information about people’s “relationship patterns.”
DHS slide showing expansion of its new HART biometric and biographic database
HART will Impinge on First Amendment Rights
DHS plans to include records in HART that will chill speech and deter people from associating with others.
DHS’s face recognition roll-out is especially concerning. The agency uses mobile biometric devices that can identify faces and capture face data in the field, allowing its ICE (immigration) and CBP (customs) officers to scan everyone with whom they come into contact, whether or not those people are suspected of any criminal activity or an immigration violation. DHS is also partnering with airlines and other third parties to collect face images from travelers entering and leaving the U.S. When combined with data from other government agencies, these troubling collection practices will allow DHS to build a database large enough to identify and track all people in public places, without their knowledge—not just in places the agency oversees, like airports, but anywhere there are cameras.
Police abuse of facial recognition technology is not a theoretical issue: it’s happening today. Law enforcement has already used face recognition on public streets and at political protests. During the protests surrounding the death of Freddie Gray in 2015, Baltimore Police ran social media photos against a face recognition database to identify protesters and arrest them. Recent Amazon promotional videos encourage police agencies to acquire that company’s face “Rekognition” capabilities and use them with body cameras and smart cameras to track people throughout cities. At least two U.S. cities are already using Rekognition.
DHS compounds face recognition’s threat to anonymity and free speech by planning to include “records related to the analysis of relationship patterns among individuals.” We don’t know where DHS or its external partners will be getting these “relationship pattern” records, but they could come from social media profiles and posts, which the government plans to track by collecting social media user names from all foreign travelers entering the country.
Social media records, even if they are publicly available, can include highly personal and private information, and the fear that the government may be collecting and searching through this information may cause people to self-censor what they say online. The data collected also won’t be limited to information about foreign travelers—travelers’ social media records may include information on family members and friends who are U.S. citizens or lawful permanent residents, two groups protected explicitly by the Privacy Act. As the recent, repeated Facebook scandals are showing us, even when you think you have done everything you can to protect your own data, it could easily be disclosed without your control through the actions of your friends and contacts or Facebook itself.
DHS’s “relationship pattern” records will likely be misleading or inaccurate. DHS acknowledges that these records will include “non-obvious relationships.” However, if the relationships are “non-obvious,” one has to question whether they truly exist. Instead, DHS could be seeing connections among people that are based on nothing more than “liking” the same news article, using the same foreign words, or following the same organization on social media. This is highly problematic because records like these frequently inform officer decisions to stop, search, and arrest people.
DHS plans to include additional records in HART that could be based on or impact First Amendment protected speech and activity. Records will include “miscellaneous officer comment information” and “encounter data.” These types of information come from police interactions with civilians, and are often collected under extremely questionable legal circumstances. For example, ICE officers use mobile devices to collect biometric and biographic data from people they “encounter” in the field, including via unauthorized entry into people’s homes and Bible study groups, and in public places where people congregate with other members of their community, such as on soccer fields, in community centers, and on buses. “Encounters” like these, whether they are conducted by ICE or by state or local police, are frequently not based on individualized suspicion that a civilian has done anything wrong, but that doesn’t prevent the officer from stockpiling any information obtained from the civilian during the encounter.
Finally, DHS relies on data from gang databases (its own and those from states), which often contain unsubstantiated data concerning people’s status and associations and are notoriously inaccurate. DHS has even fabricated gang status as an excuse to deport people.
HART Will Include Inaccurate Data and Will Share that Data with Other Agencies
DHS is not taking necessary steps with its new HART database to determine whether its own data and the data collected from its external partners are sufficiently accurate to prevent innocent people from being identified as criminal suspects, immigration law violators, or terrorists.
DHS has stated that it intends to rely on face recognition to identify data subjects across a variety of its mission areas, and “face matching” is one of the first components of the HART database to be built out. However, face recognition frequently is an inaccurate and unreliable biometric identifier. DHS’s tests of its own systems found significantly high levels of inaccuracy—the systems falsely rejected as many as 1 in 25 travelers. As a Georgetown report recently noted, “DHS’ error-prone face scanning system could cause 1,632 passengers to be wrongfully delayed or denied boarding every day at New York’s John F. Kennedy (JFK) International Airport alone.”
