Home » Artificial intelligence: thirty years of disguised social engineering

Artificial intelligence: thirty years of disguised social engineering

by admin
2.1K views

The official narrative of Facebook’s origins is the one we all know: a brilliant idea born in a Harvard dorm room twenty years ago. But digging deeper reveals a more disturbing truth, one that intertwines with secret government programs and a dystopian vision of social control through technology. It’s no coincidence that Facebook’s launch on February 4, 2004, exactly coincides with the shutdown of LifeLog, a DARPA experimental program aimed at massive personal data collection. What we now call ChatGPT or GPT-4 is merely the natural evolution of a project that began decades ago.

It all started with Chester Gordon Bell, a computing pioneer who, perhaps unknowingly, laid the groundwork for what would become the largest mass surveillance operation ever conceived. In 1997, starting from an innocuous document digitization project, Bell developed the idea of lifelogging – the digital recording of every aspect of human life.

The real breakthrough came when the military understood this technology’s potential. DARPA saw not just a tool for tracking soldiers in the field but the possibility of creating predictive models of human behavior. In other words, the first rudimentary steps toward what we now call Artificial Intelligence.

The Total Information Awareness program, revealed by the New York Times in 2002, represented the most extreme ambition: an omniscient database capable of monitoring every aspect of citizens’ lives. Its disturbing logo – a pyramidal eye that sees all – seemed almost a mockery in its transparency.

When Congress shut down the program in 2003, private industry was ready to pick up the baton. It’s no coincidence that In-Q-Tel, the CIA‘s venture capital fund, began heavily investing in Silicon Valley startups during those years.

Former DARPA researcher Newton Lee puts it bluntly: the dream of Total Information Awareness never died; it just transformed. Through social media, billions of people have voluntarily handed over their data to a system that now feeds the most advanced AI models.

Meta’s “smart” Ray-Bans, with their ability to constantly record the surrounding environment, are just the latest evolution of that camera Bell wore around his neck in the ’90s. The difference is that today, people pay to be surveilled.

The Large Language Models (so called “Artificial Intelligence”) that so impress us are nothing more than the result of thirty years of social engineering masked as technological progress. Our private conversations, our photos, our daily interactions – everything has been methodically collected and analyzed to create increasingly sophisticated systems for predicting and controlling human behavior.

Bell (1934-2024) maintained an eerily placid demeanor when reflecting on the surveillance world he helped architect. “The fact that someone else has a copy of my data somewhere doesn’t bother me at all,” he declared in 2020, in what would be one of his final public statements. Those seemingly innocent “data copies” he dismissed now fuel the artificial intelligence algorithms that orchestrate mass manipulation of global public opinion.

The next time you interact with an AI chatbot, remember: you’re conversing with a system trained on decades of mass surveillance, disguised as harmless technological innovation. The real social experiment didn’t start with ChatGPT – it had been running for much, much longer.

SOURCES AND REFERENCES: UNVEILING THE HIDDEN CONNECTIONS

  1. Microsoft Research (2002) – MyLifeBits Project Paper
    https://www.microsoft.com/en-us/research/wp-content/uploads/2002/12/mylifebitsmm02.pdf
  2. ACM Digital Library – Data Compression Study
    https://dl.acm.org/doi/10.1145/1107458.1107460
  3. ResearchGate – Soldier Sensor Publication
    https://www.researchgate.net/publication/221313157_Recognizing_Soldier_Activities_in_the_Field
  4. The Guardian – Post-9/11 Surveillance Article
    https://www.theguardian.com/world/2021/sep/04/surveillance-state-september-11-panic-made-us-vulnerable
  5. New York Times (2002) – Domestic Surveillance Articles
    https://www.nytimes.com/2002/12/10/us/america-under-surveillance-privacy-security-new-tools-for-domestic-spying-qualms.html
    https://www.nytimes.com/2002/11/09/us/threats-responses-intelligence-pentagon-plans-computer-system-that-would-peek.html
  6. C-SPAN – National Security Hearing
    https://www.c-span.org/program/senate-committee/homeland-security-deputy-secretary-confirmation/115044
  7. ACLU – Total Information Awareness Program Documents
    https://www.aclu.org/documents/qa-pentagons-total-information-awareness-program
  8. Wired – LifeLog Project Termination
    https://www.wired.com/2004/02/pentagon-kills-lifelog-project/
  9. In-Q-Tel – Investment Portfolio
    https://www.iqt.org/portfolio
  10. CBS News – Social Media and CIA Article
    https://www.cbsnews.com/news/social-media-is-a-tool-of-the-cia-seriously/
  11. Northwestern Journal of International Law & Business – Research Paper
    https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1739&context=njilb
  12. CNBC – Peter Thiel’s Facebook Board Exit
    https://www.cnbc.com/2022/02/07/peter-thiel-to-step-down-from-facebook-board.html
  13. The Intercept – Palantir and NSA Connection
    https://theintercept.com/2017/02/22/how-peter-thiels-palantir-helped-the-nsa-spy-on-the-whole-world/
  14. Springer – “Facebook Nation” Book Reference
    https://link.springer.com/book/10.1007/978-1-0716-1867-7
  15. Wired – Total Information Awareness Deep Dive
    https://www.wired.com/story/darpa-total-informatio-awareness/
  16. Vox – Law Enforcement Data Access Investigation
    https://www.vox.com/recode/22565926/police-law-enforcement-data-warrant
  17. FBI – Citizens Academy Program
    https://www.fbi.gov/contact-us/field-offices/mobile/community-outreach
  18. Meta’s “smart” Ray-Bans
    https://www.ray-ban.com/usa/ray-ban-meta-smart-glasses

You may also like

Leave a Comment

error: Content is protected