America's Proxy Government

The state has chosen some corporations over their competition, and both are colluding together to control information and proselytize those that dissent.
America's Proxy Government

Security state agencies have to justify their existence.

There are 1,271 counterterrorist, homeland security, and intelligence organizations; 1,931 private sector analogues; 10,000 locations of these organizations; and ~854,000 people with top-secret security clearances. 1 To make matters more complex, the line between private and public is obscure in this industry.

This massive effort requires massive tax collection. Since government endeavors do not compete and do not participate in reciprocal exchanges, then they have no profit-and-loss test to determine if their efforts are worth the money taken from citizens. Additionally, since only the free market can determine prices, government endeavors have to continually disseminate propaganda in order to convince citizens that the endeavor is useful.

Interestingly, officials in this industry have explicitly admitted that reports from government agencies are not trusted by the public, so the tactful solution is to hire someone to produce those reports that would have otherwise been produced by the government agency itself. Since security state agencies cannot produce evidence that their services are needed, they hire private businesses and non-profits to disseminate their propaganda for them.

Naturally, the need to justify the existence of government – propaganda – evolves into techniques to disseminate that propaganda in addition to censoring opposition to it. This is why a proxy government is established – a front for the actual government to do what it wants to do but otherwise cannot. This also sets the stage for information control:

How to Control Information

  1. Stop ideas (censorship)
  2. Force other ideas (redirection)
  3. Justify this control (propaganda)

The US government has incentivized a group of organizations to do just that. "Big tech censorship" and other control measures were not the result of free-market phenomena.

The think tanks that refer to themselves as "counter-violent extremists" (CVEs) are America's proxy government responsible for censoring, shadow banning, ad feed tampering, search result manipulation, and "racism/extremism" deception.

Our Proxy Government

The suppression of dissent is not new for American regimes, but in the modern era it is referred to as "content moderation". The dissemination of propaganda is not new either, but modern techniques have adapted and are referred to as "redirection" or "CounterSpeech initiatives".

Both are defended by the intelligence conglomerate USAID 16 and the Department of Homeland Security (DHS) 2|17

The School of Communication at American University will define and describe the growing threat of violent white supremacist extremist disinformation, evaluate attitudinal inoculation as a strategy for communication to combat the threat, and develop a suite of operational tools for use by practitioners and stakeholders. With commitment and support from Google Jigsaw, American University will develop evidence-based methods for undermining the persuasive appeal of disinformation-based messaging and facilitate on- and offline inoculation campaigns. 2

American University partnered with the pioneer of modern censorship software – Google's Jigsaw – to tamper with ad feeds so that American University (AU) content was placed in front of targeted users. The intention was for the content to appear organic (a paid advertisement or legitimate search result). The state-funded AU cites the CSIS to support their claims, 3 despite CSIS have a record of making claims without datasets or transparent methodologies. The justifications for much of it, the arbitrarily defined "white supremacy" has a statistically zero threat level. 4

In further defense of redirection, USAID argues that "CVE programs are most effective when they are tailored and focused, often at a hyper-local level". 5 [Translation: propaganda works best when we can pinpoint individual users online via surveillance campaigns and CVE software.]

The DHS uses the appeal to authority fallacy when using phrases like "credible voices" 2 instead of presenting or citing real evidence. Of course, the authoritative figures are Facebook and Twitter representatives.

Meanwhile, the Council on Foreign Affairs (CFA) states that the top terrorist threat "is domestic rather than foreign," 6 yet far-right extremism in North America results in less deaths than lightning strikes. 7 Despite the insignificance of North American far-right extremism, the White House insists on citing the CVEs:

Biden directed his national security team to lead a 100-day comprehensive review of U.S. Government efforts to address domestic terrorism, which has evolved into the most urgent terrorism threat the United States faces today...the Biden Administration is releasing the first-ever National Strategy for Countering Domestic Terrorism to address this challenge to America’s national security 8

Again, phrases like "expert assessment" are frequently used by the White House report rather than citations containing evidence. The White House also claims that the

two most lethal elements of today’s domestic terrorism threat are (1) racially or ethnically motivated violent extremists who advocate for the superiority of the white race and (2) anti-government or anti-authority violent extremists, such as militia violent extremists. 8

These claims are made despite Jigsaw only finding 35 former white supremacists globally. Jigsaw has access to data on billions of users via Google and YouTube's data advantages. 4 These meager findings did not deter the administration's appeals to emotional arguments with anecdotes of extremism. 8 Merely 4 instances of domestic terrorist attacks are used across a 26 year period (in a country of 340 million), and the Capitol Hill instance was one of the four.

