maanantai 6. helmikuuta 2023

Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials



Exclusive: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials

The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states.

For years, U.S. election officials and voting machine vendors have insisted that critical election systems are never connected to the internet and therefore can’t be hacked.

But a group of election security experts have found what they believe to be nearly three dozen backend election systems in 10 states connected to the internet over the last year, including some in critical swing states. These include systems in nine Wisconsin counties, in four Michigan counties, and in seven Florida counties—all states that are perennial battlegrounds in presidential elections.

Some of the systems have been online for a year and possibly longer. Some of them disappeared from the internet after the researchers notified an information-sharing group for election officials last year. But at least 19 of the systems, including one in Florida’s Miami-Dade County, were still connected to the internet this week, the researchers told Motherboard.

The researchers and Motherboard have been able to verify that at least some of the systems in Wisconsin, Rhode Island, and Florida are in fact election systems. The rest are still unconfirmed, but the fact that some of them appeared to quickly drop offline after the researchers reported them suggests their findings are on the mark.

“We … discovered that at least some jurisdictions were not aware that their systems were online,” said Kevin Skoglund, an independent security consultant who conducted the research with nine others, all of them long-time security professionals and academics with expertise in election security. Skoglund is also part of an advisory group, not associated with the research, that is working with the National Institute of Standards and Technology to develop new cybersecurity standards for voting machines. “In some cases, [the vendor was] in charge [of installing the systems] and there was no oversight. Election officials were publicly saying that their systems were never connected to the internet because they didn't know differently."

The systems the researchers found are made by Election Systems & Software, the top voting machine company in the country. They are used to receive encrypted vote totals transmitted via modem from ES&S voting machines on election night, in order to get rapid results that media use to call races, even though the results aren’t final.

Generally, votes are stored on memory cards inside the voting machines at polling places. After an election, poll workers remove these and drive them to county election offices. But some counties want to get their results faster, so they use wireless modems, either embedded in the voting machines or externally connected to them, to transmit the votes electronically. The system that receives these votes, called an SFTP server, is connected to the internet behind a Cisco firewall.

For security reasons, the SFTP server and firewall are only supposed to be connected to the internet for a couple of minutes before an election to test the transmission, and then for long enough after an election to transmit the votes. But the researchers found some of the systems connected to the internet for months at a time, and year-round for others, making them vulnerable to hackers.

Hacking the firewall and SFTP server would allow an attacker to potentially intercept the results as they’re transmitted and send fake results to the FTP server, depending on how securely the ES&S system authenticates the data. Although the election results that are transmitted via modem are unofficial—official votes are taken directly from the voting machine memory cards when they arrive at county offices—a significant discrepancy between the unofficial tallies and the official ones would create mistrust in the election results and confusion about which ones were accurate.

"These are all secure technologies that if [configured] correctly work just fine. It’s just that we have no faith that they are done correctly."

But Motherboard has learned that connected to the firewalls are even more critical backend systems—the election-reporting module that tabulates the unofficial votes as well as the official ones, and the election-management system that is used in some counties to program voting machines before elections. The researchers said that gaining access through the firewall to these systems could potentially allow a hacker to alter official election results or subvert the election-management system to distribute malware to voting machines through the USB flash drives that pass between this system and the voting machines.

*

Online, the researchers can only see the firewalls configured in front of these systems and cannot see anything behind them—a federal law makes it illegal for them to probe beyond the firewall. But ES&S documents posted online in various counties show that these critical backend systems are connected to the firewall, and ES&S also confirmed to Motherboard that this is the correct architecture in counties that want to transmit results electronically.

ES&S has long insisted that election-management systems are air-gapped—that is, not connected to the internet or connected to any other system that is connected to the internet—and the company insists to Motherboard that the diagram it provided isn’t showing them connected to the internet.

“There’s nothing connected to the firewall that is exposed to the internet,” Gary Weber, vice president of software development and engineering for ES&S, told Motherboard. “Our [election-management system] is not pingable or addressable from the public internet.” This makes them invisible to bad actors or unauthorized users, he said.

1565282528251-image3

But Skoglund said this “misrepresents the facts.” Anyone who finds the firewall online also finds the election-management system connected to it.

“It is not air-gapped. The EMS is connected to the internet but is behind a firewall,” Skoglund said. “The firewall configuration [that determines what can go in and out of the firewall]… is the only thing that segments the EMS from the internet.”

And misconfigured firewalls are one of the most common ways hackers penetrate supposedly protected systems. The recent massive hack of sensitive Capital One customer data is a prime example of a breach enabled by a poorly configured firewall.

“If they did everything correctly [with the ES&S systems] as they say they do, there is no danger,” Robert Graham, CEO of Errata Security, told Motherboard. “These are all secure technologies that if [configured] correctly work just fine. It’s just that we have no faith that they are done correctly. And the fact that [election officials are] saying they aren’t on the internet and yet they are on the internet shows us that we have every reason to distrust them.”

Even proper configurations won’t secure a firewall if the firewall software itself has security vulnerabilities that allow intruders to bypass all the authentication checks, whitelisting rules, and other security parameters set in the firewall’s configuration file.

“If this system hasn’t been patched and has a critical vulnerability… you may be able to subvert any kind of security scheme that you’ve put in place,” Skoglund told Motherboard.

“Not only should ballot tallying systems not be connected to the internet, they shouldn’t be anywhere near the internet.”

While no one is suggesting that any of these systems have been manipulated or hacked, the findings highlight how little local and federal election officials understand how these critical election systems are really configured and connected, and the extent to which they are beholden to what the vendors tell them.

Senator Ron Wyden (D-Oregon) said the findings are “yet another damning indictment of the profiteering election vendors, who care more about the bottom line than protecting our democracy.” It’s also an indictment, he said, “of the notion that important cybersecurity decisions should be left entirely to county election offices, many of whom do not employ a single cybersecurity specialist.”

“Not only should ballot tallying systems not be connected to the internet, they shouldn’t be anywhere near the internet,” he added.



RON WYDEN (D-OR) SPEAKS AT A PRESS CONFERENCE ALONGSIDE SPEAKER OF THE HOUSE NANCY PELOSI (D-CA) ON PASSING THE AMERICA'S ELECTIONS ACT ON JUNE 26, 2019 IN WASHINGTON, DC. THE SAFE ACT BILL INCLUDES REFORMS TO SAFEGUARD VOTING SYSTEMS AND MODERNIZE ELECTION INFRASTRUCTURE IN AN EFFORT TO LOWER THE LIKELIHOOD OF HACKING. IMAGE: TASOS KATOPODIS/GETTY IMAGES

Wyden said two pieces of federal election security legislation that have stalled on Capitol Hill due to Republican leaders—the SAFE Act and a Wyden bill called PAVE Act—would effectively ban transmission of votes via modem and prohibit connecting any election-reporting or election-management system to the internet or to a telecommunications network at any time.

The ES&S firewalls are configured to only allow authenticated systems to connect and pass data through the firewall to the SFTP server; they also block outbound connections to the internet from systems behind the firewall. Authenticated systems include modem-enabled voting machines at voting precincts, or a computer at regional transmission sites. But even these authenticated systems, armed with passwords to communicate with the SFTP server, can only communicate with that server and cannot reach past this to the critical backend systems, according to ES&S. The passwords for the voting machines to communicate with the SFTP server are generated by the election-management system and passed to the voting machines on a USB flash drive when the systems are programmed before each election, and the passwords are also stored on the SFTP server to authenticate the machines.

