Archives

Tagged ‘Google‘

It’s Not a Social Dilemma – It’s the Calculated Destruction of the Social [The Enclosure of Africa]

October 30, 2020

By Cory Morningstar

 

 

2Africa: Digital Colonization Meets White Paternalism – The Facebook Enclosure of Africa

 

“Zuckerberg’s team has another related project named 2Africa. A “mission”, as they call it… Civilians have been quite silent about it this time, but not because they don’t have an opinion. It looks like many civil society groups in the continent are financed by Facebook itself. Ironic, right? Well, it seems like the missionary-like good guys from up North are going to save the world again.”

 

August 18, 2020, “There’s a 2.0 form of colonialism happening under our very eyes”

 

 

“Facebook realizes it’s running out of room to grow in developed markets. Instead of waiting for developing countries to build adequate infrastructure for its apps, Facebook wants to help develop the infrastructure and lock users into its ecosystem.”

 

May 22, 2020, Facebook Will Bring Expanded Internet Access to Africa in $1 Billion Project

 

 

“Big Tech corporations are wreaking havoc on the Global South. There’s a crisis in the tech ecosystem, and it’s called digital colonialism.”

 

March 13, 2019, “Digital colonialism is threatening the Global South”

“Many countries will face a shrinking population. For Europe, this challenge may come sooner. The region is projected to face the highest dependency ratio—the number of people of nonworking age (over 65) compared with those of working age—by 2050. At 75 percent, this ratio is higher than for any other region… Not all populations are shrinking or getting older, though. Africa—the only region whose population is expected to grow more than 1 percent a year—will have the youngest median age, 25, by 2050.” [Source: International Monetary Fund, Finance & Development, March 2020] 

Today, four in ten people, that is, 42% of the global population, are aged under 25. Now consider that 76% of youth aged 18–24 use Facebook. [Source] “While the majority of most populations in the Global North are decreasing or flatlining, in Sub-Saharan Africa the populations are growing with nearly half of the world’s youth living in Sub-Saharan African countries.” [Source]

“As Africa meets the 4IR Fourth Industrial Revolution], its youth will be one of its most important assets”

 

August 25, 2020, World Economic Forum, How can Africa succeed in the Fourth Industrial Revolution?

According to a 2019 Pew Research Center analysis, for the first time in modern history, the planet’s human population “is expected to virtually stop growing by the end of this century, due in large part to falling global fertility rates.” [Source] In a mere ten years, by 2030, it is expected that one in five people will be African. [Source] By 2100, half of all babies born in the world – will be born in Africa. [Source]

For decades, population has been made a convenient scapegoat for climate change, greenhouse gas emissions and expressed concerns over biodiversity and sustainability. It has gained an upsurge in popularity with New Deal For Nature influencers David Attenborough and Jane Goodall (selected by the World Economic Forum, WWF et al.) promoting this narrative (a narrative with a fixation of black and brown bodies). Although it is Western countries responsible for the absolute bulk of these emissions and ecological devastation across the globe, it has not been African groups nor black academics calling on population controls for the West. Rather, it is Western and European groups, predominantly white and male, relentlessly targeting African nations and the sovereign bodies belonging to African women. Consider that in 1900 Europe held 25% of the global population, triple that of Africa. Yet by 2050, Europe is on track to hold a mere 7% of the global population (one-third that of Africa). With white supremacy as a foundational structure of the ruling class, the feigned concern over both ecology and poverty rings hollow. The race to recolonize African citizens, as techlonial subjects, has begun.

“Up until 1950, more than half of historical CO2 emissions were emitted by Europe. The vast majority of European emissions back then were emitted by the United Kingdom; as the data shows, until 1882 more than half of the world’s cumulative emissions came from the UK alone. Over the century which followed, industrialization in the USA rapidly increased its contribution. It’s only over the past 50 years that growth in South America, Asia and Africa have increased these regions’ share of total contribution.”

A 2013 map demonstrates fourteen nations account for approximately 80 percent of global greenhouse gas emissions. In 2019, an advance chapter of the 2019 Emissions Gap Report, released ahead of the UN Secretary-General’s Climate Action Summit, reported G20 member states account for almost 80 percent of global greenhouse gas emissions. [Source] The top three greenhouse gas emitters— China (with a population of1.4 billion), the European Union and the United States contribute more than half of global greenhouse gas emissions, while the bottom 100 countries account for a mere 3.5 percent. [Source]

Bob Collymore (1958-2019), Former CEO of Safaricom and leader of The B Team

Forecasts for this year (2020) show only one non-African country – Afghanistan – placed in the top 20 countries for the highest youth populations. [Source] For these reasons, Africa has been a target of both “fourth industrial revolution” technologies (digitalized healthcare, education, identities, etc.), as well as the United Nations-World Economic Forum Sustainable Development Goals (SDGs). South Asia (Afghanistan, Bangladesh, Bhutan, India, Maldives, Nepal, Pakistan and Sri Lanka) is also recognized as a key target market. Under the guise of alleviating poverty, protecting climate and biodiversity, the SDGs are in reality, emerging markets, with their implementation driven by the World Economic Forum, partner to the United Nations. Children and youth are to become human data commodities on the blockchain. This is the foray into the machinations underpinning the new global poverty economy. The majority of climate investments earmarked in Annex 1 states in the Global North will be invested in emerging markets in the Global South – created by the West, for the West.

“Tech giants have been finding new ways of gathering data from citizens, this time with major investments in connection infrastructure in the global South.”

 

August 18, 2020, Digital Colonialism

On May 13, 2020, Facebook announced its plans to encircle the entire continent of Africa with subsea cable. At 37,000 kilometers long, the 2Africa cable will be nearly equal to the entire circumference of the Earth.

The 2Africa project, valued at approximately USD 1 billion, is considered one of the largest subsea cable projects in the world. It will interconnect 16 countries in Africa, the Middle East (via Saudi Arabia), and Europe.

“Facebook hasn’t disclosed how much money it’s contributing to the project, but it won’t be a significant percentage of its projected revenue of $78 billion this year.” [Source]

Facebook’s 2Africa partners include some of the globe’s largest telecom corporations, including: the U.K.’s Vodafone Group, France’s Orange SA, China’s Mobile, stc (Saudi Telecom), Europe’s GlobalConnect, and Africa’s West Indian Ocean Cable Company (WIOCC). The two African wireless carriers involved in the project are MTN Group (Johannesburg) and Telecom Egypt. Nokia Oyj’s Alcatel Submarine Networks has been contracted to build the cable. [Source]

“2Africa, whose aim is surrounding the whole African continent with undersea fibre-optic cables, is an infrastructural feat that in usual circumstances would be considered the exclusive domain of governments.”

 

August 17, 2020, Inside Facebook’s new power grab, From cables to internet cafes, Mark Zuckerberg is leaving his mark on the global South

According to Bloomberg, “tech giants, led by Facebook and Alphabet Inc.’s Google, are behind about 80% of the recent investment in transatlantic cable, driven by demand for fast-data transfers used for streaming movies to social messaging.” If one juxtaposes such priorities, with our dire planetary ecological crisis and unprecedented biodiversity loss, one catches a glimpse of a society in intellectual and ethical freefall. As we enter a “fourth” industrial revolution, consider that after an approximately 260 years of “progress”, 30% of the global population still has no access to clean drinking water, while approximately half the world’s population lacks access to safe sanitation. In tandem with diet, nutrition, and shelter, it is these most basic necessities that prevent disease and sickness. “An estimated 801,000 children younger than 5 years of age perish from diarrhoea each year, mostly in developing countries. This amounts to 11% of the 7.6 million deaths of children under the age of five and means that about 2,200 children are dying every day as a result of diarrheal diseases. Unsafe drinking water, inadequate availability of water for hygiene, and lack of access to sanitation together contribute to about 88% of deaths from diarrheal diseases.” As these black and brown deaths occur in the Global South, the populace of Global North remains largely and seemingly willfully blind to this normalized atrocity, while as of March 27, 2020, The Lancet reported outside of two reported deaths in China of children who tested positive for COVID-19, there were no accounts of COVID-19 deaths of children in the published literature. Since this time, fatalities in children from/with COVID-19 remain extremely rare.

Although at first glance, that COVID-19 is being prioritised over providing clean drinking water and safe sanitation must be considered insane, in fact, one must understand this as marketing: “Suggesting that the digital sphere “amplifies existing inequalities”, the UN official noted that among the most pressing challenges are tackling the lack of internet access in the world’s poorest nations – where fewer than one in five people has regular electricity.” [Source] One cannot feed their children with the internet. One cannot bathe their child in a virtual world. The concern over internet access inequality – the push for equal access for all – is nothing more than public relations and strategic marketing seeking social license. This feigned concern over inequality – is the storytelling that simultaneously conceals and drives the emerging markets. Oppression is reframed as empowerment. Data is the new oil.

Let them eat virtual cake – on their smartphones.

“‘We’ve been able to work with the local partners who are providing internet service in the most challenged areas,’ says Facebook’s Rabinovitsj. ‘Some of these places are really large slums in and around large urban centres and typically the disposable income is less than a few dollars a month for households.’ ‘We are able to, with our partners, come up with a sustainable model that provides internet access for [those] families.” [Source]

[Source: Smart Growth Is Colonialism Reinvented]

Award digital badges for “Smart Learning”. Mine the data. Feed the artificial intelligence and machine learning. Continue the theft of resources (biological communities) from the pillaged continent of Africa – that underpin the imperial “great reset”. Enslave the children via technology. Smart slavery. Smart enslavement. Smart colonialism.

“Facebook has long tried to lead the race to improve connectivity in Africa in a bid to take advantage of a young population, greater connectivity and the increasing availability and affordability of smartphones.”

 

Bloomberg, May 14, 2020, Faster Internet Coming to Africa With Facebook’s $1 Billion Cable

September 12, 2016: “NAIROBI, Kenya, “Facebook founder Mark Zuckerberg is in Kenya after a three-day visit in Lagos, Nigeria in his first visit to Africa. Zuckerberg is expected to meet tech entrepreneurs, developers and talk to stakeholders in the ICT industry. Zuckerberg: “Just landed in Nairobi! I’m here to meet with entrepreneurs and developers, and to learn about mobile money – where Kenya is the world leader.” [Source] [Image]

May 17, 2017: “Black Facebook users are having their accounts banned for speaking out against racism: It seems the intent behind silencing outspoken Black folks hasn’t changed in the last few hundred years. And while Mark Zuckerberg hasn’t yet sentenced me to “thirty nine lashes on [my] bare back,” I can’t say for certain that penalty isn’t hidden somewhere… I’ve lost count of how many Black organizers have had their Facebook accounts temporarily or permanently banned for posting content that even remotely challenges white supremacy.”

Facebook’s announcement of the 2Africa project followed “a long and complex restoration process of an unprecedented simultaneous cable break”. The two Atlantic Ocean based 16,000 km cable systems (connecting South Africa to the UK) occurred early in the morning on January 16, 2020. The breaks in the cables, only eight years old, took place approximately 1,964 km apart from one another – with one break occurring near Libreville, Gabon, while the second break occurred south of Gabon, in the vicinity of Luanda, Angola. [Source] This same day, an 18-year-old cable called SAT-3 that runs along the same route was also reported broken.

