Category Archives: History

The BlueSky FirEhose: Surveillance Vulnerability as Performance Art

A little bit ago, I warned of insecure architecture risks in BluEsky, which facilitate surveillance. On the other hand (as some have commented to me privately) there has been a ballooning number of “artists” visualizing what they can see with a federated protocol that offers “efficiency” for surveillance.

One of the core primitives of the AT Protocol that underlies Bluesky is the firehose. It is an authenticated stream of events used to efficiently sync user updates (posts, likes, follows, handle changes, etc).

Many applications people will want to build on top of atproto and Bluesky will start with the firehose, from feed generators to labelers, to bots and search engines.

In the atproto ecosystem, there are many different endpoints that serve firehose APIs. Each PDS serves a stream of all of the activity on the repos it is responsible for. From there, relays aggregate the streams of any PDS who requests it into a single unified stream.

This makes the job of downstream consumers much easier, as you can get all the data from a single location. The main relay for Bluesky is bsky.network, which we use in the examples below.

Their example code has given birth to a number of “artistic” endeavors. Here are but a few.

EmoJirain (I know, it’s supposed to say emoji, but who doesn’t see this as emo?)

A script surveills Bluesky to dump out all the emoticons

RainBowsky (I know, it’s supposed to say rainbow, but the Russian in me sees bowsky):

A script surveills BlueSky to draw a stripe every time it finds a color

InTothEbluEsky:

A script surveills Bluesky and prints messages vertically

FirEhose3D:

A script surveills Bluesky and prints text into a rotating box

NightSky:

A script, which obviously should have been named Blacksky, surveills Bluesky and prints conversations as dynamic white dots

Need I go on?

FinalWords prints all the text being deleted so there’s a record of things people want to make disappear, 3D Connections is a graph of everyone’s associations, Emotions is a live display of sentiment online…

Whee! Surveillance features can be repackaged as creative tools.

These “artistic” visualizations aren’t just pretty pictures, they offer live demonstrations of mass surveillance capabilities:

  • EmoJirain and BluEskyEmo show real-time monitoring and classification of user emotional expression
  • RainBowsky and InTothEbluEsky prove continuous scanning and pattern matching of all user content
  • FirEhose3D and NightSky demonstrate real-time tracking of user activity and interaction patterns
  • 3D Connections maps personal relationships and social networks across the entire platform
  • FinalWords archives deleted content that users specifically wanted removed
  • Emotions conducts mass-scale sentiment analysis of the entire user base

Each tool leverages the same centralized firehose of user data, just with a different veneer painted over surveillance capabilities.

While today we see emoji rain, tomorrow the same firehose could be used for… behavior pattern analysis and user profiling, network mapping of user relationships and communities, content monitoring for any topic of interest, real-time tracking of information spread, mass collection of user metadata (post times, devices, engagement patterns)… oh, hold on, that’s already happening.

The artistic expressions are processing the entire firehose of user activity, and who knows where they are physically, with a “friendlier” output than the operators of the infamous room 641a of San Francisco.

Thus the firehose feature fundamentally creates a broad attack surface by design and we are seeing it deployed. Bluesky, or is it BlueSky, …FireHose or FirEhose? Either way we’re literally talking about intentional access to all user activities. The architectural choice to create a centralized “firehose” of all user activity fundamentally undermines claims of decentralization.

Who ordered the complete visibility into centralized user behavior at scale?

Well, as they say in the docs, “relays aggregate the streams…into a single unified streambecause why?

rsc := &events.RepoStreamCallbacks{
  RepoCommit: func(evt *atproto.SyncSubscribeRepos_Commit) error {
    fmt.Println("Event from ", evt.Repo)
    for _, op := range evt.Ops {
      fmt.Printf(" - %s record %s\n", op.Action, op.Path)
    }
    return nil
  },
}

I’ll say it again.

Why?

The simplicity of the BluEsky example code isn’t just poor documentation about the risks, it clearly reflects an architecture decision to increase “efficiencyagainst privacy protection.

Look mom, just three lines of code is all it takes for you to tap into every user action across the platform!

