Category Archives: History

FTC Uses Nazi Rhetoric in Letter Dismissing Digital Services Act

FTC Letter Mirrors 1933 Nazi Playbook Against Foreign Laws

A Direct Parallel

In August 2025, FTC Chairman Andrew Ferguson (former chief counsel to Mitch McConnell 2019 to 2021, serving as judicial confirmation strategist) sent letters to major tech companies warning them against complying with European regulations – using tactics that directly mirror the Nazi approach from 1933. Both Ferguson’s 2025 letter as reported in Wired and the Nazi regime followed the same playbook:

  1. Demanding Companies Reject Foreign Laws: Ferguson explicitly warned tech companies that “censoring Americans to comply with a foreign power’s laws” could violate Section 5 of the FTC Act and that “weakening encryption or other security measures to comply with the laws, demands, or expected demands of a foreign government may also violate Section 5.”

    The Nazis did exactly this in 1933. Hitler’s government “immediately began preparing for the war he planned to wage” with foreign policy that sought to “undo the Treaty of Versailles, build alliances, and incorporate territories with German populations into the Reich.” Just three months after taking power, Hitler made his first major break with the Treaty of Versailles by withdrawing Germany from the League of Nations on the 14 October 1933.

  2. “Foreign Powers” Rhetoric: Ferguson characterizes EU regulations as actions by “foreign powers to impose censorship and weaken end-to-end encryption” that “will erode Americans’ freedoms.”

    The Nazis used nearly identical language, with German Foreign Office having “the task of persuading Europe’s sovereign states to resolve their ‘Jewish question’ themselves or by turning their Jewish population over to Germany.” To be clear, both regimes specifically targeted democratic allies as threats. The Nazis characterized the League of Nations (democratic countries) as enemies, just like Ferguson is targeting EU/UK democratic regulations.

  3. Threatening Business Enforcement: Ferguson threatened companies with FTC action if they comply with European laws, stating “if companies censor Americans or weaken privacy and communications security at the request of a foreign power, I will not hesitate to enforce the law.”

    The Nazis used identical enforcement tactics in 1933. They systematically threatened German businesses with legal consequences for any cooperation with foreign powers or international agreements. Through Gleichschaltung, the regime forced companies to choose between Nazi compliance and international relationships. The German Labor Front, established in May 1933, became the primary enforcement mechanism, dissolving all independent trade unions and replacing them with Nazi-controlled organizations. By 1933, Nazi authorities were conducting coordinated raids on businesses that maintained international ties, confiscating assets and imprisoning leaders who refused to reject foreign oversight. During 1933-1939, “Government agencies at all levels aimed to exclude Jews from the economic sphere of Germany by preventing them from earning a living” – precisely the same tactic Ferguson is now using against companies that comply with European democratic regulations.

The Nazis framed rejection of international agreements as defending German sovereignty and freedom, while threatening domestic businesses with legal consequences for any cooperation with foreign powers – exactly what Ferguson is doing with European digital regulations.

The FTC thus is following the 1933 Nazi playbook nearly word for word.

The fact Ferguson is targeting democratic allies’ regulations (EU Digital Services Act, UK Online Safety Act) using the same playbook the Nazis used against the League of Nations and Treaty of Versailles is particularly striking. Let’s cut to the core of how authoritarian tactics work: they don’t start with obvious extremism, they start with seemingly reasonable sovereignty arguments that gradually normalize the rejection of international cooperation and democratic norms. When government officials use sovereignty rhetoric to demand businesses reject democratic allies’ laws while threatening enforcement, history shows us exactly where this leads.

Nazi Propaganda Minister Goebbels in 1933 deceptively framed foreign regulation as interference that threatened domestic freedom:

They do all they can to cause the Reich domestic and international difficulties. These pacifists from head to toe do not even hesitate to urge bloody war against Germany in the foreign papers that are not yet wise enough to refuse them space.

This is the same logic flip as Ferguson’s language today about “foreign powers” trying to “impose censorship” and “erode Americans’ freedoms.”

Both men fraudulently frame regular democratic criticism instead as hostile foreign interference threatening national sovereignty. In other words, they advocate harsh regulation and censorship while falsely claiming they oppose it.

Don’t forget, Ferguson served as McConnell’s judicial confirmation strategist, systematically placing conservative judges throughout the federal court system. His expertise in institutional capture through legal mechanisms set the autocratic foundation work he’s now employing against tech companies.