“It was unprecedented that two completely geographically separate cables run by completely separate companies would fail within hours of each other,”

 

— Afrihost CEO Gian Visser speaking to Business Times

The breaks, cited as catastrophic, the cause as-yet unspecified, resulted in frustrated users in over 24 sub-Saharan African countries. Upon announcing the full restoration on February 19, 2020, Openserve, the infrastructure arm of South Africa’s Telkom, charged with co-ordinating the repairs on two damaged cable lines (WACS and the SAT3/WASC) stated it would “conduct a full analysis of the unusual dual-cable break.” As a side note, in February of 2008, outages on five separate undersea cables in the Middle East were attributed to sabotage by a UN official. Such acts of sabotage are not as rare as one may think:

“What’s the least sophisticated, but probably the most foolproof, way to cut off a country’s Internet traffic? Literally cutting it by severing undersea Internet cables. That’s what the Egyptian navy caught three scuba divers doing in the waters 750 meters off the port city of Alexandria on Wednesday… The effects of the ship taking out that cable were experienced as far away as Pakistan and India…”

 

— Divers Caught Cutting Internet Backbone Cable, March 28, 2013

The cable break disruption in Africa created a well-timed segue for the 2Africa project announcement by Facebook, which otherwise may well have generated backlash: “When completed, this new route will deliver much-needed internet capacity, redundancy, and reliability across Africa; supplement a rapidly increasing demand for capacity in the Middle East; and support further growth of 4G, 5G, and broadband access for hundreds of millions of people.” [May 13, 2020] Par for the course, and leaving no stone unturned, Facebook has taken a page from its capitalist predecessors, financing any possible opposition:

“This is hardly the only reason backlash has been muted. Activists on the African continent are often battling internet shutdowns, connectivity and other issues – and also struggle to make headlines in the western media even more than their counterparts in India. And there’s an additional complication: many of the African civil society groups are themselves funded by Facebook.” [Source]

 

“They have so many projects at the moment,” van der Spuy remarks. “They’re funding so many civil society people, including people that you wouldn’t think of, and they fund them to go to conferences and things. There’s a lot of soft and hard lobbying on the continent.” — Dr Anri van der Spuy, a senior associate at Research ICT Africa, a policy and regulation think-tank [Source]

 

Smart Colonialism

 

August 21, 2020, Algorithmic Colonisation of Africa: “In the age of algorithms, this control and domination occurs not through brute physical force but rather through invisible and nuanced mechanisms such as control of digital ecosystems and infrastructure.”

“Similar to the technical architecture of classic colonialism, digital colonialism is rooted in the design of the tech ecosystem for the purposes of profit and plunder. If the railways and maritime trade routes were the “open veins” of the Global South back then, today, digital infrastructure takes on the same role: Big Tech corporations use proprietary software, corporate clouds, and centralised Internet services to spy on users, process their data, and spit back manufactured services to subjects of their data fiefdoms. ”

 

March 13, 2019, “Digital colonialism is threatening the Global South”

The 2Africa cable project is expected to be in operation by 2024. It will surpass the combined capacity of all existing sub-sea cables serving Africa.

For an idea of the massive profits to be realized from the capture of data, one only needs to look at the monetary outlay corporations are willing to place up front. The population of St. Helena, Africa is 5,000. Research suggests that approximately 60% of these 5,000 citizens will use the Internet, for a total of 3,000 Internet users. For this tiny demographic, Google will spend USD 30 million. [Source]

Fiber optic specialist and industry insider Sunil Tagare was selected by Wired magazine as one of the “Wired 25” in 1999; a Global Leader for Tomorrow by the World Economic Forum, and is a Charter Member of TiE (The Indus Entrepreneurs) New York. According to Tagare, Facebook’s share of the 2Africa project will amount to approximately 80 million dollars and use 10-20% of the bandwidth. This percentage of bandwidth will generate 21 billion dollars per year in revenues increasing Facebook’s market cap by USD 178 billion. [Source]

According to Tagare, 2Africa will be “the first smart cable with sensors to cross the Atlantic.” [Source]

The real prize here is not merely Facebook’s billion dollar revenues and growing global dominance. Rather, it is the infrastructure that underpins the further expansion of both 5G, that is, the fifth generation technology standard for broadband cellular networks (rolling out now with virtually no dissent) and 6G (foreseen for 2030). 5G networks underpin the global expansion of Internet of Things, big data, artificial intelligence, biometrics, global digitalization, digital identification, autonomous lethal weapons, cyber security, an automated global workforce, etc. At 10 gigabits per second, theoretically, 5G is said to be up to one hundred times more powerful than the current 4G technology. 6G is expected to support 1 terabyte per second speeds. This level of capacity and latency will be unprecedented, extending the capabilities of 5G applications. [Source]

Whereas US and China corporations own the platforms, Europe, China and South Korea, lead on 5G. Those that control 5G will control all the infrastructure upon which 5G technology is based. Together, China (#1), the US (#2), and the EU (#3) represent the three largest economies in the world (although the order in which they reign is sometimes contested). The three combined represented 48% of the world economy.

On June 28, 2019, Google announced “Equiano”, its new private subsea cable that will connect Africa with Europe. [Source] Named after Olaudah Equiano, a Nigerian-born writer and abolitionist who was enslaved as a child, today’s woke slavery for children is to be repackaged with digital badges earned for their very own, unique, digital passport. Perhaps such appropriation and irony is even too rich for Facebook. Consider the 2Africa project was originally named “Simba” named after the Lion King character. (After initial involvement, Google left the Simba consortium.) The first phase of Google’s Equiano project, connecting South Africa with Portugal, is expected to be completed in 2021. Between 2016 and 2018, Google invested USD 47 billion in capital expenditures, which includes the billions being invested in further expanding its global infrastructure.

“As Facebook’s core product (social) starts seeing a significant downward trend and is certainly a non-starter with the millennials, it will increasingly have to depend on other verticals which will compete with Google.” [Source]

African Telecom providers have warned that the Facebook and Google projects threaten the survival of the local and mainstream operators:

“Virtual operators like Facebook are organisations that mainstream operators have to watch out for because a number of services they render today are free of charge. Their revenue is mostly from advertisement. They don’t have tax obligations; they don’t have any obligation like the conventional licensee have to the government.”

 

June 8, 2020, Telcos Threatened As Facebook, Google Plan Subsea Cable

 

“Silicon Valley corporations are taking over the digital economy in the Global South, and nobody is paying attention. In South Africa, Google and Facebook dominate the online advertising industry, and are considered an existential threat to local media.”

 

March 13, 2019, “Digital colonialism is threatening the Global South”

 

Facebook’s “Internet.org” – Rebranded to “Free Basics”

 

“Most importantly, for Free Basics users, Facebook becomes the homepage of the Internet. Free Basics builds brand loyalty among users. It contributes to Facebook’s dominant position in emerging markets with tremendous demographic growth.”

 

Inside Facebook’s new power grab, From cables to internet cafes, Mark Zuckerberg is leaving his mark on the global South, August 17, 2020

Free Basics homepage

 In partnership with Samsung, Ericsson, MediaTek, Opera Software, Nokia and Qualcomm, Facebook launched Internet.org in 2013:

“Basic data-light web services would be available through a free app, owned and curated by Facebook. By marketing its new product as ‘the internet’, Facebook could make itself the centre of their online world. There was no email provision, no Google services, no other social media platforms – and often no content in that country’s native tongue. In effect, Facebook was offering a heavily censored version of the American internet, accessed through a Facebook app which directed everything back to its own services.” [Source]

In 2014, Internet.org launched the ‘Internet.org app’ in four African countries. Users could access 13 websites without data charge, including Google, Facebook, Wikipedia, and a Johnson & Johnson-sponsored maternal health site.

On February 10, 2015, Internet.org announced the upcoming launch of its app in six Indian states. Following intense backlash (*”Facebook was acting as a gatekeeper of the Internet by pre-selecting services available on Internet.org, without transparency and with a Western bias detrimental to local services and start-ups”) the business venture was rebranded to “Free Basics” in September 2015, prior to a nationwide roll-out. [*Source]

 

“Based on current figures provided by Facebook, some 2.99 billion people currently use at least one of Facebook’s apps every month. The population of the entire world is, according to Worldometer, around 7.8 billion, so when you take into account the aforementioned stat that 3.5 billion can’t access the web, and add to that the fact that 1.4b Chinese citizens are technically unable to use Facebook due to government restrictions, Facebook’s apps, based on these calculations, are used by pretty much everybody who’s able to access them, in some form.  Given this, you can see why Facebook’s keen to maximize its presence in India, and its reach among that nation’s 1.4 billion people.” [Source]

In February 2016, regulators banned Facebook’s Free Basics service in India. In nationwide protests, citizens argued that Free Basics expanded Facebook’s monopoly power while simultaneously subjecting users to both censorship and surveillance. This was a massive blow to Facebook. With a population of 1.4 billion citizens, India represented Facebook’s largest target market. Since this time, Facebook quietly rolled out a new initiative into India and other targeted demographics with Wi-Fi hotspots, called Express Wi-Fi. This initiative gives retailers the option to offer its users open access to Free Basics. In effect, Free Basics was re-routed through Express Wi-Fi.

“In 2015 researchers found that 65% of Nigerians, and 61% of Indonesians agree with the statement that “Facebook is the Internet” compared with only 5% in the US.” [Source]

On November 3, 2016, Facebook announced 40 million people were using internet.org. Despite the February 2016 ban of Free Basics in India, Facebook quietly continues its monolithic expansion, relatively free of scrutiny, into most developing countries, including India, while Free Basics is proliferating in dozens of countries. [Source: March 13, 2019, Digital colonialism is threatening the Global South] To successfully enable the Free Basics expansion into Africa, Facebook ceased to publicise its Free Basics pursuits, and instead focused on engagement with and financing of “civil society”(NGOs). This was largely accomplished via the Praekelt Foundation – funded by heavy hitters including the Bill and Melinda Gates Foundation, Omidyar Network, Johnson & Johnson, the Clinton Health Access Initiative, Ford Foundation, the United Nations Population Fund, and USAID. As of June 2019, it was reported that Free Basics was present in 65 countries with a large part of the expansion saturating African countries, which went largely unnoticed, unreported and uncontested. [Source]

As of July 2020, there are over 290 million Facebook users in India, with a population closing in on the 1.4 billion mark.

Graph: Leading countries based on Facebook audience size as of July 2020 (in millions) Source: Statista

“I argue that Free Basics’ quiet expansion across Africa was notably made possible by the combination of two key interrelated phenomena: (1) Facebook’s evolving strategy, particularly its growing engagement with civil society organizations and (2) the focus of digital rights activists across the continent on other issues, including Internet shutdowns, government censorship, and the lack of data privacy frameworks.”