While the example code shows how to technically connect to a centralized stream, it more importantly raises obvious critical security considerations that everyone should consider. I’m not exposing vulnerabilities in code — because that probably makes everything worse right now — but rather talking here about management decision to push “efficiency” into an architecture that begs surveillance and abuse.

  1. Volume of data
  2. Storage and processing of user activity data
  3. Authentication and rate limits
  4. Abuse of streams

The fact “art” is the motive, instead yet of targeted assassinations or mass deportations, doesn’t make BlueSky publishing code and docs for surveillance any less concerning.

This wouldn’t be the first time surveillance was dressed up in artistic clothing without explanation. In fact, the parallels to history are striking.

Recently I spoke with survivors of the East German Stasi infiltration of artistic communities (1970s-1980s). The state police saw cultural spaces such as galleries as opportunities for surveillance, especially related to cafes like Potsdam’s HEIDER.

The “avant-garde” artists actually worked as informants. This was arguably and extension of the Soviet Composers’ Union that monitored artistic expression.

Ok historians, let’s be honest here, this problem hits much closer to home than Americans like to admit. President Jackson and President Wilson were horrible abusers of surveillance, infamously using state apparatus to intercept and inspect all postal mail and all telephone calls. But we’re really talking about modern precedents like the GCHQ and NSA operation Optic Nerve 2008-2010 on Yahoo (years after I quit, please note) that sucked up a firehose of webcam images in a state-sponsored “art project”. And then the Google Arts & Culture face-matching app (2018) collected massive amounts of biometric data under the guise of matching people to classical paintings…

Wait a minute!

Optic Nerve (2008-2010) predated the ImageNet competition (2009-2017), based on unethical privacy violations by a Stanford team, that sparked the “big data” revolution we’re now swimming in.

Are we seeing history rhyme again with BlueSky’s “artistic” firehose? Surveillance keeps reinventing itself while using the same playbook.

Something smells rotten in BluEsky, and no amount of that EmoJirain is going to mask it for those who remember past abuses.

Peregrine Technologies: When State Surveillance Works Exactly as Intended

A former elite gymnast who claims he “tracked ISIS recruits with Palantir in Syria” now wants to be the definitive judge of “where criminals come from” in America. Let’s talk about what his Peregrine-themed company really means…

Adrenaline. Not calm and reasoned thought. Not justice and transparency. Adrenaline.

His Peregine code has leaked, revealing the same dangerously flawed logic as used in Iraq, Afghanistan, Syria… to create ISIS.

def surveillance_feedback_loop(population):
while True:
# Step 1: Deploy mass surveillance
# Just like COINTELPRO watching breakfast programs
targets = identify_potential_threats(population)

# Step 2: Create pressure on communities
# See: Every failed counterinsurgency campaign ever
surveilled_groups = apply_monitoring(targets)

# Step 3: Generate radicalization
# Creating tomorrow's threats ensures today's profits
new_threats = fragment_communities(surveilled_groups)

# Step 4: Use new threats to justify expansion
# Capitalism meets Kafka
population = expand_surveillance(population, new_threats)

# Results: Mission Accomplished
yield {"surveillance_expanded": True,
"threats_increased": True,
"public_safety": None,
"quarterly_profits": "Record Breaking"}

To put it plainly, there were four Palantir profit models used abroad to increase dangers, which are being transferred domestically to America by a spin-off called Peregrine.

  1. Initial Deployment
    • Claimed: “Identify ISIS recruits”
    • Actually: Targeted entire communities
    • Result: Created collective punishment… PROFIT!
  2. Community Impact
    • Claimed: “Prevent radicalization”
    • Actually: Fragmented social structures
    • Result: Increased isolation and alienation… PROFIT!
  3. Threat Generation
    • Claimed: “Reduce extremism”
    • Actually: Created conditions for recruitment
    • Result: Generated the terrorists they claimed to be tracking… PROFIT!
  4. System Response
    • Claimed: “Adapt to threats”
    • Actually: Expanded targeting
    • Result: Accelerated the cycle… PROFIT!

