Skip to content
A reading path

The architecture
was built in plain sight.

You've probably felt it — that something fundamental has shifted in who controls information, computing power, and the infrastructure of daily life. This path is an invitation to look at the evidence directly. No speculation required.

The question "who is they?" has a surprisingly boring answer: publicly traded companies, congressional committees, and federal agencies — all acting within the law, most of it disclosed in terms of service nobody reads and court filings nobody follows. The surveillance architecture wasn't hidden. And — as the first section shows — it wasn't new.

Why this matters — especially if you're not American

COINTELPRO was the FBI's covert program to surveil, infiltrate, and destabilize American political organizations. Its targets included Martin Luther King Jr. — the FBI sent him an anonymous letter suggesting he kill himself — the NAACP, anti-Vietnam War groups, feminist organizations, and the Socialist Workers Party. These were not foreign threats. They were American citizens exercising constitutional rights. The Church Committee uncovered this in 1975. The surveillance impulse didn't begin with 9/11, or the internet, or the Cold War. It begins wherever unaccountable power exists.

Anchor document The Church Committee — US Senate (1975–76)

A bipartisan Senate investigation that documented COINTELPRO, MKULTRA (government mind-control experiments on unwitting citizens), assassination plots against foreign leaders, and mass warrantless surveillance — all conducted by intelligence agencies operating within their own self-designed legal frameworks. Not disputed. Not a theory. In the congressional record. The executive summary reads like a thriller and takes an afternoon. This is the institutional proof that oversight fails not once, but repeatedly, by design.

~2 hrs (executive summary) Free PDF — US Senate archive. Large file, opens directly in browser.
Watch first — free Citizenfour — Laura Poitras (2014)

An Academy Award-winning documentary filmed in real time as Edward Snowden hands classified NSA documents to journalists in a Hong Kong hotel room. Having read the Church Committee, you already know the institutional appetite. Now watch what it looks like when the full power of the digital age is behind it. Snowden's calm, his reasoning, his specific knowledge — this is the document that makes the pattern undeniable. Free on Tubi with ads.

1h 54m Free on Tubi — no subscription required
Then read The original PRISM reporting — The Guardian (June 6, 2013)

The first publication of the NSA's PRISM program documents — describing the collection of emails, chats, photos, voice and video calls, and stored data directly from the servers of Microsoft, Google, Apple, Facebook, YouTube, and Skype. Read the article, then follow through to the actual slides. The banality of a government PowerPoint describing total information access is the point.

~15 min read Free — The Guardian archive
Primary source The PRISM slides — Internet Archive

The actual NSA internal slides, preserved by the Internet Archive from the original Washington Post and Guardian publications. Not a journalist's characterization — the presentation itself, in the agency's own words and PowerPoint formatting. 117,675 active surveillance targets as of April 5, 2013. These slides were never meant to be seen.

~20 min Free — Internet Archive, permanently preserved
Cloud infrastructure The CrowdStrike outage of July 2024 — the largest IT failure in history

On July 19, 2024, a single faulty software update from one cybersecurity company crashed 8.5 million Windows systems worldwide simultaneously. Hospitals lost patient records. Airlines grounded thousands of flights. 911 emergency services went down. Banks and ATMs stopped working. Estimated financial damage: $10 billion. This is not surveillance — it is dependency made catastrophic. The former general counsel of the NSA said afterward: "Something like this is probably going to happen again."

~20 min read Free — Wikipedia, extensively sourced
Hardware concentration Taiwan and the semiconductor chokepoint

Every advanced chip in every device you own was almost certainly manufactured in Taiwan. One company — TSMC — produces over 90% of the world's most advanced semiconductors. The physical substrate of global computing power sits in a single island at the center of the world's most volatile geopolitical flashpoint. The EU CHIPS Act, the US CHIPS and Science Act, Japan's semiconductor subsidies — these are emergency measures, not routine policy.

~20 min read Free — Institute for Economics & Peace
Book Chris Miller — Chip War (2022)

The definitive history of how semiconductor manufacturing became the central geopolitical contest of the 21st century. Controlling advanced chips is like controlling oil in the 20th century — but far more geographically concentrated. Pulitzer Prize finalist.

~8 hrs reading Book — widely available. Wikipedia link for overview.
EU law EU Digital Markets Act (2022) — the institutional response

You already know GDPR (2018), which established that Europeans have enforceable rights over their personal data. The DMA is the next chapter: Brussels' binding acknowledgment that the market has failed to self-correct. If GDPR said "your data belongs to you," the DMA says "these platforms have accumulated too much structural power over how you access everything else." The Schrems cases in section 04 show what happens when these principles meet the surveillance reality in court.

