TBR News December 5, 2013

Dec 05 2013

The Voice of the White House

 

Thought of the day: You do not need a parachute to skydive. You only need a parachute to skydive twice.

            Washington, D.C. December 6, 2013: “At first, the Internet, developed by the U.S. Army, was an intellectual toy but then it blossomed out to become one of the most vital segments of modern society. At this point in time, our entire society is geared to the Internet and our government, at the direction of the White House, is frantic to get the Internet under control so that they can control any and all information. The government now has a strong presence in the print media (which is why subscribers are leaving them in enormous numbers) and is seeking the means to get control of the Internet. The revelations of Edward Snowden has done great damage to their plans as they have alerted the public to the degree and extent to which they are spied on and, untimately, controlled.

            And in the very near future, we will be publishing sensational excerpts from a forbidden manuscript compiled by the CIA’s Robert Crowley on that agencies’ activity behind the scenes in Vietnam.

            Covered will be drug-running, extensive official torture centers, wholesale murder of innocent civilians, international manipulations concerning rubber and oil and much, much more.

            These postings are a bit too uncomfortable to post on line so they can be found on the Slaughterhouse Informer.

 

The Slaughterhouse

Informer

 

 

 

A Compendium of Various Official Lies, Business Scandals, Small Murders, Frauds, and Other Gross Defects of Our Current Political, Business and Religious Moral Lepers.

This E-magazine appears on a weekly basis and contains much material that is often more in-depth than is found on the tbr website. It costs only $5.oo per month and is easily cancelled. It is not popular with pro-government people and despised by right-wing Republicans and the banking community.



 

 

 

Welcome to the Memory Hole: Disappearing Edward Snowden

by Peter Van Buren

TomGram

 

What if Edward Snowden was made to disappear? No, I’m not suggesting some future CIA rendition effort or a who-killed-Snowden conspiracy theory of a disappearance, but a more ominous kind.

 

What if everything a whistleblower had ever exposed could simply be made to go away? What if every National Security Agency (NSA) document Snowden released, every interview he gave, every documented trace of a national security state careening out of control could be made to disappear in real-time? What if the very posting of such revelations could be turned into a fruitless, record-less endeavor?

 

Am I suggesting the plot for a novel by some twenty-first century George Orwell? Hardly. As we edge toward a fully digital world, such things may soon be possible, not in science fiction but in our world — and at the push of a button. In fact, the earliest prototypes of a new kind of “disappearance” are already being tested. We are closer to a shocking, dystopian reality that might once have been the stuff of futuristic novels than we imagine. Welcome to the memory hole.

 

Even if some future government stepped over one of the last remaining red lines in our world and simply assassinated whistleblowers as they surfaced, others would always emerge. Back in 1948, in his eerie novel 1984, however, Orwell suggested a far more diabolical solution to the problem. He conjured up a technological device for the world of Big Brother that he called “the memory hole.” In his dark future, armies of bureaucrats, working in what he sardonically dubbed the Ministry of Truth, spent their lives erasing or altering documents, newspapers, books, and the like in order to create an acceptable version of history. When a person fell out of favor, the Ministry of Truth sent him and all the documentation relating to him down the memory hole. Every story or report in which his life was in any way noted or recorded would be edited to eradicate all traces of him.

 

In Orwell’s pre-digital world, the memory hole was a vacuum tube into which old documents were physically disappeared forever. Alterations to existing documents and the deep-sixing of others ensured that even the sudden switching of global enemies and alliances would never prove a problem for the guardians of Big Brother. In the world he imagined, thanks to those armies of bureaucrats, the present was what had always been — and there were those altered documents to prove it and nothing but faltering memories to say otherwise. Anyone who expressed doubts about the truth of the present would, under the rubric of “thoughtcrime,” be marginalized or eliminated.

 

Government and Corporate Digital Censorship

 

Increasingly, most of us now get our news, books, music, TV, movies, and communications of every sort electronically. These days, Google earns more advertising revenue than all U.S. print media combined. Even the venerable Newsweek no longer publishes a paper edition. And in that digital world, a certain kind of “simplification” is being explored. The Chinese, Iranians, and others are, for instance, already implementing web-filtering strategies to block access to sites and online material of which their governments don’t approve. The U.S. government similarly (if somewhat fruitlessly) blocks its employees from viewing Wikileaks and Edward Snowden material (as well as websites like TomDispatch) on their work computers — though not of course at home. Yet.

 

Great Britain, however, will soon take a significant step toward deciding what a private citizen can see on the web even while at home. Before the end of the year, almost all Internet users there will be “opted-in” to a system designed to filter out pornography. By default, the controls will also block access to “violent material,” “extremist and terrorist related content,” “anorexia and eating disorder websites,” and “suicide related websites.” In addition, the new settings will censor sites mentioning alcohol or smoking. The filter will also block “esoteric material,” though a UK-based rights group says the government has yet to make clear what that category will include.

