The AI Surveillance State Thesis

10 min readUpdated Jan 20, 2026Loading...

Core Claim

A central element of contemporary Pax Judaica theory is that the ultimate purpose of AI development, Silicon Valley, and global technology infrastructure is to create a worldwide surveillance and control system headquartered in Jerusalem.

This thesis overlaps with, but extends beyond, mainstream concerns about surveillance capitalism and technological power concentration.

The Silicon Valley Narrative

Military Origins of Technology

The framework argues that technology attributed to private entrepreneurs actually originated from government/military R&D.

What's documented in mainstream scholarship:

  • ARPANET origins: The internet did emerge from DARPA (Defense Advanced Research Projects Agency) funding in the late 1960s1
  • Computing history: Early computers were developed for military applications, including the ENIAC for ballistics calculations and codebreaking efforts2
  • Government R&D: Federal funding through agencies like DARPA, NSF, and NIH has contributed significantly to technological development3

Key academic sources:

  • Janet Abbate, Inventing the Internet (1999)1
  • Mariana Mazzucato, The Entrepreneurial State (2013)3
  • Manuel Castells, The Internet Galaxy (2001)4

Tech Billionaires and Innovation

The framework suggests tech figures are "front people" for hidden controllers.

Alternative scholarly perspective: Historians of technology explain Silicon Valley's growth through:

  • Defense contracts and Cold War funding5
  • University research (Stanford, MIT, Berkeley)6
  • Venture capital ecosystem development7
  • Network effects and first-mover advantages8

For documented history of Silicon Valley, see:

  • AnnaLee Saxenian, Regional Advantage: Culture and Competition in Silicon Valley and Route 128 (1994)6
  • Margaret O'Mara, The Code: Silicon Valley and the Remaking of America (2019)5

Israel's Tech Sector

Documented Facts

Israel does have a significant technology sector, well-documented in mainstream sources:

Statistics:

  • Israel has more NASDAQ-listed companies than any country outside the US9
  • High per-capita venture capital investment9
  • Strong in cybersecurity, AI, defense tech, and agricultural technology

Unit 8200 connection: Israel's signals intelligence unit (comparable to NSA) has produced many tech entrepreneurs. This is documented and discussed openly in Israeli media and academic sources.10

Key academic sources:

  • Dan Senor and Saul Singer, Start-Up Nation (2009)9
  • Jason Gewirtz, Israel's Edge: The Story of the IDF's Most Elite Unit - Talpiot (2016)11

Surveillance Technology Exports

Israel's role in surveillance technology is documented by investigative journalists:

NSO Group / Pegasus:

  • Founded 2010; developed Pegasus spyware
  • Sold to governments worldwide; documented by Citizen Lab research12
  • Subject of the "Pegasus Project" investigation by 17 media organizations (2021)13
  • Documented in Laurent Richard and Sandrine Rigaud, Pegasus (2023)14

Academic/journalistic sources:

  • Citizen Lab (University of Toronto) technical reports12
  • Forbidden Stories consortium investigation13
  • Ronen Bergman, Rise and Kill First (2018)15

Claims vs. Context

DocumentedFramework Claims

Israel has significant tech sectorTech sector is part of plan for world control
Unit 8200 alumni start tech companiesThis is coordinated global influence operation
Israeli surveillance tech sold globallyThis builds infrastructure for Pax Judaica
Cybersecurity industry is largeJerusalem will become global surveillance HQ

The framework interprets documented facts through a conspiratorial lens not supported by mainstream evidence.

Surveillance Capitalism: Mainstream Analysis

Concerns about technological surveillance are not limited to conspiracy frameworks. Mainstream scholars have analyzed:

Shoshana Zuboff's Analysis

In The Age of Surveillance Capitalism (2019), Zuboff argues:16

  • Tech companies extract behavioral data as raw material
  • This data is processed into "prediction products"
  • A new economic logic has emerged that trades in human futures
  • This represents a threat to human autonomy

Note: Zuboff's analysis does not frame this in ethnic or religious terms, nor does she attribute it to a coordinated historical plan.

Other Mainstream Critiques

  • Frank Pasquale, The Black Box Society (2015)17 - Algorithmic accountability
  • Cathy O'Neil, Weapons of Math Destruction (2016)18 - Algorithmic bias
  • Yochai Benkler, Network Propaganda (2018)19 - Information ecosystem analysis
  • Evgeny Morozov, To Save Everything, Click Here (2013)20 - Tech solutionism critique

These scholars document real concerns about technology and power without resorting to conspiracy frameworks.

