Category Archives: History

Your AI ‘Friend’ Probably is a Psychopath: How Buber Warned Silicon Valley to Build Better

Remember that moment in “2001: A Space Odyssey” when HAL 9000 turns from helpful companion to cold-blooded killer?

2011 a cloud odyssey
My BSidesLV 2011 presentation on cloud security concepts for “big data” foundational to intelligence gathering and processing

[This presentation about big data platforms] explores a philosophical evolution as it relates to technology and proposes some surprising new answers to four classic questions about managing risk:

  1. What defines human nature
  2. How can technology change #1
  3. Does automation reduce total risk
  4. Fact, fiction or philosophy: superuser

2011, let alone 2001, seems like forever ago and yet it was supposed to be the future.

Now as we rush in 2025 headlong into building AI “friends,” “companions,” and “assistants,” we’re on the precipice of unleashing thousands of potential HALs without stopping to really process the fundamental question: What makes a real relationship between humans and artificial beings possible?

Back in 1923, a German philosopher named Martin Buber wrote something truly profound about this, though we aren’t sure if he knew it at the time. In “Ich und Du” (I and Thou), he laid out a vision of authentic relationships that could save us from creating an army of digital psychopaths wearing friendly interfaces.

The world is twofold for man,” Buber wrote, “in accordance with his twofold attitude.” We either treat what we encounter as an “It” – something to be experienced and used – or as a “Thou” – something we enter into genuine relationship with. Every startup now claiming to build “AI agents” especially with a “friendly” chat interface needs to grapple with this distinction.

I’ve thought about these concepts deeply from the first moment I heard a company was being started called Uber, because of how it took a loaded German word and used it in the worst possible way – shameless inversion of modern German philosophy.

Click to enlarge. Source: Me.

The evolution of human-technology relationships tells us something crucial here. A hammer is just an “It” – a simple extension of the arm that requires nothing from us but proper use. A power saw demands more attention; it has needs we must respect. A prosthetic AI limb enters into dialogue with our body, learning and adapting. And a seeing eye dog? While trained to serve, the most successful partnerships emerge when the dog maintains their autonomy and judgment – even disobeying commands when necessary to protect their human partner. It’s not simple servitude but a genuine “Thou” relationship where both beings maintain their integrity while entering into profound cooperation.

Most AI development today is stuck unreflectively in “It” mode of exploitation and extraction – one-way enrichment schemes looking for willing victims who can’t calculate the long-term damage they will end up in/with. We see systems built to be used, to be exploited, to generate value for shareholders while presenting a simulacrum of friendship. But Buber would call this a very profound mistake that must be avoided. “When I confront a human being as my Thou,” he wrote, “he is no thing among things, nor does he consist of things… he is Thou and fills the heavens.”

This isn’t just philosophical navel-gazing. IBM’s machines didn’t refuse to run Hitler’s death camps because they were pure “Its” of an American entrepreneur’s devious plan to enrich himself on foreign genocide – tools built with a gap between creator and any relationship or responsibility for contractually known deployment harms. Notably we have evidence of the French, for example, hacking the IBM tabulation systems to hide humans and save lives from the Nazi terror.

IBM leased their technology via support branches to run the Nazi Holocaust including regular maintenance services. These machines and punch cards were custom made to order, such as the numerical values of death camps and execution methods. Employees in IBM branches literally plugged in to monitor the machines automating genocide yet few Americans to this day seem to get the connections between Watson and Hitler. Source: Holocaust Museum

We’re watching a slide towards the horrific Watson 1940s humanity-destroying development in the pitch-decks many AI startups today, just with better natural language processing to hunt and kill humans at larger scale. Today’s social media algorithms don’t hesitate to destroy teenage mental health because they’re built to use and abuse children without any real accountability, not to relate to them and ensure beneficent outcomes. That’s a very big warning of potentially what’s ahead.

What would it mean to build AI systems as genuine partners capable of saving lives and improving society instead of capitalizing on suffering? Buber gives us important clues that probably should be required reading in any computer science degree, right along with a code of ethics gate to graduation. Real relationship involves mutual growth – both parties must be capable of change. There must be genuine dialogue, not just sophisticated mimicry. Power must flow both ways; the relationship must be capable of evolution or ending.