 

And government-sponsored forms of Internet censorship are being privatized. New, off-the-shelf commercial products guarantee that an organization does not need to be the NSA to block content. For example, the Internet security company Blue Coat is a domestic leader in the field and a major exporter of such technology. It can easily set up a system to monitor and filter all Internet usage, blocking web sites by their address, by keywords, or even by the content they contain. Among others, Blue Coat software is used by the U.S. Army to control what its soldiers see while deployed abroad, and by the repressive governments in Syria, Saudi Arabia, and Burma to block outside political ideas.

 

Google Search…

 

In a sense, Google Search already “disappears” material. Right now Google is the good guy vis-à-vis whistleblowers. A quick Google search (0.22 seconds) turns up more than 48 million hits on Edward Snowden, most of them referencing his leaked NSA documents. Some of the websites display the documents themselves, still labeled “Top Secret.” Less than half a year ago, you had to be one of a very limited group in the government or contractually connected to it to see such things. Now, they are splayed across the web.

 

Google — and since Google is the planet’s number one search engine, I’ll use it here as a shorthand for every search engine, even those yet to be invented — is in this way amazing and looks like a massive machine for spreading, not suppressing, news. Put just about anything on the web and Google is likely to find it quickly and add it into search results worldwide, sometimes within seconds. Since most people rarely scroll past the first few search results displayed, however, being disappeared already has a new meaning online. It’s no longer enough just to get Google to notice you. Getting it to place what you post high enough on its search results page to be noticed is what matters now. If your work is number 47,999,999 on the Snowden results, you’re as good as dead, as good as disappeared. Think of that as a starting point for the more significant forms of disappearance that undoubtedly lie in our future.

 

Hiding something from users by reprogramming search engines is one dark step to come. Another is actually deleting content, a process as simple as transforming the computer coding behind the search process into something predatory. And if Google refuses to implement the change-over to “negative searches,” the NSA, which already appears to be able to reach inside Google, can implant its own version of malicious code as it has already done in at least 50,000 instances.

 

But never mind the future: here’s how a negative search strategy is already working, even if today its focus — largely on pedophiles — is easy enough to accept. Google recently introduced software that makes it harder for users to locate child abuse material. As company head Eric Schmidt put it, Google Search has been “fine-tuned” to clean up results for more than 100,000 terms used by pedophiles to look for child pornography. Now, for instance, when users type in queries that may be related to child sexual abuse, they will find no results that link to illegal content. Instead, Google will redirect them to help and counseling sites. “We will soon roll out these changes in more than 150 languages, so the impact will be truly global,” Schmidt wrote.

 

While Google is redirecting searches for kiddie porn to counseling sites, the NSA has developed a similar ability. The agency already controls a set of servers codenamed Quantum that sit on the Internet’s backbone. Their job is to redirect “targets” away from their intended destinations to websites of the NSA’s choice. The idea is: you type in the website you want and end up somewhere less disturbing to the agency. While at present this technology may be aimed at sending would-be online jihadis to more moderate Islamic material, in the future it could, for instance, be repurposed to redirect people seeking news to an Al-Jazeera lookalike site with altered content that fits the government’s version of events.

 

…and Destroy

 

However, blocking and redirecting technologies, which are bound to grow more sophisticated, will undoubtedly be the least of it in the future. Google is already taking things to the next level in the service of a cause that just about anyone would applaud. They are implementing picture-detection technology to identify child abuse photographs whenever they appear on their systems, as well as testing technology that would remove illegal videos. Google’s actions against child porn may be well intentioned indeed, but the technology being developed in the service of such anti-child-porn actions should chill us all. Imagine if, back in 1971, the Pentagon Papers, the first glimpse most Americans had of the lies behind the Vietnam War, had been deletable. Who believes that the Nixon White House wouldn’t have disappeared those documents and that history wouldn’t have taken a different, far grimmer course?

 

Or consider an example that’s already with us. In 2009, many Kindle owners discovered that Amazon had reached into their devices overnight and remotely deleted copies of Orwell’s Animal Farm and 1984 (no irony intended). The company explained that the books, mistakenly “published” on its machines, were actually bootlegged copies of the novels. Similarly, in 2012, Amazon erased the contents of a customer’s Kindle without warning, claiming her account was “directly related to another which has been previously closed for abuse of our policies.” Using the same technology, Amazon now has the ability to replace books on your device with “updated” versions, the content altered. Whether you are notified or not is up to Amazon.

 

In addition to your Kindle, remote control over your other devices is already a reality. Much of the software on your computer communicates in the background with its home servers, and so is open to “updates” that can alter content. The NSA uses malware — malicious software remotely implanted into a computer — to change the way the machine works. The Stuxnet code that likely damaged 1,000 centrifuges the Iranians were using to enrich uranium is one example of how this sort of thing can operate.

 

These days, every iPhone checks back with headquarters to announce what apps you’ve purchased; in the tiny print of a disclaimer routinely clicked through, Apple reserves the right to disappear any app for any reason. In 2004, TiVo sued Dish Network for giving customers set-top boxes that TiVo said infringed on its software patents. Though the case was settled in return for a large payout, as an initial remedy, the judge ordered Dish to electronically disable the 192,000 devices it had already installed in people’s homes. In the future, there will be ever more ways to invade and control computers, alter or disappear what you’re reading, and shunt you to sites weren’t looking for.

