Simply three minutes earlier than Donald Trump left workplace on inauguration day, a “shadowy” firm1 known as World Useful resource Programs LLC obtained management of tens of thousands and thousands of Pentagon-owned IP addresses that had been beforehand dormant.2

The U.S. Division of Protection (DOD) made the mysterious switch, and the variety of DOD-owned IP addresses introduced by World Useful resource Programs elevated from 56 million in late January to 175 million in April 2021.3

“It’s large. That’s the largest factor within the historical past of the web,” Doug Madory, director of web evaluation at community working firm Kentik, informed The Related Press, which carried out an investigation into the unusual prevalence.4 For reference, this swath of web actual property quantities to at least one twenty-fifth of the present web, and greater than twice the dimensions of web being actively utilized by the Pentagon.5

Theories shortly emerged from the networking neighborhood about why an obscure firm was handed a lot of the Pentagon’s web.

A Washington Put up article advised, “Did somebody on the Protection Division unload a part of the army’s huge assortment of sought-after IP addresses as Trump left workplace? Had the Pentagon lastly acted on calls for to unload the billions of {dollars}’ value of IP deal with area the army has been sitting on, largely unused, for many years?”6,7

Weeks glided by earlier than any explanations had been supplied, however the Pentagon’s response left extra questions than solutions.

Pentagon: ‘Pilot Effort’ to ‘Stop Unauthorized Use’

The challenge is reportedly being run by the Pentagon’s Protection Digital Service (DDS), which was launched in 2015 to assist the DOD “resolve high-impact challenges” by way of “private-sector instruments, approaches and expertise.” Brett Goldstein, DDS director, said:8

“DDS was created to usher in the perfect and brightest, to assist advance the mission to resolve a few of our hardest technical issues, and to ensure expertise would not get in the best way of our mission: nationwide protection. I feel one of many issues we have discovered in authorities is that expertise must allow the mission.”

In regard to the web thriller, Goldstein stated the “pilot challenge” intends to “assess, consider and forestall unauthorized use of DOD IP deal with area,” and, in response to the AP, “‘establish potential vulnerabilities’ as a part of efforts to defend in opposition to cyber-intrusions by international adversaries, who’re constantly infiltrating U.S. networks, typically working from unused web deal with blocks.”9

Cybersecurity consultants have advised the IP addresses could also be a part of so-called “honeypots,” that are deliberately susceptible to draw hackers, or an effort to arrange software program and servers to observe for suspicious actions.10 In accordance with Madory:11

“I interpret this to imply that the goals of this effort are twofold. First, to announce this deal with area to scare off any would-be squatters, and secondly, to gather a large quantity of background web site visitors for menace intelligence.”

To get an thought of the scope of this pilot challenge and the numerous mysteries nonetheless behind it, Madory defined:12

“Following the rise, AS8003 [the entity announcing the DOD’s internet space] grew to become, far and away, the most important AS within the historical past of the web as measured by originated IPv4 area. By comparability, AS8003 now publicizes 61 million extra IP addresses than the now-second largest AS on the planet, China Telecom, and over 100 million extra addresses than Comcast, the most important residential web supplier within the U.S.

… Whereas yesterday’s assertion from the DoD solutions some questions, a lot stays a thriller. Why did the DoD not simply announce this deal with area themselves as an alternative of directing an outdoor entity to make use of the AS of a protracted dormant e-mail advertising agency? Why did it come to life within the remaining moments of the earlier administration?”

The Firm Has DARPA, Web Surveillance Ties

Not a lot is understood about World Useful resource Programs, the corporate the Pentagon known as upon to handle its deal with area, despite the fact that it has no document of presidency contracts. The AP revealed it has an deal with in Plantation, Florida, and was integrated in Delaware and registered by a Beverly Hills lawyer.