Transhumanism & The Elite

Transhumanism as a Movement

Transhumanism is a real intellectual movement with documented history:21

Key figures:

  • Ray Kurzweil: Director of Engineering at Google; author of The Singularity Is Near (2005)22
  • Aubrey de Grey: Gerontologist focused on life extension
  • Nick Bostrom: Philosopher at Oxford; Superintelligence (2014)23
  • Max More: Philosopher; founder of Extropy Institute

Academic analysis:

  • Steve Fuller, Humanity 2.0 (2011)24
  • Nicholas Agar, Humanity's End: Why We Should Reject Radical Enhancement (2010)25

Framework Claims vs. Documented Movement

DocumentedFramework Claims

Transhumanists advocate human enhancementElites will use technology for themselves only
Life extension research existsTwo-tier society is planned outcome
Billionaires fund longevity researchThis is "Jacob Frank's philosophy" in action
Some people get brain-computer interfacesEveryone else will get controlling implants

The transhumanist movement is real and debatable on its merits; the framework's claims about intentional stratification require evidence not in mainstream sources.

China Comparison

The framework often cites China's digital infrastructure as proof-of-concept:

What's Documented

  • Social Credit System: Exists but is more fragmented than often portrayed; academic analysis in Foreign Policy, academic journals26
  • Digital Yuan: China's CBDC is being piloted; documented by BIS and academic economists27
  • Surveillance infrastructure: Documented by researchers including Human Rights Watch, academic studies28

Academic Sources

  • Samantha Bradshaw and Philip Howard, "Troops, Trolls and Troublemakers: A Global Inventory of Organized Social Media Manipulation" (Oxford Internet Institute, 2017)29
  • Sheena Chestnut Greitens, "Surveillance, Security, and Liberal Democracy in the Post-COVID World" (2020)30

Critical Analysis

What's Documented

  • Government role in tech: DARPA did fund early internet development. Military R&D has contributed to many technologies.1
  • Surveillance capitalism: Tech companies do collect extensive data. Concerns about digital surveillance are mainstream.16
  • Israel's tech sector: Genuinely significant, with documented connections to intelligence/military.910
  • Transhumanist movement: Real movement with serious proponents.21
  • What's Speculative

  • Coordinated plan: The claim that all tech development serves a single coordinated agenda
  • Secret society control: No evidence that billionaires are "front people" for hidden controllers
  • Jerusalem as HQ: No evidence of planned relocation of tech infrastructure to Israel
  • Two-tier transhumanism: Speculative projection about future social stratification
  • Alternative Explanations

    Why does tech concentrate wealth?

    • Network effects, winner-take-all markets31
    • Favorable tax/regulatory environments
    • First-mover advantages
    • Venture capital dynamics

    Why surveillance?

    • Advertising business model (surveillance capitalism)16
    • Government intelligence interests
    • Technical convenience (centralized easier than distributed)

    These explanations don't require secret coordination.

    Questions for Discussion

  • How much of the tech industry's growth is attributable to government investment vs. private innovation?
  • Is concern about AI surveillance legitimate independent of the Pax Judaica framework?
  • How should we evaluate technologies that could be used for control as well as benefit?
  • What would falsify the claim that tech billionaires are "front people"?
  • This article presents claims made within the Pax Judaica framework alongside mainstream scholarship. Many framework assertions are speculative and not supported by documented evidence.

    Discussion(0 comments)

    Join the conversationSign in to share your perspectiveSign In
    Loading comments...

    Contribute to this Article

    Help improve this article by suggesting edits, adding sources, or expanding content.

