Attorney Mark Zaid, The Superhero Fortune Teller

Mark-Zaid-The-Fortune-Teller.jpg

It is a little known fact that Mark Zaid, the Ukraine call whistleblower’s maverick attorney, has a number of superpowers. These talents go far beyond his uncanny ability to squeeze money and fame from the dead, instantly teleport to the CNN studio, and provide a never ending pseudo-legal narrative that supports President Trump’s impeachment and the justification for general Flynn’s persecution. Zaid himself, as well as his sizable fan base have compared him to hybrid of Clark Kent and James Bond.

Mark Zaid Bond
Image 1: Mark Steven Zaid and his alter egos of Clark Kent and James Bond

Mark Zaid and Princess DianaImage 2: Squeezing money and fame from the dead: Mark Zaid, the attorney of Mohamed Al-Fayed, promoting the conspiracy theory that Princess Diane was murdered because she was pregnant

But Zaid has an additional superpower that hasn’t been made public until now. It turns out that he is psychic as well. In March 13, 2017 using what can only be explained as a divination, Zaid’s partner, John N. Tye, reinstated a 4 year defunct company called Values United DBA Whistleblower Aid.

Mark Zaid Whistleblower Aid John Tye
Image 3: Mark Zaid, the founding legal partner and John Tye, the CEO of Whistleblower Aid

The Whistleblower Aid organization, which claims to be non-profit advertises these services:

Whistleblower Aid seeks to lower the barriers for courageous patriots to step forward. As a human and civil rights organization headquartered in the District of Columbia, in some cases we hope to provide clients with additional support including:

  • Media & public relations coaching
  • Dedicated, Secure Devices for clients’ use in communicating with us about their case
  • Employment claims under the Whistleblower Protection Act
  • Transition Assistance
  • Temporary rent or mortgage support and networking to help find new jobs, in case of loss of employment
  • Psycho-social counseling and treatment

The 5 star treatment they offer their clients (i.e. PR coaching, psycho-social consulting and treatment, temporary rent and mortgage support, and job placement), looks more like a luxury spa/resort service than legal aid. Even more noteworthy is their mysterious business/revenue model. For example, it’s a puzzle how a little altruistic boutique firm can provides all of these expensive services pro-bono and uses sources like GoFoundMe to finance their legal fees. How is it that they are not violating the gift prohibition to federal employee or The American Bar Association’s rules for avoiding conflicts of interest which states the following:

“lawyers may not subsidize lawsuits or administrative proceedings brought on behalf of their clients, including making or guaranteeing loans to their clients for living expenses, because to do so would encourage clients to pursue lawsuits that might not otherwise be brought and because such assistance gives lawyers too great a financial stake in the litigation.”

Whistleblower Aid -2017 Taxes
Image 4: Whistleblower Aid 2017 taxes

Since early 2017, Whistleblower Aid has already represented a number of individuals, several with a history of leaks and affinity to the Obama administration. This taken together with Evelyn Farkas’s call in late 2016 to federal agency employees to “get as much intelligence as you can”  and then publish/leak it as fast as possible, and John Brennan’s recent call for all available whistleblowers to carpe diem and step forward, suggests that we are witnessing some sort of a mystical political crystal alignment with all of the dark litigative energy emanating from Mr. Zaid and Co.

Evelyn Farkas Leaking
Video 1
: Evelyn Farkas confirming her call to collect intelligence on the Trump team and publish/leak it

John Brennan calling all whistleblowers
Image 5: John Brennan calling all whistleblower

It’s possible that all of these events and people are unrelated and that they just somehow converged. But, Occam’s Razor suggests that it’s more likely that the formation of this organization was a coordinated effort to stand-up a factory style assembly-line in order to deliver a steady supply of political hits. The timeframe for their re-activation (52 days after President Trump’s inauguration) and Zaid’s January 2017 fortune teller style proclamation that the “#coup” against president Trump has started also supports the argument that Whistleblower Aid is in fact part of the “#rebellion” and that the only real service they provide is fuel for the “#impeachment” furnace.

Mark Zaid the Coup has Started
Image 6: Mark Zaid’s proclamation that the coup against president Trump has begun

Mark Zaid
Image 7: Examples of various linkages between Mark Zaid, his anti-Trump targeted media appearances, ‘the resistance’, his on-line profile, and social network (POI-ED is a person of interest that is related to him).

Zoltar (another well known fortune teller) once said, “Lucky at cards, unlucky in love”. From analyzing Zaid’s social and professional profile (Image 7), it certainly looks like Zoltar was right on the money. But what still remains a puzzle is how does John N. Tye’s (the CEO) salary of >$200K per year balances against Whistleblower Aid’s income of about $22K? And in this vein, who has been covering their losses since their inception (over $619K USD in 2017 alone), …and why?

Some Final Words from Zoltar
Dear Mr. Zaid, Tye, and Bakaj, Whistleblower Aid’s practice of using obscurity for security like aliases to create on-line accounts, private burner phones, and email communications to store and transmit classified government secrets only works in the movies. In the real-word, every piece of classified information your clients transmit to you via your super-duper ‘dedicated secure devices’, can be easily intercepted by every hostile foreign state actor that is monitoring your traffic.

In fact, Zoltar would be positively shocked if your little aid society isn’t one of the biggest targets of foreign intelligence gathering. But, considering Mr. Zaid’s awesome psychic powers and his proclaimed cyber security expertise, I expect you to already know that.

Mark Zaid Cyber Security Keynote
Image 8
: Mark Zaid delivering keynote on cyber security

References and Sourcing
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object detection

Maine Lighthouses Near Ogunquit
Image 9
: An example of using the Sentinel AI to discover a hidden linkage between Mark Zaid and POI-ED (a person of interest related to him). Both have independent images of shared objects such as photos, paintings, a cat, articles of clothing, and household items that the ML classifier was able to identify independently, match, and link

© Copyright 2019 Yaacov Apelbaum, All Rights Reserved.

The Rise of the Shadow Data Brokers

Real Fake
A number of internet researchers and reporters have asked me to evaluate some of the imagery and files that are being distributed by one George M. Nasif through his Twitter, Facebook, and website. Nasif claims to possess vast amounts of proprietary DOJ, diplomatic, intelligence community, and law enforcement records, in addition to donor credit card payments and a variety of classified emails. Nasif, who promotes himself as a network security specialist has significant presence and engagement on SM. His Twitter network alone has over 17K followers and its growing.

