Кремниевая долина, секретные службы и кибероружие в паутине?


Today I’m going to tell you a story about Google, one of the most famous brands of our time. We know it for its Android operating system on our smartphones, through their smart home devices and mobile phones, through their Chrome internet browser or their recent entry into the video game business with Google Stadia. And of course for their many internet services… most notably the Google search engine, Google Maps, Google Earth, Gmail and YouTube. They are an organisation that is so ubiquitous that they are almost invisible.

And this article will also be about the CIA. The secret service that overthrows foreign governments and spies on state leaders and the population. From human rights abuses to drug trafficking, the CIA has always been shrouded in mystery and controversy. But what does Google have to do with the CIA? And what is the purpose of the World Wide Web and its applications that have created so many billionaires in the last 20 years?

This collaboration is very worrying, but let’s take a closer look.

Google’s first CIA and NSA Association

In fact, the internet itself was created as a result of an intelligence effort: In the 1970s, the agency responsible for developing new technologies for military, intelligence and national security purposes – the Defense Advanced Research Projects Agency (DARPA) – linked four supercomputers together to handle massive data transfers. About a decade later, it handed over ARPA-Net to the National Science Foundation (NSF), which spread the network across thousands of universities and eventually to the public in 1991, creating the architecture and framework of the World Wide Web. But the underlying ideas of a human-controlling machine network go back to the cybernetics movement of the 1950s. Вики. And today, almost five decades after its birth, the internet is irreversible and has permeated every area of human interaction. We as a society have become socially, politically and economically dependent on it. We were lured into the global ‘web’ with promising possibilities… now we are stuck and can only wait for the spider to eat us.

In 1994, two PhD students at Stanford University, Sergey Brin and Larry Page, started working on their automatic “web crawling and page ranking” application, which was part of their research project. They hoped to gain easy access to the then exploding internet – and were successful. The part of Sergey Brin’s Stanford research was funded by the NSA and CIA.

Larry Page and Sergey Brin to the Standford at the time

Brin frequently reported his progress to ‘non-Standford individuals’ – one of whom was Dr Rick Steinhauser. Steinhauser was a representative of the CIA’s Research and Development Office and whose job was to oversee their research funding, in a programme that was a merger between the CIA and the NSA.

At that time, it was not uncommon for research projects to be funded by the intelligence agencies. US government intelligence agencies had set up programmes and often funded projects with seed money. About $3-4 million flowed into the universities via the huge apparatus of the US intelligence agencies. Смотрите здесь. Even Putin recognised that Google was a CIA project and warned against its use. Смотрите здесь.

And while both Google and the intelligence community deny that the CIA directly funded the launch of Google, it is clear that the intelligence agencies’ research funding not only helped Google, but Silicon Valley as a whole. There are many ways in which this relationship was built and is maintained to this day – one of the biggest is probably the Highland Forum.

The Highland Forum

There’s a good chance you’ve never heard of this forum, but it connects the wider Ministry of Defence and intelligence community with technology start-ups. This ensures that military and intelligence agencies are always on the cutting edge of technology.

For 20 years, the Highlands Forum has provided an unofficial space for some of the most prominent members of the shadow intelligence community to meet with senior US government officials and other leaders in the relevant industry. When Nafeez Ahmed, British author and blogger, first stumbled upon the existence of this network in November 2014, when he reported for VICE’s Motherboard that US Secretary of Defence Chuck Hagel’s newly announced “Defense Innovation Initiative” was really about building Skynet – or something like it, essentially, to dominate an emerging era of automated robotic warfare.

This story was based on a little-known Pentagon-financed “white paper” published two months earlier by the National Defense University (NDU) in Washington DC, a leading US military-run institution that, among other things, conducts research to develop US defence policy at the highest levels. The White Paper clarified the thinking behind the new initiative and the revolutionary scientific and technological developments from which it hoped to benefit.

The co-author of this NDU white paper is Linton Wells, a 51-year-old US defence official who served in the Bush administration as the Pentagon’s chief information officer, overseeing the National Security Agency (NSA) and other spy agencies. He still holds active, top-secret security clearances, and according to a 2006 report in Government Executive magazine, he chaired the “Highlands Forum” established by the Pentagon in 1994. Читай здесь.

Linton Wells II (right), former Pentagon chief information officer and assistant secretary of defence for networks, at a recent Pentagon Highlands Forum meeting. Seated next to him is Rosemary Wenchel, a senior official at the US Department of Homeland Security.

New Scientist magazine (paywall) has compared the Highlands Forum to elite meetings such as “Davos, Ditchley and Aspen”, describing it as “far less well-known but… arguably just as influential a discussion forum”. Читай здесь.

Regular forum meetings bring together “innovative people to discuss the interactions between policy and technology”. Its greatest achievements have been in the development of network-based high-tech warfare. Given Wells’ role in such a forum, it was perhaps not surprising that his White Paper on Defence Transformation was able to have such a profound impact on actual Pentagon policy. But if that was the case, why had no one noticed?

Although it was sponsored by the Pentagon, I could not find an official page about the forum on the Department of Defence’s website. According to Adhmed, active and former US military and intelligence sources have never heard of it, nor have national security journalists.

Many Highland Forum executives hold positions in the CIA, NSA and many other agencies. And career transfers from these agencies to Silicon Valley are also common. In 2012, for example, Regina Dugan, Highland Co-Chair and DARPA co-chair, left her agency to take a senior executive position at Google. Вики.

Shortly after, she built ‘a mind-reading device’ for Facebook (Building 8 Project), then went back to Google to focus on augmented reality applications and modular smartphones. She also worked for Motorola, where she was involved in developing electronic tattoos and pills that turn your whole body into an authentication password. Смотрите здесь.

Oh, and in a leaked email thread, Sergey Brin discussed sharing information with the head of the NSA for national security reasons. Читай здесь.

IN-Q-TEL – The Connection between the CIA and BIG-TECH

At the height of the dot-com boom in 1999, the CIA launched In-Q-Tel: a Silicon Valley venture capital firm. Вики. Its mission was to invest in start-ups tailored to the needs of the intelligence community. Unlike other venture capital firms, In-Q-Tel’s distribution of taxpayer money is not profit-driven. Rather, the CIA requires a technological benefit to the intelligence community no later than 36 months after the investment. The Q is supposed to be a reference to the technology inventor of the same name in the James Bond films. The spectrum includes search programmes and software needed to analyse data and images. Intelligent translation tools that can also capture the meaning of the texts to be translated. But computer security technology, energy supply systems and nano- and biotechnological development also need to keep pace (Здесь).

Over the past 20 years, the CIA has invested in dozens of technology start-ups and naturally expects collaboration.

In 2003, the CIA invested in Keyhole, a start-up that developed 3D mapping software, through In-Q-Tel. One of its first missions was to support US soldiers during Operation Iraqi Freedom – the campaign to topple Saddam Hussein. The following year, the CIA bought Keyhole, whose team now included CIA employees. A little later, Google turned Keyhole into the basis of what would become GoogleEarth, the application that lets you map the world through a keyhole. Just a year after the acquisition, the director of In-Q-Tel, who was responsible for the original investment in Keyhole, got a job at Google. But that wasn’t all that was funded by In-Q-Tel. Читай здесь. At the time, Google also landed certain contracts with the NSA and CIA to develop search applications for them. And in August 2004, ten years after its birth, Google went public.