The playbook is clear:

  • In Syria: Label communities as “ISIS suspects”
  • In America: Rebrand activists as “extremists”
  • The result? Same as Nixon’s era, just with AI-generated PowerPoint slides.

The rising cost of floggings will continue until morale improves.

Peregrine isn’t just replicating an abroad failed system domestically. They’re replicating a system that succeeded at:

  • Generating own justification — the infamous self-licking ice-cream cone (SLICC) of military history
  • Creating the threats it claimed to prevent
  • Expanding control through manufactured crisis

The Syria deployment revealed an unstated goal of expanding surveillance infrastructure through threat generation.

A User’s Guide to Hidden Success in Overt Failure

Hey Peregrine people, let’s talk about this exciting new “integrated law enforcement platform” vacuuming up citizen data across the nation like Woodrow Wilson’s nationalization of telephone lines to disenfranchise his opponents (e.g. non-whites, labor unions) from government.

But first, a quick pop quiz about how integrated law enforcement platforms work in practice:

Q: The FBI had MLK under comprehensive surveillance for years. How’d that work out?

A: They recorded his conversations, tracked his movements, infiltrated his organization… and completely failed to prevent his assassination. But hey, they did manage to send him a letter suggesting he commit suicide, so there’s that “data-driven impact” for you.

Speaking of surveillance and psychological manipulation, do you remember when Russian intelligence surveilled Olympic athletes and sent them targeted messages to destabilize their mental health and knock them out of competition?

In 2016, Russian military intelligence selectively leaked medical records and sent personalized messages to athletes, trying to push them to mental breakdown or even suicide.

Can your system yet convince people to kill themselves? Russia really wants to know.

They’ve already demonstrated how surveillance plus competitive targeting equals psychological warfare. I mean I’m very sure a hyper-aggressive competition-minded gymnast’s “integrated law enforcement platform” would never be used in such a way that we already have seen over and over again…

Greatest Hits of Peregrine Predecessors

Let’s review some other spectacular examples of safety technology succeeding at being used for oppression while failing at… safety:

COINTELPRO (1956-1971): Meticulously documented Black Panthers feeding children breakfast

SHAMROCK (1945-1975): Read millions of telegrams to harass civil rights leaders

Today: Exxon contractors hack climate activists. Because nothing says “public safety” like targeting people trying to prevent planetary disaster.

Technology Changes, Patterns Don’t

The Palmer Raids (hat tip to a comment by “Not Nick Noone“) used then-cutting-edge telephone surveillance and census data to round up political dissidents while actual bombers remained at large. Sound familiar, Peregrine?

Remember when IBM’s punch cards made the Holocaust more “efficient”? But don’t worry, this time the data lives in micro services not punch cards, so it’s totally different.

Austria’s census data enabled perfect targeting of Jewish communities. But hey, at least their data integration was on point.

Syria’s surveillance infrastructure came with great Western tech support. Those monitoring centers had excellent uptime!

Peregrine’s Innovation in White-washing

Now here’s Peregrine, with glossy brochures selling a shiny future of policing like nobody remembers:

  • Multi-agency data sharing (like Operation MINARET’s illegal intel sharing)
  • Automated targeting (like Japanese internment’s IBM cards)
  • Real-time surveillance (like COINTELPRO’s activist tracking)
  • Predictive analytics (like McCarthy era blacklisting)

But don’t worry, this time it’s different because… failed disastrously in the Middle-East first? Cloud computing? Machine learning?

A nicer font?

Show me some actual safeguards against abuse. None of their story adds up to a better future.

The Peregrine Product: Foreign Spying Failures Applied at Home

Want to know what this technology is actually really good at, and not by accident?

  • The census helped round up Japanese Americans for internment
  • Telegraph monitoring helped harass civil rights leaders
  • Phone tapping helped suppress labor movements
  • License plate readers helped target immigrant communities
  • Exxon’s hackers helped disrupt environmental litigation

Watch the Peregrine CEO, a former elite gymnast, start to tell press that he really wants to push beyond rushing criminal convictions through courts and into becoming the definitive judge of all societal ills, defining “where criminals come from“…

I try to have a lot of adrenaline for the competition.