The two backend systems—the reporting system that tabulates votes and the election-management system—sit on a local area network, which is connected to the Cisco firewall through a switch. The switch doesn’t provide additional security; it simply acts as a traffic cop to direct incoming data to the right system. To collect the encrypted votes the voting machines have deposited on the SFTP server, the backend reporting system reaches through the firewall to query the server every few minutes. If new files have arrived, the reporting system grabs those, decrypts them to read the votes inside, then tabulates them.

At least this is how the configuration in the diagram ES&S provided Motherboard works. But a different diagram the company submitted last year to Travis County, Texas, as part of a contract proposal, and which is available online, shows the reporting system and election-management system directly connected to the SFTP server through the switch, and all of them are connected to the firewall. This would mean the backend reporting system could bypass the firewall to reach the SFTP server directly, a less secure configuration. Weber of ES&S told Motherboard the Travis diagram is incorrect.

1565282630104-image1

ES&S DIAGRAM THE COMPANY SUBMITTED LAST YEAR TO TRAVIS COUNTY, TEXAS, AS PART OF A CONTRACT PROPOSAL SHOWS THE REPORTING SYSTEM AND ELECTION-MANAGEMENT SYSTEM DIRECTLY CONNECTED TO THE SFTP SERVER THROUGH THE SWITCH, AND ALL OF THEM ARE CONNECTED TO THE FIREWALL.

The backend systems in the ES&S configuration are only protected if the firewall rules ES&S has set up for controlling traffic are configured correctly, if the firewalls have no unpatched software vulnerabilities that would let an intruder bypass those protections to install malware on the SFTP server and the critical backend systems, and if the firewalls are also consistently maintained and monitored for rogue connections.

Unfortunately, there are a number of reasons to be concerned about the security of the firewalls and SFTP servers.

ES&S installs and configures the firewalls for the “majority” of its customers, the company told Motherboard. Counties then take over the maintenance or contract it out to a third party, which may even be ES&S in some cases.

Last year, the Cisco firewalls in Wisconsin failed to receive a patch for a critical vulnerability until six months after the vulnerability had been made public and the patch was released, Motherboard has learned. Patch delays aren’t unusual in states that require their election systems to be state certified as well as federally certified—a patch that needs to be applied to a certified system generally has to be reviewed for compliance with the certification requirements before it can be applied. But six months is a long time, and this means the systems were vulnerable to attack during a lengthy period before the 2018 midterm elections.

Another maintenance issue involves slow software upgrades. The researchers on Skoglund’s team discovered that seven of the SFTP servers on the ES&S systems they found are using outdated Cerberus FTP Server 6.0 software that the software maker stopped supporting in January 2017. This means that for the last two and a half years, the maker of that software has not updated it, and going forward will not produce patches if any vulnerabilities in the software are found. The current version is 10.0, and despite the fact that it has been available since November 2018, none of the ES&S SFTP servers the researchers found online are running it.

Not every ES&S backend election system is connected to the internet, because not every county opts to transmit election results. There are more than 33,000 ES&S DS200 optical scan machines with modems in use across eleven states and the District of Columbia. But ES&S told Motherboard it doesn’t know how many of its customers currently transmit results.

What’s not generally known by the public about ES&S election systems is that the company’s entire configuration for transmitting election results—from the modem to the SFTP server—is not certified by the Election Assistance Commission (EAC), which oversees the testing and certification of voting equipment at the federal level. ES&S voting machines are tested and certified, but the transmission configuration isn’t. The labs test them for functionality to make sure they transmit votes, and that’s it. In marketing literature, ES&S highlights the certified parts of its election system in blue and labels them "EAC Certified Configuration." The uncertified part is highlighted in white and labeled "Extended Configuration."

Weber told Motherboard that instead of federal certification, his company has focused on working with officials in states that allow modem transmission to test and certify the configuration under their own state certification programs. He said this includes a security assessment of the configuration. Asked which states do these security assessments, he cited Wisconsin, Florida, and Minnesota. But someone familiar with Wisconsin’s certification testing, who spoke on condition of anonymity, told Motherboard it doesn’t include a security assessment of the modem transmissions and configuration.

Hunting Election Systems

The researchers began looking for connected systems in July of 2018 after seeing repeated comments from state and local election officials as well as federal officials with the Election Assistance Commission, that voting machines and backend election systems are never connected to the internet.

Although these officials acknowledge that many voting machines use modems to transmit election results over cellular networks and landline connections, they have long insisted that modem transmissions don’t involve the internet. A New York Times story I wrote last year, however, showed that the modem transmissions do pass through the internet, and even an ES&S document that the company supplied to Rhode Island in 2015 calls the modem transmission of votes an “internet” transmission. A document for modem transmissions from voting machines made by Dominion Voting Systems—another top voting machine company in the country—similarly discusses TCP-IP and SSL, both protocols used for internet traffic.



AN ES&S DOCUMENT SUPPLIED TO RHODE ISLAND AND DATED 2015, WHICH CLEARLY SHOWS THE MODEM TRANSMISSION OF VOTES FROM THE COMPANY'S DS200 OPTICAL SCAN VOTING MACHINES GOING OVER THE INTERNET.


“The configurations show TCP-IP configuration and ‘SSL Optional,’ making it clear that at least the vendors know their systems are connecting through the internet, even if their election official customers do not realize it or continue to insist to the public that the systems are not connected to the internet,” Skoglund said.

Knowing the vote transmissions are going over the internet, the researchers decided to see if they could find the backend internet-connected systems that receive the transmitted votes. They discovered a method of searching for connected ES&S systems after one of their group stumbled across the IP address for an ES&S firewall in Rhode Island in a publicly available document.

After combing through other documents for ES&S systems published online, and finding technical specifications that show the systems use Cisco ASA 5500 series firewalls, and Cerberus FTP software and Cisco AnyConnect VPN for the vote transmissions, they used a specialized search engine called Censys to find connected systems that matched this configuration combination. Censys scans the internet weekly for connected devices and catalogues information about them, including their IP address, in a database. Their search led them to 35 connected systems over the last year, though Skoglund notes that there may actually be more ES&S systems connected to the internet that are not visible to Censys scans, since administrators can configure their connected devices to block automated scans. This doesn’t mean, however, that someone can’t still find the systems online.

When examining the ownership records for the IP addresses of the connected systems, at least four of them were registered to county governments in Michigan and Florida. This helped bolster the researchers’ belief that what they had found were county election systems. The other IP addresses were harder to trace, however, since they were registered to large internet service providers, and not the ISP customers using them.

The researchers found one or two systems online in Illinois, Indiana, Minnesota, Nebraska, Rhode Island, Tennessee, and Iowa. The Nebraska system, they surmise, is probably a demo or test system for ES&S, which has its headquarters in Omaha. They also found two systems in Canada, where ES&S has field offices and customers, that may also be demo or test systems.

Although only one system was found online in Rhode Island, this one was particularly problematic, the researchers note. Rhode Island, unlike other states, conducts its elections from a centralized office at the state Board of Elections, instead of farming out election administration to each county or jurisdiction. The election reporting system the researchers found online, therefore, was the reporting system for the entire state.

