Command and Control: Capitalism and Computation

Capitalism, a system as inescapable as breathless news items about Trump, Musk and decay, came into its own during the age of steam power, telegraphs and colonialism (first edition, we’re witnessing the attempted redux), long before the invention of digital computers. The creation of computers, initially, a tool for military purposes (ENIAC, the first programmable digital computer was immediately put to work performing calculations for then still theoretical hydrogen bombs) eventually enabled capitalists, particularly at the commanding heights, to employ what, in military circles is known as command and control at a level of sophistication and intrusiveness previously only dreamed of. 

What is command and control?

Consider this excerpt from the essay, ‘Re-conceptualizing Command and Control‘, released in 2002 for the Canadian military and co-authored by Dr. Ross Pigeau and Carol McCann which provides a succinct definition:

“…controlling involves monitoring, carrying out and adjusting processes that have already been developed. Commanding involves creating new structures and processes (i.e., plans, SOPs, etc.), establishing the conditions for initiating and terminating action, and making unanticipated changes to plans. Most acts, including decision making, involve a sophisticated amalgam of both commanding and controlling.”

Everyone who has worked in a corporate enterprise, the land of key performance indicators (or, KPIs) and other metrics gathered and analyzed to determine profit and loss, and even, in some cases, who lives and dies, understands this definition in their bones; it captures the hierarchical structure of business, which is a form of tyranny (some of these fiefdoms have pleasant break-out rooms, decent coffee and declarations of workers being in a family until, of course, restructuring and endless re-orgs casts ‘family members’ onto the street).

From the birth of the corporate era, companies have pursued operational and logistics control to ensure profit, market share and high valuation. So-called scientific management, created and promoted by mechanical engineer and early managerial consultant Frederick Taylor in the late 19th century, was the first dedicated effort of the industrial era. Sears and Roebuck, a 19th century retail and mail order behemoth, the Amazon of the pre-digital computer age, employed an army of people, scientifically managed, to run its vast enterprise. There are commonalities between the Sears of old and Amazon:

Sears and Amazon Commonalities: Diagram by Author

The primary difference between Sears in the 19th century and Amazon today is the latter’s use of digital technology to enhance command and control techniques, enhancements that make it possible for Amazon to surveil delivery drivers on their routes, among other outrages.

From Brighter than a Thousand Suns to the Office Commute

Digital computation’s first assignment was performing the subtle calculations physicists such as Edward Teller and Stanislaw Ulam needed to bring the thermonuclear devices of their fevered dreams to irradiated life. From that beginning, brighter than a thousand suns, the age of command and control fully took shape with the creation of systems such as the US Air Force’s Semi-Automatic Ground Environment (SAGE) described in a Wikipedia article:

“The Semi-Automatic Ground Environment (SAGE) was a system of large computers and associated networking equipment that coordinated data from many radar sites and processed it to produce a single unified image of the airspace over a wide area. SAGE directed and controlled the NORAD response to a possible Soviet air attack, operating in this role from the late 1950s into the 1980s.”

SAGE System Console: Wikipedia

The SAGE system was built to create a method and infrastructure for gathering data from far flung sources and coordinating a response to what its numerous displays told people in Strategic Air Command facilities. This military purpose provided the foundation, metaphor and philosophy shaping the uses of systems that eventually came online such as commercial mainframe computers, client server architectures and what is known as ‘cloud computing.’

Note this image of SAGE system elements:

SAGE Diagram: Defense Visual Information Distribution Service

In design intent and philosophy, there is a link between the vision of computation as a means of commanding people and controlling events that shaped the SAGE system and corporate methods such as business intelligence described in this Wikipedia article:

“Business intelligence (BI) consists of strategies, methodologies, and technologies used by enterprises for data analysis and management of business information. Common functions of BI technologies include reporting, online analytical processing, analytics, dashboard development, data mining, process mining, complex event processing, business performance management, bench marking, text mining, predictive analytics, and prescriptive analytics.”

