To expose how a web of powerful organizations work together to censor, hide, and suppress information on the internet. Through their influence, they push hidden agendas like Diversity, Equity, and Inclusion (DEI), often at the expense of truth and merit-based systems. This act will uncover why key information, such as the story of military pilot Rebecca Lobach, can seemingly disappear overnight and how we must take action to clean out the rot within the system.
Chapter 1: The Vanishing Web Where Did the Truth Go?
The internet was supposed to be a place where anyone could find information freely. But that vision is slipping away. When sensitive or inconvenient stories arise like Rebecca Lobach, a Black Hawk pilot whose online presence and details of her life vanished following a military incident people are left asking:
Why can’t I find anything? Why has everything been scrubbed clean?
This isn’t a technical glitch or a coincidence. It is the result of a system working in sync to delete or bury content before the public can access it. What you see online is often carefully filtered, with large organizations pulling the strings.
Chapter 2: The Hidden Web of Controllers
The internet’s infrastructure is controlled by more players than most people realize. They don’t just manage the flow of information they actively decide what you can and can’t see. Here are the key organizations responsible:
- ICANN (Internet Corporation for Assigned Names and Numbers) ICANN manages domain names, ensuring the global internet runs smoothly. But their power over domains means they can take down websites by revoking or transferring domain ownership. This has happened under their Uniform Domain-Name Dispute-Resolution Policy (UDRP), where a simple complaint can lead to a domain being taken down.
- WIPO (World Intellectual Property Organization) WIPO handles international intellectual property disputes, including domain name conflicts. If a domain is claimed to infringe on intellectual property, WIPO can order it to be taken down or transferred. Many small websites fighting powerful companies have lost their domains through this process. This system often favors large corporations and governments, silencing dissenting voices.
- Trademark Offices (e.g., BOIP) Organizations like the Benelux Office for Intellectual Property (BOIP) have the power to challenge domain names and content under trademark laws. They often collaborate with ICANN and WIPO to enforce takedowns. Even if a website’s content is legitimate, it can be removed under vague claims of trademark infringement.
- Music Rights Organizations Groups like ASCAP (American Society of Composers, Authors, and Publishers) have taken legal action to prevent political figures from using music at rallies. For example, Donald Trump’s rallies faced lawsuits and bans from using certain songs. This isn’t just about copyright it’s about controlling messages and associations.
- Federal Communications Commission (FCC) The FCC regulates communications networks, including internet service providers (ISPs). By controlling broadband allocation and net neutrality rules, they can indirectly influence what platforms thrive or struggle. If an ISP slows down or blocks certain websites, those sites become effectively invisible.
- Federal Trade Commission (FTC) The FTC enforces privacy and consumer protection laws but also has the authority to fine and shut down platforms for non-compliance. They can force companies to follow DEI-driven content policies by threatening legal action.
- Department of Justice (DOJ) and FBI The DOJ and FBI can seize domain names and shut down websites under national security claims. In cases like Rebecca Lobach’s, where military involvement is sensitive, these agencies can scrub information before the public has a chance to access it.
- CISA (Cybersecurity and Infrastructure Security Agency) CISA classifies “misinformation” as a security threat. They work with social media platforms to take down content deemed harmful. But what they call misinformation could simply be opinions or facts that challenge the mainstream narrative.
- Search Engines (Google, Bing) Search engines have enormous power over what you find online. They use algorithms to bury inconvenient content deep in search results, making it nearly impossible to find. Even if a website hasn’t been deleted, you might have to scroll through hundreds of irrelevant pages to find it.
- Hosting Providers (Amazon Web Services, GoDaddy) Web hosting services can shut down websites if they violate terms of service. For example, Amazon removed Parler, a social media platform, after it was deemed controversial.
- Internet Backbone Providers (AT&T, Level 3 Communications, CenturyLink) These companies manage the physical infrastructure of the internet the undersea cables, data centers, and routing systems. They have the ability to throttle traffic, block certain IP addresses, or prioritize data, making them a critical part of the censorship network.
- Content Delivery Networks (CDNs) CDNs like Cloudflare and Akamai ensure fast delivery of internet content by caching it at various locations worldwide. But they also have the power to deny services to certain websites, effectively blocking access. Cloudflare famously terminated services to websites deemed controversial, leaving them vulnerable to cyberattacks or making them inaccessible altogether.