 

Snowden’s revelations of what the NSA does to gather information and control technology, which have riveted the planet since June, are only part of the equation. How the government will enhance its surveillance and control powers in the future is a story still to be told. Imagine coupling tools to hide, alter, or delete content with smear campaigns to discredit or dissuade whistleblowers, and the power potentially available to both governments and corporations becomes clearer.

 

The ability to move beyond altering content into altering how people act is obviously on governmental and corporate agendas as well. The NSA has already gathered blackmail data from the digital porn viewing habits of “radical” Muslims. The NSA sought to wiretap a Congressman without a warrant. The ability to collect information on Federal judges, government leaders, and presidential candidates makes J. Edgar Hoover’s 1950s blackmail schemes as quaint as the bobby socks and poodle skirts of that era. The wonders of the Internet regularly stun us. The dystopian, Orwellian possibilities of the Internet have, until recently, not caught our attention in the same way. They should.

 

Read This Now, Before It’s Deleted

 

The future for whistleblowers is grim. At a time not so far distant, when just about everything is digital, when much of the world’s Internet traffic flows directly through the United States or allied countries, or through the infrastructure of American companies abroad, when search engines can find just about anything online in fractions of a second, when the Patriot Act and secret rulings by the Foreign Intelligence Surveillance Court make Google and similar tech giants tools of the national security state (assuming organizations like the NSA don’t simply take over the search business directly), and when the sophisticated technology can either block, alter, or delete digital material at the push of a button, the memory hole is no longer fiction.

 

Leaked revelations will be as pointless as dusty old books in some attic if no one knows about them. Go ahead and publish whatever you want. The First Amendment allows you to do that. But what’s the point if no one will be able to read it? You might more profitably stand on a street corner and shout at passers by. In at least one easy-enough-to-imagine future, a set of Snowden-like revelations will be blocked or deleted as fast as anyone can (re)post them.

 

The ever-developing technology of search, turned 180 degrees, will be able to disappear things in a major way. The Internet is a vast place, but not infinite.  It is increasingly being centralized in the hands of a few companies under the control of a few governments, with the U.S. sitting on the major transit routes across the Internet’s backbone.

 

About now you should feel a chill. We’re watching, in real time, as 1984 turns from a futuristic fantasy long past into an instructional manual. There will be no need to kill a future Edward Snowden. He will already be dead.

 

Peter Van Buren blew the whistle on State Department waste and mismanagement during Iraqi reconstruction in his first book, We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People. A TomDispatch regular, he writes about current events at his blog, We Meant Well. His next book, Ghosts of Tom Joad: A Story of the #99Percent, will be available April 2014.

 

 

 

Curtis Fineman, Deputy Director, DHS

 

 

Fact vs Fiction: The Auschwitz Official records

 

 

Note: The author of this article, Dr. Germar Rudolf, was extradited by the United States government to Germany where he was charged with ‘defaming Jews’. This is a law in Germany at the present time and it does not matter if the article is factual or not. It does not matter if a Recognized Holocaust Scholar like Breitman, Browning or Lipstadt states that 100 million Jews were killed by German Girl Scouts during a 1943 picnic, any refutation of such a idiotic statement, based entirely on extant records, would earn the writer five  years in a German jail. If the documentary record was found to be accurate to the last detail, nevertheless, German law states that one may never contradict a Recognized Holocaust Scholar at the risk of a five year prison sentence. That the holocaust scholar, or fiction writer as they should be more accurately termed , might be a complete lunatic like Goldenhagen  and the figures given invented out of their head, daring to question them brings five years of eating cold beans off a tin plate while someone with a monocle watches you through a hole in the door. The records upon which this article is based are on microfilm and Dr. Rudolf has been selling them to a large audience.  Ed.

 

 

Official German Record of all Prisoners in Auschwitz Concentration Camp from May of 1940 through December of 1944

 

Prisoner records of Auschwitz camp from May, 1940 through December 1944 from the Glücks complete Concentration Camp microfilm records now located in the Russian Central Archives[1]

 

(Note: The attached statistical tables concerning prisoners in Auschwitz camp from its inception to its closing are taken directly from Soviet archival material, now available on microfilm from the former Soviet Central Archives. Also, a good deal of corroborative material from the German Archives concerning the German State Railways has been located in the German State Archives (Bundesarchiv) and utilized. The railroad was responsible for the transportation of inmates to and from concentration camps in the figures from the Russian files is accurately reflected in the Reichsbahn documents.)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Non Jewish Prisoners Entering Auschwitz

 

1940

May

June

July

Aug

Sept

Oct

Nov

Dec

 

70

1225

147

1156

1873

471

637

1190

1941

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

1691

1339

221

4051

1793

731

1925

473

785

7191

1215

1217

1942

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

843

1508

1071

1817

1881

2583

3493

3106

1628

2952

2507

3172

 
  6669   22632   26561
1943

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

9474

4065

15618

  7346

4868

3368

4942

5282

4531

8179

3676

4961

1944

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

1767

1052

573

5971

2097

1412

1368

6890

4604

674

1854

1251

 
  76310   29513  
                   

 

Total non-Jews in Auschwitz, 1940-1944: 161,685

 

Sources: CSA No. 187603: Roll 281-1940: Frames 107-869-Roll 282-1940-41: Frames 001-875-Roll 283-1941-42:Frames 001-872-Roll 284-1942-43: Frames 003-862-Roll 285-1943-44: Frames 019-852- Roll 286-1945: Frames 001-329.