What about Facebook? In the summer of 2004, the company received its first capital injection of $500,000 from Peter Thiel. The next two capital infusions were $12.7 million from Thiel and Accel Partners in May 2005, and then another $27.5 million in April 2006 from an Accel-led funding round involving Thiel, Accel and Greylock Partners. So, these are the names I searched for in relation to In-Q-Tel, here’s what I found:

Peter Thiel: Raised the In-Q-Tel funding for his start-up Palantir somewhere around 2004.
Accel Partner: In 2004, Accel partner James Breyer sat on the board of military defence contractor BBN with In-Q-Tel’s CEO Gilman Louie.
Greylock Partners: Howard Cox, the head of Greylock, sat directly on the board of In-Q-Tel.

I’m not saying that the CIA or In-Q-Tel were directly involved with Facebook.
I’m just saying that it seems to me that the key early investors in Facebook, at the same time that Facebook was raising capital, had direct relationships with In-Q-Tel or with the top management of In-Q-Tel… I’m also saying that In-Q-Tel at that very time was a company that was very, very interested in collecting the kind of data that Facebook had to offer.

In-Q-Tel investments are also considered a kind of seal of approval. For every dollar invested by the CIA in a tech start-up, the company can expect an average of $15 from other investors. They know exactly that the technologies the CIA has in mind have a rosy future. In addition, In-Q-Tel is often staffed by industry experts, such as former Netscape CEO James Barksdale.

Many CIA-funded technologies have been sold on to big names. Microsoft struck a deal with Perceptive Pixel. The company specialises in large touch screens. RIM, the maker of Blackberry phones, acquired Paratek, a wireless system manufacturer that developed smaller and more power-efficient antennas. Oracle also helped itself to the large pool of CIA developments and bought Tacit as well as Endeca. Nokia took over MetaCarta to incorporate the technology developed there into its own map service. Clearly, the idea is spreading. If you buy a new mobile phone or computer today, it is very likely that knowledge acquired with CIA money is behind it. And today’s surveillance state shows: The CIA is always the beneficiary of these technologies.

The great web of close cooperation between intelligence services, the military and Silicon Valley.

In fact, most tech giants have direct ties with intelligence agencies. In early 2020, Microsoft, Facebook, Twitter and Google met with the FBI, Homeland Security and the ‘Office of Director of National Security (DNI)’.Little is known about this meeting except for the basic topic: “How can tech giants ensure security for the 2020 election.” Читай здесь.

For example, Google has implemented a sophisticated protection programme. This ensures vulnerable groups like journalists, politicians, activists and leading business figures Google’s most secure protection. It makes these accounts less vulnerable to hacker attacks like phishing and mailware. The only question, of course, is: who is considered worthy of this protection?

Google and the Defense Sector

The closest link between Google and the government, however, is Google Federal. Google Federal has existed since 2006 and its mission is to serve government contracts. You don’t find much about “Google Federal”. Whether they simply like to operate from the shadows, or whether Google is abusing its monopoly position in the information war to make it harder to find this information, remains difficult to say. There was a point at which this division of Google had so many former NSA employees that it was dubbed “The NSA West”. Right from the start, Google Federal hired people en masse – managers and businessmen from the Army, Air Force, CIA, Raytheon and Lockheed Martin. And it also stocked up on an army of Democratic and Republican lobbyists. Michael Bradshaw, director of Google Federal, told the Washington Post, “A lot of people didn’t even know Google Federal existed.” Читай здесь.

According to the newspaper, traditional government contractors are keen to work with Google – and Google is keen to work with them. Google has partnered with companies such as Lockheed Martin, Unisys, Computer Sciences Corporation and Blackbird Technologies. Google also has a slew of contracts with the Department of Defense and the intelligence community, providing software and services to everyone from the National Geospatial-Intelligence Agency to the Department of the Army. Most notably through Boston Dynamics, a military robotics company once owned by DARPA and owned by Google from 2013-2017. With technologies like this, you’re playing with fire, check out this fictional (but quite likely and alluding to Boston Dynamic) scenario.


It seems that this is just the beginning of Google’s foray into the national security arena. A look at Google’s broader portfolio suggests boundless ambition. Читай здесь. This is a company that now owns a satellite company, advanced mapping and geospatial technologies, self-driving cars (Waymo), an unrivalled robotics portfolio and an unparalleled collection of global user metadata. Now think about the power a company has when you combine all these efforts. Sergey Brin and Larry Page’s small internet company is now the 17th largest company in the world under the name Alphabet Inc. While the subsidiary for the internet products is still called Google LLC, there are, besides the ones already mentioned, several other subsidiaries of the giant.

Google Venture and CapitalG are Alphabet’s own venture capital companies with which they have been investing in young start-ups since 2009. Wiki. Вики.

With Wing they are building a drone delivery service. Смотрите здесь. With Loon they are delivering high-speed internet to remote locations via giant helium baloons. Вики.

Through Deep-Mind, they are leading the development of artificial intelligence and made a historic breakthrough in 2016 when their AlphaGo AI easily defeated the world’s best Go player, an Asian board game that is many times more complex than chess and where ‘intuition’ is very important. In their research facility “X” they develop a wide variety of things (from robotics to AI), but the giant octopus also has its tentacles in the field of life sciences (Verily) and biotechnology (Calico). Вики. There, research is being done on invasive health technologies and slowing down the ageing process.

The ever-increasing collaboration between Google and the intelligence services came to a head in 2010. At the time, Google was attacked by what were believed at the time to be Chinese government hackers. The NSA helped Google and seized the opportunity for an information-sharing deal: Google agreed to trade information about its traffic for what the NSA knew about foreign hackers.

Google Jigsaw is a division of the company tasked with “fighting global problems like extremism, censorship and misinformation.” But this division has had its missteps: In 2012, as the Syrian civil war escalated, intelligence agencies pushed for a change in government. Leaked emails revealed in 2016 that Jigsaw was brainstorming for ideas on how to push Bashir-Al Assad from power. Planned was a tool that visually tracked all Syrian government officials loyal to Assad. Jared Kohan, head of Google Jigsaw, planned to show this data in Syria, on TV channels like Al-Jazeera. The purpose of this was propaganda to boost the self-confidence of Assad’s opposition. This opposition was, of course, the side that the US intelligence agencies wanted to see win.

According to Fred Burton, a former covert operative with the State Department’s security division, this doesn’t happen by accident: “Google gets the support of the White House and State Department and backing. The truth is they are doing things the CIA can’t do.”

Recently, Google developed a tool to track whether its users are at high risk of radicalisation based on their internet usage. The tool directs them to government websites that specialise in dissuading them from their beliefs.

It seems that today Google and other tech giants are increasingly blurring the lines between corporate and government secrets. And perhaps Google’s new name, Alphabet, is a strong indication that Google is, or always has been, just a front organisation for the intelligence agencies. In the US, for example, the three-letter government agencies (CIA, NSA, NRO, FBI, etc.) have often been jokingly called the Alphabet agencies since their inception…. Вики.