Raymond Saulino is the one title related to the corporate, nonetheless, and he’s additionally linked to Packet Forensics, a cybersecurity/web surveillance tools firm. In accordance with the AP:13

“The corporate had almost $40 million in publicly disclosed federal contracts over the previous decade, with the FBI and the Pentagon’s Protection Superior Analysis Tasks Company [DARPA] amongst its prospects …

In 2011, Packet Forensics and Saulino, its spokesman, had been featured in a Wired14 story as a result of the corporate was promoting an equipment to authorities companies and legislation enforcement that allow them spy on individuals’s internet searching utilizing cast safety certificates.

The corporate continues to promote ‘lawful intercept’ tools, in response to its web site. One in all its present contracts with the Protection Superior Analysis Tasks Company is for ‘harnessing autonomy for countering cyber-adversary methods.’ A contract description says it’s investigating ‘applied sciences for conducting secure, nondisruptive, and efficient lively protection operations in our on-line world.’

Contract language from 2019 says this system would ‘examine the feasibility of making secure and dependable autonomous software program companies that may successfully counter malicious botnet implants and comparable large-scale malware.’”

Including much more confusion, an organization by the identical title — World Useful resource Programs — and deal with was accused of sending e-mail spam earlier than it shut down greater than 10 years in the past.

Web fraud researcher Ron Guilmette, who sued World Useful resource Programs in 2006 for unfair enterprise practices, informed the AP, “It’s deeply suspicious … In the event that they needed to be extra severe about hiding this they might haven’t used Ray Saulino and this suspicious title.”15

DARPA Developed an Injectable Biosensor

DARPA has a long history of surveillance, together with utilizing medical and non-medical information to forestall terror assaults. DARPA managed Complete Data Consciousness (TIA), a program that sprang up after the 9/11 assaults that was looking for to gather Individuals’ medical data, fingerprints and different biometric information, together with DNA and data relating to non-public funds, journey and media consumption.16

In addition they labored on the event of an injectable biosensor with its maker, Profusa.17 The sensor permits an individual’s physiology to be examined at a distance by way of smartphone connectivity. Profusa can be backed by Google, the most important information mining firm on the planet.

Hydrogel is one other DARPA invention, which includes nanotechnology and nanobots. This bioelectronic interface is a part of the COVID-19 mRNA vaccines’ supply system. The biochip being developed by Profusa is much like the proposed COVID-19 mRNA vaccines in that it makes use of hydrogel.

The implant is the dimensions of a grain of rice, and connects to a web based database that may maintain monitor of adjustments in your biochemistry and a variety of biometrics, akin to coronary heart and respiratory price and rather more.

Profusa stated it supposed to hunt FDA approval for his or her tissue-integrating biosensor in 2021,18 and a DARPA-backed research can be underway to measure early indicators of influenza by way of the biosensor expertise. The injectable sensors will likely be used to measure physiological statuses to disclose not solely indicators of human response to an infection but in addition “publicity to illness in wholesome volunteers.”19

A wi-fi patch that measures tissue oxygen ranges would even be used, sending data to a cell system for real-time information. In accordance with Profusa, the biosensors could detect illness outbreaks, organic assaults and pandemics as much as three weeks sooner than present strategies.20 It might appear, nonetheless, that to ensure that such sensors to work on a widespread scale, intensive adoption could be required.

The Pentagon Created the Web for Surveillance

Whereas the web is seen as a device to advertise the dissemination of data, it was constructed by the federal government as a device to spy on residents. Should you’re fascinated with studying extra in regards to the little-known beginnings of the web, I encourage you to learn the e book “Surveillance Valley: The Secret Navy Historical past of the Web,” by Yasha Levine.21

Levine, an investigative journalist, reveals that the web started within the Vietnam-era and was used to spy on guerrilla fighters and antiwar protestors, “a army pc networking challenge that in the end envisioned the creation of a world system of surveillance and prediction.” What’s extra, the army surveillance goals that underpinned the web’s growth are nonetheless in pressure right this moment.22

Take into account Google, which tracks your movements online, even when you do not assume you might be utilizing their merchandise, as a result of most web sites you go to use the “free” Google Analytics program to trace every little thing you do on a web site.

