The AI Surveillance State

9 min readUpdated Jan 20, 2026Loading...

Overview

In the Pax Judaica framework, the ultimate purpose of artificial intelligence is not productivity or convenience but the creation of a global surveillance system—a technological apparatus for monitoring and controlling populations. This "AI surveillance state" is characterized by digital identity systems, central bank digital currencies (CBDCs), behavioral tracking, and algorithmic control of human activity.

This article examines the framework's claims, real-world surveillance developments, and the distinction between documented trends and conspiratorial interpretation.

--------

Digital IDUniversal identity tracking1
Digital currency (CBDC)Transaction monitoring; ability to freeze funds2
AI profilingBehavioral prediction and manipulation3
Social creditReward/punishment based on compliance4
Data centersCentralized processing of all human activity
Biometric surveillanceFacial recognition, gait analysis, etc.5

The "Mark of the Beast" Connection

The framework explicitly connects this to biblical prophecy (Revelation 13:16-17):6

"He also forced everyone, small and great, rich and poor, free and slave, to receive a mark on his right hand or on his forehead, so that no one could buy or sell unless he had the mark."

Digital ID + digital currency = modern fulfillment of this prophecy, according to the framework.

Real-World Surveillance Systems

China's Social Credit System

What exists:4

China has implemented various social credit systems (not one unified system):

ComponentStatus

Government blacklists✓ Exists (courts, tax evasion)
Corporate credit scores✓ Exists (Sesame Credit via Alibaba)
Pilot city programs✓ Multiple implementations
Unified national system✗ Not yet fully implemented
Facial recognition surveillance✓ Extensive in public spaces5

Documented consequences:

  • Travel bans (flights, high-speed rail) for blacklisted individuals
  • Public shaming of debtors
  • Rewards for high scores (easier loans, rental deposits)

Western Surveillance Developments

Documented programs:7

Country/RegionProgram

USANSA mass surveillance (Snowden revelations)8
UKExtensive CCTV network; Investigatory Powers Act
EUGDPR (privacy protection); but also Europol data sharing
AustraliaMetadata retention laws
IndiaAadhaar biometric ID (1.3 billion enrolled)1

Central Bank Digital Currencies (CBDCs)

Current status (as of 2025):2

StatusCountries

LaunchedBahamas (Sand Dollar), Nigeria (eNaira), Jamaica (JAM-DEX), China (pilot)
Advanced pilotsChina, Sweden, South Korea
Research phaseUSA, EU, UK, Japan, most major economies
Rejected/pausedSome concerns in US Congress

Surveillance concerns:

  • CBDCs could enable transaction tracking
  • Potential for programmable money (expiration dates, spending restrictions)
  • Government ability to freeze/seize funds instantly

The Framework's Interpretation

Why AI Investment?

Professor Jiang questions the business model:

"Everyone's putting money into AI, but then you're like, well, how can you make money off that? If you think the answer is for you to use AI, well it's hard to make money off that. But if the answer is to create an AI surveillance state, that makes a lot more sense."

Data Centers as Control Infrastructure

The lecture interprets AI data centers as surveillance infrastructure:

"Open AI... makes no money, but at the same time, they get trillions of dollars from investors to build data centers. And these data centers allow you to make really nice pictures and videos online that do nothing... Why is all this money being spent except one day to create a surveillance state."

Israel as Future Hub

The framework claims Israel will host this infrastructure:

"For data centers to be effective, they need to be safe. Everywhere else there's gonna be wars, right? Not Israel. Because Israel has nuclear weapons. So all the major technology companies will be based in Israel in the future."