One of the most dense states for online election systems was Florida, where the researchers found a number of connected systems that they believe belong to Bradford, Charlotte, Flagler, Wakulla, Miami-Dade, and Pasco counties, and one other county they’re unable to identity from the IP address.

Florida is known for its knuckle-biting elections. Trump won the state by just 1.2 percentage points in 2016, and in 2018 the state had senate and gubernatorial races that were too close to call on election night. Miami-Dade county in particular, with 1.4 million registered voters, is one of the most intensely watched counties in federal elections—it was using ES&S machines with embedded modems in the 2016 elections.

None of this implies that the election systems in Miami-Dade or any other Florida county were manipulated in the 2016 elections. But the findings highlight what is at stake with critical election systems online.

Any election system connected to the internet creates potential vulnerabilities for elections. But the nine systems in Wisconsin and four in Michigan that the researchers found raise particular red flags since these were two states among three where Green Party presidential nominee Jill Stein sought a recount of the 2016 presidential votes. All three states, which included Pennsylvania, produced results that were contrary to election polls and prior state voting trends. Although there was no specific evidence suggesting the election systems had been manipulated, a recount could have helped provide assurance to the public that this wasn’t the case. A court, however, halted the Michigan recount after it began, and a Pennsylvania court declined to hear Stein’s case for a recount in that state.

"What you are describing is a bad behavior amplified by sloppiness and complete negligence of security."

Wisconsin’s recount was completed, but some counties that used optical scan machines didn’t do a true recount—they simply ran the paper ballots through the optical-scan machines a second time, instead of manually comparing them against the digital tallies to uncover discrepancies. If any problems existed in the scanner software to produce incorrect results during the first scan, they would reproduce the same incorrect results in the re-scan.

The researchers repeated their searches of the Censys database periodically to see when systems dropped out of visibility or new ones popped up online. This allowed them to see the systems connected for long periods of time, contrary to assertions by election officials that the systems for transmitting results only remain connected for a few minutes after elections. Some of the systems do pop up online only around election times, but they tend to remain online about a month before disappearing, not a few minutes.

“Rhode Island is one that kind of comes on and goes off,” Skoglund said. “They don’t stay on year round. But others do.”

Motherboard asked Errata Security CEO Graham, who created an internet-scanning tool called Masscan, to independently verify the methodology the researchers used to find the systems, and he confirmed that the method was sound, using the search parameters the researchers provided. Like the researchers, though, he was unable to explore further without breaking the law, so he could only see the firewalls and not what is behind them. An independent election security expert named Harri Hursti, who consults with election districts and helps run the annual Voting Machine Hacking Village at the Def Con security conference, also verified the methodology for Motherboard without being told how to find the systems. Hursti in fact told Motherboard that many other election systems are online that the researchers’ particular search parameters missed.

The researchers didn’t single out ES&S election systems for their hunt. They also attempted to search for connected systems for the other top two voting machine vendors in the country—Dominion Voting Systems and Hart InterCivic. But Skoglund said the configuration footprints for these systems are less distinctive than ES&S’s footprint, resulting in the team finding thousands of systems that were clearly not election infrastructure.

Although the researchers have not been able to confirm with elections officials in every state that all of the firewalls they spotted are connected to ES&S systems, they were able to verify enough of them that Skoglund says he feels confident their list is reliable. And all of the systems the researchers found share a configuration footprint that, as far as they can tell, is unique to ES&S systems. Furthermore, the IP addresses for the firewalls of the non-confirmed systems all appear to be in counties that also use ES&S voting machines, according to a crosscheck against a web tool operated by Verified Voting, a nonprofit that tracks voting machine use around the country. Although resolving IP addresses to precise geographical location is difficult to do, the researchers were able to pinpoint the addresses they found to a specific city or region in all cases except four of the systems.

ES&S did not dispute that the firewalls the researchers found are ES&S systems; the company said it had no way of knowing one way or the other. Motherboard offered to provide the company with the IP addresses the researchers found for the firewalls, but the company said in an email that it doesn’t store customer IP addresses and therefore wouldn’t be able to tell if the systems belong to its clients.

Because the researchers only began looking for the systems last year, it’s not known how long they’ve been online, but it’s likely that some have been connected to the internet for years, going back to whenever a county first began to use modems to transmit election results.

ES&S has been selling systems with modems to transmit results for more than a decade. Wisconsin approved the use of its current ES&S DS200 optical scan voting machines, with modem transmission capability, in September 2015, but its previous generation of ES&S optical scan machines also used modems for transmitting results. It’s not clear if they used the same firewall and backend configuration.

ES&S voting machines

IMAGE: SCOTT MCINTYRE/BLOOMBERG VIA GETTY IMAGES

Although election security experts oppose electronically transmitting votes at all, if a county is going to do it, the equipment set up to receive the results should not be connected to the internet when the system is not being used. It serves no other purpose than to receive results.

“While the [reporting systems] are secure, ES&S recommends that they only be connected to the internet when they are being tested or in use in order to minimize possible threats,” a statement sent to Motherboard from ES&S and the Wisconsin Election Commission says.

But Hursti told Motherboard it makes little difference how long election systems are connected; any connectivity at all opens them to potential attacks.

“For a skillful, motivated attacker, it doesn’t matter much if [the system is connected] two minutes or a whole year. But for a less skilled fool, less motivated attacker, the fact that they are there for a year, it lowers the bar,” he told Motherboard. “It actually buries the bar under the ground to carry out attacks with less skill. [And] you have a way longer time when the hack can be carried out and the evidence of the attacks [hidden]. What you are describing is a bad behavior amplified by sloppiness and complete negligence of security.”

A more skilled and motivated hacker—such as a Russia-backed nation-state hacker—could potentially compromise the firewall or SFTP server and plant malware that gets delivered to each voting machine that communicates with the server, Skoglund and Hursti said. This is similar to what security professionals refer to as a “watering hole” attack, named after predatory animals who lie in wait at watering holes for prey to arrive to drink.

And if hackers could push malware to the voting machines from the SFTP server, the malware could potentially reconfigure the modem on those machines to make them dial out to a system the attackers own, while preventing any evidence of these calls from showing up on the system’s log. This would give attackers time to subvert the machines for subsequent elections.

Findings Reported and Confirmed

The researchers reported the firewall IP addresses in August 2018 to the national Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC)—a 24-hour watch center funded by the Department of Homeland Security and operated by the Center for Internet Security, a nonprofit established to develop and promote best practices in cybersecurity. The EI-ISAC provides election officials with security threat information and warnings, and told the researchers they would pass the information to where it needed to go, but the researchers never got any follow-up from the EI-ISAC.

A spokesperson for the group would not tell Motherboard if the information was disseminated to the affected counties, but the researchers did see some county systems disappear from the internet. The Department of Homeland Security, which has been working with states and counties since 2016 to secure their election infrastructures, also declined to speak with Motherboard about the researchers’ findings.

The fact that half of the systems were still online last week, however, highlights how new efforts by the federal government and information-sharing groups to warn election officials about known threats and vulnerabilities don’t work if the message doesn’t get to the people who can actually take the systems offline or if local election officials simply don’t act on the information they receive. Last year the researchers gave four IP addresses to the EI-ISAC that the researchers confirmed were connected to election infrastructure in Michigan and Florida.