DARPA’S Lifelog – The Birth of Facebook

If the government were to start tracking the current location, shopping habits, preferences etc. of its citizens, it would rightly be seen as an attack on our freedom. This is exactly what the government organisation DARPA (Defense Adavanced Reasearch Program Agency), an organisation of the US Department of Defense that researches future-oriented technologies, had tried to do. Вики.

LifeLog, a DARPA project announced in late 2003 provides, according to a Wired article from the time: Читай здесь.

“LifeLog was led by Darpa, the research arm of the Department of Defense, and aimed to collect in a single place pretty much everything an individual says, sees or does: the phone calls made, the TV shows watched, the magazines read, the plane tickets bought, the email sent and received. From this seemingly endless sea of information, computer scientists would draw distinctive paths in the data, relating relationships, memories, events and experiences.”

So basically, this LifeLog would have been an all-encompassing diary. A perfect digital memory not only of what you do but where you do it, with whom you do what and in what way you do what. And the plan was to divide these different events into episodes, so that you can see: Ah here was this and then came this etc, and that all automatically. If you’re interested, you can read the original requirements from DARPA back then. Pretty scary, isn’t it? Didn’t go down well with the population either. Читай здесь.

But don’t worry, the programme was discontinued, according to the Wired article on 4 February 2004. Does that date sound familiar? That’s right: that’s EXACTLY the date Mark Zuckerberg went online with his site Facebook, which is pretty much the same as LifeLog. Well, if you dig deeper, the cancellation was only announced on 4 February, but the programme was already discontinued about two weeks earlier in January. Still, this ‘coincidence’ says a lot, or do you know something that comes closer to this LifeLog programme of the Pentagon/DARPA than Facebook and its daughter site Instagram? What is the Facebook Timeline but a ‘digital diary of events, divided into episodes’, interspersed with the complete personality traits and behaviour of the ‘user’?

Interesting is the tight-lipped explanation why Darpa quietly discontinued LifeLog:

“Researchers close to the project say they are not sure why it was cancelled late last month. Darpa has offered no explanation for the quiet cancellation of LifeLog. “A change in priorities” is the only reason given to Wired News by agency spokeswoman Jan Walker.”

The change in priorities was that instead of using government imposed coercion they convinced people to do it voluntarily! WE post our lives, WE share locations, WE link our friends. And these applications are deliberately designed to be highly addictive. Because they exploit a primal human desire: Social connection. From the government’s point of view, this was a brilliant move. They can hide their snooping in some terms and conditions, we do it voluntarily and have fun doing it. Besides, the front organisations earn billions and become willing accomplices.

LifeLog was made possible by George W. Bush’s Patriot Act of October 2001.

LifeLog came on the heels of the 9/11 ritual and they hoped to get away with it on the grounds of terror threat. The Information Awarness Office was launched in 2002 and brought together several DARPA projects to massively expand population surveillance after 9/11. Among the projects was certainly LifeLog, which was launched at the same time. After the ILO received so much public criticism, funding was cut off by Congress in 2003 (no wonder with the ILO logo). From 2004 and the years after, social media platforms became huge and as we know from Edward Snowden since 2013, not only do all tech giants have to give access to the NSA, no we also know that the surveillance projects of the ILO simply continued under a different name after they were ‘stopped’, a tactic that intelligence agencies like to use. Вики. How convenient. LifeLog becomes Facebook, Information Awarness Office becomes the NSA’s PRISM surveillance programme.

No joke, this was the official logo of Darpa’s ILO. An Illuminati pyramid with ‘knowledge is power’ in Latin.

Today, Facebook is the world’s largest social network with over 2.5 billion monthly users. The Facebook inc. group also owns Instagram, also one of the largest social networks with over one billion monthly users. Their portfolio also includes the two largest messenger apps in the world – Whatsapp (1.5 billion users) and Facebook Messenger (1.3 billion users) – and their hardware portfolio consists of their smart speaker portal, as well as VR glasses manufacturer Occulus. They also invested millions in CTRL-Labs, a lab researching a brain programming interface, and are researching sci-fi technology with their DARPA-like Research Lab. This aforementioned Building 8 Project housed Regina Dungan, former DARPA employee, and is researching augmented reality glasses, drones, brain scanners and apps that can read minds. Читай здесь. They are also launching their Libra internet currency this year. Critics fear that Facebook is setting up an unregulated shadow bank and that the market position of its investors (including Spotify and Uber) could become too powerful.

Both users and time of use of Facebook and Instagram are growing. This is surprising because Facebook already has a long history of proven lies and scandals like no other technology company. The number of times Mark Zuckerberg has had to publicly apologise for his company’s missteps has become ridiculous. Смотрите здесь.

Even Zuckerberg himself can hardly believe it, as early as 2004 he is said to have said about the first Harvard students who registered on “his” site: I dont know why. They “trust me.” Those dumb fucks! Читай здесь.

Over the years, dozens of data leaks and fines followed for Facebook, the targeted suppression of conservative and controversial news and of course the well-known Cambridge Analytica scandal in 2018, which proved that Facebook can also be used to determine the outcome of elections. Читай здесь. Their leaked Switcheroo plan revealed their true colours: while they were campaigning to make their data more secure, behind closed doors they were actually facilitating the sale of data sets. Читай здесь.

The Truth about Zucker-Boy?

But what did Mark Zuckerberg really have to do with the creation of the page? Was he really the nerd from Harvard University who wrote the scalability code for the Facebook page in one to two weeks, as he himself claimed in the legal dispute with his former colleagues? If the propaganda fairy tale movie The Social Network is to be believed then this was so. Смотрите здесь.

Well, in the summer of 2019, the site aim4truth.org was sent an anonymous Zuckerberg dossier by a high-ranking Facebook employee, which reveals astonishing things about Facebook’s birth. Читать здесь.

It is said to be authentic and the site speculates co-Facebook founder Sean-Parker as the author. He himself went to the press surprisingly openly and with remorse. In conclusion, it cannot be said 100% how true the letter is, but it is consistent in itself and it coincides with all the developments I have outlined here, so I would also consider it very authentic. A summary follows.

He starts by saying that they are lying to the world and “using your personal lives as a government-controlled experiment in brainwashing and mind control – basically a weaponised system of the military (especially the CIA) that has gotten out of control.” Well first of all the Scaleabilty code is actually extremely complex and was developed over years by a company called Leader Technologies. Micheal McKibbon, a software developer at Leader Technologies sued Facebook for stealing the code. Due to patent issues, Zuckerberg got away with it. Mark is also in reality just a very average coder who never quite understood the code of his own website, and an even more average corporate leader who “couldn’t run a McDonalds, let alone the most powerful company in the world”.

Facebook was created through a competition at Harvard University, led by then Harvard President Larry Summers. The goal of that competition, for funders DARPA and In-Q-Tel, was to develop “a cyber weapon that could control the minds of anyone tempted to use it.” The author says that not only is Facebook a military weapon, but Sergey Brin’s Google was also created for this reason. The original code for the site was not written by Mark, he is said to have got it from Professor James Chandler and IBM and made only minimal changes. The Winkelvoss twins (fellow students of Mark’s) knew about this “dirty secret” and were silenced in a $65 million lawsuit. The truth is that Mark Zuckerberg is not who he is made out to be. His real name is Mark Greenberg and he has been groomed for his “role” as a powerful tech giant by very ‘powerful and evil’ people since high school. Namely, through MK-Ultra Mindcontrol, which he was exposed to since a young age, as he was related to the people behind the real project. That’s why he got his job at Harvard without an interview and was able to drop out after two semesters, because his path was already pre-determined and the university time was only for the CV.