Historians, this is your cue. We’ve studied this many times before, and it never ends in happy ever after or “and then everything was fine.” A former gymnast honed in adrenaline-fueled competition… applies his training and “embedded” militarized experience into mass domestic surveillance and predictive policing. What could possibly go wrong?

Notice the tired and sad pattern here? Every single adrenaline-driven “innovative” surveillance system excelled mainly at controlling targeted populations to “win” in rushed competitions, while failing at its stated security purpose.

The gymnastic co-founder proudly boasts he tracked ISIS recruits with Palantir in Syria, which means he hasn’t been held accountable yet for creating the terrorists he claimed to be preventing.

No joke. Not an exaggeration.

The Peregrine co-founder literally could be charged with unsubstantiated accusations abroad. Just think, if he hadn’t been able to get away with Palantir harms like causing a rise in terrorism, and instead held accountable, he wouldn’t be hawking a domestic version of the same system expected to end in yet another societal disaster.

Recently uncovered documents show Senator McCarthy’s infamous list of 205 communists was actually from his monthly bar tab. Turns out the “Red Menace” was just his favorite cocktail during legislative happy hour.

Learn History or the Results Never Change

1950s: “Wire taps will stop communists!”
Result: Blacklisted actors, missed spies

1960s: “Surveillance will prevent violence!”
Result: Harassed civil rights leaders, missed terrorists

2024: “Peregrine will transform data into impact!”
Coming Soon: Targeted activists, missed threats, record profits

The Only Thing We Learn…

The NYPD’s demographic unit spent years mapping Muslim communities after 9/11. Did it prevent any terrorism? No. Did it destroy community trust and create detailed data for targeting minorities? You bet!

Now Peregrine wants to “optimize resource allocation” with the same capabilities that have consistently optimized oppression while failing at safety.

Peregrine’s Future is Written in the Past

Every single time we’ve built these systems, they’ve failed at their stated purpose while succeeding spectacularly at political control. But I’m sure Peregrine’s version is so different because they were born out of Palantir’s total failure and pivoted on terms like domestic “data-driven” and “real-time analytics” to more quickly incarcerate citizens into a Kafkaesque fever dream.

Here we are in 2024, watching a gymnast who helped create the threats he claimed to prevent in Syria perform his next routine: selling that same failed system to control Americans. The military-industrial-congressional-complex judges might give him perfect scores, but history already knows how this performance ends.

But hey, at least the dashboards destroying society are pretty.

…right?

Just ask Syria.

Remember: These systems don’t fail at threat detection.
They succeed at threat creation.
That’s not a bug.
That’s the business model.

Tesla Survivalist Marketing: From African Mercenary Failures to Piedmont Cybertruck Deaths

When the disgraced men of Colonel “Mad Mike” Hoare stood trial in 1982 for a failed mercenary operation in the Seychelles, he justified their actions by claiming to be “the bastion of civilization in Africa” fighting against what he called an “onslaught” of Blacks refusing to obey.

Militant survivalist British mercenaries hoping to overthrow Seychelles government, seen here in their usual garb, failed to even make it past the airport lounge. They were sentenced to death and then deported to South Africa after paying a large fine. Source: 17316220 Shutterstock

Hoare’s mercenary force, the “Wild Geese,” embodied a militant survivalist ethos popularized in certain South African circles during the Cold War.[1]

Mike Hoare “Wild Geese” patch of the anti-democratic militant coups by white nationalist mercenaries… as rendered by an artist in 2019.

This wasn’t happening in isolation, and rather in concert with wider efforts to spread white nationalist thinking around the world. In 1940, Elon Musk’s grandfather was arrested in Canada as a national security risk for his leadership role in the “Technocracy” movement of extreme racism. Despite having built himself an elite life with a 20-room home and private aircraft, he fled to South Africa specifically to help lead a newly established post-WWII apartheid regime… building an even bigger home and more private aircraft on the back of state-sanctioned racism. His vision of a technologically-enforced white ethnostate for his children and grandchildren would echo through generations, and set the stage for his grandson Elon Musk’s push into the same vision.