 

 

Jewish Prisoners Entering Auschwitz 1941-1944

 

1941

July

Nov

Dec

 

171

1

6

1942

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

1166

6762

1000

3004

9736

3518

3419

5990

4146

4742

1943

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

6076

2507

9037

5054

2453

2520

4201

13382

7990

1624

3921

7180

  178   43483   65945
1944

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

 

1445

1299

1178

3175

18927

8438

12924

12705

2126

1177

 
  63394  
               

 

Total Jews in Auschwitz, 1941-1944: 173,000

 

Total number of inmates in Auschwitz, 1940-1944

334,785

 

 Sources: CSA No. 187603: -Roll 282-1940-41: Frames 001-875-Roll 283-1941-42:Frames 001-872-Roll 284-1942-43: Frames 003-862-Roll 285-1943-44: Frames 019-852.

 

 

 

 

 

 

 

 

Total Typhus Deaths in Auschwitz, 1941-1944

 

1941

Oct

Nov

Dec

 

2128

5084

2585

1942

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

1776

1515

3018

1392

2911

3688

4124

4968

1497

6092

103

1023

1943

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

2123

2979

4604

2835

2378

2980

3438

2633

2901

3549

4621

4679

 
  9797   32107   39720
1944

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

2801

1933

2321

1771

981

1575

1121

1847

3313

3095

927

120

 
  21805  
                     

 

 

Total deaths by typhus in Auschwitz, 1941-1944

103,447

 

Sources:  CSA No. 187603: 1940-41: Frames 001-875-Roll 283-1941-42:Frames 001-872-Roll 284-1942-43: Frames 003-862-Roll 285-1943-44: Frames 019-852- Roll 286.

 

Jewish Typhus Deaths in Auschwitz, 1942-1944

 

1942

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

875

906

1789

875

1991

2406

3090

3271

919

4789

29

621

1943

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

1502

1729

3981

895

1721

1990

2017

968

1803

2705

3219

2842

1944

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

1429

876

1312

632

407

884

455

1129

1871

1294

927

91

  21561   25372   11307
                     

 

Total Jewish deaths by typhus in Auschwitz, 1942-1944

58,240

Total non-Jewish deaths by typhus in Auschwitz, 1940-1944

45,207

 

Sources: CSA No. 187603:  Roll 283-1941-42:Frames 001-872-Roll 284-1942-43: Frames 003-862-Roll 285-1943-44: Frames 019-852.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Deaths by natural causes (other than typhus) in Auschwitz, 1940-1944

 

1940

May

June

July

Aug

Sept

Oct

Nov

Dec

 

6

23

15

35

9

21

34

30

1941

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

142

175

165

9

47

19

5

11

23

2

39

48

1942

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

120

77

42

39

23

21

16

5

19

25

49

61

  173   685   497
1943

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

103

221

198

89

62

56

31

38

96

102

235

197

1944

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

120

191

178

167

155

151

98

65

54

67

94

17

 
  1428   1357  

 

Death by natural causes (other than typhus), 1940-1944

4,140

 

Sources: CSA No. 187603: Roll 281-1940: Frames 107-869-Roll 282-1940-41: Frames 001-875-Roll 283-1941-42:Frames 001-872-Roll 284-1942-43: Frames 003-862-Roll 285-1943-44: Frames 019-852- Roll 286.

 

Death by natural causes (other than typhus), Jews, Auschwitz, 1941-1944

 

1941

Dec

 

7

1942

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

62

39

32

26

11

5

9

1

11

19

37

48

1943

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

62

117

120

43

37

41

16

24

61

81

104

130

  7   300   836
1944

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

98

127

111

140

90

107

49

32

41

39

81

6

 
  921  
                       

 

Total Jewish deaths by natural causes (other than typhus), 1941-1944

2,064

Sources: CSA No. 187603: 1940-41: Frames 001-875-Roll 283-1941-42:Frames 001-872-Roll 284-1942-43: Frames 003-862-Roll 285-1943-44: Frames 019-852- Roll 286.

 

Transfers from Auschwitz, 1940-1944

 

1940

Oct

 

     11

1941

Jan

Feb

April

May

June

 

657

8

1002

36

4

1942

Feb

Mar

Apr

May

June

July

 

196

275

158

423

1845

753

       11   1707   3650
1943

Mar

Apr

Aug

Sept

Oct

Nov

Dec

 

3001

1024

3195

600

4544

3500

333

1944

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

612

2060

881

2500

7923

9228

15628

8957

9091

33244

8309

1455

 
  16197   99888  
                             

 

Total transferred from Auschwitz, 1940-1944

121,453

 

Sources: CSA No. 187603: Roll 281-1940: Frames 107-869-Roll 282-1940-41: Frames 001-875-Roll 283-1941-42:Frames 001-872-Roll 284-1942-43: Frames 003-862-Roll 285-1943-44: Frames 019-852.