The author of the letter said that some people who called him at college had a frightening amount of power over his actions. He was also plagued by terrible nightmares and flashbacks in which he relived the torture of his family. He also allegedly told the author that the brainwashing was permanent, for “the position” these people would create for him. He did not know what position that would be, only that it would give him a lot of power and wealth. He was constantly plagued by panic attacks which he began to suppress with medication later in life. Especially the question “Tell me about how you started Facebook” scared him, because he knows he didn’t. He didn’t write a single line of code, and even he didn’t write a single line of code. He didn’t write a single line of code and even the name of the site is said to be due to Larry Summers, the coordinator of the project at Harvard. And indeed, in awkward interviews Mark either looks hypnotised and drugged up or extremely nervous and sweaty. Смотрите здесь.

For example, he had a visible panic attack when confronted in an interview with the symbolism on the inside of his hoodie and whether it had anything to do with the Illuminati. Смотрите здесь.

The motto of the Facebook cult, hidden on the inside of their hoodie.

All the founding members, including the author, knew from the beginning that they were building a military cyberweapon for mind control, because that was their mission. Everything they did from the beginning was an experiment to see how far a social media platform could go to “conquer the enemy” through behavioural manipulation with electronic warfare. They just didn’t want to admit that the enemy was ALL the people on earth. That is also one of the reasons why the author remains anonymous, because he was involved as well and that would put him and many others at Facebook in jail. The author says that he was personally told to his face by DARPA that Facebook was deliberately designed to be addictive. The so-called social feedback loop causes a dopamine release in the brain (like smoking cigarettes), which leads to providing more content, which leads to more dopamine releasing social recognition, and so it goes on forever until addiction sets in. And the reason why these companies are based on a business model that provides the application “for free” is because they get enough test subjects.

The dopamine-driven social feedback loop

The social-recognition-feedback loop has devastating consequences for the psyche, especially for young people who only know a life with social media apps. There are now studies that show that prolonged use of social media makes you addicted, unhappy and dissatisfied, which can even lead to depression. Читай здесь.

It has negative effects on memory, sleep quality, self-esteem, individual well-being and ironically leads to envy and social isolation. People who turn their backs on these cyberweapons for good usually experience an immediate increase in their quality of life. Читай здесь.

The U.S. Patriot Act allows the military to consider any American as a possible terrorist or enemy combatant until proven otherwise. Any person on the Internet, also created by DARPA, is considered a cyber-terrorist and the military sees it as its job to create systems to monitor, target, disarm and aggressively remotely control the user. And for patriotic reasons, Mark also always justified his collaboration with the CIA. As soon as his founding colleagues tried to convince him that things were going in a nasty direction, a call came from his handlers and he went ahead with the plan. Everyone originally involved got a pile of cash to shut up and CIA non-disclosure agreements “grow on every plant at Facebook.”

One day Mark was called into Summers’ office at Harvard University’s Massachusetts Hall to meet a most unusual man. His name was Andrew Marshall and he was the head of the Naval Intelligence Net Assessment Office. Mark was terrified of Marshall from the start. Marshall had Mark sign a government non-disclosure agreement and other security agreements before informing Mark of the ultimate military nature of the Harvard Facebook project. Mark and Harvard were simply being used as incubation think tanks as cover for a military project that needed a corporate face. Professor Chandler said he had discovered the source code that would accomplish the seemingly impossible task of making a social directory “scalable” for billions of people.

Chandler droned on about how Harvard professors like to talk about how the academic elites at Harvard were the best choice to do the initial testing because of their superior intellect. He explained that this scalability dilemma was not being solved by the usual military vendors of Microsoft, IBM and Oracle for reasons the author did not understand. He said they had found a company that had solved the problem but was not ready to be used by the military as a black ops project against Americans and the rest of the world.

James P. Chandler III

Chandler and Summers had chosen Mark as their front man to lie and claim he wrote the source code for scalability. Chandler explained that the government had seized the source code from an inventor and his company for use in the DARPA-Harvard Facebook project. He explained in very flowery language of intellectual property theft that Mark could be sued by the inventor but DARPA would shield him. Mark told them he was willing to take that risk. And so it was: technoligy leaders have wanted to sue the government for years through the Miller Act. Читай здесь.

For intellectual property theft, they are entitled to $186 billion in government compensation per year since 2003, trillions of dollars to date! James Chandler, then patent attorney for Technoligy Leaders, had close ties to the White House from Clinton to Obama, so the lawsuit has always been shot down.

The timeline of the government’s ‘coup’ to hijack the social media idea.

Mark knew full well that the people who had brainwashed him had a grand plan and his part was simply to do what they told him. But now Mark was getting scared because James Chandler was a member of the President’s National Security Team, a top lawyer for national security and patents and was a really mean and scary black guy who could easily turn on you like a pit bull.

Larry Summers had the same elitist bully traits, was president of Harvard and a leading economist. Mark felt groomed and protected by some very powerful people. But it was Andrew Marshall, the one they called “Yoda”, who scared Mark to death. After Mark was “read into” the plan by Summers and Chandler, their boss wanted to meet Mark to make sure he could be trusted to be part of this overarching evil plan to manipulate all of cyberspace as if it were a war arena.

Larry Summers, Harvard president from 2001-2006. Before that was at the World Bank and after that a bigwig in politics for Clinton and Obama.

Andrew Marshall did not like Mark at all. The author witnessed it himself when he was asked to participate with Mark in one of Andrew Marshall’s Highland Group forums as one of Facebook’s key executives. Every time Mark opened his mouth Marshall stared at him until Mark shut up. Marshall pointed out at this meeting that Mark himself was the biggest problem with the Facebook operation. Mark was so happy when Andrew Marshall died not long ago. Mark now takes his orders from Marshall’s understudies Dick O’Neil and James Baker, who run the Highlands Group. Chandler also worked for the Highlands Group and led numerous operations working directly with Andrew Marshall and James Baker.

Andrew Marshall (“Yoda”). Passed away in March 2019.

It was on 28 October 2003 that Mark returned from Summers’ office and announced, “Let the hacking begin.” This hacking stole the white paper that had been sent to the son of Michael McKibben, owner of Leader Technologies and real inventor of scalable social media. Michael had sent his son Max the white papers written to describe the new invention. When Mark learned that Chandler was Michael’s patent attorney, the theft finally gave a name to the target Chandler had spoken of in vague terms.

Chandler had asked Michael to write a detailed explanation of the system and how it worked. After Mark showed Chandler the stolen white papers, Chandler confessed that as Michael’s patent attorney he already had a complete evaluation copy of the source code, that he used an espionage tactic called “strategic deception” by pretending to help Michael and Leader Technologies file patents while secretly passing Michael’s invention code to DARPA’s IBM Eclipse Foundation cyber-warfare partners.

