Skip to content
A reading path

The architecture
was built in plain sight.

You've probably felt it — that something fundamental has shifted in who controls information, computing power, and the infrastructure of daily life. This path is an invitation to look at the evidence directly. No speculation required.

The question "who is they?" has a surprisingly boring answer: publicly traded companies, congressional committees, and federal agencies — all acting within the law, most of it disclosed in terms of service nobody reads and court filings nobody follows. The surveillance architecture wasn't hidden. And — as the first section shows — it wasn't new.

What COINTELPRO actually did — context for readers outside the US

COINTELPRO was the FBI's covert program to surveil, infiltrate, and destabilize American political organizations from 1956 to 1971. Its targets included Martin Luther King Jr. — the FBI wiretapped his phones, infiltrated his inner circle, attempted to prevent him receiving the Nobel Peace Prize, and sent him an anonymous package containing recordings of his private life alongside a letter urging him to kill himself. The FBI's own documents describe the goal as preventing the rise of a "Black messiah." The program also targeted Malcolm X and the Nation of Islam, the NAACP, anti-Vietnam War organizations, feminist groups, and the Socialist Workers Party. These were not foreign threats. They were American citizens exercising constitutional rights. The systematic targeting of Black political leadership — before, during, and after the Civil Rights Movement — is the documented record. The Church Committee uncovered this in 1975. The surveillance impulse did not begin with 9/11, or the internet, or the Cold War.

Anchor document The Church Committee — US Senate (1975–76)

A bipartisan Senate investigation that documented COINTELPRO, MKULTRA (government mind-control experiments on unwitting citizens), assassination plots against foreign leaders, and mass warrantless surveillance — all conducted by intelligence agencies operating within their own self-designed legal frameworks. Not disputed. Not a theory. In the congressional record. The executive summary reads like a thriller. It also documented the CIA's systematic use of private contractors — including Wackenhut Corporation — to conduct operations with deniability, a structure that reappears in section 07.

~2 hrs (executive summary) Free PDF — US Senate archive. Large file, opens directly in browser.
Watch first — free Citizenfour — Laura Poitras (2014)

An Academy Award-winning documentary filmed in real time as Edward Snowden hands classified NSA documents to journalists in a Hong Kong hotel room. Having read the Church Committee, you already know the institutional appetite. Now you see what it looks like when the full power of the digital age is behind it. Free on Tubi with ads.

1h 54m Free on Tubi — no subscription required
Then read The original PRISM reporting — The Guardian (June 6, 2013)

The first publication of the NSA's PRISM program documents — describing the collection of emails, chats, photos, voice and video calls, and stored data directly from the servers of Microsoft, Google, Apple, Facebook, YouTube, and Skype. Read the article, then follow through to the actual slides.

~15 min read Free — The Guardian archive
Primary source The PRISM slides — Internet Archive

The actual NSA internal slides, preserved by the Internet Archive from the original Washington Post and Guardian publications. Not a journalist's characterization — the presentation itself, in the agency's own words and PowerPoint formatting. 117,675 active surveillance targets as of April 5, 2013. These slides were never meant to be seen.

~20 min Free — Internet Archive, permanently preserved
Context The whistleblowers who came before — and what happened to them

Thomas Drake, William Binney, and Mark Klein all tried to report NSA mass surveillance through official channels before Snowden. Drake was prosecuted under the Espionage Act, facing 35 years in prison, before charges were largely dropped. Binney, a 36-year NSA veteran who designed some of the surveillance systems, went to Congress and the Inspector General — and was raided at gunpoint by the FBI. Klein, an AT&T technician, documented a secret room at the San Francisco switching center routing internet traffic to the NSA in 2004. All three were dismissed, prosecuted, or ignored. Then Snowden published the same information and the world paid attention. Read Drake's Wikipedia page, then ask why you hadn't heard of him before.

~25 min read Free — Wikipedia. Search also: William Binney NSA, Mark Klein AT&T
Cloud infrastructure The CrowdStrike outage of July 2024 — the largest IT failure in history

On July 19, 2024, a single faulty software update from one cybersecurity company crashed 8.5 million Windows systems worldwide simultaneously. Hospitals lost patient records. Airlines grounded thousands of flights. 911 emergency services went down. Banks and ATMs stopped working. Estimated financial damage: $10 billion. The former general counsel of the NSA said afterward: "Something like this is probably going to happen again."