“The two in Florida were taken offline in the following week or two,” Skoglund said. But the systems in two Michigan counties, Kalamazoo and Roscommon, were still online this week. A third Michigan system is also online, though the researchers are unable to pinpoint the county in which the IP address is located.

Similarly, they reported half a dozen IP addresses to Tony Bridges, election security lead at the Wisconsin Election Commission, for connected systems in Outagamie, Dodge, Milwaukee, St. Croix, Columbia, and Waukesha counties. But despite initial friendly communication, Skoglund said they never received a response.

Bridges told Motherboard he did act on the information he received, advising all of the counties to disconnect their systems when not in use for elections. He was surprised to learn last week from Motherboard that there were still systems online. He contacted the counties again, and Skoglund’s group could see that all off them dropped off except Milwaukee County’s system and another county they had not reported to Bridges last year, Eau Claire County.

The director of elections in Milwaukee County told Skoglund this week that their system was online for a special election next week. Skoglund told Motherboard that when he told her the system had actually been online since September 2018, she said she only learned last week that the systems should not be connected to the internet between elections.

Skoglund has also witnessed another problems as systems dropped offline after his group’s disclosure to a county; some IT workers are simply turning off the SFTP server or switching it to standby mode so traffic can’t come into it. But as long as the firewall is online, the backend systems are still connected to the internet and can be found. And if the AnyConnect VPN is still enabled, this also provides a potential pathway into those backend systems.

Skoglund said he’s concerned that no one is monitoring all of these systems once they’re online, and that counties are trusting the configuration instructions ES&S gives them, or trusting ES&S to configure the systems securely for them, and are then ignoring the systems once they’re set up.

“When a corporation sets up a firewall and a VPN … there is someone who is applying patches and monitoring logs … and really actively ensuring the security of the device to make sure it doesn’t become a vulnerability,” Skoglund said. “That’s a real question with election infrastructure. Who manages this hardware after it’s deployed? And what oversight is there?”

https://www.vice.com/en/article/3kxzk9/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials


__
eof


sunnuntai 5. helmikuuta 2023

Jews and Nazis - The Hidden History of the 1930s and 1940s

 


American Pravda: Jews and Nazis

The Hidden History of the 1930s and 1940s

Israeli Leaders and Nazi Germany

Around 35 years ago, I was sitting in my college dorm-room closely reading the New York Times as I did each and every morning when I noticed an astonishing article about the controversial new Israeli Prime Minister, Yitzhak Shamir.

Back in those long-gone days, the Gray Lady was strictly a black-and-white print publication, lacking the large color photographs of rap stars and long stories about dieting techniques that fill so much of today’s news coverage, and it also seemed to have a far harder edge in its Middle East reporting. A year or so earlier, Shamir’s predecessor Menacham Begin had allowed his Defense Minister Ariel Sharon to talk him into invading Lebanon and besieging Beirut, and the subsequent massacre of Palestinian women and children in the Sabra and Shatila refugee camps had outraged the world and angered America’s government. This eventually led to Begin’s resignation, with Shamir, his Foreign Minister, taking his place.

Prior to his surprising 1977 election victory, Begin had spent decades in the political wilderness as an unacceptable right-winger, and Shamir had an even more extreme background, with the American mainstream media freely reporting his long involvement in all sorts of high-profile assassinations and terrorist attacks during the 1940s, painting him as a very bad man indeed.

Given Shamir’s notorious activities, few revelations would have shocked me, but this one did. Apparently, during the late 1930s, Shamir and his small Zionist faction had become great admirers of the Italian Fascists and German Nazis, and after World War II broke out, they had made repeated attempts to contact Mussolini and the German leadership in 1940 and 1941, hoping to enlist in the Axis Powers as their Palestine affiliate, and undertake a campaign of attacks and espionage against the local British forces, then share in the political booty after Hitler’s inevitable triumph.

Now the Times clearly viewed Shamir in a very negative light, but it seemed extremely unlikely to me that they would have published such a remarkable story without being absolutely sure of their facts. Among other things, there were long excerpts from the official letters sent to Mussolini ferociously denouncing the “decadent” democratic systems of Britain and France that he was opposing, and assuring Il Duce that such ridiculous political notions would have no future place in the totalitarian Jewish client state they hoped to establish under his auspices in Palestine.

As it happens, both Germany and Italy were preoccupied with larger geopolitical issues at the time, and given the small size of Shamir’s Zionist faction, not much seems to have ever come of those efforts. But the idea of the sitting Prime Minister of the Jewish State having spent his early wartime years as an unrequited Nazi ally was certainly something that sticks in one’s mind, not quite conforming to the traditional narrative of that era which I had always accepted.

Most remarkably, the revelation of Shamir’s pro-Axis past seems to have had only a relatively minor impact upon his political standing within Israeli society. I would think that any American political figure found to have supported a military alliance with Nazi Germany during the Second World War would have had a very difficult time surviving the resulting political scandal, and the same would surely be true for politicians in Britain, France, or most other western nations. But although there was certainly some embarrassment in the Israeli press, especially after the shocking story reached the international headlines, apparently most Israelis took the whole matter in stride, and Shamir stayed in office for another year, then later served a second, much longer term as Prime Minister during 1986-1992. The Jews of Israel apparently regarded Nazi Germany quite differently than did most Americans, let alone most American Jews.

Around that same time, a second intriguing example of this quite different Israeli perspective towards the Nazis also came to my attention. In 1983, Amoz Oz, often described as Israel’s greatest novelist, had published In the Land of Israel to glowing reviews. This book was a collection of lengthy interviews with various representative figures in Israeli society, both moderate and extreme, as well as some coverage of the Palestinians who also lived among them.

Of these ideological profiles, one of the shortest but most widely discussed was that of an especially hard-line political figure, unnamed but almost universally believed to be Ariel Sharon, a conclusion certainly supported by the personal details and physical description provided. Near the very beginning, that figure mentioned that people of his ideological ilk had recently been denounced as “Judeo-Nazis” by a prominent liberal Israeli academic, but rather than reject that label, he fully welcomed it. So the subject generally became known in public discussions as the “Judeo-Nazi.”

That he described himself in such terms was hardly an exaggeration, since he rather gleefully advocated the slaughter of millions of Israel’s enemies, and the vast expansion of Israeli territory by conquest of neighboring lands and expulsion of their populations, along with the free use of nuclear weapons if they or anyone else too strongly resisted such efforts. In his bold opinion, the Israelis and Jews in general were just too soft and meek, and needed to regain their place in the world by once again becoming a conquering people, probably hated but definitely feared. To him, the large recent massacre of Palestinian women and children at Sabra and Shatila was of no consequence whatsoever, and the most unfortunate aspect of the incident was that the killers had been Israel’s Christian Phalangist allies rather than Israeli soldiers themselves.

Now rhetorical excess is quite common among politicians and a shroud of pledged anonymity will obviously loosen many tongues. But can anyone imagine an American or other Western public figure talking in such terms, let alone someone who moves in higher political circles? These days, Donald Trump sometimes Tweets out a crude misspelled insult at 2am, and the American media is aghast in horror. But given that his administration leaks like a sieve, if he routinely boasted to his confidants about possibly slaughtering millions, we surely would have heard about it. For that matter, there seems not the slightest evidence that the original German Nazis ever spoke in such ways privately, let alone while a journalist was carefully taking notes. But the “Judeo-Nazis” of Israel are another story.