By 1988-89, as apartheid crumbled under international pressure for democratic reform, wealthy beneficiaries of the system rushed to move their assets internationally. The Musk family, by their own account, hurriedly sold everything and moved their racist pile of wealth to Canada, following a common pattern of capital extraction before a racist regime’s collapse. This mirrored earlier patterns of flight by others, such as Peter Thiel’s parents, who profited immensely from racist extraction systems and sought to avoid accountability after war and during democratic transitions.

Today, these survivalist themes have evolved into something more insidious: a sophisticated form of technological fraud that preys upon the same fears and desires that once made advance-fee schemes so effective.

Just as “Nigerian prince” scams targeted educated professionals by exploiting their specific blind spots about international finance and wealth extraction, today’s marketing of “apocalypse-proof” vehicles exploits educated consumers’ technological blind spots.

A single police officer in 1994 killed Nazi domestic terrorists (AWB) who had been driving around shooting randomly into houses in Black neighborhoods. Their death was headline news at the time, because AWB had promised civil war to forcibly remove all Blacks from government, yet instead ended up dead on the side of a road

Doctors, lawyers, and other highly trained professionals who would never fall for a crude email scam find themselves vulnerable to slick presentations about fake “full self-driving” and fake “bulletproof” vehicles — precisely because their expertise in other fields doesn’t transfer to evaluating complex engineering claims.

The Cybertruck represents a masterclass in this kind of deception. Its highly targeted disinformation pitches transform military survivalist themes of white nationalism into a consumer product while playing on the same psychological vulnerabilities that make advance-fee fraud so persistent.

Elon Musk had the sudden 1994 death of Nazi (AWB) terrorists in mind when he marketed his Swasticar as bullet-proof

Just as scammers promise vast riches for a small upfront investment, the Cybertruck promises “invincibility” for the price of a luxury vehicle to those prone to believing in a rapid elevation in selfish privilege. The same worldview that once described “wild humans” below private aircraft now markets vehicles as futurist personal fortresses against imagined threats — but beneath the poorly-designed false promises and dangerously-poor quality lies a deadly bait-and-switch.

The tragic deaths of three college students in Piedmont, California in November 2024 throws Elon Musk’s whole deception strategy into stark relief.

Tesla design failures allegedly cause an unpredictable veering into trees and poles, causing catastrophic fires that trap occupants and kill them. Three young Piedmont students were burned to death in this Cybertruck, among the nearly two dozen people killed by Tesla in October and November alone. Image source: Harry Harris

The Cybertruck, perhaps directly related to the fraud of its marketed indestructibility, abruptly “veered” off Hampton Road in the early morning hours, struck a tree and concrete wall, and burst into flames. This crash fits within a pattern familiar to experts in technological fraud: victims, believing in promised protections, take risks they otherwise wouldn’t for future promised gains that turn only into massive losses.

Perhaps most notably, the doors failed to open after the crash, killing the Cybertruck occupants by preventing escape — burning them to death like the cruel 1982 Operation Blanket of Lesotho (South African police invaded a neighboring country, rolled anti-apartheid refugees into plastic blankets and lit them on fire).

Just as a mark might drain their savings believing in guaranteed returns from an African prince, Cybertruck owners throw money at false confidence in their vehicle’s supposed “privileged survival” design.

The latest crash isn’t unique to one Tesla model, but rather a well-known pattern for those reading the notes in Tesla’s rapidly rising death toll in every model. The National Highway Traffic Safety Administration (NHTSA) and National Transportation Safety Board (NTSB) are now investigating this predictable tragedy of Tesla. The Cybertruck has seen six recalls and three previous investigations of the vehicle this year alone, including an August 2024 crash in Texas with eerily similar characteristics that really should have “grounded” all Tesla vehicles… to save lives from fraud.