George Nasif Profile
Image 1: George Nasif’s Twitter Profile

George Nasif, AKA George Michael Nasif, makes a lot of bold claims about the esoteric sources of his data and his deep knowledge and insight into current events. These claims seem to resonate well with his followers and influence network. A typical posting that promotes his content includes statements like:

“My Server files on the gangsters of the Obama admin. over 2 million documents. 3 Terabytes of information. Has now more than doubled to over 6 TB of files”

George M Nasif Claim
Image 2: George Nasif’s cave of data wanders

Running the sentinel AI on Nasif’s depositories (some of which are housed in a public DropBox archive) reveals that almost all of his data and images were scraped from various forums, websites, and social media outlets. None of the examined data is proprietary in any way nor was it obtained recently. Also, contrary to his claims, his data set doesn’t even come close to 6 TB or millions of files.

The following image illustrates the data sources found on Nasif’s site. This screenshot is a Nasif snippet from a flight log on Jeffery Epstein’s Boing 727-31 TN N908JE showing Bill Clinton on the passenger list. This document was originally disclosed as part of the Epstein v. Edwards lawsuit in 2009, it was collected by Nick Bryant and published through John Cook via Gawker.com.

Bill Clinton Travel Log Entery
Image 3: Nasif’s snippet of the flight logs to Epstein’s private island

Nasif however, doesn’t provide a direct link to the source document nor does he credit John Cook and Nick Bryant. Instead, as can be gleaned from his tweet below, he implies that his depository may just be the only remaining source for this information, which is clearly not the case.

Nasif Last Document Source
Image 4
: “This might be the only archive left in existence.” Nasif, obfuscating the real sources of the data in his ‘proprietary’ archive or claiming that he (Team George) is the source.

Bill Clinton Travel Log
Image 5: One example of the source of George Nasif’s “proprietary” data depository (this is the source of of Nasif’s snippet seen in Image 2)

Beside the misattribution and hiding the real sources of his data, many of the images in his depository show evidence of touch-ups and post editing (it’s unclear by whom). The images have the wrong authorship attribution and their labels have misleading descriptions of the content. Many of the screenshots of the documents also exhibit font type and resolution mismatches, suggesting that the text on some of the images was retyped after they were produced.

George Nasif SC-1
Image 6: Some of the ‘proprietary’ content advertised by George Nasif

The logistics behind Nasif’s > 6TB cloud based archive raise questions about his ability to float such an enterprise as a non-revenue service. IBM CDN cloud storage goes for $0.02-$0.085 per GB. Doing a quick math, shows that at these rates, Nasif could be spending an upwards of $100-$700 USD a month on storage alone and that doesn’t include the bandwidth cost for streaming all of the conspiratorial video files.

His claims about having pedophilia related images and records (the AI flagged several) are problematic to say the least. Beside the moral issues with possessing, posting, trading, and directing others to access this content, there is also the small problem of breaking federal and sate laws. His references to having personal and company financial data such as passport numbers, credit card numbers, bank accounts, and other PII data, could result in multiple felony charges for him and for anyone who has a copy of these records. Also, publishing this information (as he claims to have done) could be prosecuted under state doxing laws. If his public records do indeed contain names, addresses and phone numbers of federal employees, he and whomever downloads this data could also be potentially prosecuted under 18 USC § 119.

In terms of Nasif being a subject matter expert and uber-communicator, his writing style exhibits habitual poor grammar, punctuation errors, spelling, and capitalization issues—the hallmarks of an author not accustomed to technical writing. His claim of being an “IT Internet Network Security Specialist Certified White Hat NSS” is also dubious as his professional career mostly revolved around house painting. He has a zero industry security footprint, he has very limited technical vocabulary, and he exhibits a poor grasp of even basic computer security concepts. His professional network and background also fail to show any traces of InfoSec or IT experience to back up many of the cybersecurity interpretive claims and ‘big’ statements.

George Nasif Painting & Construction Services
Image 7
: George Nasif’s linkage

Based on Nasif’s lack of technical proficiency and a reasonable explanation of how he has gotten access to the ‘proprietary’ materials, it seems that he is just an opportunistic shadowy data broker who scrapes dubious content from 3rd parties, tags with provocative titles, and makes sensational headline style claims about its meaning. It may also be relevant that him becoming a purveyor of ‘secret’ intelligence suspiciously coincides with the 2017-2018 GoFundMe launch of his web hosting service (re-selling IBM hosting) which, interestingly, also uses similar bombastic claims such as:

“The Most Secure Cloud Storage Server in the World. Secure Hosting- Secure High Speed 1Gig Internet- Secure Chat- Secure Photo and Video Storage”

If you need further evidence about the nature of this depository, read Nasif’s Read First NOTICE TO ALL VIEWERS

“…Please do not publish any of my evidence documents in public or private forums without my written permission. Please do not try to “share” a link to my evidence file folders from this drop box folder to social media pages, groups, or news publications. If you publish anything labeled “Secret” in public, I cannot protect you from legal or criminal prosecution that may follow.

If you want to invite someone to view “George Global” please make that request by email to g.nasif@yahoo.com and make sure that person has followed protocol by first making a donation to the new server so I can give them access. Posting many of these documents is what got me banned 15 times from Social Media, Twitter and FB. Remember this when RT or sharing on FB. Think before you act. Be responsible. All Documents have been vetted as factual and true evidence from the source.”

So, there you have it. You shouldn’t publish any of Nasif’s documents without his permission because he scraped them from other sites and now claims them as his IP. But if you do re-publish anything labeled “Secret” from his publicly accessible DropBox archive, he won’t be able to protect you from “legal or criminal prosecution”. Also, don’t forget to ‘donate’ to his business venture in order to get access to the ‘full’ content of this magical archive (which previously was in the public domain). And finally, Nasif himself assures you that he “vetted as factual and true evidence” over 6 TB of data and millions of records.

If you are still struggling with the classification of the content in Nasif’s depository/postings as real or fake, the highly technical illustration below may be of some help.

How Nature Says, “Do Not Touch”
Image 8: How Nature Says “Don’t Touch”
Credit: Gary Larson’s Far Side Cartoons

Do Clothes Make the Woman?

Alexandria Ocasio-Cortez with her plaisters

“Clothes make the man. Naked people have little or no influence on society”

Some attribute the source of this quote to Mark Twain (1835–1910), but he wasn’t the first to observe the human propensity to dress for the occasion.

Twain, likely quoted William Shakespeare (1599), who wrote in The Tragedy of Hamlet:

“The apparel oft proclaims the man.”

Shakespeare, in turn may have cited Peter Idley (1474), who wrote in his Instructions to his Son:

“Ffor clothyng oft maketh man.”

Idley, in turn probably quoted Erasmus (1500-1508), who wrote in his Collectanea Adagiorum and Adagiorum Chiliades The Encyclopedia of Proverbs (Adagia 3.1.60):

vestis virum facit”– clothes make the man

Erasmus, in turn, quoted the Roman poet Quintilian’s (35 CE–100 CE), who wrote in his Institutions (oratory–8 pr. 20):

“To dress within the formal limits and with an air gives men, as the Greek line testifies, authority.”