As near as I can recall, the last even slightly prominent figure in American public life who declared himself a “Nazi” was George Lincoln Rockwell during the 1960s, and he was much more of a political performance artist than an actual political leader. Even as marginalized a figure as David Duke has always hotly denied such an accusation. But apparently politics in Israel is played by different rules.

In any event, Sharon’s purported utterances seem to have had little negative impact upon his subsequent political career, and after spending some time in the political wilderness after the Lebanon disaster, he eventually served five years as Prime Minister during 2001-2006, although by that later date his views were regularly denounced as too soft and compromising due to the steady rightward drift of the Israeli political spectrum.

Zionism in the Age of the Dictators


Over the years I’ve occasionally made half-hearted attempts to locate the Times article about Shamir that had long stuck in my memory, but have had no success, either because it was removed from the Times archives or more likely because my mediocre search skills proved inadequate. But I’m almost certain that the piece had been prompted by the 1983 publication of Zionism in the Age of the Dictators by Lenni Brenner, an anti-Zionist of the Trotskyite persuasion and Jewish origins. I only very recently discovered that book, which really tells an extremely interesting story.

Brenner, born in 1937, has spent his entire life as an unreconstructed hard-core leftist, with his enthusiasms ranging from Marxist revolution to the Black Panthers, and he is obviously a captive of his views and his ideology. At times, this background impairs the flow of his text, and the periodic allusions to “proletarian,” “bourgeoisie,” and “capitalist classes” sometimes grow a little wearisome, as does his unthinking acceptance of all the shared beliefs common to his political circle. But surely only someone with that sort of fervent ideological commitment would have been willing to devote so much time and effort to investigating that controversial subject and ignoring the endless denunciations that resulted, which even included physical assaults by Zionist partisans.

In any event, his documentation seems completely airtight, and some years after the original appearance of his book, he published a companion volume entitled 51 Documents: Zionist Collaboration with the Nazis, which simply provides English translations of all the raw evidence behind his analytical framework, allowing interested parties to read the material and draw their own conclusions.

Among other things, Brenner provides considerable evidence that the larger and somewhat more mainstream right-wing Zionist faction later led by future Israeli Prime Minister Menachem Begin was almost invariably regarded as a Fascist movement during the 1930s, even apart from its warm admiration for Mussolini’s Italian regime. This was hardly such a dark secret in that period given that its main Palestine newspaper carried a regular column by a top ideological leader entitled “Diary of a Fascist.” During one of the major international Zionist conferences, factional leader Vladimir Jabotinsky entered the hall with his brown-shirted followers in full military formation, leading the chair to ban the wearing of uniforms in order to avoid a riot, and his faction was soon defeated politically and eventually expelled from the Zionist umbrella organization. This major setback was largely due to the widespread hostility the group had aroused after two of its members were arrested by British police for the recent assassination of Chaim Arlosoroff, one of the highest-ranking Zionist officials based in Palestine.


https://www.amazon.com/dp/1569804338/

Indeed, the inclination of the more right-wing Zionist factions toward assassination, terrorism, and other forms of essentially criminal behavior was really quite remarkable. For example, in 1943 Shamir had arranged the assassination of his factional rival, a year after the two men had escaped together from imprisonment for a bank robbery in which bystanders had been killed, and he claimed he had acted to avert the planned assassination of David Ben-Gurion, the top Zionist leader and Israel’s future founding-premier. Shamir and his faction certainly continued this sort of behavior into the 1940s, successfully assassinating Lord Moyne, the British Minister for the Middle East, and Count Folke Bernadotte, the UN Peace Negotiator, though they failed in their other attempts to kill American President Harry Truman and British Foreign Minister Ernest Bevin, and their plans to assassinate Winston Churchill apparently never moved past the discussion stage. His group also pioneered the use of terrorist car-bombs and other explosive attacks against innocent civilian targets, all long before any Arabs or Muslims had ever thought of using similar tactics; and Begin’s larger and more “moderate” Zionist faction did much the same. Given that background, it was hardly surprising that Shamir later served as director of assassinations at the Israeli Mossad during 1955-1965, so if the Mossad did indeed play a major role in the assassination of President John F. Kennedy, he was very likely involved.

The Nazi-Zionist Economic Partnership of the 1930s


The cover of the 2014 paperback edition of Brenner’s book displays the commemorative medal struck by Nazi Germany to mark its Zionist alliance, with a Star-of-David on the front face and a Swastika on the obverse. But oddly enough, this symbolic medallion actually had absolutely no connection with the unsuccessful attempts by Shamir’s small faction to arrange a Nazi military alliance during World War II.

Although the Germans paid little attention to the entreaties of that minor organization, the far larger and more influential mainstream Zionist movement of Chaim Weizmann and David Ben-Gurion was something else entirely. And during most of the 1930s, these other Zionists had formed an important economic partnership with Nazi Germany, based upon an obvious commonality of interests. After all, Hitler regarded Germany’s one percent Jewish population as a disruptive and potentially dangerous element which he wanted gone, and the Middle East seemed as good a destination for them as any other. Meanwhile, the Zionists had very similar objectives, and the creation of their new national homeland in Palestine obviously required both Jewish immigrants and Jewish financial investment.

After Hitler had been named Chancellor in 1933, outraged Jews worldwide had quickly launched an economic boycott, hoping to bring Germany to its knees, with London’s Daily Express famously running the banner headline “Judea Declares War on Germany.” Jewish political and economic influence, then just like now, was very considerable, and in the depths of the Great Depression, impoverished Germany needed to export or die, so a large scale boycott in major German markets posed a potentially serious threat. But this exact situation provided Zionist groups with an excellent opportunity to offer the Germans a means of breaking that trade embargo, and they demanded favorable terms for the export of high-quality German manufactured goods to Palestine, together with accompanying German Jews. Once word of this major Ha’avara or “Transfer Agreement” with the Nazis came out at a 1933 Zionist Convention, many Jews and Zionists were outraged, and it led to various splits and controversies. But the economic deal was too good to resist, and it went forward and quickly grew.

The importance of the Nazi-Zionist pact for Israel’s establishment is difficult to overstate. According to a 1974 analysis in Jewish Frontier cited by Brenner, between 1933 and 1939 over 60% of all the investment in Jewish Palestine came from Nazi Germany. The worldwide impoverishment of the Great Depression had drastically reduced ongoing Jewish financial support from all other sources, and Brenner reasonably suggests that without Hitler’s financial backing, the nascent Jewish colony, so tiny and fragile, might easily have shriveled up and died during that difficult period.

Such a conclusion leads to fascinating hypotheticals. When I first stumbled across references to the Ha’avara Agreement on websites here and there, one of the commenters mentioning the issue half-jokingly suggested that if Hitler had won the war, statues would surely have been built to him throughout Israel and he would today be recognized by Jews everywhere as the heroic Gentile leader who had played the central role in reestablishing a national homeland for the Jewish people in Palestine after almost 2000 years of bitter exile.