 

 

 

 

 

 

 

 

Transfers of Jews from Auschwitz, 1941-1944

 

1941

Jan

Apr

May

 

271

459

17

1942

Feb

Mar

Apr

May

June

July

 

120

37

30

112

873

120

1943

Mar

Apr

Aug

Sept

Oct

Nov

Dec

 

1572

630

2871

395

3201

3264

173

  747   1292   12106
1944

Jan

Feb

Mar

Apr

May

June

July

Aug

Sept

Oct

Nov

Dec

 

409

1843

410

1927

7540

8109

13765

7501

8502

28509

7322

761

 
  86598  
             

 

Total number of Jews transferred from Auschwitz, 1941-1944

100,743

 

 Sources: CSA No. 187603: 1940-41: Frames 001-875-Roll 283-1941-42:Frames 001-872-Roll 284-1942-43: Frames 003-862-Roll 285-1943-44: Frames 019-852- Roll 286.

 

 

 

 

 

 

 

Administrative Executions at Auschwitz, 1940-1943

 

1940

Nov 22

 

40 Poles

1941

Jan 3

July 3

Aug 1

Nov 14

Dec 1

Dec 20

 

1 Pole

80 Poles

1 Jew

151 Poles

1 Pole

5 Poles

  Poles      40

Jews       0

  Poles      238

Jews       1

       
1942   1942 cont.  
Jan 24

Apr 3

May 27

May 28

June 4

June 9

June 10

June 11

June 12

 

June 13

June 15

June 16

June 18

June 19

June 20

 

June 22

June 23

June 25

 

1 Russian

11 Poles

150 Poles

1 Jew

3 Jews

3 Jews

13 Poles

3 Jews

60 Poles, 2 Jews

6 Jews

200 Poles

2 Poles, 2 Jews

 8 Jews

 50 Poles, 4 Jews

4 Czechs

4 Jews

3 Jews

3 Jews

 

June 26

June 27

June 29

July 1

July 2

July 14

July 16

July 20

July 23

July 29

Aug 11

Aug 13

Aug 18

Aug 21

Sept 5

Sept 25

Nov 9

Nov 14

Nov 17

Dec 4

40 Poles, 1 Jew

4 Jews

2 Poles, 3 Jews

15 Jews

9 Jews

10 Poles, 2 Jews

9 Poles

50 Poles

2 Jews

14 Poles

11 Jews

1 Pole

60 Poles

57 Poles

1 Jew

3 Poles

3 Poles

1 Pole

1 Pole

9 Poles, 2 Russians

Poles

Jews

Russians

Czechs

737

91

3

4

               

 

1943

Jan 6

Jan 14

Jan 25

Jan 26

Feb 7

Feb 9

Feb 13

Feb 19

Mar 17

Apr 3

Apr 13

May 22

May 31

June 10

June 25

June 28

July 24

July 28

Aug 20

Sept 4

Sept 21

Sept 28

Oct 11

Nov 9

 

9 Poles, 5 Jews

6 Poles

22 Poles

7 Poles, 2 Jews

2 Poles

2 Poles, 1 Jew

16 Poles

11 Poles, 3 Jews

1 Pole

26 Poles

2 Gypsies

13 Poles, 6 Jews, 5 Gypsies

1 Gypsy

20 Poles

68 Poles

30 Poles

1 Pole

4 Poles

38 Poles

45 Poles, 8 Russians

2 Poles

9 Poles, 6 Jews, 12 Gypsies, 1 Czech

54 Poles

50 Poles

Poles

Jews

Russians

Gypsies

Czechs

436

23

8

19

2

     

 

 

 

 

 

 

1944

Feb 1

 

 

Mar 24

Sept 15

 

19 Poles

8 Russians

4 Poles

3 Jews

2 Poles

Poles

Jews

Russians

 

25

3

8

 

     

 

 

 Sources: CSA No. 187603: Roll 281-1940: Frames 107-869-Roll 282-1940-41: Frames 001-875-Roll 283-1941-42:Frames 001-872-Roll 284-1942-43: Frames 003-862-Roll 285-1943-44: Frames 019-852- Roll 286.

 

Total number of inmates executed: 1359     Total Russians executed: 19

Total Gypsies executed: 19                   Total Poles executed: 1208

Total Jews executed: 117                                      Total Czechs executed: 6

Total of Hungarian Jews sent to Auschwitz, May, 1944-October, 1944

 

1944

May

June

July

Aug

Sept

Oct

 

8548

3981

6543

3881

163

1

  23,117

 

 Sources: CSA No. 187603: Roll 285-1943-44: Frames 019-852- Roll 286-1945: Frames 001-329.

 

Total number of Hungarian Jews sent to Auschwitz, May-October, 1944:  23,117

 

Note: Number of Hungarian Jews claimed sent to Auschwitz, May-October, 1944:

        Lucy Dawidowicz. The War Against the Jews, New York, 1975.: 450,000

        Raul Hilberg, The Destruction of the European Jews, New York, 1985. 180,000

 

Facebook’s Future Plans for Data Collection Beyond All Imagination

Facebook’s dark plans for the future are given away in its patent applications.