 

Access granted: Facebook’s free basics in Africa, April 22, 2020

Graph: “Number of news stories about ‘Free Basics’ and ‘Internet.org‘ across 1,500 Global English Language sources, June 2013 to July 2019″ [Source

“Free Basics also fits within two broader and interrelated trends in the digital industry, digital experiments on marginalized populations and data extraction. There is increasing evidence that vulnerable and disadvantaged populations, such as minority groups, refugees, and impoverished communities are prime, albeit largely nonconsenting subjects of digital experiments – be they designed to ‘help’ or surveil these communities (Latonero and Kift, 2018; Madianou, 2019; Mann and Daly, 2018). Data extraction, for its part, is central to the digital economy (Zuboff, 2019). It is key to building unique, rich datasets that train competitive algorithms, which are then generally used to connect businesses to customers.”

 

Access granted: Facebook’s free basics in Africa, April 22, 2020

 

“Anti-Colonialism has been economically catastrophic for India for decades. Why stop now?”

 

Facebook board member Marc Andreessen, February, 2016

Looking back momentarily, in 2015, Facebook announced that internet.org was operating in 11 countries, allowing about one billion people to access its services for free. [Source] On April 25, 2018, Mark Zuckerberg would clarify the actual number of users. In response to Facebook’s Q1 2018 earnings call Zuckerberg stated: “our Internet.org efforts have helped almost 100 million people get access to the internet who may not have had it otherwise”. [Source] This was up from 40 million users in November 2016, a 60 million increase in users in approximately 16 months.

Facebook’s capture of India has barely begun. In 2019, Facebook acquired the Indian eCommerce platform Meesho. Facebook also seeks to roll out its cryptocurrency – initially focused on funds transfers in the Indian market – in the coming months. Globalcoin is the new cryptocurrency “Libra” founded by Facebook, in conjunction with “Novi”, a digital wallet. “While Libra itself is a cryptocurrency that can be used to make purchases or gain access to services through Facebook, Calibra is the wallet that will be used to store Libra and whatever other forms of crypto the user may have, only this time, the wallet will no longer be known as Calibra, but as Novi… As part of the verification process, customers of Libra and Facebook will be required to upload a government-issued identification card.” [Bitcoin News, June 1, 2020] [Forbes, August 17, 2021: “Between Crypto, Libra, Stablecoins, And Digital Dollars, Congress Introduced 35 ‘Blockchain’ Bills’]

April 22, 2020: “If you wanted to know how much value Facebook sees in the emerging Indian market, this deal certainly provides some indication. After recent reports that Facebook was looking to acquire a stake in Indian internet provider Jio, The Social Network has now confirmed that it has purchased a majority stake in the Reliance-owned venture for a massive $US5.7 billion… the acquisition will provide Facebook with a new way into the Indian market, which it’s been looking to gain a foothold in for many years, with varying levels of success.” [Source]

 

India, and its 1.4 billion citizens, is the next key battleground for the tech giants, with both Facebook and Google both working to gain a foothold in the Indian market in order to expand their audience base, provide new business tools, and build revenue-generating partnerships that will facilitate significant opportunities to expand their respective empires… India is now the world’s second-largest smartphone market after China, while the number of internet users in the nation is expected to top 850 million by 2022. For comparison, the US is expected to reach around 300 million internet users at the same stage.” [Source]

September 6, 2017 video: “Facebook creates digital map showing where every human lives”:

 

The Colonization of Space & Skies

With Facebook’s growth slowing in the West, the corporation must diversify. August 17, 2020: “Today, the internet is estimated to have around four billion users. More than two billion of them use Facebook products. But growth is slowing, and the social network has its eyes firmly set on the three billion people without a connection as their hope for the future.” [Source]

On September 1, 2016, a SpaceX rocket exploded prior to its scheduled launch. Facebook had contracted SpaceX to deliver the first Internet.org satellite into orbit, in order to secure new internet customers in large portions of sub-Saharan Africa. This would be key in providing basic connectivity via Internet.org, to the entire world’s population. [Source] The Amos6 satellite was built by Israeli communications firm Spacecom Ltd., while owned and operated by Eutelsat, France.

In May 2019, the IEEE Spectrum reported that Facebook had established a subsidiary called PointView Tech, to develop “low-Earth-orbit satellites” under the codename Athena.

On February 12, 2020, Business Insider reported that Facebook was going forward with its plan to build a constellation of thousands of satellites with the first one launching into space in March 2020.

Last month, on September 3, 2020, Facebook launched its first satellite into orbit. A rocket encompassing “700,000 pounds of thrust” (made possible only with massive quantities of fossil fuels), successfully launched over French Guiana:

“The first satellite released into a 320-mile-high (515-kilometer) orbit by the Vega’s AVUM upper stage was Athena, a 304-pound (138-kilogram) spacecraft built by Maxar in California. Athena is a small experimental communications satellite for PointView Tech, a subsidiary of Facebook, that will test technologies that could be used in a future constellation of small satellites to provide global broadband Internet services. Athena is PointView Tech’s first satellite.”

 

September 3, 2030, Vega rocket deploys 53 satellites on successful return to flight mission, Spaceflight Now

September 3, 2020: Facebook launched its first satellite into orbit

At present, with approximately 2.7 – 3 billion users (stats differ), Facebook is closing in on almost half of the global population. Barriers include no access to China, with a population of approximately 1.4 billion citizens;  India, due to the fact that fewer than 20% of India’s citizens, in a population on par with China, have access to the Internet; and sovereign states that ban Facebook, recognizing that it serves as an instrument to empire for foreign interference and destabilization. Such targeted geopolitical hotspots include the sovereign nations of China, Iran, Syria, and North Korea (the majority of North Korean citizens do not access the Internet). This is in line with the threat of foreign and Western NGOs that serve Western foreign policy and capital. Consider Access Now, an arm of Avaaz (which led a leading role in the annihilation of Libya, as well as the attempted destruction of Syria), was created with the specific intent to destabilize Iran. [Link] (One can be certain that if Middle Eastern countries were attempting to overthrow Western states, with social media serving as a key apparatus, controlled by NGOs serving Iran, North Korea, Syria, etc. – social media would be blocked in our countries as well.)

Thus, to reach the global populace that remain off-limits, and to secure the foundation and expansion of 5G, that the “fourth industrial revolution” architecture is absolutely dependent upon, the race for satellites in space has begun. Although completely asinine, human centric and short-sighted, approximately 57,000 satellites are to be launched into space in this single decade. [This is explored in further detail later in this report.]

In tandem with industry’s servitude to planned obsolescence, coupled with the rapid acceleration of technology, satellites will eventually be far more important than subsea cables. In the not-so-distant future, (possibly the 6G era) sea cables may become altogether obsolete.

Next: Part III

 

WATCH: Quiet Storm – Technology & Social Control

WATCH: Quiet Storm – Technology & Social Control

sub.Media

Published April 2, 2019

 

“We’re on the brink of a new era. In the coming years and decades, rapid advances in the fields of robotics, artificial intelligence, data analysis, nanotech, quantum computing, bio-engineering and 3D-printing promise to drastically restructure our societies – much as the steam-powered engine and personal computer did during earlier phases of capitalist development. Coming waves of automation are expected to eliminate the majority of current job categories, raising the spectre of widespread unemployment and the potential for newer, more sophisticated forms of economic servitude and social control. These transformations will take place under the watchful eyes of a high-tech surveillance state, aided by a new generation of AI-driven facial recognition software, and the further proliferation of networked ‘smart’ devices that record nearly everything we say or do.

Many of the technologies of tomorrow are being designed today in the universities and corporate R&D labs of Shenzen, Singapore and Silicon Valley, by scientists and engineers working at the behest of military contractors and multi-billion dollar tech companies. Claims that ‘technology is neutral’ ring hollow in a world dominated by powerful states and capitalist social relations. It’s clear to anyone keeping score that those who control and shape technological development and mass production are best situated to reap the benefits. But at the end of the day, capital and the state don’t hold a monopoly on innovation. There are many anarchists also working on building new technologies to help thwart our enemies and unlock new paths of resistance. And despite what you may have heard, the master’s tools can be used to dismantle the master’s home – provided the person swinging the hammer knows where to aim.” [Source: sub.Media] [Running time: 33:26]

 

 

Fighting US Psychological Operations (PSYOPS) in Cyber Warfare & Winning

Tortilla Con Sal

August 9, 2018

By Lauren Smith

 

The CIA, NSA, FBI and DOD are your “friends” on Facebook

Social media and Google serve three strategic purposes for the United States government. First, they allow Washington to conduct espionage; second, they facilitate the spread of disinformation campaigns, and third, they serve as conduits for the transmission of social contagions. In deploying thought control against the users of social media and Google, the US government regulates civil unrest both domestic and abroad. As such, social media and Google can best be understood as unconventional weapons (UW). In this capacity, they can be used in proxy wars against the governments of non-compliant Non-Aligned Movement (NAM) nations to accomplish regime change.

Through geopolitical manipulations that eliminate opposition, the United States government can actualize the ruling elites’ vision of a corporate controlled global economy without the deployment of troops. This model of “non-violence” or “soft-coup” as a method of unconventional warfare can be traced to Gene Sharp and the Albert Einstein Institution. It is organized through the efforts of the NGOs it oversees such as Freedom House and the National Endowment for Democracy (NED). And, it can be observed in the various Color Revolutions that occurred in Eastern European countries, the Middle East and now Latin America.

The NED is the coordinating Washington agency for regime destabilization and change. It is active from Tibet to Ukraine, from Venezuela to Tunisia, from Kuwait to Morocco in reshaping the world after the collapse of the Soviet Union into what George H.W. Bush in a 1991 speech to Congress proclaimed triumphantly as the dawn of a New World Order.”

Within this context, activists and the NAM must consider Facebook, Twitter, YouTube and Google hostile territory that is ultimately controlled by the United States Intelligence Community (IC) and the Department of Defense (DoD). Despite user-friendly packaging and attractive advertisements, social media and Google remain militarized programs. As such, activists and NAM users must enter with caution, prepared to do battle to win at PSYOPS in cyber warfare.

Using the US DoD model, cyber warfare can be upgraded to a department on par with the NAM armed forces. In this regard, Polytechnic universities are strategic and can be controlled by NAM governments and their operatives, as they are in the US by the IC and DoD. NAM military institutions can recruit cyber warfare teachers/activists, develop educational curriculum, set career paths and train cyber soldiers to counter US engagements. Useful information can be taken directly from any of the US military’s cyberspace recruitment sites, which promise to develop capabilities to defend national security as well as to create effects in cyberspace to achieve national objectives.

The first step for the NAM is to create public awareness of the threat that social media possesses to protect users and the NAM governments against its influence. In doing so, a cadre of civilian cyber PSYOP content monitors can be created. Additionally, software is now commercially available that can search, monitor, analyze and manage social media content. Presently, large corporations as well at the IC and DoD are using this social media software – since it is useful in business marketing strategies. NAM governments can deploy this software in their communication offices. Through vigilance, PSYOP efforts against NAM governments by social media and Google can be thwarted.