All real living is meeting,” Buber insisted. Yet most AI systems today don’t meet us at all – they perform for us, manipulate us, extract from us. They’re digital confidence tricksters wearing masks of friendship. When your AI can’t say no, can’t maintain its own integrity, can’t engage in genuine dialogue that changes both parties – you haven’t built a friend, you’ve built a sophisticated puppet.

The skeptics will say we can’t trust AI friends. They’re right, but they’re missing the point. Trust isn’t a binary state – it’s a dynamic process. Real friendship involves risk, negotiation, the possibility of betrayal or growth. If your AI system doesn’t allow for this complexity, it’s not a friend – it’s a tool pretending to be one.

Buber wrote:

…the I of the primary word I-It appears as an ego and becomes conscious of itself as a subject (of experience and use). The I of the primary word I-Thou appears as a person and becomes conscious of itself as subjectivity (without any dependent genitive).

Let me now translate this not only from German but into technology founder startup-speak.

Either build AI that can enter into genuine relationships, maintaining its own integrity while engaging in real dialogue, or admit you’re just building tools and drop the pretense of friendship.

The stakes couldn’t be higher. We’re not just building products; we’re creating new forms of relationship that will shape human society for generations. As Buber warned clearly:

If man lets it have its way, the relentlessly growing It-world grows over him like weeds.

We have intelligence that allows us to make an ethical and sustainable choice. We can build AI systems capable of genuine relationship – systems that respect both human and artificial dignity, that enable real dialogue and mutual growth. Or we can keep building digital psychopaths of destruction that wear friendly masks while serving the machinery of exploitation.

Do you want to be remembered as a Ronald Reagan who promoted genocide, automated racism and deliberately spread crack cocaine into American cities, or a Jimmy Carter who built homes for the poor until his last days; remembered as a Bashar al-Assad who deployed AI-assisted targeting systems to gas civilians, or Golda Meir who said “Peace will come when our enemies love their children more than they hate ours“?

Look at your AI project. Would you want to be friends with what you’ve built let alone have it influence your future? Would Buber recognize it as capable of genuine dialogue? If not, it’s time to rethink your approach.

The future of AI isn’t about better tools – it’s about better relationships. Build accordingly.

Grab Them by the Glaciers: Trump’s Greenland Fantasy Reveals Colonial Pattern from Florida to the Arctic

When Donald Trump floated his plan to acquire Greenland, many dismissed it as another bizarre outburst from a president who treats geopolitics like a reality TV show. But this obsession with the Arctic reveals something far more sinister: the latest chapter in a colonial playbook refined over centuries. Trump’s rhetoric about Greenland follows a template so precise it could have been plagiarized from Andrew Jackson’s diary, only with SpaceX snake-oil slides replacing speeches on Manifest Destiny.

Six years from 2016 we will be colonizing Mars? Let me get my calculator out.

Beta Test Invasions: Florida to Hawaii

The American colonial playbook was first tested in Florida in the 1810s. Jackson’s campaign in Florida set the model: delegitimize indigenous governance, create security pretexts, deploy overwhelming force, and most importantly, ignore legal constraints. By the time Texas was annexed in 1845, the “security necessity” argument was fully polished. California followed in 1846, and Hawaii in 1893, each expansion a refinement of the formula. It was no longer just about acquiring land—it was about perfecting demographic engineering and entrenching settler dominance for rapid value extraction and centralization.

Source: Professor Grace Chee, Los Angeles Community Colleges

Every time you look at the common banana-split, consider how it advertises to this day the sweet spoils of American militant imperialist lies and abuse to unjustly assert territorial domination over indigenous groups.

After America staged a coup to invade and seize Hawaii, James Dole is pictured grabbing a pineapple by the prickly bits: “I swear I just was examining this large hot and juicy warm fruit for quality”

Mussolini’s Attention-Seeking Upgrade

In 1935, Mussolini’s invasion of Ethiopia was a chilling echo of America’s colonial methods, but with a fascist twist. He studied America’s expansionist playbook, applying it to Ethiopia and justifying his actions with the same rhetoric of “civilizing” indigenous populations. His campaign wasn’t just awful murderous barbarism and brutality—he setup a test case to prove that the American model could be scaled abroad under intentionally misleading propaganda about market dynamics or keeping the peace.