Ferguson’s letter follows the exact legal-theoretical framework Carl Schmitt developed to justify Nazi authoritarianism. Schmitt’s infamous doctrine that “the sovereign is he who decides on the exception” provided the intellectual foundation for suspending normal legal rules whenever the regime claimed a crisis. On March 26, 1933, Schmitt proclaimed the Weimar Constitution defunct and justified Hitler’s emergency powers as necessary to protect German sovereignty from foreign interference.

Ferguson is applying identical logic: declaring that compliance with democratic allies’ regulations constitutes an emergency threatening American sovereignty, justifying the FTC’s authority to override normal international legal cooperation.

This is Schmittian exceptionalism in practice with crisis rhetoric to expand executive power while rejecting democratic institutional constraints. Ferguson demanded immediate responses (by August 28), showing the same pressure tactics the Nazis used for absurdly rapid compliance to fascist doctrine.

Salt Typhoon SentinelOne Analyst So Wrong About China it Should be a Crime

Dakota Cary’s statement that “it is inconceivable the U.S. would ask a private company to hack Xi’s phone” contradicts decades of documented evidence showing extensive U.S. reliance on private contractors for offensive intelligence operations, raising questions about SentinelOne staff understanding even the most basic intelligence history.

The contrast between his confident false assertion and the documented truth is striking—perhaps America shouldn’t have private assets for hacking anymore because SentinelOne is proving such “cyber” analysts don’t even know basic operations history.

From Lockheed’s Cold War spy planes to today’s billion-dollar cloud contracts, the U.S. intelligence community has consistently relied on private contractors for its most sensitive operations—including offensive cyber capabilities that could (and would) absolutely target foreign (and domestic) leaders. Who killed 1961 Hammarskjold, and how? What about 1969 Mondlane?

China’s recent Salt Typhoon operation, while unprecedented in scale, represents not a departure from American practice but rather an adaptation and expansion of the privatized intelligence model the United States undoubtedly pioneered as its own an adaptation of a British program.

The Cold War was privatization of American intelligence

The modern marriage between U.S. intelligence agencies and private contractors arguably began in earnest with the U-2 spy plane program in 1954. The CIA awarded Lockheed $22.5 million and, within eight months, Kelly Johnson’s “Skunk Works” flew an aircraft capable of photographing Soviet military installations from 70,000 feet.

This wasn’t merely procurement as it was an unmistakable model of private companies as integral partners for America’s most classified surveillance operations. Lockheed was building the CORONA reconnaissance satellites by 1959, with the entire program disguised as the civilian “DISCOVERER” scientific mission. The pattern continued with NRO’s KH-9 Hexagon satellites from 1971-1986, where Lockheed again handled construction while multiple contractors managed the complex film recovery operations.

These partnerships established a pattern: private companies didn’t just supply equipment when they designed, built, and sometimes operated the systems that formed the backbone of American intelligence gathering. IGLOO WHITE and IBM, hello, hello, is this thing on?

The telecommunications sector proved equally crucial. Project SHAMROCK, running from 1945 to 1975, saw Western Union, RCA Global, and ITT World Communications voluntarily provide the NSA with copies of all international telegrams entering or leaving the United States—without warrants, court orders, or even written agreements. At its peak, the program analyzed 150,000 messages monthly.

The companies cooperated based purely on patriotic appeals and informal assurances from the Attorney General. When the Church Committee exposed these activities in 1975, Senator Frank Church called it “probably the largest government interception program affecting Americans ever undertaken.” Yet even after congressional reforms and the Foreign Intelligence Surveillance Act of 1978, the fundamental reliance on private sector cooperation only deepened.

If you say Church and a “cyber” expert says “who”, it is a sure sign they aren’t prepared enough yet.

Perhaps most telling was Air America, the CIA’s proprietary airline that operated from 1950 to 1976. With over 300 pilots and a fleet including Boeing 727s and 30 helicopters, it conducted everything from arms delivery to search-and-rescue operations across Southeast Asia. The company maintained commercial cover while executing covert operations, demonstrating how thoroughly the agency could integrate private entities into intelligence work.

Historical reports documented American contractors claiming a captured Vietcong woman “willfully threw herself” from their helicopter en route to her interrogation, echoing methods attributed to Apartheid South Africa’s “Dr. Death” who could only dream of Elon Musk’s Neuralink to torture secrets out of civil rights leaders. These incidents illustrate how private contractors have long operated in the gray areas of plausible deniability that always characterize modern intelligence work.