DHS’s external partners are also employing face recognition systems with high rates of inaccuracy. For example, FBI has admitted that its Next Generation Identification database “may not be sufficiently reliable to accurately locate other photos of the same identity, resulting in an increased percentage of misidentifications.” Potential foreign partners such as police departments in the United Kingdom use face recognition systems with false positive rates as high as a 98%—meaning that for every 100 people identified as suspects, 98 in fact were not suspects.
DHS Slide Showing Partner Agencies
People of color and immigrants will shoulder much more of the burden of these misidentifications. For example, people of color are disproportionately represented in criminal and immigration databases, due to the unfair legacy of discrimination in our criminal justice and immigration systems. Moreover, FBI and MIT research has shown that current face recognition systems misidentify people of color and women at higher rates than whites and men, and the number of mistaken IDs increases for people with darker skin tones. False positives represent real people who may erroneously become suspects in a law enforcement or immigration investigation. This is true even if a face recognition system offers several results for a search instead of one; each of the people identified could be detained or brought in for questioning, even if there is nothing else linking them to a crime or violation.
In addition to accuracy problems inherent in face recognition, DHS’s own immigration data has also been shown to be unacceptably inaccurate. A 2005 Migration Policy Institute study analyzing records obtained through FOIA found “42% of NCIC immigration hits in response to police queries were ‘false positives’ where DHS was unable to confirm that the individual was an actual immigration violator.” A 2011 study of DHS’s Secure Communities program found approximately 3,600 United States citizens were improperly caught up in the program due to incorrect immigration records. As these inaccurate records are propagated throughout DHS’s partner agencies’ systems, it will become impossible to determine the source of the inaccuracy and correct the data.
HART Is Fatally Flawed and Must Be Stopped
DHS’s plans for future data collection and use should make us all very worried. For example, despite pushback from EFF, Georgetown, ACLU, and others, DHS believes it’s legally authorized to collect and retain face data from millions of U.S. citizens traveling internationally. However, as Georgetown’s Center on Privacy and Technology notes, Congress has never authorized face scans of American citizens.
Despite this, DHS plans to roll out its face recognition program to every international flight in the country within the next four years. DHS has stated “the only way for an individual to ensure he or she is not subject to collection of biometric information when traveling internationally is to refrain from traveling.”
This is just the tip of the iceberg. CBP Commissioner Kevin McAleenan has stated CBP wants to be able to use biometrics to “confirm the identity of travelers at any point in their travel,” not just at entry to or exit from the United States. This includes creating a “biometric pathway” to track all travelers through airports, from check-in, through security, into airport lounges and shops, and onto flights. Given CBP’s recent partnerships with airlines and plans to collect social media credentials, this could also mean CBP plans to track travelers from the moment they begin their internet travel research. Several Congress members have introduced legislation to legitimize some of these plans.
Congress has expressed concerns with DHS’s biometric programs. Senators Edward Markey and Mike Lee, in a recent letter addressed to the agency, stated, “[w]e are concerned that the use of the program on U.S. citizens remains facially unauthorized[.] . . . We request that DHS stop the expansion of this program and provide Congress with its explicit statutory authority to use and expand a biometric exit program on U.S. citizens.” The senators have urged DHS to propose a rulemaking to clarify its plans for biometric exit. Congress also withheld funds last year from DHS’s Office of Biometric Identity Management.
DHS’s Inspector General criticized the agency last year for failure to properly train its personnel on how biometric systems worked and noted that the agency’s reliance on third parties to verify travelers leaving the country “occasionally provided false departure or arrival status on visitors.” The OIG is again investigating the biometric exit program this year and plans to “assess whether biometric data collected at pilot locations has improved DHS's ability to verify departures.” The Government Accountability Office has also looked into the agency’s programs, criticizing the reliability of DHS’s data and the agency’s failure to evaluate whether a program that collects biometrics from all travelers leaving the country was even feasible.
However, these actions are not enough. DHS needs to end its plans to use its HART database to collect even more biometric and biographic information about U.S. citizens and foreigners. This system poses a very real threat to First Amendment-protected activities. Further, DHS has a well-documented history of poor data management, and face recognition has a high rate of misidentifications. Congress must step in with more oversight and act now to put the brakes on DHS’s broad expansion of data collection.
The NSO Group, a tech outfit based in Herzliya, a stone’s throw from Tel Aviv, specialises in producing such invasive software tools as Pegasus. The reputation of Pegasus is considerable, supposedly able to access data on targeted phones including switching on their cameras and microphones.
