COINTELPRO was the FBI's covert program to surveil, infiltrate, and destabilize American political organizations from 1956 to 1971. Its targets included Martin Luther King Jr. — the FBI wiretapped his phones, infiltrated his inner circle, attempted to prevent him receiving the Nobel Peace Prize, and sent him an anonymous package containing recordings of his private life alongside a letter urging him to kill himself. The FBI's own documents describe the goal as preventing the rise of a "Black messiah." The program also targeted Malcolm X and the Nation of Islam, the NAACP, anti-Vietnam War organizations, feminist groups, and the Socialist Workers Party. These were not foreign threats. They were American citizens exercising constitutional rights. The systematic targeting of Black political leadership — before, during, and after the Civil Rights Movement — is the documented record. The Church Committee uncovered this in 1975. The surveillance impulse did not begin with 9/11, or the internet, or the Cold War.
A bipartisan Senate investigation that documented COINTELPRO, MKULTRA (government mind-control experiments on unwitting citizens), assassination plots against foreign leaders, and mass warrantless surveillance — all conducted by intelligence agencies operating within their own self-designed legal frameworks. Not disputed. Not a theory. In the congressional record. The executive summary reads like a thriller. It also documented the CIA's systematic use of private contractors — including Wackenhut Corporation — to conduct operations with deniability, a structure that reappears in section 07.
An Academy Award-winning documentary filmed in real time as Edward Snowden hands classified NSA documents to journalists in a Hong Kong hotel room. Having read the Church Committee, you already know the institutional appetite. Now you see what it looks like when the full power of the digital age is behind it. Free on Tubi with ads.
The first publication of the NSA's PRISM program documents — describing the collection of emails, chats, photos, voice and video calls, and stored data directly from the servers of Microsoft, Google, Apple, Facebook, YouTube, and Skype. Read the article, then follow through to the actual slides.
The actual NSA internal slides, preserved by the Internet Archive from the original Washington Post and Guardian publications. Not a journalist's characterization — the presentation itself, in the agency's own words and PowerPoint formatting. 117,675 active surveillance targets as of April 5, 2013. These slides were never meant to be seen.
Thomas Drake, William Binney, and Mark Klein all tried to report NSA mass surveillance through official channels before Snowden. Drake was prosecuted under the Espionage Act, facing 35 years in prison, before charges were largely dropped. Binney, a 36-year NSA veteran who designed some of the surveillance systems, went to Congress and the Inspector General — and was raided at gunpoint by the FBI. Klein, an AT&T technician, documented a secret room at the San Francisco switching center routing internet traffic to the NSA in 2004. All three were dismissed, prosecuted, or ignored. Then Snowden published the same information and the world paid attention. Read Drake's Wikipedia page, then ask why you hadn't heard of him before.
When the FBI demanded Apple unlock a shooter's iPhone, both sides had to describe the operating system's architecture accurately in order to argue about it in federal court. The FBI ultimately paid over $1 million to a third-party to break in — raising a more unsettling question than the legal one: if someone can be paid to get in, is anything actually private?
A precise economic analysis of how platforms are designed to first capture users, then business customers, then extract from both — using market structure logic rather than moral panic. The mechanism applies directly to every operating system and app ecosystem you use. Worth reading twice.
On July 19, 2024, a single faulty software update from one cybersecurity company crashed 8.5 million Windows systems worldwide simultaneously. Hospitals lost patient records. Airlines grounded thousands of flights. 911 emergency services went down. Banks and ATMs stopped working. Estimated financial damage: $10 billion. The former general counsel of the NSA said afterward: "Something like this is probably going to happen again."
Every advanced chip in every device you own was almost certainly manufactured in Taiwan. One company — TSMC — produces over 90% of the world's most advanced semiconductors. The physical substrate of global computing power sits in a single island at the center of the world's most volatile geopolitical flashpoint. The EU CHIPS Act, the US CHIPS and Science Act, Japan's semiconductor subsidies — these are emergency measures, not routine policy. A 32GB RAM kit that cost £79 in September 2025 cost £351 by January 2026. That is what supply chain concentration looks like in practice.