The pattern is not just about contracting—it is often complete fusion of commercial enterprise with intelligence operations. You see a golf cart company in Florida? The trained eye sees special operations vehicles designed for tactical clandestine surveillance. Rubber rafts being shipped to Angola as aid? Dogs of War documented these exact craft landing on an Indian Ocean beach to orchestrate a violent coup.

Post-9/11 transformation was even more intelligence contracting

The September 11 attacks triggered an unprecedented expansion of intelligence privatization. Remember AT&T Room 641A in San Francisco? Who had the keys? By 2016, approximately 70% of the U.S. intelligence budget—roughly $50 billion annually—flowed to private contractors. I’ll say it again, 70% of spending flowed into the private sector.

The body scanner is sure to get a go-ahead because of the illustrious personages hawking them. Chief among them is former DHS secretary Michael Chertoff, who now heads the Chertoff Group, which represents one of the leading manufacturers of whole-body-imaging machines, Rapiscan Systems. For days after the attack, Chertoff made the rounds on the media promoting the scanners, calling the bombing attempt “a very vivid lesson in the value of that machinery”—all without disclosing his relationship to Rapiscan.

I’ll skip further commentary about extensive allegations of corruption, regarding Chertoff mandating expensive yet dangerously flawed scanners at airports.

Five companies came to dominate this privatized landscape: Leidos, Booz Allen Hamilton, CACI International, SAIC, and CSRA, collectively employing 45,000 cleared personnel representing 80% of the total contractor workforce. Booz Allen Hamilton alone, which Bloomberg called “the world’s most profitable spy organization,” earned $5.8 billion in 2013 with nearly a quarter coming from intelligence agencies.

Edward Snowden’s 2013 revelations, while himself working as a Booz Allen contractor, were driven by Russian moles who used him to expose the depth of private sector integration in surveillance operations. The PRISM program involved Microsoft, Yahoo, Google, Facebook, Apple, and others providing the NSA with direct access to user data, with 98% of PRISM production coming from just Yahoo, Google, and Microsoft.

Meanwhile, Palantir Technologies being led by a notorious political activist, received its initial funding from the CIA’s venture capital arm In-Q-Tel, and then developed tools claiming to make the NSA’s XKeyscore surveillance data more searchable and actionable. Internal documents revealed Palantir software was specifically being designed to integrate with XKeyscore, enabling analysts across the Five Eyes intelligence alliance to visualize and analyze massive surveillance datasets.

The cloud computing revolution further cemented these rather clear relationships that SentinelOne seems ignorant about.

Amazon Web Services won the CIA’s C2S contract worth $600 million in 2013, followed by the “WildandStormy” contract worth up to $10 billion in 2021 to modernize the NSA’s classified data repositories. The broader Commercial Cloud Enterprise (C2E) contract, valued at “tens of billions” over 15 years, brought AWS, Microsoft, Google, Oracle, and IBM into the intelligence community’s core infrastructure.

These were NOT traditional procurement relationships—they represented the wholesale and overt migration of America’s most sensitive intelligence capabilities onto commercial platforms.

I know, because I helped lead the offensive dimension: Private contractors in U.S. cyber operations

The evidence for private contractor involvement in offensive U.S. cyber operations is overwhelming and directly contradicts any notion of operational restraint. I’ve spoken publicly about this for over a decade.

The Stuxnet operation against Iran’s nuclear program, arguably history’s most sophisticated cyberweapon, required extensive private sector expertise. Foreign Policy reported that earlier attacks on Iran’s Natanz facility used “field equipment used by contractors working on Siemens control systems,” while the final Stuxnet variant likely entered Iranian systems via Russian contractors’ USB drives. The operation’s success depended on deep knowledge of industrial control systems that resided primarily with experts in the private sector.

This reminds me of the early 1900s when private staff of American Telco staff would moonlight for extra pay at night by performing contracted services: private company staff performed wire taps, as a service to the government, as old as wires themselves. Ah, history.

The NSA’s Tailored Access Operations (TAO), now renamed the Office of Computer Network Operations, employs over 1,000 personnel including significant contractor presence. TAO’s explicit mission includes targeting “foreign leaders” and their communications. The unit has expanded to multiple locations across the United States and routinely outsources development of cyberespionage tools to private contractors. Companies like Raytheon Blackbird Technologies developed the UMBRAGE Component Library for the CIA, while Siege Technologies created the Athena and Hera malware systems. The 2017 Vault 7 leaks revealed that 70% of the CIA’s cyber arsenal was contracted out, with 91 malware tools among the more than 500 in the leaked materials.