~1 hr read Free — EUR-Lex full text
Book Shoshana Zuboff — The Age of Surveillance Capitalism (2019)

A Harvard professor's exhaustively documented argument that Google, Facebook, and their peers built their business models on the prediction and modification of human behavior using data extracted without meaningful consent. Start with chapters 3 and 4. The central claim: surveillance wasn't a side effect of the business model. It was the business model, from the beginning.

~15 hrs (full) / ~3 hrs (chs. 3–4) Book — widely available. Wikipedia link for overview.
Book Nicole Perlroth — This Is How They Tell Me the World Ends (2021)

A New York Times cybersecurity journalist documenting the zero-day exploit market — a real, verifiable market where governments pay millions for secret software vulnerabilities to deploy as offensive weapons. Named participants. Documented transactions. Democratic governments including European ones are buyers. Dutch intelligence (AIVD) was among agencies documented as participants.

~12 hrs reading Book — widely available. Wikipedia link for overview.
Book Marchetti & Marks — The CIA and the Cult of Intelligence (1974)

The first book the US government ever went to federal court to censor before publication. Written by a former CIA officer and a State Department analyst. The government demanded 168 passages be deleted; 27 were restored after legal challenge. The censored passages are marked in the published text. Read what they tried to hide, and draw your own conclusions about why.

~10 hrs reading Book — widely available. Censorship documented in the preface.
The doctrine — from Stuxnet to the pager attack

Stuxnet (2010) was the first cyberweapon to cross from digital into physical reality — software that destroyed Iranian centrifuges while reporting normal operation to human monitors. Its designers noted it could be adapted for power plants, water treatment facilities, and factories anywhere in the world. The Hezbollah pager attack (2024) was the same doctrine without software at all: explosive charges hidden inside a commercial supply chain, detonated by a single signal. Each step follows the same logic. The infrastructure your life depends on is the weapon.

The first cyberweapon Stuxnet — the worm that crossed from digital into physical (2010)

Jointly built by US and Israeli intelligence under Operation Olympic Games, Stuxnet was a worm delivered via USB stick that infiltrated Iranian nuclear facilities and caused centrifuges to physically destroy themselves — while reporting normal operation to human operators. It destroyed approximately 1,000 centrifuges. The crucial detail: Stuxnet's architecture was not domain-specific. It could be tailored to attack power plants, factory assembly lines, and water treatment facilities — most of which are in Europe, Japan, and the United States. Iran began building its own cyber forces immediately after.

~30 min read Free — Wikipedia, sourced from NYT, IEEE Spectrum, Kaspersky
The supply chain becomes a weapon The Hezbollah pager attack — September 2024

Israeli intelligence embedded explosive charges inside 5,000 pagers delivered through normal commercial channels. A single signal detonated them simultaneously across Lebanon and Syria — 42 killed, 3,500 injured. Hezbollah had switched to pagers specifically to avoid smartphone surveillance. The UN human rights chief called it "a new development in warfare, where communication tools become weapons." The supply chain itself — the ordinary infrastructure of global commerce — had become the delivery mechanism.

~20 min read Free — Wikipedia, sourced from NYT, Reuters, CNN, Guardian
The active front Cyberwarfare and Iran — the ongoing campaign (2010–present)

After Stuxnet, Iran built one of the world's most active cyber offense programs. Iranian groups now target US water treatment plants, power grids, and hospital systems — often gaining access through default passwords on industrial control systems. Since June 2025, as direct military strikes on Iranian nuclear and energy infrastructure have escalated, the cyber front has intensified: internet blackouts, GPS jamming, infrastructure attacks, and counter-strikes against Western systems have accelerated simultaneously.

~30 min read Free — Wikipedia, continuously updated
The governments are telling you European war preparedness guidance — what your government is actually saying (2024–present)

Sweden distributed a bright yellow booklet to every household titled "If Crisis or War Comes." Germany updated its Framework Directive for Overall Defense. The European Commission urged all EU citizens to stockpile 72 hours of food, water, and medicines. Finland, Estonia, Latvia, Lithuania, the Netherlands, Belgium, and Poland have all issued similar guidance. NATO's Secretary-General told security experts in December 2024: "It is time to shift to a wartime mindset." These are official government documents, distributed to millions of households, in the same countries that host the infrastructure described in sections 00–05.