~20 min read Free — Wikipedia, extensively sourced
Hardware concentration Taiwan and the semiconductor chokepoint

Every advanced chip in every device you own was almost certainly manufactured in Taiwan. One company — TSMC — produces over 90% of the world's most advanced semiconductors. The physical substrate of global computing power sits in a single island at the center of the world's most volatile geopolitical flashpoint. The EU CHIPS Act, the US CHIPS and Science Act, Japan's semiconductor subsidies — these are emergency measures, not routine policy. A 32GB RAM kit that cost £79 in September 2025 cost £351 by January 2026. That is what supply chain concentration looks like in practice.

~20 min read Free — Institute for Economics & Peace
Book Chris Miller — Chip War (2022)

The definitive history of how semiconductor manufacturing became the central geopolitical contest of the 21st century. Controlling advanced chips is like controlling oil in the 20th century — but far more geographically concentrated. Pulitzer Prize finalist.

~8 hrs reading Book — widely available. Wikipedia link for overview.
Book Shoshana Zuboff — The Age of Surveillance Capitalism (2019)

A Harvard professor's exhaustively documented argument that Google, Facebook, and their peers built their business models on the prediction and modification of human behavior using data extracted without meaningful consent. Start with chapters 3 and 4. The central claim: surveillance wasn't a side effect of the business model. It was the business model, from the beginning.

~15 hrs (full) / ~3 hrs (chs. 3–4) Book — widely available. Wikipedia link for overview.
Book Nicole Perlroth — This Is How They Tell Me the World Ends (2021)

A New York Times cybersecurity journalist documenting the zero-day exploit market — a real, verifiable market where governments pay millions for secret software vulnerabilities to deploy as offensive weapons. Named participants. Documented transactions. Democratic governments including European ones are buyers.

~12 hrs reading Book — widely available. Wikipedia link for overview.
Book Marchetti & Marks — The CIA and the Cult of Intelligence (1974)

The first book the US government ever went to federal court to censor before publication. Written by a former CIA officer and a State Department analyst. The government demanded 168 passages be deleted; 27 were restored after legal challenge. The censored passages are marked in the published text. Read what they tried to hide, and draw your own conclusions about why.

~10 hrs reading Book — widely available. Censorship documented in the preface.
The egalitarian backlash — Stuxnet as proof of concept for everyone

Stuxnet was a surgical strike. It was also an instruction manual. Once security researchers reverse-engineered it in 2010, the architecture was published in academic papers, conference talks, and eventually open source repositories. North Korea's Lazarus Group, Russia's Sandworm, Iranian cyber units, criminal ransomware operators — all studied it. DOGE's reported access to federal payment systems in 2025 uses techniques documented in that same lineage. The architecture became a template. A capability once owned by the wealthiest states became accessible to any sufficiently motivated actor.

The proof of concept Stuxnet — the worm that crossed from digital into physical (2010)

Jointly built by US and Israeli intelligence, Stuxnet was delivered via USB stick and caused Iranian centrifuges to physically destroy themselves while reporting normal operation to human operators. It destroyed approximately 1,000 centrifuges. Its designers noted the architecture could be adapted for power plants, factory assembly lines, and water treatment facilities anywhere. State-sponsored cyber offense programs across the world accelerated immediately after its discovery.

~30 min read Free — Wikipedia, sourced from NYT, IEEE Spectrum, Kaspersky
The supply chain becomes a weapon The Hezbollah pager attack — September 2024

Israeli intelligence embedded explosive charges inside 5,000 pagers delivered through normal commercial channels. A single signal detonated them simultaneously — 42 killed, 3,500 injured. Hezbollah had switched to pagers specifically to avoid smartphone surveillance. The UN human rights chief called it "a new development in warfare, where communication tools become weapons." The supply chain itself — the ordinary infrastructure of global commerce — had become the delivery mechanism.

~20 min read Free — Wikipedia, sourced from NYT, Reuters, CNN, Guardian
The active front Cyberwarfare and the global proliferation — from Iran to everywhere

Iran built one of the world's most active cyber offense programs in direct response to Stuxnet. North Korea's Lazarus Group has stolen billions to fund state programs. Russia's Sandworm targeted Ukrainian power grids. Iranian groups now target US water treatment plants and hospital systems through default passwords on industrial control systems. Since the direct military escalation beginning in 2025, the cyber front has intensified across all parties simultaneously. The template is shared. The proliferation is global.

~30 min read Free — Wikipedia, continuously updated
The governments are telling you Civil defense guidance across NATO member states (2024–present)

Sweden distributed a civil defense booklet to every household. Germany updated its Framework Directive for Overall Defense. The European Commission urged all EU citizens to stockpile 72 hours of food, water, and medicines. Finland, Estonia, Latvia, Lithuania, the Netherlands, Belgium, Poland, and others have all issued similar guidance. NATO's Secretary-General said in December 2024: "It is time to shift to a wartime mindset." These are official government documents distributed to millions of households in the same countries that host the infrastructure described in sections 00–05.