The definitive history of how semiconductor manufacturing became the central geopolitical contest of the 21st century. Controlling advanced chips is like controlling oil in the 20th century — but far more geographically concentrated. Pulitzer Prize finalist.
Article 12 states: "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence." This is the bedrock on which everything in sections 00–03 represents a violation, and on which everything that follows is built. It was adopted on December 10, 1948, three years after the Second World War demonstrated what states do when they have unlimited access to their citizens' private lives. The drafters knew exactly what they were codifying and why.
You already know GDPR (2018), which established that Europeans have enforceable rights over their personal data — a direct descendant of Article 12. The DMA is the next chapter: Brussels' binding acknowledgment that the market has failed to self-correct and structural intervention is required. If GDPR said "your data belongs to you," the DMA says "these platforms have accumulated too much structural power over how you access everything else."
In 2013 — the same year Citizenfour was filmed — Austrian lawyer Max Schrems filed a complaint arguing that what Snowden revealed made transferring European data to American tech companies incompatible with EU fundamental rights, directly descended from Article 12. He took the case twice to the European Court of Justice. He won both times. The EU–US Privacy Shield was struck down. Every person in Europe whose email, messages, or files live on Google, Microsoft, or Meta infrastructure is directly affected. The court agreed.
A Harvard professor's exhaustively documented argument that Google, Facebook, and their peers built their business models on the prediction and modification of human behavior using data extracted without meaningful consent. Start with chapters 3 and 4. The central claim: surveillance wasn't a side effect of the business model. It was the business model, from the beginning.
A New York Times cybersecurity journalist documenting the zero-day exploit market — a real, verifiable market where governments pay millions for secret software vulnerabilities to deploy as offensive weapons. Named participants. Documented transactions. Democratic governments including European ones are buyers.
The first book the US government ever went to federal court to censor before publication. Written by a former CIA officer and a State Department analyst. The government demanded 168 passages be deleted; 27 were restored after legal challenge. The censored passages are marked in the published text. Read what they tried to hide, and draw your own conclusions about why.
Stuxnet was a surgical strike. It was also an instruction manual. Once security researchers reverse-engineered it in 2010, the architecture was published in academic papers, conference talks, and eventually open source repositories. North Korea's Lazarus Group, Russia's Sandworm, Iranian cyber units, criminal ransomware operators — all studied it. DOGE's reported access to federal payment systems in 2025 uses techniques documented in that same lineage. The architecture became a template. A capability once owned by the wealthiest states became accessible to any sufficiently motivated actor.
Jointly built by US and Israeli intelligence, Stuxnet was delivered via USB stick and caused Iranian centrifuges to physically destroy themselves while reporting normal operation to human operators. It destroyed approximately 1,000 centrifuges. Its designers noted the architecture could be adapted for power plants, factory assembly lines, and water treatment facilities anywhere. State-sponsored cyber offense programs across the world accelerated immediately after its discovery.
Israeli intelligence embedded explosive charges inside 5,000 pagers delivered through normal commercial channels. A single signal detonated them simultaneously — 42 killed, 3,500 injured. Hezbollah had switched to pagers specifically to avoid smartphone surveillance. The UN human rights chief called it "a new development in warfare, where communication tools become weapons." The supply chain itself — the ordinary infrastructure of global commerce — had become the delivery mechanism.
Iran built one of the world's most active cyber offense programs in direct response to Stuxnet. North Korea's Lazarus Group has stolen billions to fund state programs. Russia's Sandworm targeted Ukrainian power grids. Iranian groups now target US water treatment plants and hospital systems through default passwords on industrial control systems. Since the direct military escalation beginning in 2025, the cyber front has intensified across all parties simultaneously. The template is shared. The proliferation is global.