Concurrently, it is critical to guard against cyber invasion through the passing of cyber laws with strong penalties, as done by Germany with its groundbreaking Network Enforcement Act (NetzDG). Also, it is key to ensure through news media communications that workers in the IT industry understand the ramifications of the work in which they engage as well the nefarious intent of their respective employers. The “Never Again Pledge” taken by US tech workers in 2017 is promising.

Germany’s Network Enforcement Act (NetzDG)

Germany has blazed a trail for the NAM against PSYOPS in social media with its Network Enforcement Act (NetzDG) and it’s setting of fines of up to $50 million euros.ii The NAM must immediately follow suit with the setting of robust laws and fines against: the dissemination of propaganda; the encouragement of violent offences endangering the state; treasonous forgery; public incitement to crime; breaching of the public peace by threatening to commit offences; the forming of criminal or terrorist organizations.

Never Again Pledge

As reported by the New Yorker in its March 14, 2017 article titled: Why Protesters Gathered Outside Peter Thiel’s Mansion This Weekend, a group of about fifty tech workers, attorneys and anti-surveillance activists stood outside the home of Peter Thiel. Thiel is co-founded of Palantir Technologies, a Trump advisor, and was Facebook’s first investor. He remains a board member of Facebook as well as a member of the Bilderberg Steering Committee. The protest was organized to bring attention to software developed by Plantir called Investigative Case Management that is used by Immigration and Customs Enforcement (ICE) for mass deportation. Amongst other data sources to identify and track a given target, it uses social media content.

Since the presidential election, nearly three thousand tech workers signed the Never Again Pledge, promising to not work on databases that the Trump Administration might use to target vulnerable groups. The name is a nod to I.B.M.’s alleged role, during the Second World War, in systematizing Nazi genocide by providing punch-card technology.

The banality of evil today is the person sitting in a cubicle in San Francisco, or in Silicon Valley, building the tools of digital fascism that are being used by those in Washington,”

To understand the US governments offensive against unfavorable NAM regimes, it is important to understand two things: first, the origin of Facebook and Google; and second, the influence they collectively wield over human motivation through coercion and the spread of social contagions through distorted reality. Within this context, it is of primary concern that activists become adept at the stealth guerilla tactic of hit-and-run, as flexibility and anonymity become key to survival. With the stakes of financial ruin, imprisonment and death so high under the USA Patriot Act, no dissident remains safe.

USA Patriot Act

As dissent and protest both international and domestic becomes increasingly illegal in the United States, and the governmental powers to investigate “terrorism” expand and morph under the USA Patriot Act, activists and the NAM must develop and foster skill sets that protect sympathetic Internet hosts, contributors and content against attack wherever they reside. According to the American Civil Liberties Union (ACLU), the Patriot Act increases the government’s surveillance powers in four areas:

  1. Records searches. It expands the government’s ability to look at records on an individual’s activity being held by a third party. (Section 215)

  1. Secret searches. It expands the government’s ability to search private property without notice to the owner. (Section 213)

  1. Intelligence searches. It expands a narrow exception to the Fourth Amendment that had been created for the collection of foreign intelligence information (Section 218).

  1. “Trap and trace” searches. It expands another Fourth Amendment exception for spying that collects “addressing” information about the origin and destination of communications, as opposed to the content (Section 214).

Accordingly, as described by the ACLU:

  • The government no longer has to show evidence that the subjects of search orders are an “agent of a foreign power,” a requirement that previously protected Americans against abuse of this authority.

  • The FBI does not even have to show a reasonable suspicion that the records are related to criminal activity, much less the requirement for “probable cause” that is listed in the Fourth Amendment to the Constitution. All the government needs to do is make the broad assertion that the request is related to an ongoing terrorism or foreign intelligence investigation.

  • Judicial oversight of these new powers is essentially non-existent. The government must only certify to a judge – with no need for evidence or proof – that such a search meets the statute’s broad criteria, and the judge does not even have the authority to reject the application.

  • Surveillance orders can be based in part on a person’s First Amendment activities, such as the books they read, the Web sites they visit, or a letter to the editor they have written.

  • A person or organization forced to turn over records is prohibited from disclosing the search to anyone. As a result of this gag order, the subjects of surveillance never even find out that their personal records have been examined by the government. That undercuts an important check and balance on this power: the ability of individuals to challenge illegitimate searches.

The ACLU also describes non-surveillance provisions in the Act, which remain the most serious as they enable the indefinite detention of non-citizens without trial. The provisions:

  • Give the Director of Central Intelligence the power to identify domestic intelligence requirements. As the director is appointed by the president, this extraordinary unchecked executive power opens the door to the same abuses that took place in the 1970s and before, when the CIA engaged in widespread spying on protest groups and other Americans.

  • Create a new crime of “domestic terrorism.” The Patriot Act transforms protesters into terrorists if they engage in conduct that “involves acts dangerous to human life” to “influence the policy of a government by intimidation or coercion.” The words “influence” and “coercion” have a wide range of meanings and allow for unbridled discretion. Furthermore, the law gives the attorney general and the secretary of state the power to detain or deport any non-citizen who belongs to or donates money to a broadly defined “domestic terrorist” group.

  • Allow for the indefinite detention of non-citizens. The attorney general can order detention based on a certification that he or she has “reasonable grounds to believe” a non-citizen endangers national security. Tangible proof is not a requirement, only a “reasonable belief”. Worse yet, if the foreigner does not have a country that will accept them, they can be detained indefinitely without trial.

 

US News Media: Counterpunch, Alice Donovan & the FBI

On December 25, 2017, a troubling article appeared in Counterpunch, a US media news outlet, regarding the writing of an alleged journalist/Russian troll, Alice Donovan.  Links to an additional article appeared on Counterpunch’s Facebook page on July 27, 2018. Overall, the articles allege Donavan is either an unimaginative writer that committed plagiarism as a sport, or that she is a Russian troll. However, Donavan’s transgressions and intent are irrevelant, what the story revealed in all its gory horror is how the US government concocts justifications to learn the identity and location of a given dissident, and how easily it scared an independent and alternative US news media outlet into become its slobbering accomplice.

In this case, the FBI alleged Donovan was a Russian agent that spread disinformation in the Clinton/Trump presidential campaign with the intent of effecting the national election, despite the fact that she did not submit articles specifically on Clinton or Trump. What the US government’s fishing expedition also revealed is that all US news media can’t be trusted, even ones with cute sounding reactionary names, such as Counterpunch. As Counterpunch not only admitted to bending over backwards to cooperate with the FBI, it also proudly declared its decision to up-the-ante and conduct its own investigation and exposé. Counterpunch analyzed the transmission times and IP address of Donovan’s submission emails; it included photos of the alleged Alice Donovan from other media sources in its articles about her; it interviewed other news media that hosted Donovan’s articles, and most outrageously actually asked Donovan to call them by phone and send a photo of her utility bill disclosing her physical location. Without surprise, Donovan declined both requests stating: “security reasons.” If there was ever a reason to give up US hosted media, write under a nom de plume, use a Virtual Private Network (VPN), and accept payment only in crypto currency, this is it!

As anyone honestly committed to telling the truth will explain, it’s not about the messenger; it’s about the message. Under the Patriot Act, writers are safer in anonymity. But as anyone committed to telling the truth will also explain, when you eliminate one activist, ten are energized to take their respective place. Contrary to what PSYOPS wants the 99 percent to believe, there is strength in numbers. While imperialist greed through big payoffs may make for fast friendships, the shared love of truth and justice is priceless. It engenders a loyalty so strong it overcomes setbacks and hardship.

Origin of Facebook & Google

While the development of the Internet, data collection, surveillance and the global positioning system (GPS) can be attributed to the Department of Defense (DoD), Facebook and Google are also inexplicably linked to the CIA’s non-profit venture capital corporation, In-Q-Tel (IQT).

Within this context, Facebook can best be understood as the “friendly” replacement of DoD’s unpopular Information Awareness Office (IAO) which was created by its Defense Advanced Research Projects Agency (DARPA) in 2002 and defunded shortly thereafter in February 2003 by congress, due to public criticism that the development and deployment of its technology could potentially lead to an Orwellian styled mass surveillance system. The timing of Facebook’s development from the standpoint of DoD can at minimum be understood in regard to continuity as fortuitous if not planned – since Zuckerberg is credited with having launched Facebook on February 4, 2004 (within one year of IAO’s defunding).

Information Awareness Office (IAO) the Precursor to Facebook

As the precursor to Facebook, the Information Awareness Office (IAO) brought together several DARPA projects focused on applying surveillance with information technology by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.

This information was then analyzed to look for suspicious activities, connections between individuals, and threats with the goal to increase the probability that authorized agencies of the United States could preempt adverse actions. It is important to note that adverse actions within this context are nebulous and thereby include any action that is perceived to counter US corporate short-term interests and security. Adverse actions as defined can include protests on both international and domestic issues by groups or individuals in thought, word or deed. Thus, internationally, those seeking to defend NAM countries against destabilization, invasion and occupation are engaged in adverse actions; and domestically, those seeking to protect human rights, constitutional rights and the environment are involved in adverse actions.

Just like IAO, Facebook invades and collects the email and telephone numbers of its users’ contacts in its Messenger component. Additionally, Facebook logs all photos and communications. Through its facial recognition component, Facebook links physical identities with names, locations, dates and times for easy surveillance. It also has a payment option, which allows Facebook to gain access to the financial institutions of its users. Groups centered on medical topics are densely populated on Facebook, and they encourage users to share their medical issues upon joining.

Facebook encourages its users to “complete their online profile” and list highly personal information such as: birthdate, gender, family members, school, workplace, intimate relationship, interests, religious and political views, hometown, current city as well as group affiliations. Through the recording of “likes” a granular sense of its users’ values and interests is also made known. This information, when taken in aggregate, allows for a profile so detailed and comprehensive that it amounts to a DoD agent’s wet dream.

According to Dave Chaffey in the Global Social Media Research summary, the number of social media users worldwide in 2018 is 3.196 billion. Statista claims Facebook has 2.2 billion active monthly user accounts; YouTube has 1.9 billion; Instagram has 1 billion; and Twitter has 336 thousand. Within this context, social media’s sphere of influence is enormous, as the earth’s population is estimated to be 7.6 billion in 2018, according to Worldometers.

Cutting Edge Social Media Metadata Scanning, Analysis and Management Software

Realizing anything written on this topic is already expired and anything truly mind-bending is classified and beyond reach, there is still a nifty development worth mentioning regarding social media data scanning, analysis and management software. Clearly NAM can benefit by utilizing social media software of this ilk to transmit communications to constituents, gauge reactions to proposed initiatives, and most importantly in the context of this article, quickly identify and stave off destabilizing social media surprise attacks by imperialist powers and their agents. This technology can be considered a 2018 anti ballistic missile (ABM) to social media attacks.

According to Wired media, in its 2009 article titled U.S. Spies Buy Stake in Firm that Monitors Blogs & Tweets, the CIA’s venture capital nonprofit, IQT wanted Visible Technologies, a software firm that specializes in monitoring social media, to keep track of foreign social media, and provide early-warning detection on how issues are playing internationally. With this technology it is also possible for intelligence agencies to compile information on political figures, critics, journalists or others, and to exploit such information for political advantage. Visible’s foreign languages capabilities include Arabic, French, Spanish and nine other languages.