NSO’s spyware merchandise has now attained a certain, viral notoriety. When Mexican investigative journalist Javier Valdez Cárdenas was butchered in broad daylight on a street in Culiacán, the capital of the Mexican state of Sinaloa, something reeked. The killing on May 15, 2017 had been designated a cartel hit, an initially plausible explanation given Valdez’s avid interest in prying into the affairs of organised crime in Sinaloa. But the smell went further. As Mexican media outlets reported in June 2017, the government of former president Enrique Peña Nieto had purchased the good merchandise of Pegasus. Three Mexican agencies had purchased spyware to the tune of $80 million since 2011.
Since then, Canadian research group Citizen Lab, in collaboration with Mexican digital rights outfit R3D and freedom of expression group Article 19, have made the case that the widow of the slain journalist, Griselda Triana, became a target of Pegasus spyware within 10 days of her husband’s death in 2017. According to the report, she was also targeted “a week after infection attempts against two of Valdez’s colleagues, Andrés Villareal and Ismael Bojórquez.” The group behind the infection attempts, named RECKLESS-1, is alleged to have links with the Mexican government.
Canadian-based Saudi dissident Omar Abdulaziz can also count himself amongst those targeted by Pegasus. In 2018, he claimed that his phone was tapped by NSO-made spyware, leading to a gruesome implication: that the Saudi authorities would have had access to hundreds of messages exchanged with the doomed Saudi journalist and fellow comrade-in-dissent Jamal Khashoggi.
In December, a suit was filed in Israel by Abdulaziz’s representatives Alaa Mahajna and Mazen Masri, alleging that the NSO Group had hacked his phone in the service of Riyadh. In court papers, it was alleged that the dissident was harangued by the same individuals behind Khashoggi’s murder, insisting that he pack his bags and return to Saudi Arabia.
Buried in the court documentation was the receipt of a text message purportedly tracking the shipment of a package; instead, it masked a link to the NSO Group. Once clicked, the link installed the spyware, turning the phone into an effective agent of surveillance. Soon after this took place, Abdulaziz’s family home in Jidda was raided by Saudi security forces. Two brothers were subsequently detained.
Last January, Maariv, an Israeli daily, investigated reports about telephone spyware supposedly used to bug the phone of the murdered Khashoggi. Khashoggi’s ending at the Saudi embassy in Istanbul, facilitated by a death squad, was not handiwork NSO wanted to be associated with. The group had been, according to a statement in December, “licensed for the sole use of providing governments and law enforcement agencies the ability to lawfully fight terrorism and crime”. Misuse of products would lead to investigation and, depending on appropriate findings, a suspension or termination of the contract.
Shalev Hulio, the company’s CEO, was clear to emphasise his humanity, before distancing himself and his company from the killing. “As a human being and as an Israeli, what happened to Khashoggi was a shocking murder.” Hulio was also adamant that “Khashoggi was not targeted by any NSO product or technology, including listening, monitoring, location tracking and intelligence collection.” Could such precise denials be inadvertent confessions?
The cooperative umbrella for Israel is broadening. It seeks allies, or at least some form of accommodation with regional powers, to counter common enemies. With Saudi Arabia and the United Arab Emirates, one common foe remains a constant: Iran. The Israeli state’s licensing of such companies as the NSO Group implicates the policy of permitting the distribution of Pegasus and such products. License their use; license their consequences. Molly Malekar, of Amnesty International’s Israeli office, puts it simply: “By continuing to approve of NSO Group, the Ministry of Defence is practically admitting to knowingly cooperating with NSO Group as their software is used to commit human rights abuses.” Monitoring and killing dissidents and intrepid journalists tend to be nasty by-products. They, in a sense, have become the modern merchants of death, whose clients remain unsavoury regimes.
The subjects of the previous blog are complex and warrant further explanation. A friend of mine and I have had a lively discussion on several issues I brought up in that blog. With his permission, I have decided to publish some of his comments with slight edits.
The referenced: blog article is here
Let us start from this comment:
"You lumped Internet, Facebook, Amazon, Google, Microsoft and Apple (FAGMA) into one lot. This is not entirely accurate. These companies have different business models and different degrees of abuse. You also did not include Twitter, Netflix, eBay, and a myriad of companies that probably are more intrusive than, say, Apple or Microsoft."