Quintilian, in turn, likely paraphrased Homer (484 CE–425 CE), who wrote in the Odyssey  (6.29–30):

“From these things [clothes and personal care], you may be sure, men get a good report”

My take on the concept of “Clothes make the man” is that the dress code should match the  occasion. From a sampling of 30 outfits from AOC’s vast wardrobe catalog, it looks like Cortez, the high priestess of the progressive movement and the friend of the little workingman/woman only leaves the house in ± $1.5K outfits.

Alexandria Ocasio Cortez Border Accessories
Image 1: He/She comrade Alexandria Ocasio-Cortez’s trendy white outfit and the horror of the experience of standing in front of an empty parking lot at the Tornillo CBP center.

AOC The Outfit
Image 2
: He/She comrade Alexandria Ocasio-Cortez’s working class outfit made up of a Blazer with Pants by Gabriela Hearst, Victoria Secret undergarments, and Manolo Blahnik pumps.

This obviously begs the question of how is it that a former waitress/bartender who only earned ± $27K in 2017 (and still owes about $50K in student loans) managed in less than a year to amass over $50K in clothes, shoes, bags, and bling?

AOC What's a Girl to Wear
Image 3
: He/She comrade Alexandria Ocasio-Cortez’s and her working class wardrobe

Yes, clothes can help enhance a person, but without the exercise of discretion and independent judgment, they amount to little more than putting lipstick on a pig.  Or as Proverbs 11:22 puts it:

As a ring of gold in a swine’s snout,
So is a fair woman without discretion.

As a ring of gold in a swine's snout,
Image 4: Self-explanatory

References:
–  XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object detection
– William Shakespeare – Hamlet
– Peter Idley’s – Instructions to his Son 
– Erasmus of Rotterdam – Adagiorum Chiliades 
– Quintilian – Institutes of oratory; or, Education of an orator
– Homer – The Odyssey
– Alexander Atkins “Clothes Make the Man”

Copyright 2019 Yaacov Apelbaum, All Rights Reserved.

Uncovering the Dark Secrets of Dubious Software Startups

Yaacov Apelbaum-Lavitation API and Bridge for Sale

Maybe you are thinking about buying a new technology platform or investing in a software startup. Following industry practices, you will likely conduct some form of due diligence before you make your big move. This may include interviewing members of the management, technology and finance teams. You may also conduct operational audits, review sales figures, talk to customers, and check for references.

All advisable but in the end, you will still be left with a certain amount of nagging doubt. After all, how do you really know what this company’s true technology abilities are? How can you tell with a high degree of certainty that you are not buying the Brooklyn Bridge equivalent of some useless/over-hyped software? In today’s frenzied Internet of Things, mobile and Big Data buzz-ridden world, sometimes it seems as if the sky is the limit. To the uninitiated, it is exceedingly difficult to tell the difference between a solid early stage software idea and a useless concept professing to be the next big, anti-gravity SaaS solution.

I know. You are probably asking yourself: how difficult can it be? After all there are numerous simplified due diligence guides that answers questions like:

  • Does the company really own its supposed product?
  • Is the technology integrated/constructed in the right way?
  • Can their technology scale?

Unfortunately, when you are evaluating a technology potential, you may find that the answers to such questions are fuzzy and not always easily discernable. So before you make your investment decision based on some generic checklist, you may want to consider the following tale about the rise and fall of a flying super hero in tights.

In 2010, following the meteoric success of the Spider-Man movie franchise—which grossed over $2.5 billion worldwide—a stage adaptation entitled “Spider-Man: Turn Off the Dark” arrived to Broadway. The investors spared neither expenses nor talent in pouring over $75 million into the production in hopes of recreating the movie magic and revenue.

To stay true to Spider-Man’s legacy, the play executed some complex aerobatics sequences and flight scenes across the stage.  These stunts quickly gained notoriety as the show became plagued by accidents.

Some of the more noteworthy injuries included:

  • Stunt double Kevin Aubin broke both wrists when he was catapulted from one end
    of the stage to the other
  • Brandon Rubendall broke a toe that same month doing the same stunt as Aubin
  • Natalie Mendoza, who played villain Arachne, suffered a concussion when she was struck in the head with a piece of equipment
  • Carpio, Mendoza’s replacement, suffered a neck injury after a battle scene with
    Spider-Man
  • Stuntman Christopher Tierney fell 30 feet into the orchestra pit suffering a fractured skull, a fractured shoulder blade, four broken ribs, and three broken vertebrae
  • Daniel Curry, a stunt double, got his right foot stuck in a stage lift and then a trapdoor closed on the foot, breaking the foot and both of his legs, necessitating amputations

Yaacov Apelbaum - Spiderman fallThis reads more like an account from the trenches of Verdun than a Broadway musical. Despite the carnage, the performances went on with regular venue changes and constant retooling of the storyline and musical score.

Even negative press reviews such as the “Pigs Will Fly Before Spider-Man Recoups $65 Million Costs” could not stop the show.

Finally last month, the producers announced that they plan to end the production in January 2014, the main reasons being falling ticket sales and—not surprisingly—the inability to get injury insurance for the cast.

In the end, the show will have run for over three years and will have lost an estimated $60 million.

So, what went wrong? Why did life fail to imitate art? It seems that on the live stage, the same stunts that were so easy to achieve in virtual CGI failed miserably when ported to the physical world. Why wasn’t it obvious from the start that the Spider-Man storyline could only work in the pages of comics and on the silver screen?

The investors behind the Broadway adaptation were seasoned entertainment entrepreneurs. Before committing funds to the project, they conducted their due diligence and found the venture to be worthy. Yet over a period of 3 years and despite watching repeating cycles of misfortune, they failed to pull the plug. Apparently, hope springs eternal—at least in the investor’s breast. Sometimes, even though red flags may be staring you right in the face, you can still miss all of the warning signs.

Yaacov Apelbaum- Spiderman flyingGlen southern - Fat Spiderman

Image 1: Spider-Man Planned vs. Actual

Over the years, I have conducted due diligence on various software partnerships, acquisitions, and investment opportunities. It turns out that questions like: ‘how scalable/portable is this solution?’, or ‘how valuable is the code?’ are not only difficult to answer but often irrelevant. Yaacov Apelbaum - Dehydrated Water

And just like in the example of the Spider-Man fiasco, even seasoned professionals can fall victim to a well rehearsed pitch presented by a charismatic team of snake oil salesman who can sell you dehydrated water without even blinking.