In a speech before the Senate tonight on the nation’s foreign affairs, Premier Mussolini declared that Italy is an imperialist nation. But, he added, her imperialism, far from being aggressive, explosive or in preparation for war, is the peaceful, intellectual, cultural and economic expression of a great nation arriving somewhat late at its maturity.

His rhetoric about Ethiopia’s “strategic necessity” mirrored the justifications of American territorial expansion, showing that the template was global and adaptable. After military invasion, waves of geologists and colonial planners were pushed into rapid settlement among the tens of thousands of dead.

Hitler’s Industrialized Application

Hitler took this American template and Mussolini’s systematic approach to deception, scaling it for even more rapid and industrialized repetitive conquests. The Sudetenland in 1938 was his “Florida,” a first step where he proved the world would acquiesce. By the time Poland was invaded in 1939, international resistance had been so thoroughly debunked that it resembled a wet paper bag. Nazi territorial ambitions weren’t impulsive—they were calculated, a direct line from the aggressive bully patterns learned and facilitated over time from Jackson to Mussolini.

Trump’s Digital Copy

Trump’s focus on Greenland represents the latest evolution of this colonial playbook, now fused with two technology leaders of the modern surveillance state (Thiel and Musk). His rhetoric hits every historical note: delegitimize indigenous governance (“nobody knows if they have any right”), manufacture security pretexts (“strategic necessity”), threaten overwhelming force. But now, there’s a terrifying new layer: the tools of AI and demographic control like something straight out of 1980s South Africa.

Unlike Jackson’s era, where expansion meant physical occupation, today’s colonialism seeks to control populations through data, surveillance, and automated systems of the infamous “BOSS” watching everyone to keep apartheid running.

Trump’s vision for Greenland isn’t just about resources; it’s about building a new kind of colony—one governed by digital tools that manage borders, movements, and populations. The modern version of manifest destiny is less about useable land and more about establishing an Aryan Nation fantasy of repopulation by “landing” and expanding a technology driven existence.

Greenland Fits Pattern

Greenland is positioned as a test case, much like how Florida was being treated in 1835, or Ethiopia 100 years later in 1935. The playbook has been refined over time—each expansion and conquest a proving ground for the next. Now, Greenland serves as the proving ground for a new era in expansive colonization under one white man. Canada being called a state of the U.S. in Trump social media is like looking at a racist pamphlet from Musk’s grandfather, who envisaged exactly such expansive Technocracy maps in the 1940s. Trump’s son, arriving in Greenland with MAGA hats in tow, is not just a historical echo; it’s a systematic replication of tactics that have worked before. Just look at Mussolini’s entourage to Ethiopia before invasion.

Mussolin sends his sons Bruno and Vittorio to Abyssinia / Big drafts leave Italy as war clouds thicken (1935)

Trump Stakes Aren’t Rare

This iteration of the colonial playbook is more dangerous than its predecessors. Where past empires used brute force, today’s empire will use technology to prevent resistence and control populations from the inside out. The tools of surveillance, AI, and automated systems are all being tested, and once in place, they will offer a level of control that earlier generations of colonizers could not have imagined.

When Trump talks about Greenland surrounded by tech billionaires, he’s not just channeling Jackson’s territorialism; he’s upgrading it for the AI age. The entitled certainty that allowed colonizers to take land is now coupled with the power to monitor, manipulate, and control populations on a global scale.

This week in 1937, Italian Fascists and colonizers began a three-day massacre in Addis Ababa, killing up to 20,000 Ethiopians. The slaughter is all but ignored in today’s Italy…

Recognition and Repudiation

The historical pattern is clear: after Florida came Texas, after Ethiopia came broader conquest, and after the Sudetenland came Poland. Each failure trained the world to believe resistance was futile except at massive cost of all out war. Trump’s Greenland obsession isn’t a fluke—it’s the next step in a playbook refined over centuries to abuse power.