 

December 4, 2013

by Darwin Bond-Graham

CounterPunch 

 

 “No one knows who will live in this cage in the future, or whether at the end of this tremendous development, entirely new prophets will arise, or there will be a great rebirth of old ideas and ideals, or, if neither, mechanized petrification, embellished with a sort of convulsive self-importance. For of the fast stage of this cultural development, it might well be truly said: ‘Specialists without spirit, sensualists without heart; this nullity imagines that it has attained a level of civilization never before achieved.’”

 

—Max Weber, 1905

 

On November 12 Facebook, Inc. filed its 178th patent application for a consumer profiling technique the company calls “inferring household income for users of a social networking system.”

 

“The amount of information gathered from users,” explain Facebook programmers Justin Voskuhl and Ramesh Vyaghrapuri in their patent application, “is staggering — information describing recent moves to a new city, graduations, births, engagements, marriages, and the like.” Facebook and other so-called tech companies have been warehousing all of this information since their respective inceptions. In Facebook’s case, its data vault includes information posted as early as 2004, when the site first went live. Now in a single month the amount of information forever recorded by Facebook —dinner plans, vacation destinations, emotional states, sexual activity, political views, etc.— far surpasses what was recorded during the company’s first several years of operation. And while no one outside of the company knows for certain, it is believed that Facebook has amassed one of the widest and deepest databases in history. Facebook has over 1,189,000,000 “monthly active users” around the world as of October 2013, providing considerable width of data. And Facebook has stored away trillions and trillions of missives and images, and logged other data about the lives of this billion plus statistical sample of humanity. Adjusting for bogus or duplicate accounts it all adds up to about 1/7th of humanity from which some kind of data has been recorded.

 

According to Facebook’s programmers like Voskuhl and Vyaghrapuri, of all the clever uses they have already applied this pile of data toward, Facebook has so far “lacked tools to synthesize this information about users for targeting advertisements based on their perceived income.” Now they have such a tool thanks to the retention and analysis of variable the company’s positivist specialists believe are correlated with income levels.

 

They’ll have many more tools within the next year to run similar predictions. Indeed, Facebook, Google, Yahoo, Twitter, and the hundreds of smaller tech lesser-known tech firms that now control the main portals of social, economic, and political life on the web (which is now to say everywhere as all economic and much social activity is made cyber) are only getting started. The Big Data analytics revolutions has barely begun, and these firms are just beginning to tinker with rational-instrumental methods of predicting and manipulating human behavior.

 

There are few, if any, government regulations restricting their imaginations at this point. Indeed, the U.S. President himself is a true believer in Big Data; the brain of Obama’s election team was a now famous “cave” filled with young Ivy League men (and a few women) sucking up electioneering information and crunching demographic and consumer data to target individual voters with appeals timed to maximize the probability of a vote for the new Big Blue, not IBM, but the Democratic Party’s candidate of “Hope” and “Change.” The halls of power are enraptured by the potential of rational-instrumental methods paired with unprecedented access to data that describes the social lives of hundreds of millions.

 

Facebook’s intellectual property portfolio reads like cliff notes summarizing the aspirations of all corporations in capitalist modernity; to optimize efficiency in order to maximize profits and reduce or externalize risk. Unlike most other corporations, and unlike previous phases in the development of rational bureaucracies, Facebook and its tech peers have accumulated never before seen quantities of information about individuals and groups. Recent breakthroughs in networked computing make analysis of these gigantic data sets fast and cheap. Facebook’s patent holdings are just a taste of what’s arriving here and now.

 

The way you type, the rate, common mistakes, intervals between certain characters, is all unique, like your fingerprint, and there are already cyber robots that can identify you as you peck away at keys. Facebook has even patented methods of individual identification with obviously cybernetic overtones, where the machine becomes an appendage of the person. U.S. Patents 8,306,256, 8,472,662, and 8,503,718, all filed within the last year, allow Facebook’s web robots to identify a user based on the unique pixelation and other characteristics of their smartphone’s camera. Identification of the subject is the first step toward building a useful data set to file among the billion or so other user logs. Then comes analysis, then prediction, then efforts to influence a parting of money.

 

Many Facebook patents pertain to advertising techniques that are designed and targeted, and continuously redesigned with ever-finer calibrations by robot programs, to be absorbed by the gazes of individuals as they scroll and swipe across their Facebook feeds, or on third party web sites.

 

Speaking of feeds, U.S. Patent 8,352,859, Facebook’s system for “Dynamically providing a feed of stories about a user of a social networking system” is used by the company to organize the constantly updated posts and activities inputted by a user’s “friends.” Of course embedded in this system are means of inserting advertisements. According to Facebook’s programmers, a user’s feeds are frequently injected with “a depiction of a product, a depiction of a logo, a display of a trademark, an inducement to buy a product, an inducement to buy a service, an inducement to invest, an offer for sale, a product description, trade promotion, a survey, a political message, an opinion, a public service announcement, news, a religious message, educational information, a coupon, entertainment, a file of data, an article, a book, a picture, travel information, and the like.” That’s a long list for sure, but what gets injected is more often than not whatever will boost revenues for Facebook.