In many ways, evaluating an investment opportunity in software is like a game of cat and mouse. Your evaluation will involve constant pursuit, near captures, and repeated escapes. You will have to sift through piles of partial facts, exaggerations, and in some cases even deliberate misinformation.

This is to be expected.  No cause for alarm though. Here is a three phase approach to conducting due diligence effective enough to help strip the thin veneer of pretense so that you can get deeper insight into how your potential acquisition functions and what its possible soft spots are.

Phase-1
Before you start probing any soft spots, though, you will need to get the regular DD action items out of the way.  Conduct some background research and get Intel on the  following:

  • Litigation (are the company and/or it’s principals in court for any reason?)
  • Costs to operate the business for the next 12 months based on current burn down rate
  • 3rd party licenses and vendor agreements (both, in terms of income and expense)
  • Customer base, future growth projections, and teaming agreements
  • Forecasted capital investments (what are the costs of boarding one new customer?)

Phase-2
Now that you have the basics you can proceed to look for chinks in the armor.  Schedule some face time with the technology team, including: security, architects, operations, IT, development, QA, etc.  It is important that you conduct both group and personal interviews with these individuals because the group dynamics will effect the detail and quality of the answers you get.

The topics that I find to be the most illuminating include:

Management Pedigree – Find out if the the leadership team has prior successful entrepreneurial experience. Take the time to check them out on-line before meeting them face to face. (LinkedIn is a great source for this.) Each technical leader should have at least five to seven years of “specific and proven” experience in the areas that the company is trying to innovate (i.e. cyber security, analytics, etc.). Having general practitioner without deep domain experience will dramatically decrease the chances of their success because they will have to learn on the job and this will undoubtedly be time consuming and error prone.

Also, look into the tenure of the key members on the technical team. Has the CTO or VP of engineering been with the company from the get go?  Is there rapid turnover in any of these key positions? A revolving door syndrome could be an indication that the company failed to mature their technology and is trying to bridge the gap by searching for “the one” who will save them from impending doom—a strategy which rarely works.

The Buzz Factor – Check out the industry buzz about the company, the segment in which the company operates in and the competitive landscape. See if they are covered by reputable media sources or if they have one any competitions or awards. A common strategy that some startups use is to make PR releases or pay for favorable coverage. Independent coverage is a good sign that the company is legit and is getting traction. When reading feature articles about the company, look for ranking.  Many publications will provide a listing of the top leaders in the domain. If your company is not in the top list and is just being mentioned using language similar to “also active in this space is…”, this could be a sign that they paid the publisher just to get into print.

Team Makeup – In software more so than in most other engineering disciplines, the human factor and the work environment are critical to success. A salt mine culture and a dysfunctional team are indications that the company will perform poorly. When evaluating the team, inquire about the FTE to contractor ratio. Heavy offshore presence could be an indication that the company is a façade with the bulk of the architecture, development, and engineering work being done offsite/offshore by some outsourced firm. This could a problem if you are under the impression that you are investing in domestic IP and human capital.

Work Culture – The work culture is a good indicator of how functional the organization is. Find out if they are burning the midnight oil every day and if so, why? Are they fixing bugs? Trying to catch-up on backlog features?  Working long hours in a startup is the norm, but doing it for long periods of time could be an indication that they have not yet found their stride. Ask questions like: “What do you love and hate about the company?” or “If you could change three things, what would they be?”

Compensation – This may not be obvious but compensation can teach you a lot about how well the company is doing. Working in a startup requires some financial tradeoffs but the  compensation for the technical team should be within/above the standard industry pay rates. The company should not run like a charity. Did the team get their bonuses last year? Missed yearly bonuses and compensation that is low on cash and high in stock options should raise red flags about how well the company is doing.

Phase-3
Now that you have your finger on the pulse of the organization you are ready to separate the wheat from chaff by identifying the most important takeaways about your target company.

As you complete the two previous DD phases, you will most likely discover that not all of the representations made to you were correct, nor were your original assumptions. The objective of this last exercise is to draw a critical line in the sand that if crossed will result in your walking away from the deal.

The following is my list of eight key assumptions that must pass validation:

1. Platform stability – This covers production matrix such as up-time, downtime, maintenance windows, and singed SLAs. The solution must have published SLA and a historical record of past system shutdowns. All systems go down for one reason or another. It’s important that you understand how frequently their system/sub systems bounce and what the reasons are. The need to babysit the system 24X7 or having a large IT to development ratio can be an indication that the solution is on constant life support.

2. Ease of deployability – This covers questions such as hosting (cloud based vs. hosted), provisioning, and the mechanisms for deployment of new customers and users. When it comes to creating new customer environments, look for manual steps used for copying code, configuring/populating databases, and the usage of script to create work regions. Clearly, any manual process for setting up and boarding customers and the need to manipulate the back-end through manually is a big no-no.

3. Solution scalability – This covers questions regarding number of current transactions per customer, number of customers, daily feed sizes, batch processing schedules, daily feed timeline, and core processing windows. Pay close attention to storage, processing, clustering, and load balancing. Look for obvious signs that the solution will not scale. For example, if the company plans to double its customer base in 12 months, they should already have in place the infrastructure to support such growth. Very few organizations are capable of simultaneously galloping and changing horses mid-stream by making significant alterations to to their storage and load balancing architecture.

4. Maintainability – This covers questions such as production release readiness, customer reporting, and bug tracking. Regardless of how young the company is and their appetite for technology debt, they need to have a functional configuration management, change control, and monitoring capabilities. This doesn’t mean that it’s either HP OpenView or bust. To achieve monitoring, open source tools like Nagios will do. Regardless of the tool, they need to have something in place that is integrated into their solution. Without such controls, they will be flying in the dark, which almost certainly will adversely impact their customers.

5. Disaster recovery, business continuity planning, and availability – This covers questions like how and if the company will recover from various disaster scenarios. What happens if they lose a customer database or the records of important transactions? Is this data being backed up daily? Have they ever attempted to recover from backups? If the company is providing financial services or uses big data, find out how they backup the sensitive information such as PCI data and the terabytes of records on their HDFS.

6. Sophistication of intellectual property – This covers questions regarding the robustness of the algorithms, the structure of the data models, the coupling of the various tiers, the utilization of new and cutting edge frameworks, (i.e. big data components like CPE, queue, plug-ins like R, etc.), and how well everything is mashed together. Remember, just because they use cloud storage/hosting or Hadoop doesn’t mean that their solution can achieve their business objectives or even successfully process large amounts of data.

7. Support for internationalization – This covers questions regarding multi-lingual support, localization, redundant hosting and customer support that follows the sun. Very few startups will be able to fully support internationalization.  If you are planning to offer this solution as part of your international portfolio of products, you will need real internationalization that goes beyond the skin deep ability to customize logos and labels.  Just like in the case of scalability question, if the functionality is not there now, it will require a significant development effort downstream.