Critical Analysis

What's Documented

ClaimStatus

China has extensive surveillance✓ True4
CBDCs are being developed globally✓ True2
Digital ID systems are expanding✓ True1
AI enables new surveillance capabilities✓ True3
Mass data collection by tech companies✓ True9
Governments have accessed tech company data✓ True (PRISM, etc.)8

What's Speculative

ClaimStatus

Unified global system is planned✗ No evidence of coordination
Israel will be the hub✗ Speculation
Purpose is religious/prophetic✗ Unverifiable
Elites coordinate via secret societies✗ Unsubstantiated
"Mark of the beast" interpretation✗ Religious interpretation

Alternative Explanations

Why governments want surveillance:10

  • National security concerns (terrorism, crime)
  • Tax enforcement
  • Public health (pandemic response)
  • Traffic/urban management
  • Institutional inertia (agencies expand their powers)

Why tech companies collect data:9

  • Advertising revenue model
  • Product improvement
  • Competitive advantage
  • User engagement optimization

These explanations don't require coordinated conspiracy—just incentive alignment.

Legitimate Privacy Concerns

Setting aside conspiracy framing, serious concerns exist:

Documented Risks

  • Function creep: Systems built for one purpose expand to others10
  • Data breaches: Centralized data is a target
  • Algorithmic bias: AI systems can discriminate11
  • Chilling effects: Surveillance inhibits free expression12
  • Mission creep: Emergency powers become permanent
  • Expert Warnings

    Privacy advocates, civil liberties organizations, and some technologists have warned about:12

    • The permanence of digital records
    • Difficulty of consent in ubiquitous surveillance
    • Power asymmetry between individuals and institutions
    • Potential for authoritarian abuse

    The "Nothing to Hide" Fallacy

    Common response: "If you have nothing to hide, you have nothing to fear."

    Counter-arguments:12

    • Privacy is a human right, not dependent on innocence
    • Definitions of "wrong" change over time
    • Data can be misinterpreted or misused
    • Power imbalances enable abuse

    The China Model Question

    Is China a Template?

    The framework implies China's system will go global. Consider:13

    Arguments for concern:

    • China exports surveillance technology (Huawei, Hikvision)
    • Other authoritarian states adopt similar systems
    • Democratic states have implemented surveillance post-9/11
    • Technology makes surveillance cheaper/easier

    Arguments against inevitability:

    • Democratic resistance (GDPR, privacy movements)
    • Technical countermeasures (encryption, privacy tools)
    • Institutional checks (courts, civil society)
    • Public backlash possibilities

    Democratic vs. Authoritarian Surveillance

    FeatureAuthoritarianDemocratic

    TransparencyLowHigher (FOIA, leaks)
    AccountabilityMinimalCourts, oversight
    ResistanceDangerousLegal avenues
    ScopeComprehensiveContested

    The key question: Do democratic safeguards work, or are they being eroded?

    The Prophecy Dimension

    Biblical Interpretation

    The "mark of the beast" interpretation:6

    Revelation 13:16-18: Describes a mark required for economic participation, associated with the number 666.

    Framework application: Digital ID + CBDC = this mark

    Traditional interpretations have varied:

    • Roman emperor worship (historical)
    • Future one-world currency
    • Symbolic of allegiance to anti-God systems
    • Not meant literally

    Self-Fulfilling Prophecy?

    If enough people believe technology fulfills prophecy:

    • Some may resist all digital systems
    • Others may accelerate development (to "bring prophecy")
    • Interpretation shapes response

    How to Evaluate

    Questions to Ask

  • Is coordination required? Could surveillance expand through independent actors pursuing their own interests?
  • What's the evidence for centralization? Are systems actually connecting, or remaining fragmented?
  • Who benefits? Governments, corporations, or both? Do their interests align?
  • What resistance exists? Privacy laws, encryption, civil society—are they effective?
  • Is this new? Surveillance has always existed; what's qualitatively different now?
  • Warning Signs vs. Conspiracy

    Legitimate concerns:

    • CBDC design choices (privacy vs. surveillance)
    • Digital ID implementation (opt-in vs. mandatory)
    • Data retention policies
    • Cross-border data sharing
    • AI decision-making transparency

    Conspiratorial leap:

    • Secret society coordination
    • Prophetic fulfillment
    • Predetermined global plan
    • All developments connected

    Discussion Questions

  • How do we distinguish legitimate privacy concerns from conspiracy theory?
  • What safeguards would make digital ID/CBDC acceptable?
  • Does the "mark of the beast" interpretation help or hinder privacy advocacy?
  • Is surveillance expansion coordinated or emergent?
  • Further Reading

    This article examines AI surveillance through the Pax Judaica framework lens. Surveillance concerns are legitimate and documented; claims of coordinated global conspiracy are speculative.