This sort of astonishing counter-factual possibility is not nearly as totally absurd as it might sound to our present-day ears. We must recognize that our historical understanding of reality is shaped by the media, and media organs are controlled by the winners of major wars and their allies, with inconvenient details often excluded to avoid confusing the public. It is undeniably true that in his 1924 book Mein Kampf, Hitler had written all sorts of hostile and nasty things about Jews, especially those who were recent immigrants from Eastern Europe, but when I read the book back in high school, I was a little surprised to discover that these anti-Jewish sentiments hardly seemed central to his text. Furthermore, just a couple of years earlier, a vastly more prominent public figure such as British Minister Winston Churchill had published sentiments nearly as hostile and nasty, focusing on the monstrous crimes being committed by Bolshevik Jews. In Albert Lindemann’s Esau’s Tears, I was surprised to discover that the author of the famous Balfour Declaration, the foundation of the Zionist project, was apparently also quite hostile to Jews, with an element of his motivation probably being his desire to exclude them from Britain.

Once Hitler consolidated power in Germany, he quickly outlawed all other political organizations for the German people, with only the Nazi Party and Nazi political symbols being legally permitted. But a special exception was made for German Jews, and Germany’s local Zionist Party was accorded complete legal status, with Zionist marches, Zionist uniforms, and Zionist flags all fully permitted. Under Hitler, there was strict censorship of all German publications, but the weekly Zionist newspaper was freely sold at all newsstands and street corners. The clear notion seemed to be that a German National Socialist Party was the proper political home for the country’s 99% German majority, while Zionist National Socialism would fill the same role for the tiny Jewish minority.

In 1934, Zionist leaders invited an important SS official to spend six months visiting the Jewish settlement in Palestine, and upon his return, his very favorable impressions of the growing Zionist enterprise were published as a massive 12-part series in Joseph Goebbel’s Der Angriff, the flagship media organ of the Nazi Party, bearing the descriptive title “A Nazi Goes to Palestine.” In his very angry 1920 critique of Jewish Bolshevik activity, Churchill had argued that Zionism was locked in a fierce battle with Bolshevism for the soul of European Jewry, and only its victory might ensure amicable future relations between Jew and Gentile. Based on available evidence, Hitler and many of the other Nazi leaders seemed to have reached a somewhat similar conclusion by the mid-1930s.

During that era extremely harsh sentiments regarding Diaspora Jewry were sometimes found in rather surprising quarters. After the controversy surrounding Shamir’s Nazi ties erupted into the headlines, Brenner’s material became the grist for an important article by Edward Mortimer, the longtime Middle East expert at the august Times of London, and the 2014 edition of the book includes some choice extracts from Mortimer’s February 11, 1984 Times piece:

Who told a Berlin audience in March 1912 that “each country can absorb only a limited number of Jews, if she doesn’t want disorders in her stomach. Germany already has too many Jews”?

No, not Adolf Hitler but Chaim Weizmann, later president of the World Zionist Organization and later still the first president of the state of Israel.

And where might you find the following assertion, originally composed in 1917 but republished as late as 1936: “The Jew is a caricature of a normal, natural human being, both physically and spiritually. As an individual in society he revolts and throws off the harness of social obligation, knows no order nor discipline”?

Not in Der Sturmer but in the organ of the Zionist youth organization, Hashomer Hatzair.

As the above quoted statement reveals, Zionism itself encouraged and exploited self-hatred in the Diaspora. It started from the assumption that anti-Semitism was inevitable and even in a sense justified so long as Jews were outside the land of Israel.

It is true that only an extreme lunatic fringe of Zionism went so far as to offer to join the war on Germany’s side in 1941, in the hope of establishing “the historical Jewish state on a national and totalitarian basis, and bound by a treaty with the German Reich.” Unfortunately this was the group which the present Prime Minister of Israel chose to join.

The very uncomfortable truth is that the harsh characterizations of Diaspora Jewry found in the pages of Mein Kampf were not all that different from what was voiced by Zionism’s founding fathers and its subsequent leaders, so the cooperation of those two ideological movements was not really so totally surprising.

However, uncomfortable truths do remain uncomfortable. Mortimer had spent nineteen years at the Times, the last dozen of them as the foreign specialist and leader-writer on Middle Eastern affairs. But the year after he wrote that article including those controversial quotations, his career at that newspaper ended, leading to an unusual gap in his employment history, and that development may or may not be purely coincidental.

Also quite ironic was the role of Adolf Eichmann, whose name today probably ranks as one of the most famous half-dozen Nazis in history, due to his postwar 1960 kidnapping by Israeli agents, followed by his public show-trial and execution as a war-criminal. As it happens, Eichmann had been a central Nazi figure in the Zionist alliance, even studying Hebrew and apparently becoming something of a philo-Semite during the years of his close collaboration with top Zionist leaders.

Brenner is a captive of his ideology and his beliefs, accepting without question the historical narrative with which he was raised. He seems to find nothing so strange about Eichmann being a philo-Semitic partner of the Jewish Zionists during the late 1930s and then suddenly being transformed into a mass-murderer of the European Jews in the early 1940s, willingly committing the monstrous crimes for which the Israelis later justly put him to death.

This is certainly possible, but I really wonder. A more cynical observer might find it a very odd coincidence that the first prominent Nazi the Israelis made such an effort to track down and kill had been their closest former political ally and collaborator. After Germany’s defeat, Eichmann had fled to Argentina and lived there quietly for a number of years until his name resurfaced in a celebrated mid-1950s controversy surrounding one of his leading Zionist partners, then living in Israel as a respected government official, who was denounced as a Nazi collaborator, eventually ruled innocent after a celebrated trial, but later assassinated by former members of Shamir’s faction.

Following that controversy in Israel, Eichmann supposedly gave a long personal interview to a Dutch Nazi journalist, and although it wasn’t published at the time, perhaps word of its existence may have gotten into circulation. The new state of Israel was just a few years old at that time, and very politically and economically fragile, desperately dependent upon the goodwill and support of America and Jewish donors worldwide. Their remarkable former Nazi alliance was a deeply-suppressed secret, whose public release might have had absolutely disastrous consequences.

According to the version of the interview later published as a two-part story in Life Magazine, Eichmann’s statements seemingly did not touch upon the deadly topic of the 1930s Nazi-Zionist partnership. But surely Israeli leaders must have been terrified that they might not be so lucky the next time, so we may speculate that Eichmann’s elimination suddenly became a top national priority, and he was tracked down and captured in 1960. Presumably, harsh means were employed to persuade him not to reveal any of these dangerous pre-war secrets at his Jerusalem trial, and one might wonder if the reason he was famously kept in an enclosed glass booth was to ensure that the sound could quickly be cut off if he started to stray from the agreed upon script. All of this analysis is purely speculative, but Eichmann’s role as a central figure in the 1930s Nazi-Zionist partnership is undeniable historical fact.

Just as we might imagine, America’s overwhelmingly pro-Israel publishing industry was hardly eager to serve as a public conduit for Brenner’s shocking revelations of a close Nazi-Zionist economic partnership, and he mentions that his book agent uniformly received rejections from each firm he approached, based on a wide variety of different excuses. However, he finally managed to locate an extremely obscure publisher in Britain willing to take on the project, and his book was released in 1983, initially receiving no reviews other than a couple of harsh and perfunctory denunciations, though Soviet Izvestia took some interest in his findings until they discovered that he was a hated Trotskyite.

His big break came when Shamir suddenly became Israel’s Prime Minister, and he brought his evidence of former Nazi ties to the English-language Palestinian press, which put it into general circulation. Various British Marxists, including the notorious “Red Ken” Livingstone of London, organized a speaking tour for him, and when a group of right-wing Zionist militants attacked one of the events and inflicted injuries, the story of the brawl caught the attention of the mainstream newspapers. Soon afterward the discussion of Brenner’s astonishing discoveries appeared in the Times of London and entered the international media. Presumably, the New York Times article that had originally caught my eye ran sometime during this period.