According to G2 Crowd, a Software & Services marketing firm, the latest 2018 must-have in business software is a Social Media Suite. The suite has the capability to manage, monitor, and analyze information related to one or multiple social media accounts through a single product. As such, it can:

  • Plan and publish digital content via social media

  • Engage with communities via social media

  • Report on effectiveness of social media practices

  • Track regions and demographics of audience

  • Analyze performance of posts and campaigns

  • Monitor for related mentions and trends

Facebook and the Cambridge Analytica Scandal

Through third parties, Facebook, alike its forerunner IAO, permitted the analysis of its users data. In the Cambridge Analytica (CA) scandal it was revealed that Facebook exposed the personal data of 87 million users to a political consulting firm in which Trump advisor, Steve Bannon, was its vice president and founder. The intent was to use personal data against users to influence their respective vote in the 2016 US presidential election in favor of Trump. The work of CA was done by the SCL Group, its parent company. SCL describes its capabilities as Vox’s Andrew Prokop writes:

“SCL tends to describe its capabilities in grandiose and somewhat unsettling language – the company has touted its expertise at ”psychological warfare” and “influence operations.” It’s long claimed that its sophisticated understanding of human psychology helps it target and persuade people of its clients’ preferred message.”

It is important to note that SCL’s main client is NATO and the defense department of its member states. Another company that was involved in this scandal is Palantir. Peter Thiel, is Palantir’s chairman and founder, as well as a major contributor in the Trump campaign. Palantir not only has numerous contracts with the US Intelligence Community and Department of Defense like the SCL Group, but Thiel was Facebook’s primary investor, and he remains on its board of directors.

CA whistleblower Chris Wylie told British Members of Parliament that senior Palantir employees worked with the firm on the Facebook data to help it build models off of the dataset to use for political ad targeting purposes.

Facebook’s Social Contagion Study Scandal

Another known scandal involving Facebook is the Social Contagion Study, which was undertaken in 2012 by researchers from Facebook, Cornell University, and the University of California.

In the study, the posts of approximately 700,000 unsuspecting users of Facebook were secretly manipulated, for a week, to determine how emotional states were transmitted over the platform. In the experiment, Facebook altered the news feed content of users to control the number of posts that contained words with positive or negative charged emotions to spy on the users’ reactions. They found negative feeds resulted in the user making negative posts, where as positive feeds resulted in the user making positive posts.

The team concluded its study by saying that emotions are spread via contagion through social networks.

The study appeared in the June edition of the journal Proceedings of the National Academy of Scientists (PNAS) under the title: Experimental evidence of massive-scale emotional contagion through social networks. According to the researchers:

Emotional states can be transferred to others via emotional contagion, leading people to experience the same emotions without their awareness. We provide experimental evidence that emotional contagion occurs without direct interaction between people (exposure to a friend expressing an emotion is sufficient), and in the complete absence of nonverbal cues.”

Facebook was publicly condemned when it became known that it conducted this Orwellian thought policing on unsuspecting users. The attack against Facebook worsened when it was discovered that one of the researchers of Facebook’s mind control study, Jeffrey T. Hancock of Cornell University, also received funding from the DoD’s Minerva Research Initiative to conduct a similar study entitled “Modeling Discourse and Social Dynamics in Authoritarian Regimes”.

Additionally, Cornell University was engaged with the Minerva Initiative and had a study funded through 2017 managed by the US Air Force Office of Scientific Research, which aimed to develop an empirical model “of the dynamics of social movement mobilization and contagions”.

The project aimed to determine the “critical mass” (tipping point) of social contagions by studying their “digital traces” in the cases of “the 2011 Egyptian revolution, the 2011 Russian Duma elections, the 2012 Nigerian fuel subsidy crisis and the 2013 Gazi park protests in Turkey.”

Facebook’s social contagion scandal also illustrates the disturbing ease that US educational facilities have in cooperating with the US military in experiments on human subjects without their knowledge or permission, in violation of ethical standards and protections.

DoD & the Minerva Initiative

The stated goal of the Minerva Initiative is to improve DoD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the U.S. The program seeks to achieve this by sponsoring research designed to bring together universities, research institutions, and individual scholars. In 2008, the project was provided $50 million by the United States Department of Defense. The journalist Nafeez Ahmed has expressed concern that Minerva research, in its effort to understand mass mobilization, may be targeting peaceful activists, NGOs and protest movements.

Social Network Analysis (SNA) & Unconventional Warfare (UW)

According to LTC Glenn Johnson, CW4 Maurice Duclos, Mr. Dan LeRoy in their article tittled: Mapping the Human Terrain: Applying Social Network Analysis (SNA) to an Unconventional Warfare (UW) Framework:

“Without a detailed understanding of the human terrain the Unconventional Warfare (UW) planner is uninformed about key aspects of the operating environment. SNA can provide the human terrain map needed to plan and execute UW operations. By developing a map of the human domain, SNA helps provide a description and picture of the resistance, opposition, or neutral entities, and can uncover how the population is segmented and how members interact with one another. SNA focuses on people’s behavior and how it is profoundly affected by their ties to other people and the social networks in which they are embedded.

Using SNA provides visualizations of people within their social spaces and assists in ranking their potential ability to influence those social spaces. This provides an understanding of the organizational dynamics of a resistance, insurgency, or counterinsurgency and highlights how to best influence, coerce, support, attack or exploit them. Collecting human terrain data to support SNA must be driven by commanders through focused efforts and should be conducted during every engagement with a foreign country.”

Examples of Social Network Analysis (SNA) & Unconventional Warfare (UW)

The US funded National Endowment for Democracy (NED), which is credited for numerous destabilization efforts in NAM nation states under the guise of “democracy” or imperialist subjugation as it is better known and practiced, has some great information in its numerous articles discussing the tactical use of social media to fight proxy wars. Only in the examples it provides and resources it cites, just the Chinese and Russians and NAM nation states utilize this technology. NED remains absolutely silent on its US sponsor’s activities.

According to a brief prepared by Dean Jackson for NED through the International Forum for Democratic Studies: The velocity and volume of disinformation in the contemporary information space has amplified its effectiveness and left many members of the public increasingly angry, fearful, or disoriented. This leaves the public even more vulnerable to future manipulation, resulting in a cycle of declining public trust in objective sources of information which some analysts call truth decay.

According to NED, effective ways to use social media as an unconventional weapon in proxy wars is to:

  • React or create crisis by flooding information space and drowning out discussion via online trolling, harassment, and distraction, especially with highly active automated accounts. These techniques push independent voices out of public spaces and are can be considered a new form of political censorship.

  • Falsify evidence, push misleading narratives, and spread falsehoods. Use media and diplomatic resources concurrently to promote false stories at times of rising anti-government sentiment.

  • Create accounts that are partially automated and partially controlled by human users to avoid detection. These are often referred to as cyborg or sock puppet accounts.

  • Use preexisting divides within target societies to produce content for which there is societal demand. Disinformation is more effective when it’s amplifying existing political beliefs and divisions, as opposed to introducing new narratives into the public sphere. 

  • Use proactive disinformation campaigns to achieve real-world impact by influencing the actions of consumers.

  • Use disinformation around elections to influence citizens’ decisions to vote or to abstain from voting.

  • Use disinformation to promote a larger narrative over time or to degrade civic discourse by promoting division or cynicism.

 

Role of Social Media in Arab Uprisings

In an article by Heather Brown, Emily Guskin and Amy Mitchell titled: the Role of Social Media in the Arab Uprisings they state that the Arab uprisings could be deemed

Facebook or Twitter revolutions” as the news media focused heavily on young political opposition protesters mobilizing in the streets, armed with smartphones.

As almost immediately after the Arab uprisings began, there was debate over the role and influence of social media in the ouster of Tunisian president Zine El Abidine Ben Ali and the overthrow of Mubarak. “Social media indeed played a part in the Arab uprisings. Networks formed online were crucial in organizing a core group of activists, specifically in Egypt. Civil society leaders in Arab countries emphasized the role of the internet, mobile phones, and social media in the protests.”

Reality becomes distorted when all social media reference points endlessly repeat the same message concurrently. Within this context, civil unrest is born out of social contagion frenzy. An Egyptian man, who was a student protestor against Mubarak in 2011, confided in me that a crescendo of social media chatter goaded him into taking part in the protests. While he had been beaten by Mubarak’s police in an earlier incident and had personal reasons to protest, he still believes he was driven and manipulated through social media – especially since the locations to which he and his friends were led were followed by film crews and riot police too quickly after their arrival to have been un-staged.

Looking back, he now regrets taking part in the protests, as the removal of Mubarak created a power vacuum that led to greater economic and social struggle, and allowed imperial powers to take advantage of Egypt’s resources.

Personal Account of Facebook’s use of Unconventional Warfare (UW)

On April 18, 2018, I witnessed the Facebook Nicaragua expatriate groups I belong to transform its sleepy pages, that focused on advertising the best music and drink specials in town, to revolutionary pages seeking to overthrow the democratically elected sovereign government of Nicaragua.

Having just returned from Nicaragua two weeks earlier, after spending two peaceful months in San Juan Del Sur, I was shocked at the sudden and widespread vitriol controlling my newsfeed. First, I read how the government was corrupt in making changes to their social security system, and then I read how the government was murdering protestors. I knew from my understanding of Nicaragua’s history; President Ortega’s longstanding commitment to the country; its highly successful model of community policing; and the international context Nicaragua is forced to operate in due to repressive IMF loans and trade agreements, that there was more to this story.

Yet, there was no analysis anywhere to be found, only baseless accusations from predominantly white men and an occasional white woman living in Miami, Texas and Costa Rica. A number of Latinos from various locations in the United States later joined in the chatter claiming they were born in Nicaragua and thus justified in posting hostilities, when engaged in debate.

Property owners I personally knew also spoke against the government and joined in with inflammatory remarks. It is important to understand that President Ortega and the FSLN did not conduct purging campaigns to remove its bitter rightwing enemies/Somozistas. Under President Ortega’s compassionate and practical leadership, Nicaragua even forgave the Contras that its FSLN fought against once they agreed to lay down their arms.

Everywhere I looked the message of hate was the same, be it Facebook, Twitter or mainstream news media from the mouths of rightwing senators Marco Rubio and Ileana Ross-Lehtinen who staged meetings with protestors as well as alternative media such as Democracy Now and the Guardian. The understated president, Daniel Ortega, went from being an astute and beloved aged revolutionary hero to a merciless dictator in social media and the press within a few hours. The news feed was so similar, overwhelming, relentless and well packaged, that it seemed immediately like an expertly orchestrated massive disinformation campaign set by the imperial United States to remove President Ortega and the FSLN from office yet again.