The zero-day exploit market provides us perhaps with the clearest evidence of modern private sector involvement in offensive operations.

Reuters reported in 2013 that the U.S. government is the “biggest buyer in the burgeoning gray market” for software vulnerabilities. Companies like Zerodium openly offer up to $2.5 million for mobile operating system exploits, while Crowdfence advertises $5-7 million for iPhone zero-days. These exploits aren’t defensive tools—they’re offensive weapons designed to compromise foreign systems, potentially including those of foreign leaders.

Former NSA personnel have established companies like IronNet Cybersecurity and joined firms like the Chertoff Group, creating a revolving door that ensures private sector capabilities remain aligned with intelligence community needs. Chertoff again. I won’t go into it further.

Salt Typhoon is China’s adaptation of the American model

China’s Salt Typhoon operation represents a sophisticated evolution of a privatized intelligence model they observed in American history.

Active since at least 2019, the campaign has compromised over 200 companies across 80 countries, including at least nine major U.S. telecommunications providers. The operation specifically targeted high-profile political figures including Donald Trump, JD Vance, and Kamala Harris campaign staff, while accessing metadata for over one million users in the Washington D.C. area.

The three companies involved—Sichuan Juxinhe Network Technology, Beijing Huanyu Tianqiong Information Technology, and Sichuan Zhixin Ruijie Network Technology—aren’t mere fronts but functioning businesses providing cyber services to China’s Ministry of State Security and People’s Liberation Army.

This represents a crucial distinction: while U.S. contractors often maintain degrees of independence and work with multiple clients, these Chinese firms may appear more tightly integrated with state intelligence operations. Although this reflects China’s civil-military fusion doctrine, it could shift to be more like America and use increasingly private entities.

What makes Salt Typhoon particularly sophisticated is its focus on compromising the backend of wiretap systems that U.S. law enforcement itself uses for lawful intercepts. It’s literally the privacy extremists’ most frequent talking point, that a backdoor for someone becomes a backdoor for anyone including adversaries.

By infiltrating these systems, Chinese operators gained access not just to general communications but to the specific targets of U.S. government interest. The operation used known vulnerabilities rather than zero-days, employing “living off the land” techniques that made detection extremely difficult. The persistent access achieved—maintained for months to years in some cases—provided both intelligence collection and potential disruption capabilities.

SentinelOne is Bonkers: Dakota Cary’s claim needs serious context

Now hopefully it is clear why Dakota Cary’s statement that “it is inconceivable the U.S. would ask a private company to hack Xi’s phone” appears to reflect either diplomatic discretion or a fundamental misunderstanding of U.S. intelligence operations. Am I being too charitable?

The documented evidence overwhelmingly demonstrates that the United States has not only asked but routinely contracted private companies to develop and deploy offensive cyber capabilities that could absolutely target foreign leaders.

Consider the specific capabilities revealed in the Vault 7 leaks: tools to compromise smart TVs, smartphones, and vehicles—precisely the technologies foreign leaders use daily. The NSA’s TAO unit explicitly lists foreign leaders among its targets, and its operations have included intercepting laptops ordered by high-value targets before delivery. The CherryBlossom project compromised wireless infrastructure in “bars, hotels, airports”—locations frequented by traveling officials. These aren’t theoretical capabilities but operational tools developed with extensive private contractor involvement.

The distinction Cary wants to draw—between China using private companies for offensive operations and supposed U.S. restraint—collapses under any basic scrutiny.

The U.S. intelligence community has spent decades building precisely the kind of public-private partnerships that enable such operations. The difference lies not in whether private companies are involved but in the specific organizational models: the U.S. operates through a more distributed contractor ecosystem with greater corporate independence, while China’s approach features tighter state control and civil-military fusion.

A convergence of intelligence models

What emerges from this analysis is not a story of fundamentally different approaches but rather a convergence toward hybrid public-private intelligence capabilities. The United States pioneered the model during the Cold War, formalized it through the Church Committee reforms, and exponentially expanded it after 9/11. China of course studied and adapted these practices, creating its own version of American spy craft that simply reflects Chinese governmental structures and strategic priorities.