Microsoft, never one to miss an opportunity to simultaneously shape and profit from business requirements, real or imagined (does anyone recall the Metaverse? It disappeared, like youth, or money from your bank account) provides a visual of how a business intelligence platform can be built on their Azure platform:

Azure Business Intelligence Architecture: Microsoft

The common goal – the thematic bridge from SAGE to business intelligence – is data gathering and analysis which, as an objective in abstract, is not at all sinister. Every society and every social organization, no matter how large or small, needs to understand its environment, collect information and act upon what is learned. Just as SAGE applied that methodology to the task of nuclear war (which, outside of the insane circles running the world to ruin, is no one’s idea of a good use case) corporations apply it to maximizing profit. In the capitalist world, we are data points to be ingested, analyzed and optimized via something called KPIs.

Key Performance Indicators – the SAGE of Corporate Life

Key Performance Indicators or, KPIs, are the metric used to include our behavior and actions as workers, into a command and control schema. What, in the past, was directed without the aid of software (Taylorism being the first, formalized example of a pre software method) is now measured as data points stored in databases and spreadsheets. How ‘productive’ are you? KPIs, we’re told, are a way to ensure workers are on track from the perspective of owners. In a 2021 article titled ‘Why You Need Personal KPIs To Achieve Your Goals’, Forbes, a magazine once treated as scripture, advised ‘professionals’ (a word used to lobotomise that portion of one’s mind that is aware of your status as a precarious worker) to use KPIs to shape their careers:

“Peter Drucker famously said that “what is measured is managed, and what is managed gets improved.” Key Performance Indicators (KPI) are a staple of every business. It is the tool used to measure how effectively an organization is meeting vital business objectives. Teams, departments, and organizations initiate the KPIs so that it spreads to every level of an institution. If it’s such a prominent accountability measure in the business sector, why not use it for our professional success? Perhaps we should inculcate personal KPIs into our practice.”

This is good advice in a way not unlike the sort of contextually useful counsel you’d get on how to handle yourself in a bar fight or dealing with a cop who’s obsessed with demonstrating his authority; you contort yourself to survive. It’s useful, but its utility is a sign of a problem, of a system of artificially enforced limits whose boundaries serve others’ interests.

In his 2018 book, ‘Surveillance Valley’, journalist Yasha Levine details the links between the US’ intelligence agencies and Silicon Valley. From the beginning, Levine shows, companies such as Oracle and technologies we think sprung into existence on the sun blasted terrain of California like dreams were nurtured and even created by the US’ surveillance apparatus.

There is a similar link between the techniques used by the corporations who dominate our lives and the systems and thinking which shaped the US’ command and control fixated response to the Cold War. Our work lives exist in the long shadow of the computers used to determine if ICBMs should wing their way to targets.

The F-35 Maneuver

Bad ideas, like death, are inevitable and just as inescapable.

The US-based tech industry is a Pandora’s box of bad ideas, unleashed upon an unwilling and unwitting populace, and indeed world, with reckless abandon, scorching lives and the Earth itself. Never mind, they say, we’re building the future.

The latest bad idea to spread dark wings and take flight is that building a super massive data center for ‘AI’ called ‘Stargate’- a megamachine that will solve all our problems like a resource and real estate devouring Wizard of Oz – is not only good, but essential.

In an Associated Press article titled, ‘Trump highlights partnership investing $500 billion in AI‘ published Jan 23, 2025, the project is described:

WASHINGTON (AP) — President Donald Trump on Tuesday talked up a joint venture investing up to $500 billion for infrastructure tied to artificial intelligence by a new partnership formed by OpenAI, Oracle and SoftBank.

The new entity, Stargate, will start building out data centers and the electricity generation needed for the further development of the fast-evolving AI in Texas, according to the White House. The initial investment is expected to be $100 billion and could reach five times that sum.

“It’s big money and high quality people,” said Trump, adding that it’s “a resounding declaration of confidence in America’s potential” under his new administration.