Public relations professionals are quite skilled at minimizing the impact of damaging revelations, and pro-Israel organizations have no shortage of such individuals. Just before the 1983 release of his remarkable book, Brenner suddenly discovered that a young pro-Zionist author named Edwin Black was furiously working on a similar project, apparently backed by sufficient financial resources that he was employing an army of fifty researchers to allow him to complete his project in record time.

Since the entire embarrassing subject of a Nazi-Zionist partnership had been kept away from the public eye for almost five decades, this timing surely seems more than merely coincidental. Presumably word of Brenner’s numerous unsuccessful efforts at securing a mainstream publisher during 1982 had gotten around, as had as his eventual success in locating a tiny one in Britain. Having failed to prevent publication of such explosive material, pro-Israel groups quietly decided that their next best option was trying to seize control of the topic themselves, allowing disclosure of those parts of the story that could not be concealed but excluding items of greatest danger, while portraying the sordid history in the best possible light.

Black’s book, The Transfer Agreement, may have arrived a year later than Brenner’s but was clearly backed by vastly greater publicity and resources. It was released by Macmillan, a leading publisher, ran nearly twice the length of Brenner’s short book, and carried powerful endorsements by leading figures from the firmament of Jewish activism, including the Simon Weisenthal Center, the Israel Holocaust Memorial, and the American Jewish Archives. As a consequence, it received long if not necessarily favorable reviews in influential publications such as The New Republic and Commentary.

In all fairness, I should mention that in the Foreword to his book, Black claims that his research efforts had been totally discouraged by nearly everyone he approached, and as a consequence, he had been working on the project with solitary intensity for many years. This implies the near-simultaneous release of the two books was purely due to chance. But such a picture is hardly consistent with his glowing testimonials from so many prominent Jewish leaders, and personally I find Brenner’s claim that Black was assisted by fifty researchers far more convincing.

Since both Black and Brenner were describing the same basic reality and relying upon many of the same documents, in most respects the stories they tell are generally similar. But Black carefully excludes any mention of offers of Zionist military cooperation with the Nazis, let alone the repeated attempts by Shamir’s Zionist faction to officially join the Axis Powers after the war had broken out, as well as numerous other details of a particularly embarrassing nature.

Assuming Black’s book was published for the reasons I suggested, I think that the strategy of the pro-Israel groups largely succeeded, with his version of the history seeming to have quickly supplanted Brenner’s except perhaps in strongly leftist or anti-Zionist circles. Googling each combination of the title and author, Black’s book gets eight times as many hits, and his Amazon sales ranks and numbers of reviews are also larger by roughly that same factor. Most notably, neither the Wikipedia articles on “The Transfer Agreement” and “The Ha’avara Agreement” contain any mention of Brenner’s research whatsoever, even though his book was published earlier, was far broader, and only he provided the underlying documentary evidence. As a personal example of the current situation, I was quite unaware of the entire Ha’avara history until just a few years ago when I encountered some website comments mentioning Black’s book, leading me to purchase and read it. But even then, Brenner’s far more wide-ranging and explosive volume remained totally unknown to me until very recently.

Hitler’s Jewish Soldiers

Once World War II began, this Nazi-Zionist partnership quickly lapsed for obvious reasons. Germany was now at war with the British Empire, and financial transfers to British-run Palestine were no longer possible. Furthermore, the Arab Palestinians had grown quite hostile to the Jewish immigrants whom they rightfully feared might eventually displace them, and once the Germans were forced to choose between maintaining their relationship with a relatively small Zionist movement or winning the political sympathy of a vast sea of Middle Eastern Arabs and Muslims, their decision was a natural one. The Zionists faced a similar choice, and especially once wartime propaganda began so heavily blackening the German and Italian governments, their long previous partnership was not something they wanted widely known.

However, at exactly this same moment a somewhat different and equally long-forgotten connection between Jews and Nazi Germany suddenly moved to the fore.

Like most people everywhere, the average German, whether Jewish or Gentile, was probably not all that political, and although Zionism had for years been accorded a privileged place in German society, it is not entirely clear how many ordinary German Jews paid much attention to it. The tens of thousands who emigrated to Palestine during that period were probably motivated as much by economic pressures as by ideological commitment. But wartime changed matters in other ways.

This was even more true for the German government. The outbreak of a world war against a powerful coalition of the British and French empires, later augmented by both Soviet Russia and the United States, imposed the sorts of enormous pressures that could often overcome ideological scruples. A few years ago, I discovered a fascinating 2002 book by Bryan Mark Rigg, Hitler’s Jewish Soldiers, a scholarly treatment of exactly what the title implies. The quality of this controversial historical analysis is indicated by the glowing jacket-blurbs from numerous academic experts and an extremely favorable treatment by an eminent scholar in The American Historical Review.

Obviously, Nazi ideology was overwhelmingly centered upon race and considered racial purity a crucial factor in national cohesion. Individuals possessing substantial non-German ancestry were regarded with considerable suspicion, and this concern was greatly amplified if that admixture was Jewish. But in a military struggle against an opposing coalition possessing many times Germany’s population and industrial resources, such ideological factors might be overcome by practical considerations, and Rigg persuasively argues that some 150,000 half-Jews or quarter-Jews served in the armed forces of the Third Reich, a percentage probably not much different than their share of the general military-age population.

Germany’s long-integrated and assimilated Jewish population had always been disproportionately urban, affluent, and well-educated. As a consequence it is not entirely surprising that a large proportion of these part-Jewish soldiers who served Hitler were actually combat officers rather than merely rank-and-file conscripts, and they included at least 15 half-Jewish generals and admirals, and another dozen quarter-Jews holding those same high ranks. The most notable example was Field Marshal Erhard Milch, Hermann Goering’s powerful second-in-command, who played such an important operational role in creating the Luftwaffe. Milch certainly had a Jewish father, and according to some much less substantiated claims, perhaps even a Jewish mother as well, while his sister was married to an SS general.

Admittedly, the racially-elite SS itself generally had far stricter ancestry standards, with even a trace of non-Aryan parentage normally seen as disqualifying an individual from membership. But even here, the situation was sometimes complicated, since there were widespread rumors that Reinhard Heydrich, the second-ranking figure in that very powerful organization, actually had considerable Jewish ancestry. Rigg investigates that claim without coming to any clear conclusions, though he does seem to think that the circumstantial evidence involved may have been used by other high-ranking Nazi figures as a point of leverage or blackmail against Heydrich, who stood as one of the most important figures in the Third Reich.

As a further irony, most of these individuals traced their Jewish ancestry through their father rather than their mother, so although they were not Jewish according to rabbinical law, their family names often reflected their partly Semitic origins, though in many cases Nazi authorities attempted to studiously overlook this glaringly obvious situation. As an extreme example noted by an academic reviewer of the book, a half-Jew bearing the distinctly non-Aryan name of Werner Goldberg actually had his photograph prominently featured in a 1939 Nazi propaganda newspaper, with the caption describing him as the “The Ideal German Soldier.”