The even bigger through-line from 1980s South Africa to modern Silicon Valley reveals a consistent pattern and origin of the tragedy: sophisticated fraud schemes that exploit specific blind spots in otherwise capable people’s knowledge. From Hoare’s mercenaries believing that they could overthrow a government dressed as a “beer-drinking tourist party,” to wealthy Musk and Thiel families believing they could permanently extract wealth ahead of democratic transitions, to today’s marketing of “apocalypse-proof” consumer products, there is a theme that stays constant. The victims change, but the exploitation of targeted ignorance persists.

The Piedmont tragedy thus raises urgent questions about how racist 1980s South African-themed marketing narratives are showing up in the 2020s to influence risk perception, particularly among communities like Piedmont that desire “safety” so badly they fall victim to a snake oil salesman. When vehicles are marketed to wealthy families as virtually indestructible, it may create a false sense of future gains that sets them up instead for a tragic end, like the American Vietnam vet who was shot up and barely survived following Hoare’s failed coup attempt. The fact that this crash occurred at 3 AM, with young college students home for Thanksgiving break, suggests the deadly potential of combining buggy software, buggy hardware, and marketing that emphasizes the exact opposite of reality — the unmistakable bogus elixr of mystical invulnerability in a cooked-up vision of false threats.

As Captain Chris Monahan of the Piedmont police noted, they are “looking into actions that occurred before the collision.” But beyond the specific circumstances of this crash, we must examine the broader implications of marketing military-grade protection to civilian communities. Piedmont is known for its 0% Black population demographic surrounded by communities with 30% Black residents. Does anyone really think marketing to this community wouldn’t influence how people there — particularly young people — perceive risk as a function of their race-based privilege?

The candles and handmade cards left at the Cybertruck fatal crash scene tell a different story than the glossy survivalist marketing. They remind us that nobody who dons a stainless steel Tesla version of the white X robe is truly invincible, no racist burning cross is an actual safety act, and that the cost of believing such things can be devastatingly high.

The KKK in 1921 violently kept union workers and Blacks from settling into Piedmont, California. The X (e.g. the rebrand of Twitter) was the symbol of violent extremism, painted on tail-fin of planes like those used to firebomb Tulsa, as well clearly sewn onto their robes.

As investigations continue and the Piedmont community mourns, we must consider how the white flight mindset of survivalist marketing narratives have evolved from Hoare’s era to today — and more importantly, how they might influence decisions that put lives at risk. The same racist-driven swagger that led Hoare’s “Wild Geese” to disaster has been repackaged into a consumer product, but the potential for tragedy remains. Instead of getting themselves shot-up in a firefight trusting Elon Musk’s grandfather in 1981, these kids were driven by Elon Musk straight into a tree and burned alive in 2024.

For the sake of future young lives, we must look past false narratives of mystical indestructibility – whether they come from white African technocrats, white African mercenaries, or white African manufacturers promising a trip to Mars — and recognize that true safety comes not from racist narratives of apocalyptic survival, but from building democratic institutions that allow for actual risk science, known as peaceful reform and representation.


[1] “Cooked Goose”, Time Magazine, Monday, Aug 09, 1982 (provided here for reference from an original printed copy)

“Mad Mike” gets ten years.

During his five-month trial, Colonel Thomas Michael (“Mad Mike”) Hoare, who gained notoriety while soldiering for fortune in the Congo during the 1960s, put up a plucky front. During recesses Hoare entertained visitors with tales of his derring-do and signed copies of his swashbuckling biography, entitled Congo Mercenary. But last week the bravado was gone from the man who used to run a swaggering group of commandos in the Congo who called themselves the Wild Geese. His face ashen, Hoare, 63, slumped in his chair in a Pietermaritzburg courtroom as Judge Neville James found him and 42 fellow mercenaries guilty of airplane hijacking and sentenced Mad Mike to ten years in prison.

Hoare and his mercenary band of brothers were forced to stand trial following their bungled attempt last November to overthrow the socialist government of the Seychelles led by President Albert René. The armed mercenaries entered the Seychelles disguised as a beer-drinking tourist party, “The Ancient Order of Froth-Blowers.” Hoare’s objective was to return to power ex-President James Mancham, 49, a pro-Western leader who was deposed by René in a 1977 coup.