Both nations now operate through complex ecosystems where the boundaries between government agencies and private contractors have become increasingly blurred.

In the United States, massive intelligence budget very openly flows to contractors who develop offensive tools, operate surveillance systems, and provide analytical capabilities. In China, companies like those behind Salt Typhoon function as extensions of state intelligence while maintaining commercial operations. The shared model is to provide plausible deniability, technical expertise, and operational flexibility that pure government operations cannot match.

The real insight from comparing Salt Typhoon to U.S. operations isn’t that China has crossed some unprecedented line—it’s that the privatization of intelligence and cyber operations has become the model everyone leverages. The “inconceivable” has not only been conceived ages ago but fully operationalized, documented, and refined over decades of practice by the very nation that now expresses surprise at China’s adoption of similar methods.

Wrap Up

The parallel histories of American and Chinese intelligence privatization reveal a natural and a rather Boring (e.g. private company with old tech tunneling under American cities) transformation in how nations conduct espionage and cyber operations. The United States established and refined the model of deep public-private integration in intelligence work, from Lockheed’s Cold War reconnaissance programs to today’s multi-billion-dollar cloud computing contracts and zero-day exploit purchases. China’s operations in the news, while remarkable in scale and sophistication, are simply an expected evolution of established practices rather than any revolutionary departure.

Dakota Cary’s claim is absolutely contradicted by decades of documented evidence showing extensive private contractor involvement in offensive cyber operations, tools explicitly designed for targeting high-value individuals, and a thriving gray market where the U.S. government is the largest purchaser of offensive cyber capabilities. I’m always curious when American “security analysts” seem to not know their history.

As all nations continue to blur the lines between state and corporate capabilities in cyberspace, the question isn’t whether private companies will be involved in sensitive intelligence operations—it’s how democratic oversight and international norms can adapt to this post-Church reality where the most powerful surveillance and offensive capabilities increasingly reside not in government agencies but in the secretive unregulated conference rooms and data centers of private corporations.

Just ask GM or GE or Ford or…

I’ve been saying this stuff out loud since at least early 2012. SentinelOne should be held to account for a 2025 false statement that veers completely over the line.

Source: Ford

Trump Invokes Hitler With Intel Stake: “Not Socialism”

The Intel deal in the news isn’t just about getting taxpayer returns. Let’s be honest, it’s about the Nazi playbook of state control over critical infrastructure and strategic industries.

Looking at this through the lens of what’s already happening:

  • Control Pattern: Just as Trump is systematically undermining the autonomy of Democratic cities and centralizing control, taking a government stake in Intel represents state control over the semiconductor industry, which arguably is the most strategically critical technology sector.
  • Strategic Sectors: Fascist regimes historically didn’t fully nationalize industries but rather maintained private ownership while exercising state control through stakes, regulations, and political pressure. The government gets influence without the responsibility of full ownership.
  • Economic Leverage: With a 10% stake in Intel, the government gains board representation and veto power over major decisions. Combined with the administration’s new requirements for federal review of transportation projects “to ensure compliance with current Administration priorities,” this creates a pattern of using economic levers to enforce political compliance. How very Sieg Heil.
  • Infrastructure Control: Semiconductors are as foundational to modern economy as transportation networks. Controlling both gives unprecedented leverage over businesses, states, and cities that depend on these systems.

The telling part is how this fits the broader authoritarian playbook: maintain private ownership to avoid appearing “socialist,” but exercise state control through strategic stakes, regulatory capture, and political pressure.

It’s not worth asking whether traditional socialism or capitalism is here, because we’re witnessing the economic structure that typically defines Nazism, meaning authoritarian consolidation.

Combined with military deployments and targeting of opposition areas based on race alone, the mechanisms are being put in place for a new Reich.

The historical parallel is about whether democratic institutions can resist systematic capture by an increasingly dictatorial movement that’s following Hitler’s well-documented playbook of dismantling democracy from within.

What’s especially concerning is how toxic moves are cynically packaged as reasonable policy responses – “taxpayer returns,” “crime fighting,” “national security” – when the actual effect is systematic institutional capture by white supremacists. This is exactly how democratic backsliding works: each individual action seems defensible in isolation, while together they form a coherent strategy of loss of power. The window for resistance is closing rapidly.

Once state control over critical infrastructure has been consolidated and military deployment to suppress Black leaders becomes normalized, the mechanisms for democratic resistance become scarce. The pattern from Nazi Germany is clear and the trajectory today is accelerating into a known disaster.