    Submit via EmailSend your edits

    References

    1
    Abbate, Janet. Inventing the Internet. MIT Press, 1999. ISBN: 978-0262511155. Standard academic history of internet development.
    2
    Ceruzzi, Paul E. A History of Modern Computing. 2nd ed. MIT Press, 2003. ISBN: 978-0262532037.
    3
    Mazzucato, Mariana. The Entrepreneurial State: Debunking Public vs. Private Sector Myths. Anthem Press, 2013. ISBN: 978-0857282521. Argues for significant government role in innovation.
    4
    Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford University Press, 2001. ISBN: 978-0199255771.
    5
    O'Mara, Margaret. The Code: Silicon Valley and the Remaking of America. Penguin Press, 2019. ISBN: 978-0399562181. Documents defense funding role in Silicon Valley.
    6
    Saxenian, AnnaLee. Regional Advantage: Culture and Competition in Silicon Valley and Route 128. Harvard University Press, 1994. ISBN: 978-0674753402.
    7
    Gompers, Paul and Josh Lerner. The Venture Capital Cycle. 2nd ed. MIT Press, 2004. ISBN: 978-0262572385.
    8
    Shapiro, Carl and Hal Varian. Information Rules: A Strategic Guide to the Network Economy. Harvard Business School Press, 1998. ISBN: 978-0875848631.
    9
    Senor, Dan and Saul Singer. Start-Up Nation: The Story of Israel's Economic Miracle. Twelve, 2009. ISBN: 978-0446541466.
    10
    Behar, Richard. "Inside Israel's Secret Startup Machine." Forbes, May 30, 2016. Mainstream coverage of Unit 8200-to-startup pipeline.
    11
    Gewirtz, Jason. Israel's Edge: The Story of the IDF's Most Elite Unit - Talpiot. Gefen Publishing House, 2016. ISBN: 978-9652297129.
    12
    Citizen Lab, University of Toronto. "The Million Dollar Dissident" (2016) and subsequent Pegasus technical reports. https://citizenlab.ca/
    https://citizenlab.ca/
    13
    Forbidden Stories consortium. "The Pegasus Project." July 2021. Investigation by 17 media organizations. https://forbiddenstories.org/case/the-pegasus-project/
    https://forbiddenstories.org/case/the-pegasus-project/
    14
    Richard, Laurent and Sandrine Rigaud. Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy. Henry Holt, 2023. ISBN: 978-1250858696.
    15
    Bergman, Ronen. Rise and Kill First: The Secret History of Israel's Targeted Assassinations. Random House, 2018. ISBN: 978-1400069712.
    16
    Zuboff, Shoshana. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs, 2019. ISBN: 978-1610395694.
    17
    Pasquale, Frank. The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press, 2015. ISBN: 978-0674368279.
    18
    O'Neil, Cathy. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Crown, 2016. ISBN: 978-0553418811.
    19
    Benkler, Yochai, Robert Faris, and Hal Roberts. Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics. Oxford University Press, 2018. ISBN: 978-0190923624.
    20
    Morozov, Evgeny. To Save Everything, Click Here: The Folly of Technological Solutionism. PublicAffairs, 2013. ISBN: 978-1610391382.
    21
    Bostrom, Nick. "A History of Transhumanist Thought." Journal of Evolution and Technology 14 (2005): 1-25. https://www.nickbostrom.com/papers/history.pdf
    https://www.nickbostrom.com/papers/history.pdf
    22
    Kurzweil, Ray. The Singularity Is Near: When Humans Transcend Biology. Viking, 2005. ISBN: 978-0670033843.
    23
    Bostrom, Nick. Superintelligence: Paths, Dangers, Strategies. Oxford University Press, 2014. ISBN: 978-0199678112.
    24
    Fuller, Steve. Humanity 2.0: What It Means to Be Human Past, Present and Future. Palgrave Macmillan, 2011. ISBN: 978-0230233430.
    25
    Agar, Nicholas. Humanity's End: Why We Should Reject Radical Enhancement. MIT Press, 2010. ISBN: 978-0262014625.
    26
    Liang, Fan et al. "Constructing a Data-Driven Society: China's Social Credit System as a State Surveillance Infrastructure." Policy & Internet 10 (2018): 415-453. doi:10.1002/poi3.183
    27
    Auer, Raphael, Giulio Cornelli, and Jon Frost. "Rise of the central bank digital currencies: drivers, approaches and technologies." BIS Working Papers No 880 (2020). https://www.bis.org/publ/work880.htm
    https://www.bis.org/publ/work880.htm
    28
    Human Rights Watch. "China's Algorithms of Repression: Reverse Engineering a Xinjiang Police Mass Surveillance App." May 2019. https://www.hrw.org/report/2019/05/01/chinas-algorithms-repression/reverse-engineering-xinjiang-police-mass
    https://www.hrw.org/report/2019/05/01/chinas-algorithms-repression/reverse-engineering-xinjiang-police-mass
    29
    Bradshaw, Samantha and Philip Howard. "Troops, Trolls and Troublemakers: A Global Inventory of Organized Social Media Manipulation." Oxford Internet Institute Working Paper 2017.12.
    30
    Greitens, Sheena Chestnut. "Surveillance, Security, and Liberal Democracy in the Post-COVID World." International Organization 74 (2020): E169-E190. doi:10.1017/S0020818320000417
    31
    Crémer, Jacques, Yves-Alexandre de Montjoye, and Heike Schweitzer. "Competition Policy for the Digital Era." European Commission, 2019. Analysis of digital market concentration.