But the operation failed when a Mahé airport customs inspector found a weapon hidden in a Froth-Blower’s luggage. A gunfight broke out at the airport, in which one mercenary was killed and several oth ers wounded. Desperate to escape, the raiders fought their way to the control tower, guided an incoming Air India 707 to a landing and commandeered the plane. They forced the Air India pilot to fly them 2,500 miles across the Indian Ocean to Durban.

Lawyers for Hoare argued that the mercenaries had harmed no one nor demanded any ransom. Indeed, the government had initially released most of the men after their flight to South Africa, holding only Hoare and four others on the lesser charge of kidnaping, which carries no minimum sentence. But that leniency was abandoned after other nations, including the U.S., warned that South Africa could be struck from air-travel routings unless Pretoria enforced international agreements against harboring of air hijackers. The government then brought hijacking charges against all 43 of the escaped mercenaries.

Only one was declared not guilty last week: Charles William Dukes, an American veteran of Viet Nam, who was carried onto the 707 under heavy sedation after being seriously wounded during the Seychelles gunfight. He was ruled incapable of having taken part in the heist.

Throughout the trial, the Irish-born Hoare insisted that his operation had had the blessing of the South African government. “I see South Africa as the bastion of civilization in an Africa subjected to a total Communist onslaught,” he said. “I foresee myself in the forefront of this fight for our very existence.” Indeed, more than half of the convicted mercenaries had been members of either the South African Defense Force or the army reserve. There was also evidence that Soviet-made AK-47s and Chinese grenades and ammunition used by the mercenaries had been supplied by South African Defense Force officers.

Judge James declared that individuals in the National Intelligence Service and Defense Force had clearly known about the operation but, nonetheless, ruled that allegations of an official South African connection to the operation were “purely hearsay.” The day after the trial, Prime Minister P.W. Botha, who had refrained from commenting until the legal proceedings were completed, insisted that the government had not known of the affair. He charged that Hoare had approached members of the intelligence and military forces with his plan and admitted that arms and ammunition had been given to him. Botha said that “departmental action” would be taken against anyone who had cooperated with Hoare.

The colonel, who got his rank in the Congo, drew the stiffest sentence. His fellow raiders were given from six months to five years, and the judge later reduced most to six months. Hoare and his co-defendants were clearly the lucky ones. Last month four of Hoare’s soldiers of fortune who were left behind in the Seychelles were convicted of treason by René’s government. They are under sentence of death by hanging.

Nazi Hipsters on Soviet Mopeds: Extremist AfD Ressurects the Dirty Simson

In the 1890s, Germany pioneered electric bikes, launching a legacy of sustainable transportation innovation. Yet today, in an ironic twist, Germany’s Nazi party (AfD) has elevated a polluting relic of Soviet engineering into a cultural battleground symbol.

As Germans increasingly embrace efficient, affordable electric two-wheeled transportation, Nazis (AfD) have seized upon an unlikely symbol of resistance: the primitive, polluting two-stroke Simson engines manufactured in East Germany. This embrace of DDR-era technology by a nationalist party reveals a deeper political strategy.

The irony is striking: while electric bikes represent Germany’s authentic heritage of proud innovations, the AfD has chosen Soviet-bloc mopeds as symbols of “traditional” German identity. This dubious appropriation appears deliberately provocative — these engines, which fail modern emissions standards by spectacular margins, serve as perfect vehicles for the AfD’s broader assault on regulations and regulatory authority itself.

Obsolescence makes these mopeds ideal political props for the politically obsolete Nazis. An inability to meet basic standards transforms them from mere vehicles into symbols of false victimhood, grievance and attempted defiance against time itself, not to mention modern governance.

I have firsthand experience with these machines, having spent years modifying an Italian moped from the 1980s. The technology was fundamentally flawed even then. The two-stroke engines release up to 30% of their fuel unburned directly into the air, mixing oil with gasoline to create dramatically higher pollution levels than four-stroke designs. When Simson attempted a more sensible four-stroke update with the SR50/4 in the 1990s, it was snubbed by traditionalists, a perfect metaphor for the AfD’s stance. The more weak and unhealthy a technology, the more ardently they embrace it as a symbol of resistance.