Micheal McKibbon, Leader Technoligies, is the true inventor of social media.

Chandler told Mark that IBM Eclipse was preparing Michael’s programme as they spoke to present it to Mark for the Facebook launch at EclipseCON ’04 in San Fancisco just after the Harvard January reading period. He said the plan was to transfer all the NSA’s LifeLog data to the Facebook platform as soon as possible as well. He also told Mark that he would be moving to Silicon Valley at the end of the term and that the next phase of the plan for him would be in California. Dustin and the author went with him that summer, but he decided to return to Boston and finish his degree.

Chandler had not yet seen Michael’s white paper and was eager to have it. Mark sent him the hacked copies. Chandler said that with the inventor’s first-ever public report and the source code, the Highlands Group and the IBM Eclipse Foundation now had everything they needed to prepare the platform with which Mark could launch thefacebook, later shortened to Facebook, at EclipseCON ’04 in February.

This is what Facebook looked like when it launched in 2004.

It became clear to the author that Chandler took the stolen source code from Michael McKibben and Leader Technologies and gave it to the IBM Eclipse Foundation, which gave it, the most lucrative intellectual property in history, to all the social media giants as open source code without charging a cent.

Mark Zuckerberg (Greenberg) didn’t invent Facebook, he can’t even really code. The story of the Harvard genius is nothing more than a fairy tale… He was only supposed to play the leader of the front organisation and for that he was from the beginning under mind-control of his military handlers who made every decision of the company. According to the author, he played his role more badly than right, as evidenced by all the scandals and bad answers before Congress. The next step will be to drive the data monopolies Google and Facebook against the wall and split them up into several small companies, as happened with Rockefeller’s oil monopoly Standard Oil. This ultimately made them even richer and the public mistakenly believed that there was no longer a monopoly. The new oil is data and a similar process is to be expected. One can almost feel sorry for Mark, he is the controlled boo face to point the finger at when the military cyber weapon does its desired damage. According to the author, however, he is slowly losing it, starting to believe his own lying propaganda and thinking he is better than the lowly humans (typical MK-Ultra). He is also said to have bragged about being able to become president at any time – all he has to do is stand up and Facebook would take care of the election result.

Facebook was actually developed by DARPA under the leadership of James Chandler, Larry Summers, the Highland Forum and the IBM Eclipse Foundation. The code was stolen by Leader Technoligies, the true inventors of social media. Their claim for damages is watertight, but has always been shot down by corruption. When the author of this dossier saw how they used $1.5 billion from George Soros and the Atlantic Council to set up the AI system (some of which was built by the Cambridge Digital Forensic Research Laboratory) used in Europe to shut down free speech, he had enough and wrote this letter. He knew then that Mark was really being used by evil forces and that even he could not stop it. Mark’s handlers order him to allow more surveillance even though there are security breaches, to sell customer data, to allow spying by CIA, NSA, DIA, GCHQ, MI6, Five Eyes, to lie to Congress, to interfere in elections, to give anyone access to Facebook data, to censor conservatives, to be a platform for the Democratic Party, and many other charges that have been brought against Facebook in other countries and America.

Surveillance Capitalism

But the question remains: Why did the secret services go this route via companies? What do they want with these applications? Somehow they had to finance the expensive operation of the cyberweapon, use the enormous possibilities of money creation in the private sector to develop further enslavement tools (X, Building 8) and at the same time offer the applications free of charge and on a voluntary basis, so that everyone would actually participate. How did this work?

Shoshana Zuboff, economist and professor emerita of business administration at Harvard Business School. Вики.

The term surveillance capitalism is not an abstract concept. Why surveillance? Because it has to be operations that are deemed unverifiable, undeceivable, cloaked in rethoric, designed to misdirect, obfuscate and downright confuse us all. What is really happening to your Facebook photos? Why are there hidden microphones in Google Nest? And Pokemon Go exposed as a child molester? Shoshana Zuboff reveals how Silicon Valley fools us…. and extremely well.

Some might say, “Hey I like personalised advertising, it’s so useful.” Or, “I enjoy personalised customer service.”; or, “You know, I have nothing to hide… so I don’t care what they collect.” Each of these statements is a profound misconception of what is really going on. We think that the only personal data they have about us is the data we’ve given them. And we think that we can exercise some control over what we give them. And so we think that this “exchange” that we’re making here is something that is under our control…. we think we understand. This is what’s really happening here: We give them personal information, but the personal information we give them is the least important part of the information they collect about us.

Thanks to navigation and search engines, Google knows where we are and what we think all the time. Facebook knows our hobbies, preferences and friends. Because they get a lot of information from the digital footprints we unwittingly leave behind. Misspellings in your search queries, which icon colour you prefer, how fast you type and how fast you drive… So-called ‘residual data’.

In the very beginning, back in 2000, 2001, 2002, this data was just seen as extra data. It was perceived as ‘rubbish’ and people referred to it as digital exhaust or data exhaust. At some point, however, it was understood that this so-called ‘data rubbish’ contained this rich predictive data.

“The search information we keep, we do for quality reasons. So, for example, the Google spell checker, our “Did you mean?” feature that appears in Google, was built using long periods of data around the idea that when someone makes a search query and then puts out another corrected query rate, we learn those corrections. And it took us more than 30 days of data to build the top-notch spelling correction that we have.” – Marissa Mayer interview (Vice President Google 2006)

Companies like to say that they collect data so they can improve service and that’s true. They collect data and some of that data is used to improve the service for you. But the bulk of the data is analysed to train what they call models. Patterns of human behaviour. And once I have big, trained models, I can see how people with those traits typically behave over time. And that allows me to put your data right into that arc and predict what you’re likely to do. Not just what you’re doing now, but what you’re going to do soon or later.

These data streams that are filled with this rich predictive data are called “behavioural surplus”. Why surplus? Because at the very beginning there was more data than needed for product and service improvement.

Behavioral Excess Data – Garbage Turned to Gold

Once you have the behavioral surplus, the extensive behavioral data of hundreds of millions of people, you can begin to predict the preferences of certain groups. Think of popular shoes for male managers or preferred restaurants for a group of people who share the same zip code. At the simplest level, they predict the type of food you feel like eating. They auction this forecast to their business partners in the restaurant industry, who in turn send a quick advertisement, according to the motto: “We know that you are currently in the mood for a delicious pasta dinner, so here is a discount for our restaurant.” Some people claim that this targeted advertising is ineffective.

One of the misconceptions we really need to move away from is that surveillance capitalism only manifests itself in our lives when we are online. Or that for some reason it is only limited to personalised online advertising. It is easy to say that such things have no impact on us.

Surveillance capitalism is no more limited to advertising than mass production is limited to the manufacture of the Ford Model T. It quickly became the standard model of capital accumulation in Silicon Valley, adopted by almost every start-up and app. And it was a Google executive – Sheryl Sandberg – who played the role in spreading it, bringing Google’s surveillance capitalism to Facebook when she signed on as Mark Zuckerberg’s number two in 2008. It is now no longer confined to individual companies or even to the internet sector. It has spread across a wide range of products, services and economic sectors, including insurance, retail, healthcare, finance, entertainment, education, transport and more, creating whole new ecosystems of suppliers, producers, customers, market makers and market participants. Almost every product or service that begins with the word “smart” or “personalised”, every internet-enabled device, every “digital assistant”, is merely an interface in the supply chain for the unimpeded flow of behavioural data on the way to predicting our future in a surveillance economy.