[…]

It seems like only yesterday, or more precisely, several months ago, that the same ‘Stargate’, with a still astronomically large but comparatively smaller budget, was described in a Tom’s Hardware article of March 24, 2024 titled ‘OpenAI and Microsoft reportedly planning $100 billion datacenter project for an AI supercomputer‘ –

Microsoft and OpenAI are reportedly working on a massive datacenter to house an AI-focused supercomputer featuring millions of GPUs. The Information reports that the project could cost “in excess of $115 billion” and that the supercomputer, currently dubbed “Stargate” inside OpenAI, would be U.S.-based. 

The report says that Microsoft would foot the bill for the datacenter, which could be “100 times more costly” than some of the biggest operating centers today. Stargate would be the largest in a string of datacenter projects the two companies hope to build in the next six years, and executives hope to have it running by 2028.

[…]

Bad ideas are inevitable but also, apparently, subject to cost overruns.

There are many ways to think and talk about this project, which is certain to fail (and there is news of far less costly methods, making the Olympian spending even more obviously suspicious). For me, the clearest way to understand the Stargate project and in fact, the entire ‘AI’ land grab, is as an attempt to create guaranteed profit for those tech firms who’re at the commanding heights – Microsoft, OpenAI, Amazon, Oracle and co-conspirators. Capital will flow into these firms whether the system works as advertised or not – i.e. they are paid for both function (such as it is) and malfunction.

This isn’t a new technique. The US defense industry has a long history of stuffing its coffers with cash for delivering weapons systems that work… sometimes. The most infamous example is Lockheed’s F-35 fighter, a project that provides the company with funding for both delivery and correction as described in the US Government Accounting Office article, ‘F-35 Joint Strike Fighter: More Actions Needed to Explain Cost Growth and Support Engine Modernization Decision’ May 2023 –

The Department of Defense’s most expensive weapon system—the F-35 aircraft—is now more than a decade behind schedule and $183 billion over original cost estimates.

[…]

That’s a decade and 183 billion of sweet, steady profit, the sort of profit the tech industry has long sought. First there was ‘enterprise software’, then there was subscription-based cloud, both efforts to create ‘growth’ and dependable cash infusions. Now, with Stargate, the industry may have, at last, found its F-35. Unlike the troubled fighter plane, there won’t be any Tom Cruise films featuring the data center. Then again, perhaps there will be. Netflix, like the rest of the industry, is out of ideas.

State of Exception – Part Two: Assume Breach

In part one of this series, I proposed that Trump’s second term, which, as we’re seeing with the rush of executive orders, has, unlike his first, a coherent agenda (centered on the Heritage Foundation’s Project 2025 plan), would be a time of increased aggression against ostracized individuals and groups, a state of exception in which the pretence of bourgeois democracy melts away.

Because of this, we should change our relationship with the technologies we’re compelled to use; a naive belief in the good will or benign neglect of tech corporations and the state should be abandoned. The correct perspective is to assume breach.

In a April, 2023 published blog post for the network equipment company, F5, systems security expert Ken Arora, described the concept of assume breach: 

Plumbers, electricians, and other professionals who operate in the physical world have long internalized the true essence of “assume breach.” Because they are tasked with creating solutions that must be robust in tangible environments, they implicitly accept and incorporate the simple fact that failures occur within the scope of their work. They also understand that failures are not an indictment of their skills, nor a reason to forgo their services. Rather, it is only the most skilled who, understanding that their creations will eventually fail, incorporate learnings from past failures and are able to anticipate likely future failures.

[…]

For the purposes of this essay, the term, failure, is re-interpreted to mean the intrusion of hostile entities into the systems and devices you use. By adopting a technology praxis based on assumed breach, you can plan for intrusion by acknowledging the possibility that your systems have, or will be penetrated.

Primarily, there are five areas of concern:

  • Phones
  • Social Media
  • Personal computers
  • Workplace platforms, such as Microsoft 365 and Google’s G-Suite
  • Cloud’ platforms, such as Microsoft Azure, Amazon AWS and Google Cloud Platform

It’s reasonable to think that following security best practices for each technology (links in the references section) offers a degree of protection from intrusion. Although this may be true to some extent, when contending with non-state hostiles, such as black hat hackers, state entities have direct access to the ownership of these systems, giving them the ability to circumvent standard security measures via the exercise of political power.