That is Four instances across 26 years in a country of 340 million.

The White House article argues that LGBTQI+ communities are targets of violence, yet any "crime data" I have found that supports this narrative is selective polling from left-leaning sources, like ConnectFutures, NPR, and Media Diversity Institute. Opinion polling is not crime data.

Even the "rise" in Asian hate crime was a myth that was fabricated 13 by a state-funded CVE out of California and staunch advocate of Marxist ideologies and state servitude. 14|15

If government grants you a part of its tax revenue to perform its tasks, are you a government official?

The Department of Homeland Security granted $10 million to the private sector CVE community in 2017. An amount of $568,000 was granted to American University. 2 Recall that AU content is built into Google's search function, meaning it has become a feature of Google Search products. The intelligence and CVE communities label non-participating competitors (like Parlor or Brave) as extremist-infested for not having services; albeit, manipulative services.

In other words, this funding resulted in a feature on Google's search platform – a feature that Google did not have to fund itself, like an equal market player. Google's competitors, who are not afforded this privilege from the state, are then slandered by the state for not having it. Similar situations have occurred on Facebook, Twitter, and other platforms.

For instance, the DHS granted $750,ooo to the Life After Hate group 9 who partnered with Moonshot and Facebook, to manipulate users into far-leftism online. 10|11 The collaboration resulted in a redirection service to Facebook's search function and ad “service”. Censorship comes in various forms - software programs, organized online efforts like iamhereinternational, and indoctrination. Life After Hate uses indoctrination to censor. It teaches people how to report or censor content on various platforms. In other words, the US government funded a campaign to turn citizens into censors under the guise of leftism.

The DHS also granted $121,000 to Prevention Through Education, 9 a social policy-based group with a critical theory (Marxist) foundation. 12

There was a total of $77 million in the overarching CVE grant program.

the Department of Homeland Security (DHS) has designated “Domestic Violent Extremism” as a National Priority Area within the Department’s Homeland Security Grant Program, which means that over $77 million will be allocated to state, local, tribal, and territorial partners to prevent, protect against, and respond to domestic violent extremism...The Department of Defense (DOD) is incorporating training for servicemembers separating or retiring from the military on potential targeting of those with military training by violent extremist actors. 8

The CVE community is the proxy government in charge of what ideas are acceptable and what ideas are not. This community does what the security apparatus wishes to do but cannot do directly.

Read: Policies that would worsen the problem


References

[1] The Washington Post. "A Hidden World, Growing Beyond Control".

[2] Department of Homeland Security.

[3] American University. "Understanding and Interrupting Extremism".

[4] Offield. "A Hidden War on Free Speech: Google's Jigsaw". The ARKA Journal.

[5] USAID. "Policy for Countering Violent Extremism Through Development Assistance". (April 2020).

[6] Council on Foreign Relations (CFR). "How Has the Terrorism Threat Changed 20 Years After 9/11?" (2021).

[7] Offield. "The False Agenda". The ARKA Journal.

[8] The White House. "Fact Sheet: National Strategy for Countering Domestic Terrorism." (2021).

[9] Department of Homeland Security. "Targeted Violence and Terrorism Prevention Grant Program".

[10] Offield. "Facebook's Puppet Masters". The ARKA Journal.

[11] Offield. "Leftist Indoctrination on Facebook". The ARKA Journal.

[12] FOS Feminista. stories-resources

[13] Center for Study of the Study of Hate and Extremism. "Report to the Nation: Anti-Asian Prejudice and Hate Crime." California State University, San Bernardino (CSUSB).

[14] Center for Study of the Study of Hate and Extremism. "Preparing Anti-Racist Educators During a Time of Pandemics".

[15] Center for Study of the Study of Hate and Extremism. "Intercultural Effectiveness..." California State Univeristy, San Bernardino.

[16] US Agency for International Development (USAID). "Policy for Countering Violent Extremism Through Development Assistance". Policy for Countering Violent Extremism Through Development Assistance (usaid.gov)

[17] Department of Homeland Security. "Digital Forum on Terrorism Prevention". PDF (Dec 2017). Digital Forum on Terrorism Prevention: Executive Summary, A Report on Trends and Insights (dhs.gov)