The best example is Amazon. Jeff Bezos’ company harnessed the power of predictive meta-data and combined it with commodity trading, making Amazon the most powerful company in the world today, a monopoly in commerce, and Jeff Bezos the richest person in the world. Who bought the Washington Post, one of the most influential newspapers in the US, just for fun.

The fact is that the whole thing is done on a level that we can’t access. We have no idea what today’s algorithms can predict about us or on the basis of what behavioural data they do. A simple thing like buying a certain shampoo can reveal essential information about us.

For example, the New York Times reported on a case of a US supermarket chain that knew a woman was pregnant even though she didn’t know it herself. Читай здесь.

Let alone be willing to share the news. The store’s algorithm found that the young woman switched from scented shampoos to more neutral-smelling products. Since a pregnant woman’s olfactory senses become stronger, the market algorithm assumed that she must be pregnant. Her father didn’t know this – until he was repeatedly sent special offers for baby products.

Thanks to the analysis of trillions of terabytes of behavioural data we unwittingly leave in the digital domain, big tech sometimes knows us better than we know ourselves. They can predict things like our personality, our emotions, our sexual orientation, our political views – a whole range of things we never wanted to reveal. The pedagogical value that big tech can extract from residual data is enormous. The family pictures we post on Facebook contain residual data from which large amounts of valuable knowledge can be distilled. Say you upload a picture of your kids’ birthday party to the Facebook page. What we don’t understand is that the most important thing here is not the photo per se – it’s the predictive signals these companies can draw from these photos. It’s not just my face, but allowing them to analyse the hundreds of muscles in my face. Uploading innocent photos to your Facebook profile can have unexpected consequences.

Facebook’s Face Recognition – We Create our Own Enslavement

Our faces, for example, are used to train facial recognition algorithms and we have absolutely no idea what this facial recognition software is used for. All these streams of data with these rich predictive signals are fed into the new factories, the computational factories, and analysed for predictive behaviour. These predictions are then sold. Who are they sold to? Not to us. We are not the customers. They are sold to companies who want to maximise our value to their business, whatever that may be. The information of our faces, but-billions of photos we gave to Facebook are used for face recognition models, and these models are then sold to military operations. Some of them in China and these Chinese operations do many things, including openly discriminating against and imprisoning Uyghurs. Смотрите здесь.

A Muslim minority in China whose place of residence is rightly considered an “open air prison”. They don’t even have to have people behind bars because they are tracked and constantly followed through facial recognition. Amazon also sells facial recognition software to police departments in the US through its Amazon Rekogition service. Вики. They are building a database of people with it right now. It starts with criminals and then the definition of crime is stretched further and further.

The knowledge generated by our residual data can be sold to anyone. Facial recognition software can be sold to a Chinese company that supports the repression of the Uyghurs or helps track down democracy advocates in Hong Kong. In this way, our beloved family photos could be used by Facebook to facilitate authoritarian regimes around the world (and soon our own) while guaranteeing our privacy. After all, it is not our faces that are being sold, but the (anonymous) residual data that is scraped from them. It is difficult to have a concept of this, and for good reason – it is not because we are stupid. No, these processes have been hidden. They operate in secret. They have been created to be undetectable and indecipherable, to create ignorance in a large group of what they call us, users. Our ignorance is their blessing.

There are a few things that have come out in the open that we don’t know about. Let’s talk about Facebook’s Massive Scale Contagion Experiments.

Facebook experimented with subliminal cues that they placed on their Facebook pages that influenced real, offline-real-world, behaviours and emotions. They wanted to find out if they could make people happier or sadder through subliminal cues such as speech manipulation and word manipulation. When the experimenters published this work in prestigious science magazines, they focused on two key findings. Читай здесь.

1) We now know that we can manipulate subliminal cues in an online context to change real behaviour and emotions.

2) We can execute these methods without the user being aware of them.

This means that the behaviour and emotions of billions of people in the world can be manipulated without them realising it. How many protests have been incited by the cabal in this way in the past?

Pokemon Go – Google’s Outsourcing of Surveillance Capitalism

An interesting experiment is currently taking place in the form of an augmented reality game: Pokemon Go. In this mobile phone game, which is very popular among young people, you walk through the real world with your smartphone. The Pokemon are hidden at real GPS data points, which you have to move to in order to catch and collect them with your mobile phone. During the hype of this game in 2016, thousands of young people went on pilgrimages through cities all over the world to catch the rarest Pokemon. You might be happy that the kids are getting out, but Pokemon Go has a completely different purpose than you might think.

Pokemon Go was hatched for years inside Google, led by a man named John Hanke. He was also the inventor of Keyhole, the CIA start-up that later became Google Earth and Google Maps under his leadership. He developed the underlying idea behind the concept of the game, so-called location-based games, but no one would have played a “Google Go”. So he founded the company Niantic Labs and developed the game together with Google and the Japanese game developer Nintendo, using the still very popular Pokemon to market his idea. Just a small start-up with a cool game… Nope. The big game behind the augmented reality Google Game precisely emulates the logic of surveillance capitalism.

John Hanke. Head of Niantic Labs, which has spun off from Google since 2015.

In online surveillance capitalism, the click-through rate is predicted and then sold to the advertiser. The advertiser pays Google to get clicks on their website and hopes they will eventually click through to the ‘buy’ button. Now in the real world, businesses have paid Niantic Labs to get the real world equivalent of the click through rate: Feetpace. To get real bodies with their feet into their storefronts. In plain English, this means that an ice cream parlour, for example, can pay Niantic Labs to have a Pokemon appear in front of their shop, which will naturally attract players who, while they’re there, might as well buy an ice cream. They actually call the whole thing bait modules. The more money they pay, the rarer Pokemon appear near them and the more people come. It was a win-win situation: Starbucks, McDonalds, Niantic Labs – all made the fat business. But the players had no idea.

The successes and failures in the game app were used to steer you through the city until you got to the places that paid for your body… without you knowing about it. That was the real game – the shadow game that was going on in the background. Getting you to a place where they predicted you would be. Game design makes it much easier to guarantee those predictions, which in turn makes those predictions more valuable. Pokemon Go, and the copycat games of it, are a vast and global experiment in ‘economies in action’, in which remote control has been used to automate and change behaviour to meet the commercial goals of others. All while having a good time.

Remote control of the crowds like a swarm of bees.

You are meant to feel served. You are meant to be saturated with comfort so that you will not notice and complain. And all this shadow operation will remain hidden because they will not ask questions. Because they are all so busy being entertained.

Smart Home Devices

So it’s no longer enough for them to know what you’re doing online: your messages & emails and your browse behaviour. They want to know about your walk in the park, what you’re doing in your car or what you’re doing at home.


A clever person discovered a hidden microphone in the Google Nest Security System. This microphone was not revealed in the user manual and had no official function. But it was there. Читай здесь.