The author conducted more than 400 personal interviews of the surviving part-Jews and their relatives, and these painted a very mixed picture of the difficulties they had encountered under the Nazi regime, which varied enormously depending upon particular circumstances and the personalities of those in authority over them. One important source of complaint was that because of their status, part-Jews were often denied the military honors or promotions they had rightfully earned. However, under especially favorable conditions, they might also be legally reclassified as being of “German Blood,” which officially eliminated any taint on their status.

Even official policy seems to have been quite contradictory and vacillating. For example, when the civilian humiliations sometimes inflicted upon the fully Jewish parents of serving half-Jews were brought to Hitler’s attention, he regarded that situation as intolerable, declaring that either such parents must be fully protected against those indignities or all the half-Jews must be discharged, and eventually in April 1940 he issued a decree requiring the latter. However, this order was largely ignored by many commanders, or implemented through a honor-system that almost amounted to “Don’t Ask, Don’t Tell,” so a considerable fraction of half-Jews remained in the military if they so wished. And then in July 1941, Hitler somewhat reversed himself, issuing a new decree that allowed “worthy” half-Jews who had been discharged to return to the military as officers, while also announcing that after the war, all quarter-Jews would be reclassified as fully “German Blood” Aryan citizens.

It has been said that after questions were raised about the Jewish ancestry of some of his subordinates, Goering once angrily responded “I will decide who is a Jew!” and that attitude seems to reasonably capture some of the complexity and subjective nature of the social situation.

Interestingly enough, many of part-Jews interviewed by Rigg recalled that prior to Hitler’s rise to power, the intermarriage of their parents had often provoked much greater hostility from the Jewish rather than the Gentile side of their families, suggesting that even in heavily-assimilated Germany, the traditional Jewish tendency toward ethnic exclusivity had still remained a powerful factor in that community.

Although the part-Jews in German military service were certainly subject to various forms of mistreatment and discrimination, perhaps we should compare this against the analogous situation in our own military in those same years with regard to America’s Japanese or black minorities. During that era, racial intermarriage was legally prohibited across a large portion of the US, so the mixed-race population of those groups was either almost non-existent or very different in origin. And when Japanese-Americans were allowed to leave their wartime concentration camps and enlist in the military, they were entirely restricted to segregated all-Japanese units, but with the officers generally being white. Meanwhile, blacks were almost entirely barred from combat service, though they sometimes served in strictly-segregated support roles. The notion that an American with any appreciable trace of African, Japanese, or for that matter Chinese ancestry might serve as a general or even an officer in the U.S. military and thereby exercise command authority over white American troops would have been almost unthinkable. The contrast with the practice in Hitler’s own military is quite different than what Americans might naively believe.

The Racial Focus of Traditional Judaism

This paradox is not nearly as surprising as one might assume. The non-economic divisions in European societies had almost always been along lines of religion, language, and culture rather than racial ancestry, and the social tradition of more than a millennium could not easily be swept away by merely a half-dozen years of National Socialist ideology. During all those earlier centuries, a sincerely-baptized Jew, whether in Germany or elsewhere, was usually considered just as good a Christian as any other. For example, Tomas de Torquemada, the most fearsome figure of the dreaded Spanish Inquisition, actually came from a family of Jewish converts.

Even wider racial differences were hardly considered of crucial importance. Some of the greatest heroes of particular national cultures, such as Russia’s Alexander Pushkin and France’s Alexandre Dumas, had been individuals with significant black African ancestry, and this was certainly not considered any sort of disqualifying characteristic.

By contrast, American society from its inception had always been sharply divided by race, with other differences generally constituting far smaller impediments to intermarriage and amalgamation. I’ve seen widespread claims that when the Third Reich devised its 1935 Nuremberg Laws restricting marriage and other social arrangements between Aryans, non-Aryans, and part-Aryans, its experts drew upon some of America’s long legal experience in similar matters, and this seems quite plausible. Under that new Nazi statute, pre-existing mixed-marriages received some legal protection, but henceforth Jews and half-Jews could only marry each other, while quarter-Jews could only marry regular Aryans. The obvious intent was to absorb that latter group into mainstream German society, while isolating the more heavily-Jewish population.

Ironically enough, Israel today is one of very few countries with a similar sort of strictly racially-based criteria for citizenship status and other privileges, with the Jewish-only immigration policy now often enforced by DNA testing, and marriages between Jews and non-Jews legally prohibited. A few years ago, the world media also carried the remarkable story of a Palestinian Arab sentenced to prison for rape because he had had consensual sexual relations with a Jewish woman by passing himself off as a fellow Jew.

Since Orthodox Judaism is strictly matrilineal and controls Israeli law, even Jews of other branches can experience unexpected difficulties due to conflicts between personal ethnic identity and official legal status. The vast majority of the wealthier and more influential Jewish families worldwide do not follow Orthodox religious traditions, and over the generations, they have often taken Gentile wives. However, even if the latter had converted to Judaism, their conversions are considered invalid by the Orthodox Rabbinate, and none of their resulting descendants are considered Jewish. So if some members of these families later develop a deep commitment to their Jewish heritage and immigrate to Israel, they are sometimes outraged to discover that they are officially classified as “goyim” under Orthodox law and legally prohibited from marrying Jews. These major political controversies periodically erupt and sometimes reach the international media.

Now it seems to me that any American official who proposed racial DNA tests to decide upon the admission or exclusion of prospective immigrants would have a very difficult time remaining in office, with the Jewish-activists of organizations like the ADL probably leading the attack. And the same would surely be true for any prosecutor or judge who sent non-whites to prison for the crime of “passing” as whites and thereby managing to seduce women from that latter group. A similar fate would befall advocates of such policies in Britain, France, or most other Western nations, with the local ADL-type organization certainly playing an important role. Yet in Israel, such existing laws merely occasion a little temporary embarrassment when they are covered in the international media, and then invariably remain in place after the commotion has died down and been forgotten. These sorts of issues are considered of little more importance than were the past wartime Nazi ties of the Israeli prime minister throughout most of the 1980s.

But perhaps the solution to this puzzling difference in public reaction lies in an old joke. A leftist wit once claimed that the reason America has never had a military coup is that it is the only country in the world that lacks an American embassy to organize such activities. And unlike the U.S., Britain, France, and many other predominately-white countries, Israel has no domestic Jewish-activist organization filling the powerful role of the ADL.

 

Over the last few years, many outside observers have noted a seemingly very odd political situation in Ukraine. That unfortunate country possesses powerful militant groups, whose public symbols, stated ideology, and political ancestry all unmistakably mark them as Neo-Nazis. Yet those violent Neo-Nazi elements are all being bankrolled and controlled by a Jewish Oligarch who holds dual Israeli citizenship. Furthermore, that peculiar alliance had been mid-wifed and blessed by some of America’s leading Jewish Neocon figures, such as Victoria Nuland, who have successfully used their media influence to keep such explosive facts away from the American public.

At first glance, a close relationship between Jewish Israelis and European Neo-Nazis seems as grotesque and bizarre a misalliance as one could imagine, but after recently reading Brenner’s fascinating book, my perspective substantially shifted. Indeed, the main difference between then and now is that during the 1930s, Zionist factions represented a very insignificant junior partner to a powerful Third Reich, while these days it is the Nazis who occupy the role of eager suppliants to the formidable power of International Zionism, which now so heavily dominates the American political system and through it, much of the world.

Related Reading:

 

https://www.unz.com/runz/american-pravda-jews-and-nazis/

__
eof