How The CIA Made Google

26 Januar 2015 — MintPress News

Google ciaThe Google campus-network room at a data center in Council Bluffs, Iowa. Photo: Connie Zhou/A

Originally published on Medium.

INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’

Continue reading

Graphika: The Deep State’s Beard for Controlling the Information Age

Tuesday, 25 January 2022 — MintPress News

NEW YORK – Graphika is the toast of the town. The private social-media and tech-intelligence agency that tracks down bots and exposes foreign influence operations online is constantly quoted, referenced and profiled in the nation’s most important outlets. For example, in 2020, The New York Times published a fawning profile of the company’s head of investigations, Ben Nimmo. “He Combs the Web for Russian Bots. That Makes Him a Target,” ran its headline, the article presenting him as a crusader risking his life to keep our internet safe and free. Last year, business magazine Fast Company labeled Graphika as among the 10 most innovative companies in the world.

Continue reading

A “Leap” toward Humanity’s Destruction

25 June 2021 — Unlimited Hangout

The world’s richest medical research foundation, the Wellcome Trust, has teamed up with a pair of former DARPA directors who built Silicon Valley’s skunkworks to usher in an age of nightmarish surveillance, including for babies as young as three months old. Their agenda can only advance if we allow it.

by Whitney Webb

A UK nonprofit with ties to global corruption throughout the COVID-19 crisis as well as historical and current ties to the UK eugenics movement launched a global health-focused DARPA equivalent last year. The move went largely unnoticed by both mainstream and independent media.

Continue reading

Watch: The Antibody Deception

2 March 2021 — Rosemary Frei

By Rosemary Frei

The world has been fixated for months on novel-coronavirus PCR testing, contact tracing and vaccination.

Meanwhile, another major part of the Covid biomedical complex has received far less attention: the use of antibodies for detecting, diagnosing and treating infection with the novel coronavirus.
Continue reading

US Defense Department prepares for mass internet censorship By Kevin Reed

6 September 2019 — WSWS

DARPA requests proposals for “Semantic Forensics” system

The US military has issued a call for research proposals from technology partners for the development of an automated system capable of scanning the entire internet and locating and censoring content deemed as “false media assets” and “disinformation.” According to government documents, the requested solution would provide “innovative semantic technologies for analyzing media” that will help “identify, deter, and understand adversary disinformation campaigns.”

Continue reading

The Media is the Message By William Bowles

23 December, 2010

“By working primarily with media organizations from NATO countries, Wikileaks has chosen to submit its leaks to one single ‘worldview’, that of the West.” — Who’s Who at Wikileaks? By Julie Lévesque

Cyber-warfare – Cyber-Anarchy – Anarchists – Hackers

It’s all so predictable isn’t it and how quick the media was to brand the leaks as the opening shots of a ‘Cyber-War’, a designation that fed back into the government’s propaganda almost immediately. To paraphrase, the media really is the message not just the messenger.

‘Prepare for all-out cyber war’

Government sites braced for attack by pro-WikiLeaks ‘hacktivists’

Whitehall is preparing for a crippling attack on government websites as evidence mounts that the backlash against the arrest of the WikiLeaks founder Julian Assange is rapidly growing into a mass movement that aims to cause widespread disruption on the internet. — ‘Prepare for all-out cyber war‘ By Cahal Milmo and Nigel Morris, The Independent, 14 December 2010

Continue reading

Who’s Who at Wikileaks? by Julie Lévesque

20 December, 2010 — Global Research

Global Research Editor’s Note

Progressive organizations have praised the Wikileaks endeavor. Our own website Global Research has provided extensive coverage of the Wikileaks data banks and their implications, particularly with regard to US-NATO war crimes.

The Wikileaks Project is heralded as an immeasurable victory against corporate media censorship, without examining its organizational structure.

A distinction should be made between the Wikileaks data banks, which constitute a valuable source of information in their own right, and the mechanisms whereby the leaks, used as source material by the corporate media, are transformed into news.

Wikileaks from the outset has collaborated closely with several mainstream media.

This article by Julie Lévesque focuses on the nature and organizational structures of the Wikileak project. Continue reading

Big Brother FBI: Data-Mining Programs Resurrect “Total Information Awareness” By Tom Burghardt

8 October, 2009 — Global ResearchAntifascist Calling

Like a vampire rising from it’s grave each night to feed on the privacy rights of Americans, the Federal Bureau of Investigation is moving forward with programs that drain the life blood from our constitutional liberties.

From the wholesale use of informants and provocateurs to stifle political dissent, to Wi-Fi hacking and viral computer spyware to follow our every move, the FBI has turned massive data-mining of personal information into a growth industry. In the process they are building the surveillance state long been dreamed of by American securocrats.

A chilling new report by investigative journalist Ryan Singel provides startling details of how the FBI’s National Security Branch Analysis Center (NSAC) is quietly morphing into the Total Information Awareness (TIA) system of convicted Iran-Contra felon, Admiral John M. Poindexter. According to documents obtained by Wired:

A fast-growing FBI data-mining system billed as a tool for hunting terrorists is being used in hacker and domestic criminal investigations, and now contains tens of thousands of records from private corporate databases, including car-rental companies, large hotel chains and at least one national department store. (Ryan Singel, “FBI’s Data-Mining System Sifts Airline, Hotel, Car-Rental Records,” Wired, September 23, 2009)

Among the latest revelations of out-of-control secret state spookery, Wired disclosed that personal details on customers have been provided to the Bureau by the Wyndham Worldwide hotel chain “which includes Ramada Inn, Days Inn, Super 8, Howard Johnson and Hawthorn Suites.” Additional records were obtained from the Avis rental car company and Sears department stores.

Continue reading

Network-centric Warfare: Dominating entire societies Worldwide through ubiquitous surveillance By Tom Burghardt

11 June, 2009 – Global ResearchAntifascist Calling…

What Pentagon theorists describe as a “Revolution in Military Affairs” (RMA) leverages information technology to facilitate (so they allege) command decision-making processes and mission effectiveness, i.e. the waging of aggressive wars of conquest.

It is assumed that U.S. technological preeminence, referred to euphemistically by Airforce Magazine as “compressing the kill chain,” will assure American military hegemony well into the 21st century. Indeed a 2001 study, Understanding Information Age Warfare, brought together analysts from a host of Pentagon agencies as well as defense contractors Boeing, Booz Allen Hamilton and the MITRE Corporation and consultants from ThoughtLink, Toffler Associates and the RAND Corporation who proposed to do just.

As a result of this and other Pentagon-sponsored research, military operations from Afghanistan to Iraq and beyond aim for “defined effects” through “kinetic” and “non-kinetic” means: leadership decapitation through preemptive strikes combined with psychological operations designed to pacify (terrorize) insurgent populations. This deadly combination of high- and low tech tactics is the dark heart of the Pentagon’s Unconventional Warfare doctrine.

Continue reading