Why would there be a microphone in there? Now what is our business? Extraction of behavioural surplus. A microphone is ideal for a new kind of behavioural surplus: voices. Conversations with family or flatmates, what you watch on TV or what music you listen to. Who comes in and out of your house? Do you shout at each other at your breakfast table? All of this has enormous predictive value. Google Home, Facebook’s Portal, Amazon’s Echo with Alexa, Apple’s HomePod with Siri, Microsoft’s Ivoke with Cartana. All are now targeting voices, just as they are all now targeting faces.

Of course, Google claimed they never intended to use this hidden microphone. But that’s just their business: to obfuscate and draw attention away from their undetectable methods and when confronted, deny it. Deny it until you get used to it. And when they fail to get an element accepted, they create an adaptation. They turn off the microphones and when no one is looking they are in the next device.

When the privacy policy of the Google Nest Thermostat was analysed, it was found that even one thermostat collects a lot of data. This data is sold on to third parties, who can sell it on again at will until in the end no one knows where the endless stream of data has gone. And none of these companies, not even Google, takes responsibility for what this data is used for. But they blackmail the user into agreeing to it. If you don’t consent to it being passed on to third parties, you are no longer guaranteed functionality. The software will not be updated. Be aware that the smoke detector might not work anymore or that your pipes might freeze.

Well, they have also found that they need not only quantities of data but also different qualities of data.

The concept of Surveillace Capitalism does not stop at self-driving cars. A car like this has up to 15 cameras that are constantly filming the environment 360 degrees and if you only have access to 1% of all cars you know what is happening all over the world. And when this data will be worth more than the production costs of a car, these cars will probably also become free. The price is again our privacy. That’s why Google got into the self-driving car market, they are another Trojan horse to get data.

Spreading Out the Data Vacuum Cleaner

With the free Android, Google has managed to be in almost 90% of all mobile phones today, pulling the data surplus of about 3.15 billion (!) people. That’s almost half the world’s population! And the rest are supposed to be connected too: Helium balloons (Project LOON) are supposed to bring mobile internet to places that don’t have it yet. Facebook followed suit and flew network drones over growing markets and offered a free internet connection if you downloaded the Facebook app. India saw through this and rejected its offer.

The Aquilla drone from Facebook. Almost as big as a Boeing 737. Very reminiscent of the HAPS.

Thanks to a leak, Facebook’s secret methods have been made public. Читай здесь. In particular, this disclosure looks at how Facebook executives promote ad campaigns that exploit Facebook users’ emotional states – and how they target users 14 and older. They told their clients that they have data on 6.6 million Australian teenagers and young adults and that they can predict their mood swings. They can predict when they feel stressed, exhausted, nervous, worthless, anxious… All these very personal feelings can then be used by Facebook to serve an appropriate ad at the exact moment they need a self-esteem boost. For example, for a coupon for a sexy outfit, exactly one day before the date (when the nervousness about it is at its peak). They take advantage of the peak of vulnerability.

When whistleblower Chris Wiley told the world about Cambridge Analytica in the Guardian in 2018, he said that they had so much data on so many people that they knew exactly how to appeal to their fears, anger and paranoia. Читай здесь.

And by doing that, they could manipulate them into what group to join, what books to read, who to meet and who to vote for. This is exactly the same thing Facebook did with the kids. Same methods, just shifted a few degrees from a commercial outcome to a political outcome. Cambride Analytica was nothing more than a parasite on a host and that host is surveillance capitalism.

MK-Ultra puppet Mark Greenberg proclaimed big time after that scandal in 2019 that the future at Facebook is private (and laughed at privacy like it was a joke). Смотрите здесь.

Only for a Facebook lawyer to come clean under oath a few months later. Читай здесь. Due to a class action lawsuit in which citizens demanded the data sets that Facebook had passed on to Cambridge Analytica, Orin Snyder had to defend the company. He told the judge, “There is no invasion of privacy because there is no privacy. Facebook users can’t expect privacy.”

Just as credible as McDonalds talking about sustainability.

And the Bluetooth tracking now developed by Google and Apple which is now being used to track Corona infected people is the pinnacle of the surveillance nightmare. Of course, no one can refuse the contact tracking update, every Android and IOS user (which is probably 99.99% of all smartphone users in the world) will get this update automatically, whether they want it or not. Google and Apple will not release a health app themselves (these will be voluntary), but the API update needed for this will be forced on you. No discourse and no voting – just two tech giants and the government making a decision. All the phones in your Bluetooth range go into a database. In a few months this is even supposed to be part of the operating system and provide a new stream of data to third parties. They say this data is anonymised, but that’s “bla-bla”….

Both companies have tons of personalised data of their users and this can be connected to it. Re-identification of anonymous data sets is easy business for these companies and especially intelligence agencies. With 3-4 data sets, one could identify 87%-95% anonymous cases. With modern AI and 15 data sets, even a re-identification of 99.98% is possible in a very short time. Considering that Google and Apple have thousands of data on everyone… no “anonymised” contact tracing will do anything if it takes a long time. Add to that the fact that chaos-mongers with Blutooth booster antennas can specifically trigger false alarms on someone. Or just the fact that it goes off through the wall because the neighbour is “positive”, but not with supposedly contagious surfaces? And it would all depend on the number of tests anyway. What’s the point? But yes, logic is nowhere to be found in this fake crisis, instead lies and control everywhere you look, but you know that.

When will this be withdrawn again? When “the pandemic” is over? Should these measures be maintained just in case of a second wave? Why not keep them for potential future pandemics? Why stop at health crises, why not use them to fight organised crime? Or drug dealers and their suppliers and customers? Why not use contact tracking to make public transport more convenient? Why not use it to manage immigration? Or keep a distance from “conspiracy theorists” to avoid misinformation pandemics?

The Patriot Act showed that temporary anti-terror surveillance measures not only remained in place until today, but were even expanded as more and more uses were found. Do we really want to trust the same governments and companies not to abuse their power this time? The coders at Goolge could also improve the delivery systems for medicine and food, but no more surveillance it should be. They have uncovered a new vein of gold, a new behavioural surplus: Real Contact. And the cabal is one big step closer to a worldwide open-air prison. So I already got myself a faraday bag for my mobile phone (blocks signals).

Conclusion – The Way Out of the Spider Web

In terms of human history, we’ve only had these intelligence tools for a minute. And before that, we were doing just fine. We lived lives of abundance and real connections with family and friends. However, the digital age obviously brings us a lot and we deserve to have it all – but without paying the price of surveillance capitalism. Especially since, according to insider Jaron Lanier, it would work without: Offer the applications for a monthly end fee, then they would no longer be dependent on manipulation and surveillance, and we would only have advantages through the internet. Смотрите здесь.

People of the 21st century should not have to choose between going analogue or living in a world where our self-determination and privacy are destroyed to satisfy this market logic and control humanity. And let us not be naive: These powerful control tools are and will increasingly be used against us by the powers that be. This was the plan from the beginning. We can still get out of it as long as it is in the realm of the market and not political coercion.

So how do we get out of it? The European GDPR, although one of the better ones in the world, doesn’t even scratch the surface. It only deals with the public data that we have given to companies. But as we have seen, companies are getting rich on the predictive data that we have not consciously given them. They can use it to manipulate us and feed models. And these models are used for the oppression of humanity. And this is not being prevented so far, and of course this is by design. Both Facebook and Google spend millions on lobbying the EU. Читай здесь. И здесь.

We will never get claim to the data of the shadow operation, they took it from our lives without asking and claim it for themselves. The spider, the cyber weapon that feeds on our behaviour and grows stronger.

But there are ways to become invisible.

First of all, you should of course think very carefully about whether you want to continue using these untrustworthy social media sites or whether it would not be advisable to delete the account completely and forever. And yes: I say this in the full knowledge that I myself get a lot of traffic for my blog via Facebook and Twitter. These sites are also good for spreading the truth, because they reach the critical mass. But the day will soon come when they will be completely censored. And there are other ways to stay in touch. I have to admit myself: I find it extremely difficult to do without Youtube, because I have learned and experienced a lot through Youtube and the convenience of Amazon is unbeatable.

You can also start in small steps: Do I really have to have the app on my mobile phone or isn’t it enough to just take a look from home? That’s how I was able to reduce my Facebook time by more than 90% and it was the best thing I ever did. Now I check it maybe once a month for 5 minutes. If you want to delete Facebook, here is a page with a simple guide, because Facebook itself makes it as hard as possible. Читай здесь.

Here’s a guide to deleting Instagram. Читай здесь. If you can’t delete it, at least try to reduce the time you use it to a minimum. If you really want to use these sites on your phone, then use a progressive web app through a secure browser. Читай здесь. This feels like using an app without having to have the real app on your phone. Instagram, for example, always tracks your location unless you manually turn it off.

Alternatives to the Google search engine are: DuckDuck Go or even better Startpage. Смотрите сюда. И здесь. Both do not collect any of your data and protect your privacy satisfactorily. Set them as your homepage in your browser and get the app. However, they don’t help as well against manipulating search results and burying critical information. Good-Gopher and Searx.me might be a good alternative here. Смотрите сюда. И здесь.

Delete all apps you don’t need from your phone, turn off GPS and get the free app NetGuard to block your apps’ hidden internet access. Смотрите сюда.

An anonymous alternative to Google Maps is OpenStreetMap and its OSMAnd+ app. Смотрите сюда. An encrypted and secure email service is the Swiss-based ProtonMail. Смотрите сюда. They also offer a free VPN that anonymises your IP address.

You should definitely do without WhatsApp and switch to Signal instead. Смотрите сюда. I’ve been using it for years and hopefully I’ll be able to delete WhatsApp (for the last of my friends and acquaintances) soon. You may think that your conversations are private but they are not. Facebook also collects meta-data from Whatsapp and does God knows what with it. Telegram is the talk of the town right now, but it has the disadvantage that not all messages are automatically end-to-end encrypted, but are stored unencrypted for a while on the various servers of the central company. Moreover, Telegram is not open source, which means they keep the code secret, and instead of various security and democracy foundations, Telegram is mainly financed by the donation of a rich Russian. This makes one a bit sceptical and is unusual for non-profit messenger companies. Nevertheless, Telegram is better than WhatsApp and offers many cool features. However, Signal is much safer for writing:

The message content can neither be seen by the operators nor by third parties due to the end-to-end encryption. This applies to everything: text, voice messages, telephony and video telephony. The users’ phone book is not uploaded in plain text to the operators’ servers. Instead, only hash values of the numbers are matched. In future, this process will also be shielded by a second layer of encryption. Since Signal encrypts the sender’s address before sending a message, it is not possible to reconstruct who is communicating with whom even when tapping the exchanged messages.

The user profiles, consisting of name and photo, are encrypted and therefore not visible to the operators, but only to the conversation partners themselves.

The messenger offers every comfort you need, only the camera function leaves something to be desired. Signal is not perfect, but it is the best way in the right direction. Unfortunately, the servers are located in the USA and are not decentralised. The messages are completely encrypted, but if the US government somehow manages to force the company to decrypt, all security is out the window. Another good messenger is Briar. Смотрите сюда.

If you need to convince friends to switch from WhatsApp, show them this video and talk to them in person. Start person to person contacting only through Signal, a little more security is better than no security. You only have something to gain. After about a year, almost everyone in my circle of friends has been convinced.


So Google and general internet anonymity is a bit trickier. The Google apps cannot be deleted from Android, but check the privacy settings on your phone to make sure they have as little access as possible. Kick Google Chrome and Microsoft Edge off your devices. Use Brave instead. Смотрите сюда.

It’s fast, has an integrated ad- and tracker blocker and an incognito mode that runs through Tor. Tor also makes sense to use directly. The web browser Tor is by far the safest way to use the internet, because with it it is impossible to collect user data about you (it is also available for mobile phones). Смотрите сюда.

Tor itself was developed by the US Naval Research Laboratory and was funded by DARPA to protect the agents of the secret services themselves on the net. However, they realised that the more people who use the network, the more secure Tor becomes and had to release it to the public. Logically, if only CIA agents are allowed to use Tor, it is automatically clear who is looking at a page when the request comes anonymously. Since then, it has been financed only by donations from users and is completely independent. To prevent it from being used by the masses, it has been given a dirty image in the public media (only terrorists, Nazis and child fuckers use it, so don’t touch it, blah, blah, blah).

It anonymises your connection data and gives you another one across several servers in the world, your IP address then comes from another country and is untraceable. Each of these relays works independently and is chosen randomly. This is called ‘onion routing’ because your connection goes through many layers, like an onion. Unfortunately, this slows down the internet speed, as the data then make several detours around the world. With a fast internet, however, this is feasible. A VPN, on the other hand, always runs in and out via a central server of a single company, which knows your IP and website visits and sometimes even your account data, because you have to pay for the many VPNs. Authorities can force these companies to hand over the IPs. This is enough to bypass sites blocked in your country, but the security is hypocritical. This is not possible with the free open-source browser Tor. It is theoretically possible to locate a Tor user, but this is extremely time-consuming and only makes sense for the authorities if actual crimes are committed and the user also makes mistakes. Смотрите здесь.


With Tor, you disappear from the internet and can still use it. You no longer support the beast and you regain your privacy. This pisses off the cabal and thanks to Snowden we know that the NSA puts every Tor downloader on an extremist list. Читай здесь.

Because protecting their behavioural data is “extreme”. If that’s too tricky for you, VPNs (Proton), secure browsers (Brave) and secure search engines (Startpage) will do for now.

Yes, the whole thing is an hour’s work, but the payoff can’t be overstated. You now know the real story behind the internet and the true intentions of this cyber weapon. It is important that as many people as possible make themselves invisible, because a few tens of thousands do not scratch the system at all, we need hundreds of millions. These sites do not think they will suddenly be abandoned en masse and are counting on the ignorance of the many. These hidden operations need to be experienced and anger about them needs to overcome comfort. This is not about whether one has something to hide, but about not giving these parasitic front organisations of the secret services access to our actions and thoughts any more. Because with this, algorithmic models are trained that will remotely control us, exploit us, manipulate us, set us against each other, make us mentally ill and completely enslave us through advanced surveillance measures.

Online as well as offline.

Whoever sleeps today will wake up in a dictatorial dystopia!

Here are a few more documentaries to delve deeper into the subject, otherwise this will never end All highly recommended!