8. Security and privacy –  This covers questions regarding authentication, anonymization, encryption, sensitive data storage, data retention, compliance with PCI, FFIEC, etc. Security, due to its nature, is viewed almost universally as overhead and an afterthought. If the platform you are evaluating needs to run silent and deep in hostile waters, you need to make sure that areas such as intrusion detection/prevention, access controls, malware/firewall management, and auditing are up to snuff.  Look for up-to-date security policies, records of ongoing security audits (SAS 70, CISA, etc.), vulnerability assessments reviews, and penetration tests. If the company has no such records on file, this can be a strong indication of poor security planning, which is a ticking liability time bomb.

General Consideration During your Due Diligence
My primary indicator of readiness and prospect for success is the number of customers that currently use the software. Obviously these numbers may vary with the type of the solution but if your investment target has a steady and growing customer base, they have at least survived the valley of death and are for real.  When evaluating the customer base, look for active accounts that use the system regularly.  In many startups, the customers are often made up of relatives/friends and pilot users, although, these types of accounts are important for testing they have little commercial value.

Remember, in the end, it doesn’t matter how compelling the business case may seem, what great technologies they have, or how modular their solution architecture is, without a real customer base, it’s a risky gamble.

A secondary indicator is that of the team and organization. Are you are just buying the software, the team, or the entire package? If you are only interested in the IP, then you will need to identify and secure the architects, lead developers, and core technical team in order to assimilate the technology. On the other hand, if you want the product, then you will need to insure that the organizational structure will be maintained.  This is not an easy thing to do, as often many core team member will cash their chips and move on to pursue other opportunities after the sale of the company.

A third indicator is that of Intellectual Property. You need to carefully address IP questions and determine who owns it, where the inventions come from, who was exposed to the inventions, what are the rights of the FTE/contractors to these ideas, and if there are any invention disclosure forms or patent filings in place.

An in-depth evaluation of the architecture through a code review of the key algorithms, data structure, and framework that form the secret sauce should help answer most of these questions. It is important that you conduct this discovery hands-on by reviewing code and metrics such as code quality, code complexity, and unit test coverage. This is the only way for you to insure that the magic is real.

Summary
Executing an effective technology due diligence is more of an art than a science because each software solution you will evaluate is unique. Many early and mid stage startups need to trade off between delivering basic business value and developing a fully mature prime time ready platform. These competing factors make it hard to determine with certainty if a solution has the potential evolve into a commercial success or if it is just being held together with chicken wire and chewing gum.

It is important to approach each discovery phase with a set of simple objectives that are critical for a favorable evaluation of the overall solution. This way, during the evaluation of each key assumption, you will be able to clearly identify the main decision gates and confidently make a go/no-go determination.

© Copyright 2014 Yaacov Apelbaum. All Rights Reserved.

The Time Tunnel & Reciting the Shema in Papua New Guinea

Yaacov Apelbaum-Time Tunnel

Among the most prominent themes in the Hebrew Bible are the concepts of sin, punishment, repentance, and restoration. Chapter 28 of the book of Deuteronomy, known as the “blessing and curse”, makes it abundantly clear what the rules of the game are. Follow the law and you will enjoy fantastic entrepreneurial success and overflowing prosperity. Disobey it, and you’ll be punished with the worst forms of war, exile, anarchy, and poverty.

The following two promises illustrate the inverse relationship of the biblical punishment and restoration concepts:

Punishment (Deuteronomy 28:64)

…and the LORD shall scatter you among all peoples, from the one end of the earth unto the other end of the earth;

…and there you will serve other gods, which you have not known, nor your fathers, even ones made of wood and stone.

is offset by:

Restoration (Jeremiah 29:14 and Zechariah Chapter 14:9)

… and I will end your captivity, and gather you from all the nations, and from all the places whither I have driven you, said the LORD.

…and the LORD shall be King over all the earth; in that day shall the LORD be One and His name one.

I chose to use the example of the exile from/return to the Promised Land as an illustration because it seems to have been executed with meticulous precision for over 2700 years. Being a software engineer, I can’t help but look at a promise of punishment and restoration that spans such a long period of time and not see a BPEL long-running transaction.

In software design, we use the term ‘long-running transaction’ to describe a job that may need to run for an extended time and survive various failure conditions like system reboots and lack of connectivity. These processes might also have long periods of inactivity between consecutive events, so they just sit and wait for days, weeks, or months at a time.

So keeping this in mind, we can begin our historical tour of one of the longest-running transactions in history and how it unfolded throughout the centuries.

The Jewish mass exiles from the holly land begins in 740 BCE. After repeated threats and prophecies foreshadowing impending doom, the Assyrian king Tiglath-Pileser III, arrives to the Northern Kingdom of Israel and exiles the tribes of Reuben, Gad, and the half of the tribe of Manasseh (I Chronicles 5:26).

Yaacov Apelbaum - Sennacherib Prisms In 722 BCE, it is the turn of Samaria, the capital of the Northern Kingdom. After a three year siege, Samaria is captured by Sargon II and Shalmaneser V, each of whom, in turn, proceeds to exile first 27,290 inhabitants of Samaria and then ten of the twelve tribes of Israel. Those ten later came to be known as the Ten Lost Tribes. (2 Kings 17:24).

In 701 BCE, twenty years later, Sennacherib leads a military campaign against Judea, which results in the exile of 200,000 Israelites (2 Kings 18:12 and Taylor Prism).

Yaaacov Apelbaum - Nebchadnezzar Tablet JerusalemNow fast-forward the time machine by 100 years, to 597 BCE.  The Assyrian empire has just been replaced by the Babylonian.  With new regional management comes a new round of exiles. This time it’s king Nebuchadnezzar II who is the divine “messenger”. Jerusalem, the capital of Judea, is put under siege and eventually falls resulting in the destruction of the First Temple in Jerusalem and the exile of 50,000 people to Babylonia (2 Kings 25:21).

By 520 BCE, only 70 years later, the Babylonian empire has gone the way of all empires and the new superpower, Persia, permits the exiles to return to Judea and rebuild the Second Temple.

Yaacov Apelbaum - Antiochus IV EpiphanesIn 334 BCE, it’s the Persian empire’s turn to meets its maker. Judea now falls under the rule of Alexander the Great. By 167 BCE, his empire is broken to there separate kingdoms and one of his successors, the Seleucid king Antiochus IV Epiphanes, pursues a zealous Hellenizing policy against the Jews which leads to the Maccabean Revolt. In the space of three days, 40,000 people are killed in Jerusalem, and the same number is exiled and sold into slavery. (2 Maccabees 5:11–14).