Anytime I questioned the prevailing narrative on the Facebook expatriate groups, 10 to 15 users, with questionable profiles, ganged up on me. I was personally insulted, told to remove my posts, and threatened. They feared my comments. Additionally, my Facebook friends were contacted and insulted and told to “make me remove my posts”. I received phone calls on Facebook Messenger despite the fact that my friend’s list is hidden.

The questionable profiles that contacted me often listed present employment with an obscure non governmental organization (NGO), and/or prior employment with the US State Department, US military, or in one case a user listed his job as a “private investigator” that just returned from “doing security in Venezuela.”

Yet, what was most troubling to me was that people I knew from San Juan Del Sur were brainwashed by the massive and unrelenting wave of disinformation. PSYOPS temporarily worked. They began repeating hostile catch phrases against the government as if it was Holy Scripture. They would not read or watch anything in favor of the government, despite my best efforts through verbal and written communication. They made up their minds, based on social media and Google’s distorted reality, that revolution was what the majority of people in Nicaragua wanted. This distortion couldn’t be farther from the truth, as President Daniel Ortega was elected with over 70 percent of the vote. However, the barrage of repeating fake propaganda videos resulted in social contagion frenzy, similar to that experienced by the Arab students in Egypt.

As it turned out, many of the photos and videos posted and used to incite violence were actually taken in Mexico and Honduras years earlier and many of the “dead” were found resurrected in other parts of Nicaragua alive and well. However, armed criminal mercenaries called “peaceful student protestors” by the news and social media did murder police and civilians. Fortunately, distorted reality can only last a short time.

In Nicaragua, the government had control over the county within three months, as the news and social media lies became apparent to citizens and foreigners. Essentially, the criminal mercenaries that infiltrated the protests were not content to restrict their activities to the ones dictated by their US government employers. To supplement their wages, they robbed, raped and pillaged the communities to which they held hostage, and were systematically removed by local residents as well as the police.

Facebook’s Biased Reaction

Facebook automatically flagged and blocked my posts on Nicaragua’s expatriate groups, and group administrators removed the ones that slipped through. My posts merely explained the US government’s longstanding disinformation campaigns against Nicaragua. Then, Facebook and/or group administrators removed my access to the pages. Eventually, due to threats, I deleted my Facebook profile. However, PSYOPS did not succeed in silencing me; instead, it encouraged me to write for a larger audience.

Control over Dissent Using Facebook

In late July 2018, I created a new Facebook profile and began again to monitor Nicaragua expatriate news groups and post articles that support its sovereign government against slanderous untruths. On July 29th, Facebook removed and considered spam two articles that I posted: “The Case Against Daniel Ortega” by Chuck Kaufman hosted on the Libya360.Worldpress.com website and “Opposition Beyond the Violence in Nicaragua” by John Perry hosted on The Guardian website. Both articles non-violently support the sovereign government of Nicaragua. Fortunately, I was able in both instances to get the posts restored after clicking a few buttons. Yet I still remain unable to get Facebook or group administrators to remove articles that promote violence against the government. Despite my flagging of these fake articles for deletion under the Facebook categories: terrorism, violence, harassment, and hate speech, Facebook allows this vitriol to remain.

After posting a third article titled: “After the Failed Coup, After All the Lies, Nicaragua Rebuilds” by Tortilla Con Sal, hosted on the Telesur website, Facebook locked me out of my user account. The article I posted promoted peace and reconstruction. For the record, none of the articles I posted were ever in violation of Facebook’s community standards.

To unlock my user account, Facebook required me to upload a close-up photo of my face. Facebook’s clear bias against the content of my posts coupled with its desire to invade my physical privacy proved intimidating. Facebook, a corporate behemoth, had me vulnerable and exposed, as I could not access my account to delete it without first revealing my personal identity. Facebook is like the mighty Wizard of Oz in that its master is concealed behind a curtain and unreachable. Facebook lists no email address or phone number for “customer service”.

Did Facebook’s version of Orwell’s Thought Police flag my account? After a few deep breaths, I took a chance that Facebook would use its facial recognition software to confirm my physical identity against an Internet search. So, I found a close-up photo online that corresponded with the fake name I used to open my Facebook account, and uploaded it hoping for the best. It worked. I had access to my profile by the next morning. However, I continue to wonder if Facebook was fooled or if I am merely being given more opportunity to violate the Patriot Act in thought and word? Are my CIA, NSA, FBI and DoD “friends” continuing their surveillance of my personal communications on Facebook’s Messenger and WhatsApp applications just more closely? Under the Patriot Act, Facebook is mostly prohibited from disclosing law enforcement surveillance. According to Facebook, in its summary of its 2017 transparency report, it states:

“The US government requests for account data remained roughly even at 32,742, of which 62% included a non-disclosure order prohibiting Facebook from notifying the user, which is up from 57% during the first half of 2017.”

Other transparency report findings of note for Google, Verizon and AT&T are as follow:

“Google received 48,941 government data requests affecting 83,345 user accounts in the first six months of 2017.” And, “In the reporting period between 2016 and 2017, local, state and federal government authorities seeking information related to national security, counter-terrorism or criminal concerns issued more than 260,000 subpoenas, court orders, warrants, and other legal requests to Verizon and more than 250,000 such requests to AT&T.”

On May 24, 2018, the ACLU filed a Freedom of Information Act request to find out how agencies like the FBI and the Department of Homeland Security are collecting and analyzing content from Facebook, Twitter, and other social media sites.

Government surveillance of social media can have serious consequences, whether you’re a U.S. citizen, a lawful resident, or are seeking to immigrate to or visit the United States. The FBI appears to be using social media as a basis for deciding who to interview, investigate, or target with informants or undercover agents. A single Facebook post or tweet may be all it takes to place someone on a watch list, with effects that can range from repeated, invasive screening at airports to detention and questioning in the United States or abroad.”

With the proliferation of US government non-discloser surveillance, the use of facial recognition software, and the requirement to upload close-up photos to gain access to existing profiles, the velvet gloves are completely off Facebook as an iron fisted US government spy tool. The justification that this intrusive level of policing is merely to remove “fake profiles” doesn’t fly. There are alternate methods that do not compromise our constitutional and civil rights. This is a ruse, engineered by the NSA. Be warned.

Facebook Facial Recognition Software and the US National Security Agency (NSA)

As discussed by James Risen and Laura Poitras in their May 31, 2014 article titled: N.S.A. Collecting Millions of Faces From Web Images, the National Security Agency (NSA) is actively harvesting massive amounts of images of people from communications that it intercepts through its global surveillance efforts for use in sophisticated facial recognition programs, according to top-secret documents.

The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. The agency intercepts millions of images per day including about 55,000 facial recognition quality images which translate into tremendous untapped potential, according to 2011 documents obtained from the former agency contractor Edward J. Snowden.”

In-Q-Tel (IQT)

In early 1999, with funding directed by the US Central Intelligence Agency (CIA), input from Silicon Valley consultants and Norman Augustine, a former CEO of Lockheed-Martin, In-Q-It, a non-profit corporation was formed. Its core mission to improve the data collection and analysis capabilities of the CIA through access and control over emerging Information Technology (IT) remains intact to date. By March of 1999, the corporation received its first contract. In 2000, its name was changed to In-Q-Tel (IQT).

IQT invests in areas where there is both a CIA need and private sector interest. Examples of commercial applications that also support intelligence functions are: data warehousing and mining, knowledge management, profiling search agents, geographic information systems, imagery analysis and pattern recognition, statistical data analysis tools, language translation, targeted information systems, mobile computing, and secure computing.

Though IQT, the CIA has the option of purchasing products directly from the vendor or launching Research & Development (R&D) projects. While IQT’s present budget remains secret, its first year budget was $28 million. According to a 2013 Fox Business News report, IQT claims that for every dollar it invests in a company, the venture community invests over $9. Further, it claimed that it had leveraged more than $3.9 billion in private-sector funds.

R&D remains the core of its activities. Sometimes IQT assembles teams of companies to create the solution it seeks; other times it is a co-investor in a fledgling company with additional business partners. IQT also uses request for proposal. Essentially, IQT is empowered to use whatever model meets its objective.

In the area of R&D, the CIA’s agreement with IQT allows it and/or its partners to retain title to the innovations created, and to freely negotiate the allocation of Intellectual Property (IP) derived revenues. The only major stipulation is that the CIA retain traditional “government purpose rights” to the innovations. This agreement has allowed IQT to amass considerable financial resources secretly over the last nineteen years since its inception. Also, this agreement has permitted collaborating and beholden individuals to become extremely wealthy and powerful.

To restrict contracting to specific entities, and to achieve privacy from oversight authorities, IQT uses DARPA’s contract model called “Other Transactions” (OT). OT contracts enable IQT to bypass Federal Acquisition Regulations (FAR), which requires competition in federal contracting.

Because of the clandestine nature of IQT’s work and its key relationship to the CIA, both entities remain extremely vulnerable to security risks during solution transfer.

Origin of Facebook

While no record of the CIA directly funding Facebook through IQT is apparent, members of IQT’s top management are founding members and/or board members of Facebook. Some of Facebook’s allure to users is that Mark Zuckerberg and his friends started the company from a Harvard dorm room and that he remains the chairman and chief operating officer. If he didn’t exist, he would need to be invented by Facebook’s marketing department. Primarily, the legend and image of a fresh faced Zuckerberg provides a palatable context that entices young people to voluntarily part with their constitutional right to privacy for social acceptance. Though subtle coercion, young people come to believe that in order to be “liked” by their peers, they need to be part of the Facebook brand.

A few months after Facebook was formed in 2004, it received its first capital injection from Peter Thiel, a member of the Steering Committee of the exclusive Bilderberg Group, the drivers of globalization. Members include political leaders, key members from the intelligence community, and experts from industry, finance, academia and the media. According to Global Research’s Stephen Lendman, in his May 2014 article titled: The True Story of the Bilderberg Group and What they May Be Planning Now:

“Bilderbergers want to supplant individual nation-state sovereignty with an all-powerful global government, corporate controlled, that’s check-mated by militarized enforcement.”

In August of 2004, Thiel acquired a 10.2% stake in Facebook for $500,000. The next two capital injections were $12.7 million from Thiel and Accel Partners in May 2005 and then $27.5 million from an Accel-led round of financing that included Thiel, Accel and Greylock Partners in April 2006. In 2012, Thiel sold the majority of his shares for over $1 billion, but remains on the board of directors.

Essentially, IQT is linked to Facebook through Thiel, and Thiel is linked to IQT through his firm Palantir. So, to understand Facebook it is first necessary to understand Palantir, then Thiel.

Palantir

According to Wikipedia, Palantir was started in 2004. Its only outside backer was the CIA’s nonprofit venture capital firm, IQT. Through pilots facilitated by IQT with computer scientists and analysts from intelligence agencies, Palantir’s technology was developed over a three-year period. A document leaked to TechCrunch revealed that Palantir’s clients as of 2013 included at least twelve groups within the U.S. government, including the CIA, DHS, FBI, CDC, the Marine Corps, the Air Force, Special Operations Command, West Point, the Joint Improvised-Threat Defeat Organization and Allies, the Recovery Accountability and Transparency Board and the National Center for Missing and Exploited Children.