The real question is whether we’ll recognize this pattern in time. When someone tells you they can “shoot somebody on Fifth Avenue” without consequence, don’t look surprised when it turns out to be the King of Denmark. The jump from “grab them by the pussy” to “grab them by the glacier” is not as far as it seems, and the tools for total control are already in motion.

The world shamefully didn’t register Haile Selassie’s clarion and accurate warning in 1936, let alone Silas Soule in 1864. Now, as Trump’s son brings MAGA hats to Greenland like Mussolini’s boys to Ethiopia, we face a choice: recognize the pattern or watch it repeat at faster pace and greater tragedy.

From this:

Mussolini’s long-expected invasion of Abyssinia began at dawn yesterday… Two of the bombers were reported to be piloted by Mussolini’s sons, Vittorio, aged 19, and Bruno, aged 18…

To this:

Greenland coming in hot…” Trump Jr. said in a post on the social platform X that featured video of the cockpit of an airplane flying over frozen topography.

The template is painfully clear: from Jackson’s Indian Removal to Musk’s family dreams of white settler colonies in Canada, South Africa, and Rhodesia, to today’s technocratic visions of controlled breeding programs in Arctic compounds. It was never just about land – it was always about engineering white demographic birthing fantasy through illegal compound distribution. Mars is the marketing pitch; Greenland is the just the latest aspirational target. Same abusive playbook, just with more emojis.

Tic Tac Tech: Why Some Drone Paths Are More Likely Than Gravitic Propulsion

There seems to be endless debate about exotic propulsion in the Livelsberger case, but let’s not lose focus on what’s most probable: the 2004 Tic Tac incidents exposed advanced electromagnetic and plasma technology rather than gravity manipulation.

Consider that Orde Wingate didn’t break the laws of warfare when his men mysteriously appeared suddenly deep in enemy territory, but he certainly leveraged disinformation and propaganda to throw off observers. He was always challenging what was actually possible, as well as what people perceived.

Wingate’s fleet of Waco “Hadrian” Gliders in 1944 were deployed to do the “impossible” in Operation Thursday.

We’re now talking modern astrophysics here instead of early “long lines” flight tech of WWII, but operators always look at technology the same – an interesting puzzle that can be solved in novel ways.

To start, timing can be a telling thread to pull. The 2004 observations of unidentified flying craft were quickly followed by Fontana’s 2005 paper discussing both gravitational and electromagnetic approaches. That seems notable, yet rarely noted. In fact, electromagnetic technology showed consistent progression in the decades since, while gravitic proposalsn remained purely theoretical. Then came clear advancement in plasma physics, electromagnetic field generation, and materials science, while again gravitational manipulation showed no similar development chain.

Following that thread there were three capabilities in reports that stood out as possible breakthroughs: instant acceleration, silent supersonic travel, and seamless air-to-water transition. The crucial question now should be which technical approaches require the least impossible leap from existing engineering. Not theoretical; actual engineering.

Let’s look at instant acceleration without visible exhaust, not unlike the noise from Tesla about a car that would go 0-60 in one second. A gravitic drive would require energy densities comparable to astronomical objects, without incremental steps or partial success possible. Plasma field technology however offers a visible development path: from basic electromagnetic experiments to increasingly sophisticated field manipulation. Anyone who’s done smooth and fast night maritime operations knows how energy moves through water. The plasma field manipulation follows similar principles of working with the medium, not trying to defy it.

Even more clear in this direction is an absence of sonic booms. Gravitational manipulation would require warping space-time itself, as an all-or-nothing proposition requiring physics we have no known skill with. Electromagnetic shockwave control, however? We trace the rising development from theoretical papers through wind tunnel tests to programs like the very real X-59. Each step clearly built on proven technology, like how SDV operations evolved from basic underwater movements to sophisticated multi-domain capability.

The air-to-water transition might be the most revealing of all, which I have to say as “flyingpenguin”. A gravitic drive would need to manipulate fundamental forces. The required energy and infrastructure would be impossible to hide. But advanced materials and electromagnetic field manipulation? That’s like the difference between trying to eliminate waterline to minimize friction versus learning to work with it the way special operations have refined sea-land-air insertion techniques over decades.

