From Hollerith to Holocaust? The Impact of Technology and Privacy

On this International Day of Commemoration in Memory of the Victims of the Holocaust, it is not only important to compassionately contemplate the past, but is also important to cautiously consider the future through the lens of the events and enablers that contributed to the identification and extermination of millions of people. One of these enablers was technology.

en flag
nl flag
et flag
fi flag
fr flag
de flag
pt flag
ru flag
es flag

Editor’s Note: Today marks the 75th anniversary of the liberation of the Auschwitz-Birkenau Nazi German Concentration and Extermination Camp by Soviet forces. The liberation of the death camps such as Auschwitz-Birkenau ended the carnage of one of the most heinous crimes in the history of the world, the systematic killing of six million Jewish men, women, and children and millions of others by the Nazis and their Holocaust collaborators. On this International Day of Commemoration in Memory of the Victims of the Holocaust, it is not only important to compassionately contemplate the past, but is also important to cautiously consider the future through the lens of the events and enablers that contributed to the identification and extermination of millions of people. One of these enablers was technology.

Ranging from the technologies developed specifically for mass death to the technologies applied to information that accelerated the identification, separation, and subsequent elimination of discriminated against groups, technologies inappropriately applied can have catastrophic and irreversible consequences. Because of this fact, it is important that information technology, security, and legal professionals always be aware of not only the capability of technology but also of the consequences of its misuse. This is especially important in the area of data privacy where it is very easy to focus on data and regulations and forget that behind the data there are people and lives.

Provided below is a short extract by award-winning investigative author Edwin Black that may help put a face on the potential misuse of information technology and the importance of data privacy on this day of remembrance. Additionally, a short extract from the Centre for Holocaust Education (Institute of Education, University of London) is provided to highlight the use of information technology as a contributor to the Holocaust.


Extract an article by Edwin Black

The Nazi Party: IBM and Death’s Calculator

Mankind barely noticed when the concept of massively organized information quietly emerged to become a means of social control, a weapon of war, and a roadmap for group destruction. The unique igniting event was the most fateful day of the last century, January 30, 1933, the day Adolf Hitler came to power. Hitler and his hatred of the Jews was the ironic driving force behind this intellectual turning point. But his quest was greatly enhanced and energized by the ingenuity and craving for profit of a single American company and its legendary, autocratic chairman. That company was International Business Machines, and its chairman was Thomas J. Watson.

Der Führer’s obsession with Jewish destruction was hardly original. There had been czars and tyrants before him. But for the first time in history, an anti-Semite had automation on his side. Hitler didn’t do it alone. He had help.

In the upside-down world of the Holocaust, dignified professionals were Hitler’s advance troops. Police officials disregarded their duty in favor of protecting villains and persecuting victims. Lawyers perverted concepts of justice to create anti-Jewish laws. Doctors defiled the art of medicine to perpetrate ghastly experiments and even choose who was healthy enough to be worked to death and who could be cost-effectively sent to the gas chamber. Scientists and engineers debased their higher calling to devise the instruments and rationales of destruction. And statisticians used their little known but powerful discipline to identify the victims, project and rationalize the benefits of their destruction, organize their persecution, and even audit the efficiency of genocide. Enter IBM and its overseas subsidiaries.

Solipsistic and dazzled by its own swirling universe of technical possibilities, IBM was self-gripped by a special amoral corporate mantra: if it can be done, it should be done. To the blind technocrat, the means were more important than the ends. The destruction of the Jewish people became even less important because the invigorating nature of IBM’s technical achievement was only heightened by the fantastical profits to be made at a time when bread lines stretched across the world.

Read the complete article at The Nazi Party: IBM & “Death’s Calculator”


Extract from a Presentation from the Centre for Holocaust Education

Being Human? Perpetrators, Collaborators, Bystanders, and Rescuers

The German Census Bureau

In 1939, the Nazi government counted all of the people living in Germany, recording every person’s age, sex, address, job, religion, and marital status. For the first time, they also listed the person’s ‘race’.

All of this information about millions of people was punched into cards by thousands of clerical workers.

The cards were sorted and counted by the electrical brushes of a Hollerith machine, an early type of computer.

At this time no plan had been made to murder the Jewish people, and the workers who punched the cards could not imagine such horrors. But they did know the hatred the Nazis had for Jews, Gypsies and other groups already suffering persecution. And thousands still turned up for work each day and punched this information hour after hour, being particularly careful, as they were told to be, in marking the column that recorded ‘race’.

As the Nazis invaded other countries, information about these populations was also punched onto the cards. The punch cards, other records, registration and identity cards made it possible for the Nazis to find their victims, round them up, deport them to the camps and to select them for mass murder.

People first had to be identified before they could be killed. The historians Götz Aly and Karl Heinz Roth have argued that before every act of extermination there was first an act of registration.