Here is my reasoning. I have used annual revenues of the FAGMA oligopoly and other companies to compare their relative sizes. FAGMA dominates their respective markets so much so that all other runners up simply do not compare. Twitter is tiny (2018 revenue of $3 billion); and Netflix (2018 revenue of $14 billion) only deals in movies, however bad this might be. eBay probably needs some more consideration, but their revenue was only $10 billion in 2018.
In contrast, Amazon’s revenue was $233 billion, Apple’s $266 billion, Google’s $90 billion, Microsoft's $110 billion, and Facebook’s $14 billion. The runners' up 2018 revenues were: IBM $76 billion and Oracle $40 billion. Together, FAGMA had $713 billion of revenue in 2018. Twitter, and Ebay are in a different league. Only Facebook was similar to eBay in terms of revenue, but it terms of social harm they are almost infinitely more dangerous. Comparing eBay with Facebook is like comparing a skin scratch with the virulent pancreatic cancer.
Interestingly, the big box store company, Walmart, had the 2018 revenue of $518 billion, almost as large as FAGMA. But Walmart depends on China for their low prices and is loaded with physical infrastructure FAGMA seems to abhor. The companies like Google, Amazon and Facebook have virtual monopolies in their respective domains of operations. Microsoft and Apple in turn virtually monopolize operating systems of personal computers, tablets, etc.
My friend's second comment was a dark insight I simply did not have:
"Truly, these [FAGMA] companies are benevolent in terms of their deal: They take your data and your privacy and give you dopamine. See below for the companies that will take your data even if encrypted and analyze the hell out of view; no dopamine and no cigar. Read on.
What you did not list are companies that you may have never heard of, but they are the ones that collect information about you and steer you to the wolves, such as Chitika, Exponential [their website was blocked by my Chrome filter, TWP], RythmeOne, and PulsePoint, etc. This is where the real stuff is, and very few people know about them or understand what they do.
Did you hear of Cogent, Level 3, Akamai, UUU? Well, these companies carry your packets to their destination. If you are sending unencrypted stuff, they know you and they know what you do. If you try to send encrypted stuff, they will data mine you, machine learn you, and extract every bit of information about your habits."
I had no idea!
My friend continued thus:
"Yes, it is Orwellian, but I think your portrayal may not capture the entire picture. Seeing the evolution of American media since the Gulf War in 1990, I believe that the Department of Truth is really a combination of Reuters, Associated Press, and a few other news networks that are in the business of “making” news instead of reporting them. Then, this is fed to the Internet warriors who will massage the data, bias it, and use to bully or make a point. We live like sheep in a beautiful meadow, surrounded by very smart wolves that have mastered the art of sucking us dry while keeping us alive and happy."
He has a good point!
...
Many people ask me how can I be happy writing and thinking about so many sad and desperate things? Well, let me explain. Happiness is the fleeting rush of dopamine I feel seeing my little grandson, my wife or children. As good as it might feel, it comes and goes. Think, please, about the happiness you purchase by sharing with your "friends" on Facebook a picture of a new pair of pink sneakers. Or think of the happiness you bring to your partner by giving her/him a bouquet of roses on the Valentine day.
You probably never pay attention to over a billion roses which are imported that day for your bouquet. They are flown refrigerated on transport flights from Columbia, Ecuador and Mexico. Once these cold roses land in Miami, they are rushed to other refrigerated planes and trucks, so that you can get them from a store refrigerator anywhere in the US. The energy cost of your bouquet is absolutely ginormous, but it is worth another minute or two of dopamine rush. Or is it?
Here is a dozen of roses for $600. You might give this box to your mistress (why would you spend that much money on your wife?) to impress her with your virility and give her a dopamine shot. While at it, you may send her a selfie with your dick. But when the little head sucks out blood from the big one, you may black out and forget that there is no privacy left, including your private parts. Someone will intercept your selfies to blackmail you. You may as well publish all you've got, just like I publish this blog. By my count, some 31 "unrecognizable" entities are monitoring it.