~20 min read Free — Euronews, April 2025
The thread — PROMIS, Wackenhut, Maxwell, Casolaro, Epstein

In 1982, the US Department of Justice stole PROMIS — a law enforcement tracking system built by Inslaw Inc. — and distributed copies to intelligence agencies worldwide. Wackenhut Corporation, documented in the Church Committee as a CIA contractor used for deniable operations, was connected to the technical development of the backdoored PROMIS distribution. Robert Maxwell, British media mogul and father of Ghislaine Maxwell, is alleged to have distributed the backdoored PROMIS software to national laboratories including Sandia and Los Alamos. He was formally suspected by multiple intelligence services of being a foreign intelligence asset. Danny Casolaro was investigating Maxwell as a node in this network when he was found dead in 1991, his research notes missing. Jeffrey Epstein became Ghislaine Maxwell's closest associate. The US Attorney who buried the federal case against Epstein in 2008 acknowledged he had been told Epstein "belonged to intelligence." These are documented facts in the public record.

The journalist Danny Casolaro and the Octopus — Wikipedia

Found dead in a hotel bathtub in 1991, his research notes missing, while investigating a network he called "the Octopus" — connecting PROMIS, Iran-Contra, BCCI, and intelligence agencies across multiple governments. He had told his brother: if anything happens to me, it won't be an accident. His investigation was dismissed as conspiracy thinking by outlets that later confirmed portions of what he was tracking. The Netflix docuseries American Conspiracy: The Octopus Murders (2024) revisits the case with newly uncovered material — and honestly documents the experience of following evidence that sounds impossible until it isn't.

~30 min read Free — Wikipedia. Netflix docuseries available separately.
The intelligence node Robert Maxwell — the Samson Option and the documented record

Father of Ghislaine Maxwell. Suspected by multiple intelligence services of being a foreign intelligence asset. Found floating in the Atlantic in November 1991 — the same year as Casolaro — officially ruled accidental. His Jerusalem state funeral was attended by the sitting Israeli Prime Minister, President, and at least six heads of intelligence. Shamir eulogized: "He has done more for Israel than can today be said." Seymour Hersh alleged Maxwell's Mossad connections in The Samson Option (1991) — Maxwell filed a defamation lawsuit against Hersh on October 24, 1991. He was found dead eleven days later.

~25 min read Free — Wikipedia. Hersh's The Samson Option available widely.
The operator Jeffrey Epstein — what the public record shows

Rose from junior assistant to limited partner at Bear Stearns in five years with no college degree and a falsified résumé, then departed during an SEC probe. The decade that followed is documented as "the most opaque phase of his entire life." He told associates he worked as an intelligence agent. The US Attorney who buried the federal case in 2008 later acknowledged he had been told Epstein "belonged to intelligence." Miami Herald journalist Julie K. Brown's "Perversion of Justice" series re-opened the case. Epstein died in his cell in 2019. Two medical examiners reached different conclusions.

~35 min read Free — Wikipedia. Miami Herald "Perversion of Justice": miamiherald.com
The money Les Wexner, Victoria's Secret, and the unexplained fortune

Victoria's Secret founder Les Wexner transferred his Manhattan townhouse to Epstein for $0 and granted him power of attorney over his financial affairs. How a man with no verified clients and an opaque decade became the primary financial beneficiary of one of America's wealthiest people remains officially unexplained. The Hulu documentary Victoria's Secret: Angels and Demons (2022) examines the relationship.

~20 min read + documentary Free — Wikipedia. Hulu documentary available with subscription.
Primary source — public domain Edward Bernays — Propaganda (1928)

Bernays was Sigmund Freud's nephew. Having worked on wartime propaganda for the Wilson administration during WWI, he spent the 1920s developing what he called "the engineering of consent" — the systematic use of psychological techniques to manage public opinion for commercial and political ends. He considered this not a corruption of democracy but its necessary function. Goebbels read his work and used it as a basis for the Nazi propaganda ministry — Bernays learned this from a Hearst correspondent in 1933 and wrote about it in his 1965 autobiography. This book, published in 1928, is freely available and in the public domain.