Why AI Bubble Talk is Pop Nonsense

For all the times I’ve said the AI hype is way too overheated, I also dislike extreme cold. Where did all the balance go?

Fortune’s latest breathless reporting about a “tragic” AI market reads like buzzword bingo: insert “bubble,” add some dot-com references, quote a longtime insider skeptic, and call it analysis. But this lazy framing completely misreads the history it quotes and fundamentally misunderstands what’s actually happening.

The author leans too heavily on dramatic language (“tragic,” “underwhelming”) and seems to conflate stock valuations with technological viability. Insert nails on chalkboard.

The article follows the all too familiar template of gathering concerning quotes and market data without deeply examining whether current AI adoption patterns actually resemble historical bubbles. He said, she said, where’s the critical thinking?

Let me show what I mean. The dot-com crash wasn’t just a market correction—it was a techbro fraud filter. It cleared out companies sponging investors with marketing-oriented science fiction while preserving the real infrastructure that became the backbone of our digital economy. The Web won. The internet didn’t fail; the ruthless extractive speculation around it did.

Today’s AI situation is fundamentally different. Companies aren’t betting on hypothetical future revenue—customers already are operationally dependent and paying for AI as a service. Once you’ve integrated AI into your assembly lines like steam-powered machinery, you face a simple economic reality: pay for the AI and pay to clean up its mistakes, or pay the higher costs of reverting to manual processes.

This isn’t speculation anymore. It’s infrastructure, and like all powerful infrastructure, it demands safety protocols.

Calling AI a bubble because some stocks are overvalued is like calling the steam engine a bubble after factories have already been retrofitted with boilers but haven’t installed proper safety systems. Sure, some companies are overpaying, some investments won’t pan out, and some operations will catastrophically fail like an entire factory burning to the ground. But we’re well past the “will this work?” question and deep into the “how do we deploy this at scale without killing all the workers?” phase.

The Jungle by Upton Sinclair, clearly describing the reality of American industrialization, should be required reading in computer science degrees.

Sinclair wrote The Jungle to expose worker exploitation and advocate for labor rights, but the public was horrified by food contamination instead. The government responded with the Pure Food and Drug Act to protect consumers from tainted meat, while largely ignoring the workers who were being ground up by the same system.

Sinclair wanted to show how capitalism was destroying human beings, but readers fixated on their own safety as consumers rather than the systematic dehumanization of workers. The government gave people clean food while leaving the fundamental power imbalances and dangerous working conditions intact.

The AI parallel is unmistakable: we’re so focused on whether AI stocks are overvalued (protecting investors) that we’re missing the much more serious question of what happens to the people whose lives and livelihoods get processed through these systems without adequate safeguards.

The real regulatory challenge is less about market bubbles and more about preventing algorithmic systems from treating humans like they are contaminated byproducts of the industrial technology boom Sinclair exposed.

And just like 1906, we’re probably going to get consumer protection laws (maybe some weak-sauce transparency requirements) while the fundamental power dynamics and safety issues for the people actually affected by these systems get ignored. It’s the same pattern again: worry on Wall Street about the symptom that scares the powerful, ignore the causes that harm the powerless at scale.

We’re seeing the consequences of rushing powerful automation into critical systems we depend on without adequate safeguards, like the industrial equivalent of the Triangle Shirtwaist Factory disaster, where really bad algorithmic decision-making functions like the doors that don’t open in a fire.

Fortune’s bubble talk, complete with cartoon analogies about Wile E. Coyote, reveals a fundamental misunderstanding of technological adoption cycles. When automation becomes operationally essential, market corrections don’t reverse the underlying transformation—they reset the price of admission and, hopefully, force better safety standards.

The real story is how AI slowly moved from experimental to indispensable as a 1950s concept dismissed in the 1980s before exploding in the early 2010s. Do you know what else followed that exact slow 30 year cycle?

Cloud computing.

The 1950s time-sharing concept reached explosive adoption in the 2010s, just like AI is doing now. A generation from idea to infrastructure in both cases, except one of them was rebranded. Calling the cloud a bubble today would be absurd.

Similarly the AI bubble predictions will age as poorly as Oracle saying there was no cloud, Sun Microsystems claiming there was no privacy, or IBM declaring there was no future for personal computing.

It’s not just a tech pattern to watch, it’s how human societies adopt transformative technologies for infrastructure across generational timescales.