Sweden distributed a civil defense booklet to every household. Germany updated its Framework Directive for Overall Defense. The European Commission urged all EU citizens to stockpile 72 hours of food, water, and medicines. Finland, Estonia, Latvia, Lithuania, the Netherlands, Belgium, Poland, and others have all issued similar guidance. NATO's Secretary-General said in December 2024: "It is time to shift to a wartime mindset." These are official government documents distributed to millions of households in the same countries that host the infrastructure described in sections 00–05.
In 1982, the US Department of Justice stole PROMIS — a law enforcement tracking system built by Inslaw Inc. — and distributed copies to intelligence agencies worldwide. Wackenhut Corporation, documented in the Church Committee as a CIA contractor used for deniable operations, was connected to the technical development of the backdoored PROMIS distribution. Robert Maxwell, British media mogul and father of Ghislaine Maxwell, is alleged to have distributed the backdoored PROMIS software to national laboratories including Sandia and Los Alamos. He was formally suspected by multiple intelligence services of being a foreign intelligence asset. Danny Casolaro was investigating Maxwell as a node in this network when he was found dead in 1991, his research notes missing. Jeffrey Epstein became Ghislaine Maxwell's closest associate. The US Attorney who buried the federal case against Epstein in 2008 acknowledged he had been told Epstein "belonged to intelligence." These are documented facts in the public record.
Found dead in a hotel bathtub in 1991, his research notes missing, while investigating a network he called "the Octopus" — connecting PROMIS, Iran-Contra, BCCI, and intelligence agencies across multiple governments. He had told his brother: if anything happens to me, it won't be an accident. His investigation was dismissed as conspiracy thinking by outlets that later confirmed portions of what he was tracking. The Netflix docuseries American Conspiracy: The Octopus Murders (2024) revisits the case with newly uncovered material — and honestly documents the experience of following evidence that sounds impossible until it isn't.
Father of Ghislaine Maxwell. Suspected by multiple intelligence services of being a foreign intelligence asset. Found floating in the Atlantic in November 1991 — the same year as Casolaro — officially ruled accidental. His Jerusalem state funeral was attended by the sitting Israeli Prime Minister, President, and at least six heads of intelligence. Shamir eulogized: "He has done more for Israel than can today be said." Seymour Hersh alleged Maxwell's Mossad connections in The Samson Option (1991) — Maxwell filed a defamation lawsuit against Hersh on October 24, 1991. He was found dead eleven days later.
Rose from junior assistant to limited partner at Bear Stearns in five years with no college degree and a falsified résumé, then departed during an SEC probe. The decade that followed is documented as "the most opaque phase of his entire life." He told associates he worked as an intelligence agent. The US Attorney who buried the federal case in 2008 later acknowledged he had been told Epstein "belonged to intelligence." Miami Herald journalist Julie K. Brown's "Perversion of Justice" series re-opened the case. Epstein died in his cell in 2019. Two medical examiners reached different conclusions.
Victoria's Secret founder Les Wexner transferred his Manhattan townhouse to Epstein for $0 and granted him power of attorney over his financial affairs. How a man with no verified clients and an opaque decade became the primary financial beneficiary of one of America's wealthiest people remains officially unexplained. The Hulu documentary Victoria's Secret: Angels and Demons (2022) examines the relationship.
Bernays was Sigmund Freud's nephew. Having worked on wartime propaganda for the Wilson administration during WWI, he spent the 1920s developing what he called "the engineering of consent" — the systematic use of psychological techniques to manage public opinion for commercial and political ends. He considered this not a corruption of democracy but its necessary function. Goebbels read his work and used it as a basis for the Nazi propaganda ministry — Bernays learned this from a Hearst correspondent in 1933 and wrote about it in his 1965 autobiography. This book, published in 1928, is freely available and in the public domain.
After World War II, the US government recruited over 1,600 German scientists, engineers, and intelligence operatives — many of them active Nazis, some implicated in war crimes — and gave them new identities and positions in American military, scientific, and intelligence programs. Officials in the Joint Intelligence Objectives Agency actively falsified or suppressed their records, overriding President Truman's directive against recruiting Nazi party members. The propaganda and psychological warfare expertise developed under Goebbels — built in part on Bernays' methods — did not disappear with the Reich. It was recruited, absorbed, and put to work under new management.