~20 min read Free — Euronews, April 2025
The thread — PROMIS, Maxwell, Casolaro, Epstein

In 1982, the US Department of Justice allegedly stole PROMIS — a law enforcement tracking system — backdoored it, and distributed copies to intelligence agencies worldwide. Robert Maxwell, British media mogul and father of Ghislaine Maxwell, was suspected by the British Foreign Office of being an agent of a foreign government; his state funeral in Jerusalem was attended by the sitting Israeli Prime Minister, President, and at least six heads of intelligence. He is alleged to have distributed the backdoored PROMIS software to Sandia National Laboratories and Los Alamos. Danny Casolaro was investigating Maxwell as a node in this network when he was found dead in a hotel bathtub in 1991, his research notes missing. Jeffrey Epstein became Ghislaine Maxwell's closest associate. US Attorney Acosta, who buried the federal case against Epstein in 2008, later acknowledged he had been told Epstein "belonged to intelligence." These are documented facts. The line connecting them is left to the reader.

The journalist Danny Casolaro and the Octopus — Wikipedia

Found dead in a hotel bathtub in 1991, his research notes missing, while investigating a network he called "the Octopus" — connecting PROMIS, Iran-Contra, BCCI, and intelligence agencies across multiple governments. He had told his brother: if anything happens to me, it won't be an accident. The Netflix docuseries American Conspiracy: The Octopus Murders (2024) revisits the case with newly uncovered material.

~30 min read Free — Wikipedia. Netflix docuseries available separately.
The intelligence node Robert Maxwell — the documented record

Father of Ghislaine Maxwell. Formally suspected by the British Foreign Office of being a secret agent of a foreign government. Found floating in the Atlantic in November 1991 — the same year as Casolaro — officially ruled accidental. His Jerusalem state funeral was attended by the sitting Israeli Prime Minister, President, and at least six heads of intelligence. Shamir eulogized: "He has done more for Israel than can today be said."

~25 min read Free — Wikipedia, sourced from British parliamentary record, Sunday Times, Foreign Office documents
The operator Jeffrey Epstein — what the public record shows

Rose from junior assistant to limited partner at Bear Stearns in five years with no college degree and a falsified résumé, then departed during an SEC probe. The decade that followed is documented as "the most opaque phase of his entire life." He told associates he worked as an intelligence agent. The US Attorney who buried the federal case in 2008 later acknowledged he had been told Epstein "belonged to intelligence." Miami Herald journalist Julie K. Brown's "Perversion of Justice" series re-opened the case. Epstein died in his cell in 2019. Two medical examiners reached different conclusions.

~35 min read Free — Wikipedia. Miami Herald "Perversion of Justice": miamiherald.com
The money Les Wexner, Victoria's Secret, and the unexplained fortune

Victoria's Secret founder Les Wexner transferred his Manhattan townhouse to Epstein for $0 and granted him power of attorney over his financial affairs. How a man with no verified clients and an opaque decade on his résumé became the primary financial beneficiary of one of America's wealthiest men has never been officially explained. The Hulu documentary Victoria's Secret: Angels and Demons (2022) examines the relationship.

~20 min read + documentary Free — Wikipedia. Hulu documentary available with subscription.
Before you act — what the internet actually is

Signal and Firefox are not solutions.
They are the minimum floor of dignity.

The guide you just read documented what governments and corporations have done with the internet. This section is about what the internet is — the technical foundation beneath every tool, every app, every encrypted message. Because the people who built it have been saying for thirty years that they built it wrong. And that changes what "taking action" actually means.

It was designed for people who trusted each other. The early internet — the 1970s ARPANET — was a small network of university researchers and government scientists who all knew each other. Nobody locked the doors because nobody expected strangers. When you saw in section 01 that the NSA was collecting data directly from Google and Microsoft's servers, you might have wondered: why couldn't Google just stop them? Part of the answer is legal and political. But part of the answer is structural: the plumbing beneath Google's servers was never designed to verify who has a right to be there. Vint Cerf, one of the architects of the internet's core protocols, has said publicly that security was not a design priority and that this was a mistake. The assumption of good faith is literally baked into the infrastructure.

Your data takes a physical path — and nobody controls that path. When you send a message or load a page, your data is broken into packets and routed across dozens of physical networks owned by different companies and governments. The protocol that decides this routing — BGP — has no way to verify that any given network is who it claims to be. Anyone can announce a route. In 2010, a significant portion of US internet traffic, including military and government communications, was briefly routed through Chinese servers due to a BGP announcement. It lasted 18 minutes. It was logged. The structural vulnerability remains unremediated. This is the layer beneath the VPNs, beneath the encrypted apps, beneath everything. It's the road the data travels on, and the road has no passport control.

The padlock is real — and limited. You've seen the padlock icon in your browser that means a connection is encrypted. This is real and meaningful — it means your data can't easily be read in transit. But the padlock depends on a system of organizations called certificate authorities whose signatures your browser is pre-programmed to trust. Several of these have been compromised by hackers. Some are operated by state actors. When DigiNotar — a Dutch certificate authority — was hacked in 2011, attackers issued fraudulent certificates that allowed surveillance of Iranian dissidents' encrypted traffic. The encryption worked. The trust chain didn't. A valid padlock tells you your connection is encrypted. It doesn't tell you whether the organization vouching for that encryption is itself trustworthy.