- Internet Service Providers (ISPs) ISPs such as Comcast, Verizon, and Spectrum directly control what you can access online by managing your internet connection. They can block or slow down websites based on pressure from external organizations or governments.
- Telecom Operators Controlling Undersea Cables Major telecom operators own and manage the critical undersea cables that carry internet data across continents. Organizations like Submarine Cable Networks have a behind-the-scenes role in ensuring or denying connectivity to regions, providing a powerful lever for governments or corporations to influence access.
Chapter 3: Real Examples of Suppression
- Rebecca Lobach’s Missing Information Following a tragic Black Hawk helicopter accident, details about Rebecca Lobach’s life and social media profiles disappeared. Online discussions were removed, and search results led nowhere. This wasn’t random it was a coordinated effort to erase her presence for reasons still unclear.
- Hunter Biden’s Laptop Before the 2020 election, platforms like Twitter and Facebook restricted articles discussing Hunter Biden’s laptop. The FBI labeled the story as potential disinformation, even though it was later verified. The damage was done by the time the truth came out.
- COVID-19 Debate Suppression Doctors and scientists who questioned the official COVID-19 response had their content flagged and deleted. Platforms coordinated with health organizations to enforce a single narrative, leaving little room for scientific debate.
Chapter 4: The DEI Agenda and the Death of Merit
One of the biggest dangers lurking beneath internet control is the DEI agenda. DEI policies were initially meant to promote inclusion, but they have become tools to override merit and common sense. Here’s how:
- Boosting Certain Voices: Content that meets DEI criteria is prioritized, even if it’s less informative or credible than other content.
- Silencing Critics: Posts criticizing DEI policies are often flagged as harmful or hateful, leading to removals.
- Hiring Based on Identity: Many organizations now prioritize diversity over qualifications, resulting in biased decision-making and poorly implemented censorship policies.
Chapter 5: The Solution Clean Out the Hidden Agendas
To restore the internet’s original purpose, we must:
- Enforce Transparency: Organizations like ICANN, WIPO, and search engines should be required to disclose their involvement in content takedowns.
- Protect Search Visibility: Search engines should not be allowed to bury content unless it is illegal or harmful.
- Reevaluate DEI Policies: DEI should not be prioritized over merit. Hiring decisions and content curation should be based on skill, not quotas.
- Public Oversight: Independent watchdogs should review decisions related to content removal and censorship.
Chapter 6: The Role of Artificial Intelligence in Suppression
AI now plays a major role in deciding what you see or don’t see online. Algorithms designed by human developers reflect their biases and are often programmed to suppress information that challenges certain narratives. Here’s how it works:
- Content Filtering: AI automatically scans for keywords and topics flagged as harmful. Entire articles, videos, and even accounts can be taken down in seconds based on automated flags.
- Behavior Monitoring: AI tracks users who post content that does not align with dominant narratives. Shadow banning is common, where users are allowed to post but their content is hidden from others without their knowledge.
- Deepfake Manipulation: AI is capable of creating or altering videos and images, spreading disinformation or distorting facts to fit agendas.
Chapter 7: Government Collaboration with Big Tech
Governments work closely with tech giants to control narratives and suppress information deemed problematic. This collaboration extends beyond national borders. Here are the key methods:
- Coordinated Censorship: Governments provide tech companies with lists of “problematic” topics or accounts to monitor and suppress.
- Funding Ties: Many platforms receive government grants or contracts, making them more likely to comply with government demands.
- Surveillance Agreements: Governments access user data shared by tech companies, monitoring and preemptively silencing dissenting voices.
Chapter 8: Manipulation of Online Communities
Online communities, originally meant for free discussion, are now heavily manipulated to control public opinion. This is done through:
- Astroturfing: Fake grassroots campaigns are created to make it seem like public opinion supports certain agendas when it doesn’t.
- Bot Armies: Automated accounts flood discussions, drown out dissenting opinions, and create the illusion of consensus.
- Algorithmic Bias: Platforms boost or suppress discussions based on their algorithms, making it difficult for real conversations to gain traction.
Final Thought
The internet belongs to the people. When powerful organizations work together to make information disappear whether it’s about Rebecca Lobach, Hunter Biden, or medical debates they undermine democracy and freedom. We must act now to expose the hidden layers of control and restore the internet as a space for open and honest information.