The AfD’s embrace of obsolete technology reveals another layer of historical ignorance. Nazi Germany was crippled by technological backwardness, particularly its heavy reliance on horses. Nearly 80% of the Nazi military depended on horse transport during WWII, lacking reliable access to modern fuel and engines. This technological deficit was a key factor in their defeat by 1942, though Hitler prolonged the war purely to continue his genocidal campaign. The historical irony is sharp: while the AfD claims to champion German technological tradition, they mirror the Nazi regime’s fatal embrace of outdated transportation methods — just replacing horses with Soviet mopeds. Nazis…can Nazi the future.

Freund Pferd or “Our Friend the Horse” by Rolf Roeingh as published in 1941 by Deutschen Archiv-Verlag in Berlin.

Like their Nazi predecessors, the Nazis today (AfD) build power by twisting historical symbols into nonsensical propaganda. They appropriate whatever serves their disruptive agenda, regardless of historical accuracy or internal contradiction. The fact that Germans pioneered electric vehicles in the 1800s makes any “traditional” stance against the modern technology particularly absurd; yet another example of blowing their bets on the wrong horse.

The AfD’s appropriation of the Simson becomes even more cynical when considering the moped’s original design philosophy. The designer’s own grandson reveals the bitter irony[1]:

What does the Simson designer actually think about his moped being exploited by right-wing groups? Clauss Dietel designed the Simson models S50 and S51.

Unfortunately, BuzzFeed News Germany can no longer ask him, as he passed away in 2022. His grandson Bruno Dietel did not want to comment on the topic when we approached him.

In a post on X/Twitter, he writes that the moped’s design was based on the so-called ‘open principle,’ a ‘solidary, ecological, democratic design concept.’ Simson is being ‘wrongfully misused and annexed as a symbol.’ ‘My grandfather experienced the Nazi era in Saxony and in his final years was very concerned about the resurgence of totalitarianism. What’s happening in the Simson context would have deeply outraged him.’

This calculated provocation, using an environmentally conscious designer’s work as a symbol of anti-environmental protest, exemplifies the broader AfD strategy. Nazis deliberately misappropriate symbols to generate outrage, treating German cultural heritage as merely raw material for political theatre.

Their visual branding follows the same cynical logic. Their red ‘swoosh’ logo deliberately contrasts with the German Reichstag’s considered and thoughtful blue, suggesting violent disruption to any democratic process.

The German AfD red logo signals leaving blue to put red Nazis back in power, invoking “just do it” Nike campaigns.

Also, I swear that logo wasn’t designed intentionally to look like a giant red horse penis attached to a swastika man. Pure coincidence.

The Simson story exemplifies how the AfD weaponizes nostalgia against progress. While electric motors offer traditional German solutions to contemporary mobility needs, the AfD transforms them into cultural battlegrounds. Their embrace of anemic polluting Soviet-era mopeds has nothing to do with transportation policy — it’s about manufacturing outrage. The more harmful or obsolete a technology, the more valuable it becomes as a symbol of resistance to modern environmental and social standards.

The path forward may lie in Clauss Dietel’s original vision of modernity, the “open principle” of democratic, ecological design that respects heritage while embracing progress. His Simson vision represented an attempt to bridge East and West, old and new. That his creation has been twisted into a symbol of extreme division would have outraged him, but perhaps not surprised him. After all, he had seen Nazis put on this show before.

A 1980s Soviet export brochure marketed the S51 as a marvel of modern global engineering (click on the image for an English PDF)

[1] “Höcke und die AfD feiern ostdeutsche Kultmarke – die reagiert empört: „Missbrauch““, Frankfurter Rundschau, 12.11.2024. (https://www.fr.de/panorama/simson-moped-ostdeutschland-bjoern-hoecke-afd-kultmarke-partei-rechtsextrem-fans-zr-93283765.html)