By 6 CE, the Seleucid empire goes up in smoke and Judea became a province of the Roman empire. In 66 CE, due to a combination of religious and political factors, a full -blown revolt is launched against Rome. This war, known as the First Jewish–Roman War, lasts for about 7 years and ends in the destruction of Jerusalem and the Second Temple. According to Josephus, around 1,000,000 people are killed, and as many as 100,000 are exiled and sold into slavery. The exiled slaves and gold that was stolen from the temple finances major public works in Rome, including the Colosseum.

Through their iron fist policy, the Romans keep Judea quiet for another 40 years. Then in 115 CE, the Second Jewish-Roman war breaks out.  Known as the Kitos War or the rebellion of the diaspora, the war lasts for about two years and results in the depopulation of many Jewish communities in places like Cyprus, Cyrene (modern-day Libya), Alexandria, and thousands of exiles.

Yaacov Apelbaum - Hadrian Bar Kochvah RebellionPax Romana works for another 15 years. Then in 132 CE, the emperor Hadrian decides to rename Jerusalem “Aelia Capitolina” and to prohibit circumcision. This leads to the Third Jewish-Roman War, also known as the Bar Kokhba Revolt. The war lasts for 4 years.  The outcome is almost the complete devastation of Jewish life in Judea. According to the Roman historian Cassius Dio, 580,000 Jews were killed and thousands exiled.

In a final attempt to suppress any future Jewish revolts, Hadrian burns the Torah scrolls at the former Temple sanctuary and places two statues there: one of Jupiter and one of himself. Yaacov Apelbaum - Constantius GallusTo eradicate any memory of Judea or Israel, he also wipes the name “Judea” off the official Roman maps and replaces it with “Syria Palaestina” (after the Philistines).

This strategy works for about 120 years. Then in 351 CE, a revolt brakes out against emperor Gallus.  After a short war, Tiberias, Diospolis, and Diocaesarea, the centers of the rebellion, are razed to the ground. Ursicinus, the Roman general in charge, orders thousands to be killed, enslaved, and exiled.

260 years passes, and the empire is now under Byzantine management when a Jewish revolt Yaacov Apelbaum -Heraclius Tremissisbrakes out against emperor Heraclius. The war ends in about 626 and is followed by a wide scale massacre of the Jewish population throughout Jerusalem and Galilee, and the exile of tens of thousands.

By 628 CE, it’s the end of the road for the Byzantine empire. The Jewish population in Judea under Muslims rule continues to shrink for about 400 years and eventually in 1099 CE, culminates in the Crusades during which most of the Jewish population left in the land is either killed or exiled.

Yaacov Apelbaum - Latin Kingdom of Jerusalem Baldwin III.

This pattern continues during the Middle Ages, Renaissance, and up until as late as the 20th century. Some of the expulsions are massive, such as the one in Spain in 1492 that effects 800,000 people. Others are smaller and impact a single city or several hundred individuals.  But nevertheless, The Jewish communities everywhere were constantly involuntarily on the move.

A quick historical sampling of European expulsions between 1495-1597 shows 23 such events.

1495 Lithuania
1497 Portugal
1499 Germany
1510 Brandenburg, Germany
1510 Naples  
1514 Strasbourg
1519 Ratisbon [Regensburg in Germany]
1527 Florence
1535 After Spanish troops capture Tunis, all the local Jews are sold into slavery
1540 Naples
1542 Bohemia
1550 Genoa
1551 Bavaria
1551 Pesaro
1559 Austria
1561 Prague
1564 Brest-Litovsk
1567 Würzburg [Bavaria] 
1569 All Papal Territory except Rome and Ancona
1593 Brandenburg, Austria
1597 Cremona
1597 Pavia
1597 Lodi

Between 1941 and 1945 across German-occupied Europe, the Nazis, aided by local collaborators, murdered systematically over six million Jews, around two-thirds of Europe’s Jewish population. The murders were carried out in pogroms and mass shootings; by a policy of extermination through labor in concentration camps; and in gas chambers and gas vans in German extermination camps.

By 1947, 2700 years have passed since the first Assyrian exile. The original prophesy in Deuteronomy 28:64 of “I’ll scatter you among all people… from the one end of the earth unto the other end of the earth” has now been fulfilled.

So, you are probably thinking to yourself: “This history of the exiles and expulsions is very interesting, but where is the proof of the inverse prophesy?” (Remember? The one about gathering the exiles from the far reaches of the earth and bringing them back to their homeland and the universal recognition of the one nature of G-d).

In what looks like the self-reassembly scene from the Iron Giant, over the past 100 years, the decedents of the exiles are finally starting to make their way back home. Need some proof?  By 1948, against all the odds, the State of Israel is re-established, the land is reclaimed, and Hebrew, as a spoken language is resurrected.  Furthermore, consider the stories of some of the returning exiles, a remote and apparently completely unrelated groups like: Beta Israel, Bnei MenasheBene Ephraim, Bene Israel, Pashtun, ye-Ityoppya Ayhudi, Bakwa Dishi, The Lemba people, and Kaifeng. All of these have an oral traditions that claim that they are the descendants of the Judean exiles or the ten lost tribes.

Ok, so what about the universal recognition of the “one nature of G-d” prophesy? This one takes the cake! Check out the video below, recorded in a remote village in Papua New Guinea. It shows the native community reciting one of the oldest biblical affirmation prayers about the unity of G-d.

The words for this song come from the text found in Deuteronomy 6:4:

Hear, O Israel: the LORD our G-d, the LORD is one

For Jews, it is considered the single most important passage in the Hebrew Bible, and it has been recited as part of the daily prayer routine for over 3,000 years, long before the first exile ever took place.

G-d bless the people of Papua New Guinea!

 

© Copyright 2011 Yaacov Apelbaum All Rights Reserved.

The Startup Leap to Success

Yaacov Apelbaum-The Startup Product Leap

One of the most challenging periods for any startup is passing through the “Valley of Death”. During this delicate phase, the organization’s burn rate is high and it has to rapidly achieve the following three goals:

  1. Move from a proof of concept (POC) to a functional commercial product
  2. Reach a cash flow break even
  3. Transition form seed\angel funding to venture capital funding

For startups focusing on the development of SaaS products, this phase also marks an important millstone in the maturity of their product. With increased volume of production users comes stricter SLA’s and the need to implement more advanced operational ability in areas such as: change control, build automation, configuration management, monitoring and data security.

Yaacov Apelbaum-Startup Financing Cycle

If you are managing the technology organization in an early stage startup, you have every reason to be concerned. To the outsider, the success and failure of startups often seems to be shrouded in mystery–part luck part black magic.  But ask a seasoned professional who has successfully gone through the startup meat grinder and he will tell you that success has nothing to do with luck, spells, or incantations.