You probably don't know that just one rose you gave to your loved one needed about 10 liters of water to grow. In Bogotá, more than 5,000 wells have been drilled in the savanna in order to provide fresh water for Colombia’s exploding flower industry, and streams and wetlands have been disappearing. To be pest "safe," your roses are literally drenched in pesticides and herbicides. The unprotected laborers greatly suffer and some die. Several common pesticides used throughout Central and South American countries are listed below with health risks related to exposure: 1. Paraquat- Fatal poisoning; chemical burns in skin and eyes. 2. Mancozeb- Cancer. 3. Methyl bromide - Acute poisoning; air and groundwater pollution; depletion of ozone layer. 4. Carbofuran-Acute Poisoning. 5. Terbufos- Fatal poisoning. 6. Methamidophos- Acute poisoning; delayed peripheral neurotoxicity. 7. Methyl parathion - Acute poisoning. 8. Aluminum Phosphide -Acute poisoning. 9. Copper arsenate- Cancer. 10. Aldicarb- Acute poisoning; groundwater pollution; immunotoxicity.
I am happy, though, that you got your deserved dopamine moment, didn't you?
But I digressed. Joy - not happiness - is really what I feel. Joy is different. It is a feeling of content and completeness after going through many adversities, pain, and difficult periods in life and emerging from them a better, wiser human being. Joy is what I feel looking back on my personal and public life. Being joyful should never be confused with being happy one moment and throwing tantrums the next, just like my little grandson or president Trump.
Many millions of people today feel the chronic pain of being that detracts from their joyfulness. Their pain and desperation appear as anger, anguish and, yes, hatred toward the enemies real and imaginary. Welcome to the updated narrative of "nineteen eighty four," a novel by George Orwell. It is impossible to condense this dark prophecy in a few sentences. If you haven't done so already, you must read it (here is a free download); I have, at least three times, and listened to a masterful CD version.
In the dark world of Orwell's 1984, Great Britain is a small part of Oceania that encompasses the Americas, half of Africa, Australia and New Zealand. Oceania is in permanent war with Eurasia and Eastasia (sort of like our war on "terrorism"). The lowest echelon of the impoverished British society, the "Proles," (think of the Brexiters or core Trump, Orban, Kaczynski, etc. supporters) live in utter misery, and neglect of education and healthcare. The proles are kept sedated with alcohol, football, cheap repetitive pop music, pornography and a national lottery whose winnings are never actually paid out; that particular lie is obscured by propaganda and the lack of communication within Oceania. The impotent proles are freer and less intimidated than the middle-class Outer Party (think of the college educated Democrats with degrees in political science, history, philosophy or English literature). The very poor middle class is constantly monitored and controlled by the two-way TV sets that cannot be turned off and by secret police agents.
How does this Orwellian vision of world's future compare with reality thus far?
According to the Vox article, Cambridge Analytica has between 4000 and 5000 data points for every American adult.
Now, let's take a closer look at SCL Group. While the privately-held SCL Group pretty much flies under the radar, some information about its operations are available on the company's website as shown in this summary of its operations:
"SCL Group provides data, analytics and strategy to governments and military organizations worldwide. For over 25 years, we have conducted behavioral change programs in over 60 countries & have been formally recognized for our work in defense and social change."
The company's vision and mission statements are as follows:
"Our vision is to be the premier provider of data analytics and strategy for behavior change.
Our mission is to create behavior change through research, data, analytics, and strategy for both domestic and international government clients"
SCL are in the business of information management. The stations handle demographic and social data and trend analyses so that the government may use "persuasion and influence" to achieve their ends. The strategic stations are where decisions are made and the output desks are where "the means of communication exist for what the government wants to achieve". Big Brother is not just watching you, he's listening and talking too." (my bold)
Let's close this posting with a quote from a recent interview with Julian Assange:
"There is an organization that is much more significant than Cambridge Analytica, which is the SCL Group, of which Cambridge Analytica is part. The SCL Group does a lot of work for the UK military and intelligence sector and has been involved in numerous elections over the last 20 years, they brag in 60 countries. It is partly government, partly commercial work. There is still an important question to be resolved, which is how much of the SCL Group's activities in other countries' elections are on behalf of the UK state, or otherwise subsidized in some way by the UK state, and how many are simply field service operations for political parties in those states".
I hope that this posting has provided you with background information on how your personal data is used by private companies with links to governments around the globe. The only way to put an end to the endless data that governments are only too happy to use to manipulate us is to stop exposing our private lives for public show. As the recent Facebook/Cambridge Analytica story shows us, George Orwell was just slightly ahead of his time and we are playing right into the hands of "Big Brother" by using social media to communicate. What is particularly ironic and hypocritical is the fact that governments around the world have invoked privacy legislation with the alleged intent of "protecting us" and yet, they are the ones that have this overwhelming need to know everything about us so that they can either retain or gain power over us.