Encryption works. Jurisdiction doesn't care. In section 04 you read about Schrems winning in the European Court of Justice — the legal argument that EU citizens' data couldn't be sent to US servers because US surveillance law violated their rights. That ruling was about jurisdiction overriding technical protection. The Proton Mail case in 2021 is the same lesson at the individual level. Proton Mail is Swiss, uses end-to-end encryption, and was specifically chosen by a French climate activist because it was considered the most private email provider available. In 2021, Swiss authorities legally compelled Proton to log the activist's IP address and hand over metadata. Proton complied — they were legally required to. The encryption worked perfectly. The state walked around it. This is not a criticism of Proton; they behaved exactly as an honest company operating under law should. It is an illustration of the limit: the math holds, and the jurisdiction doesn't care about the math.

Signal is still worth using. Firefox with uBlock Origin is still worth using. They raise the cost of surveillance significantly. But they are tools built on a foundation that was designed for trust, not security, by people who have since said they got it wrong. Use them. And use them with clear eyes about what they are.

The routing problem BGP hijacking — Wikipedia

The documented history of internet traffic being redirected by unauthenticated routing announcements — including the 2010 China Telecom incident, the 2018 route leak that took down Google services, and ongoing cases. The structural vulnerability is not theoretical. It has happened repeatedly and remains unremediated at the protocol level.

~20 min read Free — Wikipedia, extensively sourced
The padlock failure DigiNotar — the Dutch certificate authority that was compromised (2011)

DigiNotar was a Dutch company trusted by browsers worldwide to vouch for encrypted connections. In 2011 it was hacked, and fraudulent certificates were issued that allowed attackers to intercept encrypted traffic — including that of Iranian dissidents using Gmail. The padlock showed green. The surveillance happened anyway. DigiNotar went bankrupt within weeks. The trust model it exposed has not fundamentally changed.

~15 min read Free — Wikipedia. Particularly relevant: it was a Dutch company.
Encryption vs jurisdiction Proton Mail's own account of the 2021 IP logging case

Proton's own transparency report explaining what happened, why they complied, and what it means. Worth reading because it is unusually honest: Proton did not hide what occurred, did not pretend the encryption protected everything, and explains clearly where the limits of technical protection end and legal jurisdiction begins. The encryption worked. The law walked around it.

~15 min read Free — Proton.me blog
What to do with this

Secure your foundation. Interrogate the guide. Take it public.

Three steps — in order. The first protects you. The second sharpens your thinking. The third is where it matters.

Step 2 — Interrogate this guide

This guide was built in dialogue with Claude — an AI system made by Anthropic. Don't take its framing on faith. Take the guide to Claude yourself and ask it to challenge everything you just read. Copy and paste this prompt:

I just read a guide called "See Clearly" at see-clearly.gridlogicfoundation.org — assembled in conversation with you. I want you to steelman the skeptical case against it. What facts does it get wrong, what context does it omit, and what would a well-informed person who disagrees with its framing say?

→ Any generative AI tool will do. The practice of inquiry matters more than the platform.

Step 3 — Take it public

You've read it. Now say something. Post your reflection — what landed, what you disputed, what you went and verified yourself. Disagree publicly. The record can handle it. The conversation belongs to no institution, party, or platform.

#SeeClearly

→ Use the tag on any platform. Link back to this page if it helped.

Built with Claude — a note on what that means

This guide was built in extended conversation with Claude, an AI system made by Anthropic. Not as a search engine — as a thinking partner. The sequencing decisions (Church Committee before Snowden, Maxwell before Epstein, the pager attack as doctrine rather than incident), the framing choices, the specific resources — all emerged through dialogue, challenged and refined over hours of back-and-forth with a human who knew the subject and pushed back on every easy answer.

The argument made in that conversation: generative AI might actually be a tool that moves toward greater truth — not because it is neutral or infallible, but because it lowers the cost of careful, sourced, documented inquiry for anyone willing to do the work. These systems can synthesize across domains, hold contradictions in tension, flag their own uncertainty, and be challenged directly when wrong. That's different from a search engine returning ranked results, and different from an expert with a fixed position to defend.

This guide is offered as evidence for that proposition. The step 2 prompt above is an invitation to test it. Ask any generative AI tool of your choice to find the holes in this guide's argument, to steelman the opposing view, to identify what was omitted and why it might matter. If the guide holds up under that scrutiny, it's stronger for it. If it doesn't, you'll have learned something more useful than the guide itself.

The surveillance architecture was built in plain sight. The tools to understand it are available to anyone. The conversation is open.