    Discussion(0 comments)

    Join the conversationSign in to share your perspectiveSign In
    Loading comments...

    Contribute to this Article

    Help improve this article by suggesting edits, adding sources, or expanding content.

    Submit via EmailSend your edits

    References

    1
    World Bank. "ID4D Global Dataset." Identification for Development. https://id4d.worldbank.org/global-dataset
    https://id4d.worldbank.org/global-dataset
    2
    Atlantic Council. "Central Bank Digital Currency Tracker." Updated regularly. https://www.atlanticcouncil.org/cbdctracker/
    https://www.atlanticcouncil.org/cbdctracker/
    3
    Feldstein, Steven. "The Global Expansion of AI Surveillance." Carnegie Endowment for International Peace, September 2019. https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847
    https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847
    4
    Creemers, Rogier. "China's Social Credit System: An Evolving Practice of Control." SSRN, May 2018. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3175792
    https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3175792
    5
    Mozur, Paul. "Inside China's Dystopian Dreams: A.I., Shame and Lots of Cameras." The New York Times, July 8, 2018. https://www.nytimes.com/2018/07/08/business/china-surveillance-technology.html
    https://www.nytimes.com/2018/07/08/business/china-surveillance-technology.html
    6
    Revelation 13:16-18 (Bible, various translations). https://www.biblegateway.com/passage/?search=Revelation%2013%3A16-18&version=NIV
    https://www.biblegateway.com/passage/?search=Revelation%2013%3A16-18&version=NIV
    7
    Privacy International. "State of Privacy Reports." Ongoing country profiles. https://privacyinternational.org/state-privacy
    https://privacyinternational.org/state-privacy
    8
    Greenwald, Glenn. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, 2014. ISBN: 978-1627790734. https://us.macmillan.com/books/9781627790734/noplacetohide
    https://us.macmillan.com/books/9781627790734/noplacetohide
    9
    Zuboff, Shoshana. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs, 2019. ISBN: 978-1610395694. https://www.publicaffairsbooks.com/titles/shoshana-zuboff/the-age-of-surveillance-capitalism/9781610395694/
    https://www.publicaffairsbooks.com/titles/shoshana-zuboff/the-age-of-surveillance-capitalism/9781610395694/
    10
    Solove, Daniel J. Nothing to Hide: The False Tradeoff Between Privacy and Security. Yale University Press, 2011. ISBN: 978-0300177251. https://yalebooks.yale.edu/book/9780300177251/nothing-hide
    https://yalebooks.yale.edu/book/9780300177251/nothing-hide
    11
    O'Neil, Cathy. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Crown, 2016. ISBN: 978-0553418811. https://www.penguinrandomhouse.com/books/241363/weapons-of-math-destruction-by-cathy-oneil/
    https://www.penguinrandomhouse.com/books/241363/weapons-of-math-destruction-by-cathy-oneil/
    12
    American Civil Liberties Union. "Privacy and Surveillance." Ongoing reports. https://www.aclu.org/issues/privacy-technology
    https://www.aclu.org/issues/privacy-technology
    13
    Polyakova, Alina and Chris Meserole. "Exporting Digital Authoritarianism." Brookings Institution, August 2019. https://www.brookings.edu/research/exporting-digital-authoritarianism/
    https://www.brookings.edu/research/exporting-digital-authoritarianism/