The eavesdropping was aimed at gaining a second – and this time unequivocal – Security Council resolution in support of an invasion. “British involvement in this would be illegal without a second resolution,” Ellsberg said. “How are they going to get that? Obviously essentially by blackmail and intimidation, by knowing the private wants and embarrassments, possible embarrassments, of people on the Security Council, or their aides, and so forth. The idea was, in effect, to coerce their vote.”
Katharine Gun foiled that plan. While scarcely reported in the U.S. media (despite cutting-edge news releases produced by my colleagues at the Institute for Public Accuracy beginning in early March of 2003), the revelations published by the Observer caused huge media coverage across much of the globe – and sparked outrage in several countries with seats on the Security Council.
“In the rest of the world there was great interest in the fact that American intelligence agencies were interfering with their policies of their representatives in the Security Council,” Ellsberg noted. A result was that for some governments on the Security Council at the time, the leak “made it impossible for their representatives to support the U.S. wish to legitimize this clear case of aggression against Iraq. So, the U.S. had to give up its plan to get a supporting vote in the UN.”
The U.S. and British governments “went ahead anyway, but without the legitimating precedent of an aggressive war that would have had, I think, many consequences later.”
Ellsberg said: “What was most striking then and still to me about this disclosure was that the young woman who looked at this cable coming across her computer in GCHQ acted almost immediately on what she saw was the pursuit of an illegal war by illegal means…. I’ve often been asked, is there anything about the release of the Pentagon Papers on Vietnam that you regret. And my answer is yes, very much. I regret that I didn’t put out the top-secret documents available to me in the Pentagon in 1964, years before I actually gave them to the Senate and then to the newspapers. Years of war and years of bombing. It wasn’t that I was considering that all that time. I didn’t have a precedent to instruct me on that at that point. But in any case, I could have been much more effective in averting that war if I’d acted much sooner.”
Katharine Gun “was not dealing only with historical material,” Ellsberg emphasizes. She “was acting in a timely fashion very quickly on her right judgment that what she was being asked to participate in was wrong. I salute her. She’s my hero. I think she’s a model for other whistleblowers. And for a long time I’ve said to people in her position or my old position in the government: Don’t do what I did. Don’t wait till the bombs are falling or thousands more have died.”
By making her choice, Gun risked two years of imprisonment. In Ellsberg’s words, she seemed to be facing “a sure conviction – except that the government was not willing to have the legality of that war discussed in a courtroom, and in the end dropped the charges.”
When you tell an establishment Democrat that Google’s hiding and removal of content is a dangerous form of censorship, they often magically transform into Ayn Rand right before your eyes.
“It’s a private company and they can do what they like with their property,” they will tell you. “It’s insane to say that a private company regulating its own affairs is the same as government censorship!”
This is absurd on its surface, because Google is not separate from the government in any meaningful way. It has been financially intertwined with US intelligence agencies since its very inception when it received research grants from the CIA and NSA for mass surveillance, pours massive amounts of money into federal lobbying and DC think tanks, has a cozy relationship with the NSA and multiple defense contracts.
“Some of Google’s partnerships with the intelligence community are so close and cooperative, and have been going on for so long, that it’s not easy to discern where Google Inc ends and government spook operations begin,” wrote journalist Yasha Levine in a 2014 Pando Daily article titled “Oakland emails give another glimpse into the Google-Military-Surveillance Complex“.
“The purchase of Keyhole was a major milestone for Google, marking the moment the company stopped being a purely consumer-facing Internet company and began integrating with the US government,” Levine wrote in a recent blog post about his book Surveillance Valley. “While Google’s public relations team did its best to keep the company wrapped in a false aura of geeky altruism, company executives pursued an aggressive strategy to become the Lockheed Martin of the Internet Age.”
And now we learn from Gizmodo that Google has also been helping with AI for the Pentagon’s drone program. A Google spokesperson reportedly told Gizmodo that the innovations it is bringing to the Defense Department’s Project Maven are “for non-offensive uses only,” which is kind of like saying the beer kegs you delivered to the frat house are for “non-intoxicating use only.” The DoD and its drone program exist to find and kill enemies of the US empire, and Google will be helping them do it.