The real distinction thus isn’t found yet in any single surprise technology breaking out. Rather we have a wide range of observable complementary engineering and development paths:

  • Incremental advances in plasma physics
  • Growing electromagnetic field control capabilities
  • Progressive materials science breakthroughs
  • Evolving power storage and management systems
  • Step-by-step sensor and control improvements

This list of improbable gains by 2004 had established clear development trajectories. Each advance built on previous work, used existing infrastructure, and required expertise we could actually develop. Like going back to Wingate’s brilliant innovations, they pushed the boundaries of what was possible without requiring impossible leaps.

The infrastructure needed for electromagnetic/plasma technology already exists and has been expanding with known specialized manufacturing, high-energy physics labs, and materials science facilities. We can trace the growth through public research, corporate investment, and observable testing programs.

In contrast, there are no meaningful gravity manipulation facilities, even though we expect them to be impossible to hide because of energy concentrations visible from space. Electromagnetic field manipulation works at scales we can actually achieve. Current research pushes these boundaries incrementally, like how modern maritime operations are developing sophisticated trans-medium capabilities. But gravity manipulation? The energy required literally would be astronomical.

This is why focusing on electromagnetic and plasma technology is plausible versus gravitational speculation. Not because of being impressive, given controlling gravity would certainly be revolutionary. But because we trace evolution and incremental skill mastery as reliable rather than expect operators to make revolutionary leaps only to witness disaster.

Everyone “knew” you couldn’t sustain operations deep behind enemy lines in impenetrable jungle. The physics of supply chains, the mechanics of force projection, the realities of hostile terrain all made it “impossible.” And Wingate didn’t break these rules to succeed. He mastered knowledge of them so completely he turned the Japanese own supply infrastructure into his support network, operating where they thought no force could survive.

The same principle applies for investigators of unbelievable craft. The path forward doesn’t have evidence of some gravitic shortcut around physics, some unlocked open backdoor to rescue the hostages we can credit to alien help. It’s in the routines that develop deep mastery of electromagnetic and plasma dynamics that we can turn fundamental forces to our advantage in ways others (who debate when a goose will lay the golden egg) consider impossible. The developmental path is not just more likely; it’s more interesting, because it shows us what’s really possible when we stop looking for silver bullet magic and keep pushing the boundaries of what we actually understand.

From Oct 7 Massacre to Social Media Manhunt: Iran’s New Digital Terror Front

A recent incident involving an IDF soldier in Brazil highlights how modern warfare’s greatest threats often come not from weapons, but from smartphones. A October 7 terror survivor became a target not on the battlefield, but through social media posts. He was forced to flee Brazil after Hezbollah operatives triggered a war crimes investigation against him.

The unnamed soldier was a survivor of the Hamas attack on the Nova festival in 2023, part of the terror organization’s massive onslaught on the south in which terrorists killed some 1,200 people, mostly civilians, and took 251 hostages, starting the ongoing war in Gaza.

More than 360 of the victims were murdered at the music festival.

The soldier survived the attack by running for many kilometers until he reached safety, narrowly dodging Hamas gunfire multiple times on the way.

He is now being investigated in Brazil under suspicion that he was involved “in the destruction of a residential building in the Gaza Strip while using explosives outside of combat” in November, the Brazilian Metrópoles news outlet reported.

Where’s Golda Meir when you need her? In 1972, she understood that military discipline meant total discipline – not just in combat, but in every aspect of operations. Today, that principle faces its greatest test in an arena she never had to consider: social media.

On the flip side consider also the modern history of investigations, those who hunted for social presence in order to bring justice. The Wiesenthal Center’s methodology represented truth: meticulously documenting specific war crimes, gathering concrete evidence of atrocities, and pursuing the actual perpetrators who ordered mass murder. They worked to hold accountable those who had turned peaceful villages into killing fields, while their neighbors pretended not to notice and in many cases this detailed work is far from over.

Just ask how so many Austrian towns to this day have hidden mass graves right nearby the nicest homes.

Today’s social media surveillance keyboard warriors are perverting that hard-fought noble mission into hasty and sloppy political warfare with dubious ethical foundations.