Read the complete presentation at Being Human? Perpetrators, Collaborators, Bystanders, and Rescuers

Additional Reading

Source: ComplexDiscovery

Have a Request?

If you have information or offering requests that you would like to ask us about, please let us know and we will make our response to you a priority.

ComplexDiscovery is an online publication that highlights data and legal discovery insight and intelligence ranging from original research to aggregated news for use by business, information technology, and legal professionals. The highly targeted publication seeks to increase the collective understanding of readers regarding data and legal discovery information and issues and to provide an objective resource for considering trends, technologies, and services related to electronically stored information.

ComplexDiscovery OÜ is a technology marketing firm providing strategic planning and tactical execution expertise in support of data and legal discovery organizations. Registered as a private limited company in the European Union country of Estonia, one of the most digitally advanced countries in the world, ComplexDiscovery OÜ operates virtually worldwide to deliver marketing consulting and services.

A (Brand) New Approach? Considering the Framework and Structure of eDiscovery Offerings

Today’s eDiscovery providers may benefit from the lessons learned in the creation of the Sgt. Pepper’s Lonely Hearts Club Band album by creating a concept for branding and packaging their offerings within that brand in a connected, theme-based way that represents the offerings’ promise and capability in a way that is easy to understand and remember.



Check Out the New Approach Now!

Interested in Contributing?

ComplexDiscovery combines original industry research with curated expert articles to create an informational resource that helps legal, business, and information technology professionals better understand the business and practice of data discovery and legal discovery.

All contributions are invested to support the development and distribution of ComplexDiscovery content. Contributors can make as many article contributions as they like, but will not be asked to register and pay until their contribution reaches $5.

From Proactive Detection to Data Breach Reviews: Sensitive Data Discovery and Extraction with Ascema

A steady rise in the number of sensitive data discovery requirements...

Resetting the Baseline? eDiscovery Market Size Adjustments for 2020

An unanticipated pandemeconomic-driven retraction in eDiscovery spending during 2020 has resulted...

New from NIST: Integrating Cybersecurity and Enterprise Risk Management (ERM)

NIST has released NISTIR 8286, Integrating Cybersecurity and Enterprise Risk Management...

A Cloudy Alliance? A Next-Generation Cloud for Europe

According to Thierry Breton, Commissioner for the Internal Market, "Europe needs...

A Running List: Top 100+ eDiscovery Providers

Based on a compilation of research from analyst firms and industry...

The eDisclosure Systems Buyers Guide – 2020 Edition (Andrew Haslam)

Authored by industry expert Andrew Haslam, the eDisclosure Buyers Guide continues...

The Race to the Starting Line? Recent Secure Remote Review Announcements

Not all secure remote review offerings are equal as the apparent...

Enabling Remote eDiscovery? A Snapshot of DaaS

Desktop as a Service (DaaS) providers are becoming important contributors to...

Resetting the Baseline? eDiscovery Market Size Adjustments for 2020

An unanticipated pandemeconomic-driven retraction in eDiscovery spending during 2020 has resulted...

Home or Away? New eDiscovery Collection Market Sizing and Pricing Considerations

One of the key home (onsite) or away (remote) decisions that...

Revisions and Decisions? New Considerations for eDiscovery Secure Remote Reviews

One of the key revision and decision areas that business, legal,...

A Macro Look at Past and Projected eDiscovery Market Size from 2012 to 2024

From a macro look at past estimations of eDiscovery market size...

A Season of Change? Eighteen Observations on eDiscovery Business Confidence in the Fall of 2020

In the fall of 2020, 77.2% of eDiscovery Business Confidence Survey...

The Continuing Case of Budgetary Constraints in the Business of eDiscovery

In the fall of 2020, 49.4% of respondents viewed budgetary constraints...

Outstanding Accounts? eDiscovery Operational Metrics in the Fall of 2020

In the fall of 2020, eDiscovery Business Confidence Survey more...

Holding the Rudder? Fall 2020 eDiscovery Business Confidence Survey Results

This is the twentieth quarterly eDiscovery Business Confidence Survey conducted by...

DISCO Raises $60 Million

According to the media release, DISCO will use this investment to...

Rampiva and the RYABI Group Merge

According to today's announcement, the RYABI Group merger is Rampiva's first...

eDiscovery Mergers, Acquisitions, and Investments in Q3 2020

From HaystackID and NightOwl Global to Reveal Data and NexLP, the...

Mitratech Acquires Acuity ELM

According to Mike Williams, CEO of Mitratech, “We came to the...

Five Great Reads on eDiscovery for October 2020

From business confidence and captive ALSPs to digital republics and mass...

Five Great Reads on eDiscovery for September 2020

From cloud forensics and cyber defense to social media and surveys,...

Five Great Reads on eDiscovery for August 2020

From predictive coding and artificial intelligence to antitrust investigations and malware,...

Five Great Reads on eDiscovery for July 2020

From business confidence and operational metrics to data protection and privacy...