Because the early 2000s, Google and Fb specifically have been information mining on-line customers. These information, then, have been utilized to deep studying computer systems, giving them unprecedented capacity to foretell the kind of messaging triggers that may create the utmost quantity of worry — and thus compliance.

Silicon Valley Is Tied to US Intelligence Businesses

Silicon Valley stays deeply related to U.S. intelligence companies. Many suspect Fb is the public-friendly model of DARPA’s Lifelog, a database challenge aimed toward monitoring the trivia of individuals’s whole existence for nationwide safety surveillance functions.23 The Pentagon pulled the plug on Lifelog February 4, 2004, in response to backlash over privateness issues.24 But that very same day, Fb was launched.25 Coincidence?

Google, Amazon, Twitter and different main tech firms are additionally tied to the “military-industrial-intelligence-media advanced,” to cite journalist Edward Curtin from Off-Guardian.26 All present invaluable surveillance and censorship features, and with out them, the totalitarian control system we now discover ourselves caught in wouldn’t be attainable.

Even the U.S. Postal Service has apparently been monitoring Individuals’ social media posts by way of its United States Postal Inspection Service (USPIS) Web Covert Operations Program (iCOP).27 Echoing the pattern of strangeness, Rachel Levinson-Waldman, deputy director of the Brennan Middle for Justice’s liberty and nationwide safety program, informed Yahoo Information, “This appears slightly weird”:28

“Based mostly on the very minimal data that’s obtainable on-line, it seems that [iCOP] is supposed to root out misuse of the postal system by on-line actors, which doesn’t appear to embody what’s happening right here. It’s under no circumstances clear why their mandate would come with monitoring of social media that’s unrelated to make use of of the postal system.”

A key answer will likely be decentralized platforms that not solely just about eradicate censorship but in addition foster privateness and free speech. What are you able to do to guard your privateness on-line proper now? Listed below are a couple of solutions:

Swap from Fb and Twitter to free-speech alternate options29 akin to Gab, MeWe, Minds and Parler.

Swap from YouTube to uncensored alternate options30 akin to Bitchute, Brighteon, and Thinkspot.

Obtain the Sign or Telegram app to encrypt your textual content messages. Telegram additionally lets you subscribe to channels (read-only messages are despatched to your cellphone from any channel you subscribe. This characteristic is beginning to be more and more utilized by people who’ve been banned on different social media platforms).

Use a VPN in your desktop, laptop computer and cell gadgets to protect your privateness.

For content material creators and various information sources that not have a social media presence as a consequence of censoring, subscribe to their e-newsletter if obtainable, and/or mark their web site in your favorites and verify again regularly.

Boycott Google by avoiding any and all Google merchandise:

  • Cease utilizing Google serps. Options embrace DuckDuckGo31 and SwissCows.
  • Uninstall Google Chrome and use Brave as an alternative, obtainable for all computer systems and cell gadgets.32 From a safety perspective, Courageous is much superior to Chrome and provides a free VPN service (digital personal community) to additional preserve your privacy.
  • Swap to a non-Google e-mail service akin to ProtonMail,33 an encrypted e-mail service primarily based in Switzerland.
  • Cease utilizing Google docs. Digital Developments has printed an article suggesting numerous alternate options.34
  • Do not use Google Residence gadgets. These gadgets document every little thing that happens in your house, each speech and sounds akin to brushing your tooth and boiling water, even when they look like inactive, and ship that data again to Google. Android telephones are additionally at all times listening and recording, as are Google’s house thermostat Nest, and Amazon’s Alexa.
  • Ditch Fitbit, because it was not too long ago bought by Google and can present them with all of your physiological data and exercise ranges, along with every little thing else that Google already has on you.
  • Should you’re a highschool pupil, don’t convert the Google accounts you created as a pupil into private accounts.


Please enter your comment!
Please enter your name here