Having worked with a number of startups, I have come to conclude that the most common reasons for product failure (beyond just not being able to build a viable POC) is the inability to control your product’s stability and scalability.

In the words of Ecclesiastes, there is a time and purpose for everything under heaven.  In the early stages of a startup’s life cycle,  process is negotiable.  Too much process may hinder the speed in which you can build a functional POC.  In later stages, reliable process and procedures (e.g. requirements, QA, unit testing, documentation, build automation, etc., ) are critical. They are the very foundations of any commercial grade product.  Poor quality and performance are self evident and no matter how much marketing spin and management coercion you use, if you are trying to secure an early stage VC funding round, your problems will rapidly surface during the due diligence process.

To avoid the startup blues, keep your eyes on the following areas. Factoring them into your deployment will help you deliver on time and on budget, with the proper scalability and highest quality possible.

Design Artifacts
Before converting your POC to a functional product, take the time to design your core components (i.e. CRM, CMS, DB access, security, API, etc.).  Create a high level design that identifies all major subsystems.  Once you know what they are, zoom into each subsystem and provide a low level design for each these as well.

  • Resist the temptation to code core functionality before you have a solid and approved scalable architecture (and the documentation for it). 
  • Let your team review and freely comment about the proposed platform architecture and deployment topology.  Just because a vocal team member has religious technology preferences doesn’t mean that everyone should convert.
  • No matter how good your technical staff is, when it comes to building complex core functionality (transaction engine, web services API, etc,) don’t give any single individual carte blanche to work in isolation without presenting their design to the entire team.
  • Document the product as you develop it. Building a complex piece of software without accurate documentation is akin to trying to operate a commercial jet without its flight manual.
  • To help spread the information and knowledge, establish a company-wide document depository (like a Wiki or SharePoint ) and store all your development and design documents under version control.  Discourage anyone from keeping independent runaway documents of the system.
  • Maintain an official (and versioned) folder for the platform documentation showing product structure and components, development roadmaps, and technical marketing materials. 

Testing and QA
If you are not writing unit tests you have no way to verify your product’s quality. Relying on QA to find your bugs means that by the time you do (if ever!) it will be too late and expensive to fix them.  Spend a little extra time and write unit tests for every line of code you deploy in production.  When refactoring old code, update the original unit test as well.

Just like most things in life, bugs have a lifecycle, they are born, they live and die.  Effectively tracking them as part of your build and QA process is a prerequisite for their timely resolution.  

If you are discovering a high critical bug count in your “code complete release” (half a percent of source code e.g. 500 bugs for a 100,000 line code base), you may not be production ready.  Stop further deployment and conduct a thorough root cause analysis to understand why you have so many issues. 

If your bug opening/closure rate remains steady (i.e. QA is opening bugs at the same rate development is closing them) and you have reoccurring bug bounces, you may need to reassess the competency of your development resources. This would also be a good time to have a serious heart to heart conversation with the developers responsible for the bugs. Be prepared for some tough HR decisions.

Monitoring and Verification
Just like you wouldn’t drive a car without a functional dashboard, you can’t run quality commercial software without real time visibility into its moving parts.  Implement a monitoring dashboard to track items such as daily builds (and breaks), servers performance, users transactions, DB table space, etc. 

Seeing is believing. Products like Splunk can help you aggregate your operational data.  Once you have this information, show it to your entire team. I personally like to pump it onto a large screen monitor in the development areas so everyone can get a glimpse.

Yaacov Apelbaum-Splunk Monitoring
Image 1: Splunk Dashboard in Action

Security, Scalability and Operations
Unless you are in the snake oil sales business, build your production environment from the get-go for scalability, security, and redundancy.  Don’t look for “bargains” on these technologies, leverage commercial-grade load balancers, firewalls, and backup solutions.

Your production environment is critical to your success, so don’t treat it as a second class citizen or try to manage it with part time resources. As you will quickly discover, a dedicated sys admin and a DBA who know your platform intimately are worth their weight in gold.

You must achieve operational capabilities in build automation, release management, bug tracking, and configuration management before going live.  If you don’t, be prepared to spend most of your productive time fixing boo-boos in the wee hours of the night.

Implementing many of the above mentioned measures will give you a significant tactical advantage as well as a strategic boost when negotiating with potential VCs.  Having these capabilities on your utility belt will also help you calmly face any future issues as your startup matures.

 

© Copyright 2011 Yaacov Apelbaum All Rights Reserved.

Only the Racially Pure Need Apply

The German American Bundpsd

On February 20, 1939, over 20,000 American supporters of the Nazi party packed Madison Square Garden in New York City. They anxiously awaited the appearance of Fritz Julius Kuhn, the newly anointed Führer of the German−American Bund. The event took place two days before George Washington’s birthday and a 30−foot-portrait of the first president (who was described by Kuhn as the first fascist) hung behind the podium along with Nazi flags and swastikas.

George W and Bund Fritz Kuhn
The 30 foot poster of GW and the American Führer Fritz Julius Kuhn

Kuhn entered the arena together with thousands of uniformed Nazi guards. During the rally he and his fiery fellow orators held back no punches, calling President Franklin D. Roosevelt: “Franklin Rosenfeld,” and referring to his New Deal as a “Jew Deal.”

Nazis in Madison Square Garden

Being a creature of the night, Kuhn loved nightclubs, drinking, and the company of women (among them his two mistresses, Virginia Cogswell AKA “The Marrying Georgia Peach−on account of her previous seven husbands”, Florence Camp, Frau Hedwig Munx, and others). Just like many petty dictators, he was pompous, dishonest, idiotic, and didn’t understand his own limitations.

Once during a testimony before the Dies Committee, he was asked by Congressman Starnes if the reason why 23 of 71 Bund units concentrated in and around New York City was because the aircraft and naval manufacturing facilities were handy for sabotage. He replied: “That’s the same thing Lipshitz said. You know who Lipshitz is? That’s Walter Winchell [referring to Winston Churchill]. Lipshitz is his real name.”  No one was amused.

Shortly after his rock concert−like appearance in Madison Square Garden, New York city’s mayor, La Guardia, who was fed up with the constant anti−Semitic and anti−American agitation, started an Al Capone−style financial investigation of the Bund’s taxes.

When asked about his relationship to Florence Camp during his trial, Kuhn denied that he had asked her to marry him and noted that Mrs. Camp was too much of a lady to accept a proposal after just a few days’ acquaintance. Herman McCarthy (the prosecutor) whipped out a Kuhn letter and read it aloud:

“Florence : I am terrible in love with you. I beg you to become my beloved wife. I will always be true to you. . . .”