 

The advantage here, according to Facebook, is that “rather than having to initiate calls or emails to learn news of another user, a user of a social networking website may passively receive alerts to new postings by other users.” The web robot knows best. Sit back and relax and let sociality wash over you, passively. This is merely one of Facebook’s many “systems for tailoring connections between various users” so that these connections ripple with ads uncannily resonant with desires and needs revealed in the quietly observed flow of e-mails, texts, images, and clicks captured forever in dark inaccessible servers of Facebook, Google and the like. These communications services are free in order to control the freedom of data that might otherwise crash about randomly, generating few opportunities for sales.

 

Where this fails Facebook ratchets up the probability of influencing the user to behave as a predictable consumer. “Targeted advertisements often fail to earn a user’s trust in the advertised product,” explain Facebook’s programmers in U.S. Patent 8,527,344, filed in September of this year. “For example, the user may be skeptical of the claims made by the advertisement. Thus, targeted advertisements may not be very effective in selling an advertised product.” Facebook’s computer programmers who now profess mastery over sociological forces add that even celebrity endorsements are viewed with skepticism by the savvy citizen of the modulated Internet. They’re probably right.

 

Facebook’s solution is to mobilize its users as trusted advertisers in their own right. “Unlike advertisements, most users seek and read content generated by their friends within the social networking system; thus,” concludes Facebook’s mathematicians of human inducement, “advertisements generated by a friend of the user are more likely to catch the attention of the user, increasing the effectiveness of the advertisement.” That Facebook’s current So-And-So-likes-BrandX ads are often so clumsy and ineffective does not negate the qualitative shift in this model of advertising and the possibilities of un-freedom it evokes

 

   Forget iPhones and applications, the tech industry’s core consumer product is now advertising. Their essential practice is mass surveillance conducted in real time through continuous and multiple sensors that pass, for most people, entirely unnoticed. The autonomy and unpredictability of the individual —in Facebook’s language the individual is the “user”— is their fundamental business problem. Reducing autonomy via surveillance and predictive algorithms that can placate existing desires, and even stimulate and mold new desires is the tech industry’s reason for being. Selling their capacious surveillance and consumer stimulus capabilities to the highest bidder is the ultimate end.

 

Sounds too dystopian? Perhaps, and this is by no means the world we live in, not yet. It is, however, a tendency rooted in the tech economy. The advent of mobile, hand-held, wirelessly networked computers, called “smartphones,” is still so new that the technology, and its services feel like a parallel universe, a new layer of existence added upon our existing social relationships, business activities, and political affiliations. In many ways it feels liberating and often playful. Our devices can map geographic routes, identify places and things, provide information about almost anything in real time, respond to our voices, and replace our wallets. Who hasn’t consulted “Dr. Google” to answer a pressing question? Everyone and everything is seemingly within reach and there is a kind of freedom to this utility.

 

Most of Facebook’s “users” have only been registered on the web site since 2010, and so the quintessential social network feels new and fun, and although perhaps fraught with some privacy concerns, it does not altogether fell like a threat to the autonomy of the individual. To say it is, is a cliche sci-fi nightmare narrative of tech-bureaucracy, and we all tell one another that the reality is more complex.

 

Privacy continues, however, too be too narrowly conceptualized as a liberal right against incursions of government, and while the tech companies have certainly been involved in a good deal of old-fashioned mass surveillance for the sake of our federal Big Brother, there’s another means of dissolving privacy that is more fundamental to the goals of the tech companies and more threatening to social creativity and political freedom.

 

Georgetown University law professor Julie Cohen notes that pervasive surveillance is inimical to the spaces of privacy that are required for liberal democracy, but she adds importantly, that the surveillance and advertising strategies of the tech industry goes further.

 

“A society that permits the unchecked ascendancy of surveillance infrastructures, which dampen and modulate behavioral variability, cannot hope to maintain a vibrant tradition of cultural and technical innovation,” writes Cohen in a forthcoming Harvard Law Review article.

 

“Modulation” is Cohen’s term for the tech industry’s practice of using algorithms and other logical machine operations to mine an individual’s data so as to continuously personalize information streams. Facebook’s patents are largely techniques of modulation, as are Google’s and the rest of the industry leaders. Facebook conducts meticulous surveillance on users, collects their data, tracks their movements on the web, and feeds the individual specific content that is determined to best resonate with their desires, behaviors, and predicted future movements. The point is to perfect the form and function of the rational-instrumental bureaucracy as defined by Max Weber: to constantly ratchet up efficiency, calculability, predictability, and control. If they succeed in their own terms, the tech companies stand to create a feedback loop made perfectly to fit each an every one of us, an increasingly closed systems of personal development in which the great algorithms in the cloud endlessly tailor the psychological and social inputs of humans who lose the gift of randomness and irrationality.