“The department announced last year that the AI initiative, just over six months after being announced, was used by intelligence analysts for drone strikes against ISIS in an undisclosed location in the Middle East,” reports The Intercept on this story.
Google is not any more separable from the US government than Lockheed Martin or Raytheon are, yet it has been given an unprecedented degree of authority over human speech and the way people communicate and share information. Would you feel comfortable allowing Northrop Grumman or Boeing to determine what political speech is permissible and giving them the authority to remove political Youtube content and hide leftist and anti-establishment outlets from visibility like Google does?
For two years, the FBI has followed and harassed Refaie as part of an apparent effort to recruit him to become an informant or cooperate in some way with counterterrorism investigations. The FBI has more than 15,000 informants today, many working because they have been coerced or threatened by criminal prosecution or immigration enforcement. Classified FBI policy documents published by The Intercept in January revealed the often heavy-handed methods used by the government to recruit informants, including so-called threat assessments as “a means to induce him/her into becoming a recruited [informant] mainly through identifying that person’s motivations and vulnerabilities.” What’s unique about Refaie’s interactions with the FBI is that he recorded and documented the conversations and events that led to his indictment. The FBI did not respond to a request for comment or a list of questions about Refaie’s case.
As Tim Wu explains in his energetic and original new book The Attention Merchants, a ‘facebook’ in the sense Zuckerberg uses it here ‘traditionally referred to a physical booklet produced at American universities to promote socialisation in the way that “Hi, My Name Is” stickers do at events; the pages consisted of rows upon rows of head shots with the corresponding name’. Harvard was already working on an electronic version of its various dormitory facebooks. The leading social network, Friendster, already had three million users. The idea of putting these two things together was not entirely novel, but as Zuckerberg said at the time, ‘I think it’s kind of silly that it would take the University a couple of years to get around to it. I can do it better than they can, and I can do it in a week.’
Wu argues that capturing and reselling attention has been the basic model for a large number of modern businesses, from posters in late 19th-century Paris, through the invention of mass-market newspapers that made their money not through circulation but through ad sales, to the modern industries of advertising and ad-funded TV. Facebook is in a long line of such enterprises, though it might be the purest ever example of a company whose business is the capture and sale of attention. Very little new thinking was involved in its creation. As Wu observes, Facebook is ‘a business with an exceedingly low ratio of invention to success’. What Zuckerberg had instead of originality was the ability to get things done and to see the big issues clearly. The crucial thing with internet start-ups is the ability to execute plans and to adapt to changing circumstances. It’s Zuck’s skill at doing that – at hiring talented engineers, and at navigating the big-picture trends in his industry – that has taken his company to where it is today. Those two huge sister companies under Facebook’s giant wing, Instagram and WhatsApp, were bought for $1 billion and $19 billion respectively, at a point when they had no revenue. No banker or analyst or sage could have told Zuckerberg what those acquisitions were worth; nobody knew better than he did. He could see where things were going and help make them go there. That talent turned out to be worth several hundred billion dollars.
Jesse Eisenberg’s brilliant portrait of Zuckerberg in The Social Network is misleading, as Antonio García Martínez, a former Facebook manager, argues in Chaos Monkeys, his entertainingly caustic book about his time at the company. The movie Zuckerberg is a highly credible character, a computer genius located somewhere on the autistic spectrum with minimal to non-existent social skills. But that’s not what the man is really like. In real life, Zuckerberg was studying for a degree with a double concentration in computer science and – this is the part people tend to forget – psychology. People on the spectrum have a limited sense of how other people’s minds work; autists, it has been said, lack a ‘theory of mind’. Zuckerberg, not so much. He is very well aware of how people’s minds work and in particular of the social dynamics of popularity and status. The initial launch of Facebook was limited to people with a Harvard email address; the intention was to make access to the site seem exclusive and aspirational. (And also to control site traffic so that the servers never went down. Psychology and computer science, hand in hand.) Then it was extended to other elite campuses in the US. When it launched in the UK, it was limited to Oxbridge and the LSE. The idea was that people wanted to look at what other people like them were doing, to see their social networks, to compare, to boast and show off, to give full rein to every moment of longing and envy, to keep their noses pressed against the sweet-shop window of others’ lives.