In another letter to Florence he said that he loved her with his “whole soul and body and was about to have [his] teeth fixed.”

Virginia Cogswell Yaacov Apelbaum - Virginia Cogswell  News
Virginia Cogswell AKA “The Marrying Georgia Peach” and a case related telegraph

In the course of the trial, it was established that Kuhn had pilfered $14,548 from his organization ($717.02 of it having been spent on moving expenses for Mrs. Camp). Kuhn was swiftly convicted on charges of embezzlement, grand larceny, and forgery and was first sent to Sing Sing Prison.  After the war, he was deported to Germany, where he managed to get into trouble again.

The Escape of Fritz Kuhn

In 1949 when he again stood trial in front of a Munich court this time on charges of escaping from jail and being a major Nazi organizer, he claimed that the Bund was strictly “an American patriotic organization,” that he had used the swastika only because it was “an old American Indian design,” and that he had patterned the Bund’s uniforms after the US National Guard, not  the SS. As for his 1944 meeting with Hitler he said: 

“It was purely a social call. If I went to England today, I would naturally like to call on King George.” 

When the US. entered the war, whatever was left of the German−American Bund organization quickly disintegrated, however, that didn’t spell the end of Nazi activity in America. Another high profile organization waiting in the wings was the Steuben Society. In comparison to the Bund which was composed of common National Socialist riff raff, the Steuben Society represented the cream of the crop to the US Nazi aristocracy.

The German American Bund Movie

Although Steuben Society members avoided public Nazi displays such as hailing Hitler, the differences between the two organizations were only skin deep. When it came to hard core issues such Nazi ideology, they were indistinguishable.

While visiting the reception room of the Steuben Society in New York, John Roy Carlson observed:

“One could find a large American flag standing in one corner. On the walls were pictures of Von Steuben, Washington, and Lincoln, The Pledge to the Flag and the Bill of Rights hung framed between them. There was also no lack of red−white−and−blue. Patriotism oozed from every crevice in the room.”

True to its nature, the Society published “The Steuben News” a newspaper for Patriotic Americans which described itself as:

Yaacov Apelbaum-The Steuben News

“. . . a patriotic, civic and educational political society endeavoring to awaken in the hearts and minds of American citizens of German extraction the necessity for taking a more active part and interest in the political affairs of our great country.”

Its program demanded “strict discipline” on the part of its members, and rejected “persons who are shifters and trimmers, or who are known to possess no race pride.” The Steuben Society strongly emphasized Racial (Aryan) consciousness and political objectives.

In his 1943 investigative book Under Cover, Carlson wrote:

“…The Steuben News reprinted articles from the pro−Fascist Italian daily, Il Progress Halo−Americana. It recommended books by the notorious Ausland Institute and ran many articles by Nazi agents. The Steuben News praised as “extraordinary and valuable” the book Scarlet Fingers published by Flanders Hall, the propaganda mill financed by Nazi agent George Sylvester Viereck. The Steuben News followed the accepted party line of pro−Nazi isolationists. It headlined the speeches of Lindbergh. It championed the late senator Ernest Lundeen−some of whose speeches were written by Nazi agent George Sylvester Viereck−and on one occasion devoted eleven columns to one of his defeatist speeches. It reprinted from Social Justice and The Herald, American Fascist weekly. It ran large advertisements for the America First Committee, reprinted its bulletins and urged its members to support it financially. The Steuben Society fought desperately all measures to arm those European Democracies which resisted Hitler’s brutality. And it also quoted liberally from the New York Enquirer, published by William Griffin, who was later shown to have associated with Viereck.”

Now, you’re probably thinking: “This is a fascinating piece of history, but what’s the relevance of all of this 1939 Nazi stuff to our current 21st century jet−set life style?” Well, wonder no more.

This past Sunday morning on our way out of our local diner, I caught sight of the newspaper stand in the entrance vestibule.  I usually don’t read printed media, but the name of the paper and the motto “A Newspaper for Americans” caught my attention. Curious about how the Steuben Society’s defines “American,” I picked up my free copy and read on. 

Steuben News

At the top of the cover page on each side of the title “The Steuben News” were the mission statements: (1) United for Common Interests and Common Needs” and (2) DUTY, JUSTICE, TOLERANCE, CHARITY.

I flipped through and read some of the articles. There was an announcement of a presidential proclamation regarding the German−American Day, a story about the treaty between German settlers of Texas and the native Comanche Indians. My first impression was that it all seemed rather banal. Then I got the last page. Under the calendar of events, I ran into some terminologies like “event sponsored by Unit #998” and “contact Brother Erick or Sister Hildegard.” That seemed a bit cryptic and militant. At the bottom of the page I saw the membership form which prompted an unexpected double−take.

The membership form, unlike any other application I have ever seen,  had questions about the nationality of the applicant’s father and mother, political affiliation, and—most surprising of all—about naturalization. For some reason, the Steuben Society (acting in the capacity of a quasi−government organization?) will only issue membership cards after careful evaluation of the applicant’s naturalization certificate, which includes scrutiny of the certificate number and place of origin. (I’m kind of curious to know who at the INS helps them validate these applications.)

Are You Naturalized

From what I can tell, this membership application has remained consistent over the years. After conducting a quick search on−line for similar historical documents, I found one for the Silver Shirts, and as you can see from the contents, not much has changed in terms of drilling down to pedigree and other über eugenics.

Yaacov Apelbaum-Silver Shirt

When, I checked out the Steuben Society’s website for the name and location of the chapter nearest me, I discovered that they are all named after some distinguished German figure. I was hoping to find a chapter honoring the likes of von Stauffenberg, but alas, no such luck.

I am not sure what to make of all this. I hold German culture, ingenuity, work ethics, and organization in the highest esteem. I’m an avid admirer of Handel’s music and Nietzsche’s, Kant’s, Goethe’s, and Leibniz’s writings. My family originated from Germany and in my travels there I have found most German people to be kind, polite, friendly, and exceedingly intelligent.

On one hand, it’s laughable that anyone would be willing to complete an application detailing his mother’s nationality or his naturalization number in order to join a civic organization. On the other hand it’s really disturbing that in 2010—the age of the internet—a nationwide fraternity that draws its philosophy from one of humankind’s darkest moments, continues to operate in the mainstream with apparently unrestricted access to leading politicians and public figures.

If you are considering joining an organization such as this, take a breather and dedicate some time to learning the German language, literature, philosophy, and music instead. You will discover that the richness of Germanic culture has a lot to do with individuality and little with purity of race and blood.   

Et si omnes ego non

© Copyright 2009 Yaacov Apelbaum All Rights Reserved.