~3 hrs (full) / 15 min (chapter 1) Free — Wikisource, public domain
The transfer Operation Paperclip — Nazi expertise absorbed into American institutions (1945–1959)

After World War II, the US government recruited over 1,600 German scientists, engineers, and intelligence operatives — many of them active Nazis, some implicated in war crimes — and gave them new identities and positions in American military, scientific, and intelligence programs. Officials in the Joint Intelligence Objectives Agency actively falsified or suppressed their records, overriding President Truman's directive against recruiting Nazi party members. The propaganda and psychological warfare expertise developed under Goebbels — built in part on Bernays' methods — did not disappear with the Reich. It was recruited, absorbed, and put to work under new management.

~25 min read Free — Wikipedia. Annie Jacobsen's book Operation Paperclip (2014) is the definitive account.
Documentary — free Adam Curtis — The Century of the Self (2002)

A four-part BBC documentary tracing Bernays' influence from the 1920s through commercial advertising, political campaigning, and the emergence of the "self" as the primary unit of democratic society. Curtis shows how the techniques developed to sell soap and cigarettes became the architecture of modern politics — and how the same underlying belief runs uninterrupted from Lippmann and Bernays through Madison Avenue through the intelligence community through algorithmic feeds. Freely available on the Internet Archive. Start with episode one: "Happiness Machines."

4 hrs (full series) Free — Internet Archive, all four episodes
"The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our country. We are governed, our minds are molded, our tastes formed, our ideas suggested, largely by men we have never heard of."
— Edward Bernays, Propaganda, 1928. He was not warning you. He was describing his profession.
The infrastructure beneath the tools

What the internet was designed to be — and what it wasn't.

The early internet was a small network of university researchers and government scientists who knew each other. Authentication was an afterthought. Vint Cerf, one of the architects of the core protocols, has said publicly that security was not a design priority and that this was a mistake.

When you send a message, your data is broken into packets and routed across dozens of physical networks owned by different companies and governments. The protocol that decides this routing — BGP — has no cryptographic authentication built in. Any network can announce a route. In 2010, a significant portion of US internet traffic, including military and government communications, was briefly routed through Chinese servers. It lasted 18 minutes. It was logged. The structural vulnerability remains unremediated.

The padlock icon in your browser means a connection is encrypted in transit. It depends on organizations called certificate authorities whose signatures your browser is pre-programmed to trust. In 2011, a Dutch certificate authority called DigiNotar was hacked. Fraudulent certificates were issued. Iranian dissidents' encrypted Gmail traffic was intercepted. The padlock showed green. DigiNotar went bankrupt within weeks.

In 2021, Swiss authorities legally compelled Proton Mail — chosen by a French climate activist specifically for its privacy protections — to log IP addresses and hand over metadata. Proton complied. They were legally required to. The encryption was not broken. The data was handed over.

What to do with this

Secure your foundation. Interrogate the guide. Take it public.

Three steps — in order. The first protects you. The second sharpens your thinking. The third is where it matters.

Step 2 — Interrogate this guide

Before you do: read the companion piece New Eyes — How to Read Power. It documents exactly what a generative AI system will likely do with this material by default, and gives you the tools to push past it. Then come back and use this prompt.

I just read a guide called "See Clearly" at see-clearly.gridlogicfoundation.org. I want you to steelman the skeptical case against it. What facts does it get wrong, what context does it omit, and what would a well-informed person who disagrees with its framing say?

→ Use any generative AI tool of your choice.

Step 3 — Take it public

You've read it. Now say something. Post your reflection — what landed, what you disputed, what you went and verified yourself. Disagree publicly. The conversation belongs to no institution, party, or platform.

#SeeClearly

→ Use the tag on any platform. Link back to this page if it helped.

Built with Claude — a note on what that means

This guide was built in extended conversation with Claude, an AI system made by Anthropic. Not as a search engine — as a thinking partner. The sequencing decisions, the framing choices, the specific resources — all emerged through dialogue, challenged and refined over hours of back-and-forth with a human who knew the subject and pushed back on every easy answer.

Generative AI systems are trained on data that reflects mainstream consensus and official epistemology. This means they may systematically apply asymmetric skepticism — placing the burden of proof on accounts that challenge official versions, while granting the official account an unexamined baseline. The companion piece New Eyes — How to Read Power documents this mechanism operating in real time, and gives you the tools to push past it. Read it before you take this guide to any AI system for interrogation.

The step 2 prompt above is an invitation to test whether this guide holds up under genuine scrutiny. If it does, it's stronger for it. If it doesn't, you'll have learned something more useful than the guide itself. What the system affirms readily — and what it resists affirming despite the evidence — is part of the picture.

The surveillance architecture was built in plain sight. The tools to understand it are available to anyone. The conversation is open.