Phones (and tablets)

Phones are surveillance devices. No communications that require security and which, if intercepted, could lead to state harassment or worse should be done via phones. This applies to iPhones, Android phones and even niche devices such as Linux phones. Phones are a threat in two ways:

  1.  Location tracking – phones connect to cellular networks and utilize unique identifiers that enable location and geospatial tracking. This data is used to create maps of activity and associations (a technique the IDF has used in its genocidal wars)
  2.  Data seizure – phones store data that, if seized by hostiles, can be used against you and your organization. Social media account data, notes, contacts and other information

Phone use must be avoided for secure communications. If you must use a phone for your activist work, consider adopting a secure Linux-based phone such as GrapheneOS which may be more resistant to cracking if seized but not to communication interception. As an alternative, consider using old school methods, such as paper messages conveyed via trusted courier within your group. This sounds extreme and may turn out to be unnecessary depending on how conditions mutate. It is best however, to be prepared should it become necessary.

Social Media

Social media platforms such as Twitter/X, Bluesky, Mastodon, Facebook/Meta and even less public systems such as Discord, which enables the creation of privately managed servers, should not be used for secure communication. Not only because of posts, but because direct messages are vulnerable to surveillance and can be used to obtain pattern and association data. A comparatively secure (though not foolproof) alternative is the use of the Signal messaging platform.  (Scratch that: Yasha Levine provides a full explantation of Signal as a government op here).

Personal Computers

Like phones, personal computers -laptops and Desktops – should not be considered secure. There are several sub-categories of vulnerability:

  • Vulnerabilities caused by security flaws in the operating system (for example, issues with Microsoft Windows or Apple MacOS)
  • Vulnerabilities designed into the operating systems by the companies developing, deploying and selling them for profit objectives (Windows CoPilot, is a known threat vector, for example)
  • Vulnerabilities exploited by state actors such as intelligence and law enforcement agencies (deliberate backdoors)
  • Data exposure if a computer is seized

Operating systems are the main threat vector – that is, opening to your data – when using a computer. In part one of this series, I suggested abandoning the use of Microsoft Windows, Google Chrome OS and Apple’s Mac OS for computer usage that requires security and using secure Debian Linux instead. This is covered in detail in part one.

Workplace Platforms such as Google G-Suite and Microsoft 365 and other ‘cloud’ platforms such Microsoft Azure and Amazon Web Services

Although convenient, and, in the case of Software as a Service offerings such as Google G-Suite and Microsoft 365, less technically demanding to manage than on-premises hosting, ‘cloud’ platforms should not be considered trustworthy for secure data storage or communications.

This is true, even when platform-specific security best practices are followed because such measures will be circumvented by the corporations that own these platforms when it suits their purposes – such as cooperating with state mandates to release customer data.

The challenge for organizations who’re concerned about state sanctioned breach is finding the equipment, technical talent, will and organizational skill (project management) to move away from these ‘cloud’ systems to on-premises platforms. This is not trivial and has so many complexities that it deserves a separate essay, which will be part three of this series.

The primary challenges are:

  • Inventorying the applications you use
  • Assessing where the organisation’s data is stored and the types of data
  • Assessing the types of communications and the levels of vulnerability (for example, how is email used? What about collaboration services such as SharePoint?)
  • Crafting an achievable strategy for moving applications, services and data off the vulnerable cloud service
  • Encrypting and deleting data

In part three of this series, I will describe moving your organisation’s data and applications off of cloud platforms: what are the challenges? What are the methods? What skills are required? I’ll talk about this and more.

References

Assume Breach

Project 2025

Security Best Practices – Google Workspace

Microsoft 365 Security Best Practices

Questions and Answers: Israeli Military’s Use of Digital Tools in Gaza

UK police raid home, seize devices of EI’s Asa Winstanley

Cellphone surveillance

GrapheneOS

Meta-provided Facebook chats led a woman to plead guilty to abortion-related charges