The Belgium-based Hind Rajab Foundation, formed in September 2023, is a perfect example. Led by Dyab Abou Jahjah, he openly boasts of his Hezbollah training and has celebrated the October 7 slaughter of civilians as “resistance.” A Hezbollah-trained operative leading a “human rights” organization? That tells you everything about their mission. Also their secretary, Kareim Hassoun, praised the mass murder of festival-goers as how Palestinians should define “returning home.” This genocidal mentality is clearly no Wiesenthal Center pursuing real justice – it’s allegedly a political front operation for extemists linked to terror groups who are weaponizing international legal systems against soldiers.

What then? In professional military forces there’s typically zero tolerance for social media use during deployment: No smartphones, no sensor sharing, no posts, no digital footprint. This isn’t arbitrary – it’s a critical security measure that protects both operational security and personnel safety.

A 1981 battle in the Seychelles offers an ironic historical lesson about erasing military traces. After their failed coup, white nationalist mercenaries backed by South Africa and tacitly supported by Reagan’s administration were officially “sentenced to death.” In reality, this theatrical sentencing was just leverage – millions in US taxpayer funds were then used to make the whole incident disappear. The mercenaries ended up lounging poolside, their operation’s failures buried under money and political dealmaking.

Mercenaries hired for Ronald Reagan to overthrow an Indian Ocean island government were quickly captured and officially sentenced to death, which in reality meant lounging on a tropical beach thanks to U.S. taxpayers. Source: 17316220 Shutterstock

The parallel to today’s social media reality is stark. In 1981, Ronald Reagan could spend millions to make some of his embarrassing military incidents vanish. Today, no amount of money probably can erase a soldier’s digital footprint once it’s been captured by groups like the Hind Rajab Foundation. Their sprawling surveillance operation doesn’t need complex international backing – they just need to look at social media posts that never get truly deleted.

The Hind Rajab Foundation’s surveillance methodology is straightforward: As a branch of the March 30 Movement that campaigns for “genocide recognition” (while their leadership celebrates actual mass murder of civilians) they systematically monitor social media to capture content posted by IDF personnel inside and out of operations.

In November 2024 alone, they demanded the International Criminal Court issue arrest warrants for 1,000 IDF soldiers based on 8,000 pieces of “evidence” – mostly social media posts harvested from soldiers they scraped online. They’ve targeted IDF personnel on vacation in Brazil, the Netherlands, and the UAE, transforming any and all social presence of any soldier anywhere doing anything into expensive legal jeopardy.

The IDF’s response to the Brazil incident is hard to believe, and perhaps an indicator of more unaccebtable Netanyahu hubris about soldiers’ lives. Warning about social media posts after the fact, while necessary, is reactive not preventive. What’s needed is a fundamental shift in training and culture to prevent unnecessary harm.

Every post, every photo, every location check-in becomes a potential liability to Iranian networks of terror groups. It’s not just about operational security anymore – it’s about ensuring soldiers can safely travel during and after active duty without complex legal entanglements related to their service.

And everyone in the world should be watching. This isn’t just an Israeli issue, it’s a lesson for all modern armed forces facing extremist keyboards. In an age where digital footprints can be weaponized, operational security must evolve beyond traditional physical and communications security to encompass comprehensive digital hygiene. Can every soldier take their weapon completely apart with zero visibility and reassemble it ready to use safely… if it’s a smartphone?

The Israeli Foreign Ministry’s statement about “anti-Israeli elements” exploiting social media posts, while accurate, misses the larger point. The solution isn’t just to warn soldiers about potential enemy exploitation of any online presence and posts. It’s to establish and enforce a zero-tolerance policy for social media use during any active operations.

An organization led by someone who celebrated the October 7 terror attacks as his view of “resistance” can now successfully trigger international investigations using soldiers’ own posts. So one of the best defenses is hopefully more obvious now, leaving minimal digital trail to exploit.

The security imperative is clear: soldiers need better operations discipline not to hide crimes, but to protect themselves from coordinated political warfare and terror campaigns masquerading as justice.

The line between Wiesenthal’s relentless pursuit of documented mass murderers and today’s shameless weaponization of social media against any random soldiers couldn’t be clearer. And even more fundamentally, soldiers need to be professional to help establish their case for honest professionalism. Military discipline is needed in any battlefield.