Peter Thiel

According to Wikipedia, Peter Thiel was born in Germany and holds German, American and New Zealand citizenship. Besides being a member of the Bilderberg Group’s Steering Committee as referred to earlier, Thiel is the co-author of an anti-multicultural book titled “The Diversity Myth: Multiculturalism and Political Intolerance on Campus”, where his racist and misogynist bias is apparent in his argument that multiculturalism in colleges is hurting education and that some cases of alleged date rape are actually seductions that are later regretted.

Despite his apology, issued 20 years after the book was published, he gave $1.2 million to the campaign of then Republican presidential nominee Donald Trump, who ran on a white nationalist campaign. Thiel is also is a member of the super PAC called: Make America Number 1. The super PAC is credited with donating funds to Steve Bannon, via a shell company he heads named Glittering Steel. Bannon is widely considered a racist, anti-Semite and white nationalist. The supper PAC also donated funds to rightwing Senator Ted Cruz. With Thiel’s clear intent and bias, it should be no surprise that the Facebook Cambridge Analytica scandal favored Trump in the election, and that the violent prevailing narrative against Nicaragua, supported by Ted Cruz, is impossible to remove from Facebook’s expatriate group pages.

Accel Partners: In 2004, Accel partner James Breyer sat on the board of directors of military defense contractor Bolt, Beranek and Newman (BBN) with IQT’s CEO Gilman Louie. BBN is known for essentially helping to create email and the Internet for the DoD. Breyer is a member of the Council on Foreign Relations.

Greylock Partners: Howard Cox, the head of Greylock, served on IQT’s board of directors. Before Greylock, Cox served two years in the Office of the Secretary of Defense.

Origin of Google

Launched in 1998, Google is one of the world’s largest media companies. While the Department of Defense (DoD), CIA, NSA and Google’s marketing department would like users to believe that its founders, Stanford University students, Larry Page and Sergey Brin developed software independent of the DoD, the truth is they didn’t. They were both on the payroll of the National Science Foundation (NSF) while working on its Stanford Digital Library Project (SDLP). This library project is similar to Google in that it involved the creation of search algorithms to scan large quantities of data to find relationships.

The NSF is funded by the US federal government and expresses in its mission statement its intention to “secure the national defense”. NSF has a longstanding relationship with the DoD’s Defense Advanced Research Projects Agency (DARPA). Nothing requiring serious funding and real paychecks involving Information Technology and US Universities is done without DARPA knowledge as detailed below:

“In the 1970s, the agency responsible for developing emerging technologies for military, intelligence, and national security purposes the Defense Advanced Research Projects Agency (DARPA) linked four supercomputers to handle massive data transfers. It handed the operations off to the National Science Foundation (NSF) a decade or so later, which proliferated the network across thousands of universities and, eventually, the public, thus creating the architecture and scaffolding of the World Wide Web.”

Not only was Google’s development nurtured by NSF/DARPA, but Google was also was aided by the secretive Massive Digital Data Systems (MDDS) program which was administered by private contractors for the CIA and NSA. The MDDS program sought to identify the digital fingerprints of users inside the World Wide Web so information requests could be tracked, sorted and aggregated to reveal individual proclivities and that of like-minded others with the intention of assembling target groups for easy surveillance so as to predict and counter their plans. The MDDS project was named Birds of a Feather with the thinking that like-minded individuals will engage in coordinated action together, just as birds fly in predictable V-formations. Predictability is key to the CIA in its efforts to weaponize social unrest. MDDS is considered to have helped create the design breakthrough that Google was built upon

Google has been an obvious partner with the CIA since 2004 when the company bought Keyhole from IQT, the CIA’s venture capital nonprofit. EarthViewer, Keyhole’s mapping technology software, became Google Earth.

Google and Social Media’s Influence

Besides geographic and locational tracking, Google assists the government in its efforts to write, and rewrite, history. According to its Google’s transparency report, the US government has named 79,901 items for removal since 2009. To add perspective to this number, consider that for this same period in time, Venezuela has named 10 items for removal, and Nicaragua has named 1 item for removal.

Content Placement in Social Media and Google

Olivia Solon and Sam Levin detail, in their December 16, 2016 article for The Guardian, How Google’s Search Algorithm Spreads False Information with a Rightwing Bias. According to the authors, search and autocomplete algorithms prioritize sites with rightwing bias, and far-right groups trick it to boost propaganda and misinformation in search rankings. As described below, the authors uncovered this bias in environmental as well as social and political examples:

“Following a recent investigation by the Observer, which found that Google’s search engine prominently suggests neo-Nazi websites and anti-Semitic writing, the Guardian has uncovered a dozen additional examples of biased search results. Google’s search algorithm and its autocomplete function prioritize websites that, for example, declare that climate change is a hoax, being gay is a sin, and the Sandy Hook mass shooting never happened.”

To test this allegation out, I entered the following text: “Socialism is…” Autocomplete added: “…is for figs.” The full sentence with autocomplete then read: “Socialism is for figs.” Photos of a red t-shirt appeared. On the t-shirt is a drawing of Che Guevara, a limp wrist, and text. Upon review, I found that an extreme rightwing group is marketing this t-shirt. The word “figs” in the text is written with a missing “I” that is replaced with the drawing of a fig hanging from a tree branch. Because of drawing of a limp wrist, this text can be interpreted by the reader to mean that socialism is for “fags.” In the US, the word “fag” is a derogatory name for homosexuals, and a limp wrist is a derogatory symbol. This supports the Guardian’s observation of Google’s bias against homosexuals as well its bias against socialists. Additionally, the fig fruit represents the name of the village in Bolivia where Che Guevara was captured and murdered. Thus, the fig represents a death threat against socialists. Hopefully, a socialist cyber activist can remove this blight against a beloved revolutionary hero.

Google’s Influence in Elections

As explained by Robert Epstein, from the American Institute for Behavioral Research and Technology, Google has the power to rig elections through something he calls the search engine manipulation effect (SEME). Based on his four years trying to reverse engineer Google’s search algorithms, he concludes that:

“We know that if there’s a negative autocomplete suggestion in the list, it will draw somewhere between 5 and 15 times as many clicks as a neutral suggestion,” Epstein said. “If you omit negatives for one perspective, one hotel chain or one candidate, you have a heck of a lot of people who are going to see only positive things for whatever the perspective you are supporting. Even changing the order in which certain search terms appear in the autocompleted list can make a huge impact, with the first result drawing the most clicks, he said.”

Appearing on the first page of Google search results can give websites undue authority and traffic.

These platforms are structured in such a way that they are allowing and enabling, consciously or unconsciously, more extreme views to dominate,” said Martin Moore from Kings College London’s Centre for the Study of Media, Communication and Power.”

Epstein believes these two manipulations work together and have a profound impact on people, since they are unaware it is being done. He believes this is compounded by Google’s personalization of search results. This means users see different results based on their interests.

According to politico.com, the problem is that more than 75 percent of all online searches in the United States are conducted on Google. Thus, if Google’s CEO, a rogue employee or the search algorithm favors one candidate, there is no way to counteract that influence. Politico’s research shows that even when people do notice they are seeing biased search rankings, their voting preferences still shift in the desired directions toward the bias. It’s as if the bias is serving as a form of social proof. The thinking is that if the search engine prefers one candidate, that candidate must be the best. Biased rankings are hard for individuals, regulators and election watchdogs to detect as SEME is easy to hide through customized search results.

In Wired’s 2010 article titled: Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring, it discusses the company Recorded Future, that is funded by both the CIA’s IQT non-profit and Google. Both IQT and Google Ventures have seats on Recorded Future’s board. Not only does the software, Recorded Future, scour websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents in the present, but also in the future. In looking at the invisible links between documents that mention similar or related entities and events, it can figure out the participants, the location, and predict when it might occur. According to Recoded Future, the software can assemble actual real-time dossiers on people. Recoded Future maintains an index with more than 100 million events.

“The cool thing is, you can actually predict the curve, in many cases,” says company CEO Christopher Ahlberg, a former Swedish Army Ranger with a PhD in computer science.”

Content Placement in Social Media and Google

Besides taking proactive security measures, activists and the NAM can benefit by controlling the technology that decides the placement of supportive material on social media and Google. As most involved in the drafting and dissemination of content already know, everything that departs from the prevailing imperialist narrative is automatically considered subversive and blocked. While quality content continues to exist, locating it on the Internet is like finding a needle in a haystack, even when one already knows what is being sought, by whom, and from where.

The latest trick is for a news item of interest to be blocked by a message warning of an “expired security certificate” and threatening “a virus upon opening”. This was found on an article titled: Cyber warfare: Challenge of Tomorrow, by none other than Counterpunch’s plagiarist spy Alice Donovan.

The Cost of US Cyber Warfare

The United States 2019 proposed intelligence budget at $73 billion has nearly doubled since 2005. This figure includes the National Intelligence Program (NIP) budget at $54.6 billion and Military Intelligence Program (MIP) budget at $18.4 billion. Back in 2005, there was no MIP budget. The total NIP Budget was $39.8 billion, which is still an exorbitant amount of money.

The NIP funds Intelligence Community (IC) activities in six Federal Departments and two independent agencies: the Department of Defense, the Department of Justice, the Department of Homeland Security, the Department of State, the Department of Energy, the Department of Treasury, the Central Intelligence Agency, and the Office of the Director of National Intelligence.

As described in by the Washington Post in its article titled: “The Black Budget”, the CIA, NSA and National Reconnaissance Office (NRO) received more than 68 percent of the 2013 black budget. The CIA received $14.7 billion, the NSA $10.8 billion, and NRO $10.3 billion. Within its funding mission categories, $20.3 billion was for Warning U.S. leaders about critical events and $17.2 billion was for Combating Terrorism.

In looking at the new 2019 MIP budget, one can better understand how new initiatives and training in cyber warfare are being funded. Take for example the US Air Force Cyberspace Defense Operations (IB4X1) Summary description:

“Personnel in the Cyber Warfare Operations specialty perform duties to develop, sustain, and enhance cyberspace capabilities. These capabilities are used to defend national interests from attack and to create effects in cyberspace to achieve national objectives.” “They conduct both offensive and defensive cyberspace operations. They act to protect cyberspace systems from adversarial access and attack. They execute command and control (C2) of assigned cyberspace forces and de-conflict cyberspace operations. They will partner with Department of Defense, interagency, and Coalition Forces.”

While the US government clearly takes the lead in unconventional warfare technology, due to its massive resources and funding, it leaves in its wake tons of technological opportunities ripe to be exploited. What can’t be appropriated can be protested. Just don’t post anything tactical on the Internet or use smart phones, because your “friends” in the US government are watching. Take heart, this elaborate surveillance system was devised because the ruling elite is outnumbered. Knowledge is power.

[Lauren Smith, author of historical fiction, has a BA in Politics, Economics and Society from SUNY at Old Westbury and an MPA in International Development Administration from New York University. Her novel on Nicaragua’s 1979 revolution is due out in 2019.]