 

“It is modulation, not privacy, that poses the greater threat to innovative practice,” explains Cohen. “Regimes of pervasively distributed surveillance and modulation seek to mold individual preferences and behavior in ways that reduce the serendipity and the freedom to tinker on which innovation thrives.” Cohen has pointed out the obvious irony here, not that it’s easy to miss; the tech industry is uncritically labeled America’s hothouse of innovation, but it may in fact be killing innovation by disenchanting the world and locking inspiration in an cage.

 

If there were limits to the reach of the tech industry’s surveillance and stimuli strategies it would indeed be less worrisome. Only parts of our lives would be subject to this modulation, and it could therefore benefit us. But the industry aspires to totalitarian visions in which universal data sets are constantly mobilized to transform an individual’s interface with society, family, the economy, and other institutions. The tech industry’s luminaries are clear in their desire to observe and log everything, and use every “data point” to establish optimum efficiency in life as the pursuit of consumer happiness. Consumer happiness is, in turn, a step toward the rational pursuit of maximum corporate profit. We are told that the “Internet of things” is arriving, that soon every object will have embedded within it a computer that is networked to the sublime cloud, and that the physical environment will be made “smart” through the same strategy of modulation so that we might be made free not just in cyberspace, but also in the meatspace.

 

Whereas the Internet of the late 1990s matured as an archipelago of innumerable disjointed and disconnected web sites and databases, today’s Internet is gripped by a handful of giant companies that observe much of the traffic and communications, and which deliver much of the information from an Android phone or laptop computer, to distant servers, and back. The future Internet being built by the tech giants —putting aside the Internet of things for the moment— is already well into its beta testing phase. It’s a seamlessly integrated quilt of web sites and apps that all absorb “user” data, everything from clicks and keywords to biometric voice identification and geolocation.

 

United States Patent 8,572,174, another of Facebook’s recent inventions, allows the company to personalize a web page outside of Facebook’s own system with content from Facebook’s databases. Facebook is selling what the company calls its “rich set of social information” to third party web sites in order to “provide personalized content for their users based on social information about those users that is maintained by, or otherwise accessible to, the social networking system.” Facebook’s users generated this rich social information, worth many billions of dollars as recent quarterly earnings of the company attest.

 

In this way the entire Internet becomes Facebook. The totalitarian ambition here is obvious, and it can be read in the securities filings, patent applications, and other non-sanitized business documents crafted by the tech industry for the financial analysts who supply the capital for further so-called innovation. Everywhere you go on the web, with your phone or tablet, you’re a “user,” and your social network data will be mined every second by every application, site, and service to “enhance your experience,” as Facebook and others say. The tech industry’s leaders aim to expand this into the physical world, creating modulated advertising and environmental experiences as cameras and sensors track our movements.

 

Facebook and the rest of the tech industry fear autonomy and unpredictability. The ultimate expression of these irrational variables that cannot be mined with algorithmic methods is absence from the networks of surveillance in which data is collected.

 

One of Facebook’s preventative measures is United States Patent 8,560,962, “promoting participation of low-activity users in social networking system.” This novel invention devised by programmers in Facebook’s Palo Alto and San Francisco offices involves a “process of inducing interactions,” that are meant to maximize the amount of “user-generated content” on Facebook by getting lapsed users to return, and stimulating all users to produce more and more data. User generated content is, after all, worth billions. Think twice before you hit “like” next time, or tap that conspicuously placed “share” button; a machine likely put that content and interaction before your eyes after a logical operation determined it to have the highest probability of tempting you to add to the data stream, thereby increasing corporate revenues.

 

Facebook’s patents on techniques of modulating “user” behavior are few compared to the real giants of the tech industry’s surveillance and influence agenda. Amazon, Microsoft, and of course Google hold some of the most fundamental patents using personal data to attempt to shape an individual’s behavior into predictable consumptive patterns. Smaller specialized firms like Choicestream and Gist Communications have filed dozens more applications for modulation techniques. The rate of this so-called innovation is rapidly telescoping.

 

Perhaps we do know who will live in the iron cage. It might very well be a cage made of our own user generated content, paradoxically ushering in a new era of possibilities in shopping convenience and the delivery of satisfactory experiences even while it eradicates many degrees of chance, and pain, and struggle (the motive forces of human progress) in a robot-powered quest to have us construct identities and relationships that yield to prediction and computer-generated suggestion. Defense of individual privacy and autonomy today is rightly motivated by the reach of an Orwellian security state (the NSA, FBI, CIA). This surveillance changes our behavior by chilling us, by telling us we are always being watched by authority. Authority thereby represses in us whatever might happen to be defined as “crime,” or any anti-social behavior at the moment. But what about the surveillance that does not seek to repress us, the watching computer eyes and ears that instead hope to stimulate a particular set of monetized behaviors in us with the intimate knowledge gained from our every online utterance, even our facial expressions and finger movements?

 

Darwin Bond-Graham, a contributing editor to CounterPunch, is a sociologist and author who lives and works in Oakland, CA. His essay on economic inequality in the “new” California economy appears in the July issue of CounterPunch magazine. He is a contributor to  Hopeless: Barack Obama and the Politics of Illusion

 



[1] Central State Archives No 187603, Rolls 281-286 (Auschwitz)

No responses yet

Leave a Reply