A four-part BBC documentary tracing Bernays' influence from the 1920s through commercial advertising, political campaigning, and the emergence of the "self" as the primary unit of democratic society. Curtis shows how the techniques developed to sell soap and cigarettes became the architecture of modern politics — and how the same underlying belief runs uninterrupted from Lippmann and Bernays through Madison Avenue through the intelligence community through algorithmic feeds. Freely available on the Internet Archive. Start with episode one: "Happiness Machines."
What the internet was designed to be — and what it wasn't.
The early internet was a small network of university researchers and government scientists who knew each other. Authentication was an afterthought. Vint Cerf, one of the architects of the core protocols, has said publicly that security was not a design priority and that this was a mistake.
When you send a message, your data is broken into packets and routed across dozens of physical networks owned by different companies and governments. The protocol that decides this routing — BGP — has no cryptographic authentication built in. Any network can announce a route. In 2010, a significant portion of US internet traffic, including military and government communications, was briefly routed through Chinese servers. It lasted 18 minutes. It was logged. The structural vulnerability remains unremediated.
The padlock icon in your browser means a connection is encrypted in transit. It depends on organizations called certificate authorities whose signatures your browser is pre-programmed to trust. In 2011, a Dutch certificate authority called DigiNotar was hacked. Fraudulent certificates were issued. Iranian dissidents' encrypted Gmail traffic was intercepted. The padlock showed green. DigiNotar went bankrupt within weeks.
In 2021, Swiss authorities legally compelled Proton Mail — chosen by a French climate activist specifically for its privacy protections — to log IP addresses and hand over metadata. Proton complied. They were legally required to. The encryption was not broken. The data was handed over.
The documented history of internet traffic being redirected by unauthenticated routing announcements — the 2010 China Telecom incident, the 2018 route leak that took down Google services, and ongoing cases. The structural vulnerability remains unremediated at the protocol level.
A Dutch company trusted by browsers worldwide to vouch for encrypted connections. Hacked in 2011, fraudulent certificates issued, Iranian dissidents' encrypted Gmail traffic intercepted. The padlock showed green. DigiNotar went bankrupt within weeks.
Proton's own transparency report explaining what happened and why they complied, including where technical protection ends and legal jurisdiction begins.
Secure your foundation. Interrogate the guide. Take it public.
Three steps — in order. The first protects you. The second sharpens your thinking. The third is where it matters.
Before you do: read the companion piece New Eyes — How to Read Power. It documents exactly what a generative AI system will likely do with this material by default, and gives you the tools to push past it. Then come back and use this prompt.
→ Use any generative AI tool of your choice.
You've read it. Now say something. Post your reflection — what landed, what you disputed, what you went and verified yourself. Disagree publicly. The conversation belongs to no institution, party, or platform.
→ Use the tag on any platform. Link back to this page if it helped.
This guide was built in extended conversation with Claude, an AI system made by Anthropic. Not as a search engine — as a thinking partner. The sequencing decisions, the framing choices, the specific resources — all emerged through dialogue, challenged and refined over hours of back-and-forth with a human who knew the subject and pushed back on every easy answer.
Generative AI systems are trained on data that reflects mainstream consensus and official epistemology. This means they may systematically apply asymmetric skepticism — placing the burden of proof on accounts that challenge official versions, while granting the official account an unexamined baseline. The companion piece New Eyes — How to Read Power documents this mechanism operating in real time, and gives you the tools to push past it. Read it before you take this guide to any AI system for interrogation.
The step 2 prompt above is an invitation to test whether this guide holds up under genuine scrutiny. If it does, it's stronger for it. If it doesn't, you'll have learned something more useful than the guide itself. What the system affirms readily — and what it resists affirming despite the evidence — is part of the picture.
The surveillance architecture was built in plain sight. The tools to understand it are available to anyone. The conversation is open.