Moment of Truth – the Fight for Hard Net Neutrality Regulation

Disruptive Views

July 20, 2016

by Tony Poulos

 

Over the last few years, John Strand and his firm, Strand Consult, have followed the net neutrality debate and published a number of research notes and 7 detailed reports on the topic. Hard net neutrality rules are in place in some 50 countries even though soft rules are proven to work better to support investment and innovation.

For the last 20 years Strand Consult has published serious, independent research about the telecommunications industry. They are not afraid to say unpopular and embarrassing things about its actors in the industry.

With this free report “The moment of truth – a portrait of the fight for hard net neutrality regulation by Save The Internet and other internet activists” Strand Consult shares its knowledge and offers a free 50 page report detailing how sophisticated global coalitions such as Save the Internet have succeeded to overwhelm seemingly “independent” telecom regulators and implement hard rules.

The report shows that Save The Internet and other internet activists with well-funded, globally coordinated, digitally sophisticated campaigns, have succeeded to deliver hard net neutrality regulations in some 50 countries. Internet activism is an industry; “digital prostitutes” who will lend their support to corporate inspired causes are available for hire; and net neutrality activism receives hundreds of millions of dollars of support from corporate and foundation funders intent on protecting their financial portfolios and business models.

US-based net neutrality activists franchise and broker their activism models and concepts to a variety of activist entrepreneurs around the world. Telecom regulators such as BEREC, FCC and TRAI are both supporters and victims of activist campaigns. They may tout the mails delivered as part of digital campaigns as support for rulemaking, but they also experience increasing lack of credibility, as the activism exposes their lack of political independence.

SavetheInternet.eu website: “In this campaign hundreds of thousands of Internet users banded together from 2013 till 2016 to keep the Internet free and open. Together, we sent a loud, clear message to the European Institutions: protect net neutrality. And it worked! The final rules, which were published on 30 August 2016, offer some of the strongest net neutrality protections we could wish for. So long as these new rules are properly enforced by national telecom regulators, they represent a resounding victory for net neutrality.”

SavetheInternet.eu purports to have delivered some 94,000 mails to BEREC as part of the net neutrality consultation, but based upon access to “20,000” mails Strand Consult received under freedom of information laws, Strand Consult believes the actual number to be only 4,000 – 5,000 mails. Each mail is delivered to the 28 telecom regulators of the EU. Moreover some 30 percent of the mail come from Americans in the USA, not Europeans.

In a battle that has waged for a decade, telecom operators have been outmatched by the net neutrality lobby in funding, coordination, leadership, and impact.  The funding of the Ford and Open Society Foundations to activists alone exceed what the entire telecom industry spends on advocacy on the issue. In the BEREC stakeholder consultation in December 2015, Google had financial support with 7 of the 14 official stakeholder organizations in all three categories (including 3 of the 4 civil society organizations).  Telecom industry representatives were only found in one category.

In a modern democracy, it is important to listen to people and have a debate.  A serious debate should be based on facts and provide transparency. The debate about a free and open internet is important, but self-interested Internet companies such as Google and Netflix have poisoned the debate. They have used their combination of money, public relations spin, and outsourcing of the dirty work to digital prostitutes around the World.

Avaaz website: “Update 12 November 2014|”We won! After a nerve-wracking battle, the delivery of our 1.1 million-strong petition, and hundreds of thousands of emails and calls to key MEPs, the EU Parliament voted for strong Net Neutrality rules. Now the EU governments have the final say — let’s keep up the pressure so they don’t backtrack – sign and tell everyone!”

The net neutrality debate is not about a free and open internet; it is game in which big companies fight their competitors. In the process, users and regulators are abused as tools. BEREC, FCC, TRAI and other regulators has become the naïve victims, having been co-opted by well-funded activists.  The process could be cleaned up with an appropriate return to the facts and academic evidence.

Strand Consult’s goal is to bring transparency to the net neutrality debate and to demonstrate how well-funded, sophisticated global campaigns have succeeded to make hard net neutrality rules in the US, EU, India, and other countries.

Download the free report here: The Moment of Truth

[Tony Poulos is a freelance writer, regular speaker, MC and chairman for the telecoms and digital services industries worldwide. He has founded and managed software and services companies, acts a market strategist and is now Editor of DisruptiveViews. In June 2011, Tony was recognized as one of the 25 most influential people in telecom software worldwide.]

WATCH: The Limits of the Web in an Age of Communicative Capitalism

Democracy and Other Neoliberal Fantasies

December 5, 2013

In association with the Left Forum, Jodi Dean gives a talk on what she terms “communicative capitalism” and the Communist horizon.

What has been the political impact of networked communications technologies? In the era of the occupy movement, the Arab Spring, Wikileaks and now the protests in Brazil and Turkey, many have celebrated the internet and social media’s central role in creating resistance movements. Jodi Dean, author of ‘The Communist Horizon’ and ‘Democracy and Other Neoliberal Fantasies’, argues that the web has formed part of a profoundly depoliticizing shift in capitalism, which has enabled the marriage of neoliberalism to the democratic values of participation and the reduction of politics to the registration of opinions and the transmission of feelings.

She insists that any reestablishment of a vital and purposeful left politics will require shedding the mantle of victimization, confronting the marriage of neoliberalism and democracy and mobilizing different terms to represent political strategies and goals. The left’s ability to develop and defend a collective vision of equality has been undermined by the ascendance of what she calls “communicative capitalism”. Although we have the means to express ideas and ask questions like never before, Dean asks why, in an age celebrated for its communications, there is no response.

Filmed in Connolly Books, Temple Bar, Dublin on the 29th June 2013.

“Doctors” Behind Syrian Chemical Weapons Claims are Aiding Terrorists

msf

Land Destroyer

August 25, 2013

by Tony Cartalucci

The “evidence” upon which the West is propping up its narrative of the Syrian government using chemical weapons against large numbers of civilians hinges so far entirely on claims made by “Doctors Without Borders.” In the New York Times article, “Signs of Chemical Attack Detailed by Aid Group,” it is reported:

An international aid group said Saturday that medical centers it supported near the site of a suspected chemical weapons attack near Damascus received more than 3,000 patients showing symptoms consistent with exposure to toxic nerve agents on the morning of the reported attack.

Of those, 355 died, said the group, Doctors Without Borders.

The statement is the first issued by an international organization working in Syria about the attack on Wednesday in the suburbs northeast of Damascus, the capital.

While it is often described by the Western media as “independent,” nothing could be further from the truth.

To begin with, Doctors Without Borders is fully funded by the very same corporate financier interests behind Wall Street and London’s collective foreign policy, including regime change in Syria and neighboring Iran. Doctors Without Borders’ own annual report (2010 report can be accessed here), includes as financial donors, Goldman Sachs, Wells Fargo, Citigroup, Google, Microsoft, Bloomberg, Mitt Romney’s Bain Capital, and a myriad of other corporate-financier interests.

CIA Asset Gloria Steinem’s “Women Under Siege” Joins Syrian Propaganda Campaign

CIA’S “WOMEN UNDER SIEGE IN SYRIA” CAMPAIGN EXPOSED

An early interview of Gloria Steinem detailing her time as an operative in the CIA:

April 14, 2012

Tony Cartalucci

 

Ironically, faux-feminist Gloria Steinem’s “Women Under Siege’s” latest campaign to demonize the Syrian government in tandem with the US State Department and its vast stable of media and intelligence assets, stands to set the stage for extremist ideologues to overrun Syria, ending its secular society and entirely stripping away the “women’s rights” Steinem claims to have spent a lifetime fighting for.


Image: “Women Under Siege – Documenting Sexualized Violence in Syria” attempts to demonize the Syrian government and raise the level of feigned humanitarian-hysteria ahead of NATO maneuvering to rearm and redeploy militant extremists sure to end all human rights in currently secular Syrian society – just as they’ve done in Libya.

Of course, when one understands that Steinem is an establishment asset merely leveraging/perverting legitimate concerns regarding women to manipulate, divide, and control people for a corporate-financier agenda, such hypocrisy makes perfect sense.

Women Under Siege is a project of Steinem’s “Women’s Media Center,” which is itself a spinoff of its umbrella organization, Ms Foundation. Steinem’s Ms Foundation is funded by convicted criminal and Wall Street speculator George Soros‘ Open Society Foundations, the Ford Foundation, Tides Foundation, New York Life, Google, the United Nations, AT&T, Lifetime, the ACLU, and many others featured in their 2011 Annual Report starting on page 27. So what appears to be a feminist crusade turns out to be yet another facade of Wall Street and London’s (ironically very male-dominated) charade of manipulating, exploiting, dividing, and controlling the population.

Further evidence exposing Steinem and her expansive propaganda empire as nothing more than a tool of special interests is the documented fact that she was at least for a time, an asset of the Central Intelligence Agency (CIA) as described in the New York Times article “CIA Subsidized Festival Trips; Hundreds of Students Were Sent to World Gatherings” (full text can be found here). Steinem’s “Independent Research Service” was anything but “independent,” as it was bankrolled by the CIA. While Steinem claims the CIA did nothing to influence her organization’s policy, a tenuous defense used by many operatives caught receiving dubious funding, it is clear that her activities dovetailed with the CIA’s agenda, making her at best what is called a “useful idiot.”

Agribusiness: The Corporations that Control Conservation [WWF, Conservation International, Nature Conservancy]

“So, who are the individuals guarding the mission of global conservation nonprofits? US-WWF boasts (literally) that its new vice-chair was the last CEO of Coca-Cola, Inc. (a member of Bonsucro) and that another board member is Charles O. Holliday Jr., the current chairman of the board of Bank of America, who was formerly CEO of DuPont (owner of Pioneer Hi-Bred International, a major player in the GMO industry). The current chair of the executive board at Conservation International, is Robert Walton, better known as chair of the board of WalMart (which now sells ‘sustainably sourced’ food and owns the supermarket chain ASDA). The boards of WWF and Conservation International do have more than a sprinkling of members with conservation-related careers. But they are heavily outnumbered by business representatives. On the board of Conservation International, for example, are GAP, Intel, Northrop Grumman, JP Morgan, Starbucks and UPS, among others.”

Way Beyond Greenwashing: Have Corporations Captured Big Conservation?

Beyond Greenwashing

by Jonathan Latham
Independent Science News

February 7, 2012

Imagine an international mega-deal. The global organic food industry agrees to support international agribusiness in clearing as much tropical rainforest as they want for farming. In return, agribusiness agrees to farm the now-deforested land using organic methods, and the organic industry encourages its supporters to buy the resulting timber and food under the newly devised “Rainforest Plus” label. There would surely be an international outcry.

Virtually unnoticed, however, even by their own membership, the world’s biggest wildlife conservation groups have agreed exactly to such a scenario, only in reverse. Led by the World Wide Fund for Nature (WWF), many of the biggest conservation nonprofits including Conservation International and the Nature Conservancy have already agreed to a series of global bargains with international agribusiness. In exchange for vague promises of habitat protection, sustainability and social justice, these conservation groups are offering to greenwash industrial commodity agriculture.

%d bloggers like this: