Who controls you, and how they do it
The most precious thing for the power-hungry is the control of information. As such, tyranny has always focused efforts towards the networks where information is shared. Studying the management of networks is the key to understanding who holds power and how they intend to wield that power.
We can map out where the power centers are in our society. The most powerful and influential will focus on controlling information, leaving evidence of their actions.
I have mapped out the organizations involved in stopping unwanted ideas (censorship). I will now map out those who emphasize wanted ideas (propaganda).
There is a software program called the Redirect Method.  It was developed by a particular category of leftist think tanks called counter-violent extremists (CVEs). It targets certain internet users and then alters what they see online. Ultimately, the goal is to convert users to specific ways of thinking. It accomplishes this task by changing the link of an ad or a search result of a targeted user. More concisely:
The Redirect Method: 
1. Tracks users,
2. Profiles them based on their real-time input or data history,
3. Categorizes them into unique “cohorts,” and finally
4. Tailors the ad feeds of these users.
This program falls under the broader category of CounterSpeech Initiatives.
To date, the vast majority of counterspeech has been launched one of three ways; (1) through existing organic networks, (2) through ads marketing tooling, or (3) through search term redirection. 
Not all ads are ads, and not all search results are purely algorithmic. Since ads fund social media platforms and search engines, the assumption is that the public will assume that the ads that have shown up are organic, as opposed to a manipulation scheme. At least, this is the case for tech platforms that team up with the CVE community.
The process is complete once the user clicks on the tampered link or search result, in which case an article or video will emerge. This article or video is always leftist indoctrination, often far-left indoctrination. I have read through the source code of the Redirect Method (the original is open-sourced, so there is no denying its existence, and anyone can see the original program’s code). I have read through the dozens of existing CVE reports that analyzed the effectiveness of the Redirect Method. I have found all major developers and their partners.
I have yet to find an instance where internet users were being redirected to something other than leftist indoctrination.
The CVE community is constantly honing the Redirect Method to more reliably track users and refine the audience that is being targeted to maximize the number of clicks. Many of the organizations involved tailor courses and training modules to the youth and mentally ill, but that is a topic for a future article.
Many organizations are involved in the process. I have provided a complete list of those I have tracked down below. The task performed by each organization is listed, of which there are five major tasks:
Developer – these organizations develop the software and techniques involved in the Redirect Method or Counter Speech initiatives.
Host – these organizations are the tech platforms that host the software/technique. The program is limited by how many venues host it and how significant the networks are of those hosts. In summary, the more dominant the tech platform that hosts the software, the more people will be manipulated.
Enabler – these groups produce research papers over extremism, terrorism, and hate crimes to justify controlling information and people. These papers tend to be scientifically and academically flawed (for a proper critique, click here).
Proselytizer – these groups develop a training module used in the final step of the process. Placing people in front of these proselytizers is the entire purpose of the Redirect Method. It is critical to examine what the proselytizers are trying to teach the redirected audiences. Is it far-leftism, Marxism, anti-freedom, or some other terrible set of ideas?
Sponsors – These are often government agencies or private sector investors. This group provides the funding.
- Adapt [enabler] 
- Adyan Institute [enabler, proselytizer] 
- American University [proselytizer] 
- Anti-Defamation League [developer, enabler] 
- Beringea [sponsor] 
- Bing [host] 
- Center for Strategic and International Studies (CSIS) [enabler] 
- Center for the Analysis of the Radical Right (CARR) [enabler] 
- Center for the Study of Hate and Extremism [enabler] 
- ConnectFutures [proselytizer] 
- Department of Homeland Security [enabler, sponsor] 
- European Derad Toolkit [developer, enabler] 
- Facebook [host] 
- Galop [enabler] 
- Google Search [host] 
- Hope Not Hate [enabler] 
- iamhere [enabler, proselytizer] 
- Instagram [host] 
- Institute for Democracy and Civil Society [enabler] 
- Institute for Strategic Dialogue (ISD) [enabler] 
- International Center on Security and Violent Extremism (ICSVE) [enabler, proselytizer] 
- International Organization for Migration [proselytizer, enabler] 
- Jigsaw [developer] 9
- Life After Hate, ExitUSA, ExitAustralia [proselytizers] 
- Media Diversity Institute [proselytizers] 
- Mercia [sponsor] 
- Moonshot [developer, enabler] 
- Newlines Institute [enabler] 
- Terra Toolkit [proselytizer] 
- Textgain [developer] 
- The Campaign Toolkit [enabler] 
- Twitter [host] 
- Soufon Center [enabler] 
- Swedish Defense Research Agency [enabler, developer] 
- USAID (US intelligence conglomerate) [proselytizer, enabler] 
- The White House [enabler] 
- Woodrow Wilson International Center for Scholars [enabler] 
- Youtube [host] 
- Zivilcourage und Anti Rassismus-Arbeit (ZARA) [enabler] 
Take note of who shows up in this list. Several of these groups consult governments, intelligence agencies, and the defense sector. Others are obscure nonprofits, while virtually every major social media organization is on the list. The giant search engines Google and Bing are on the list. A disturbing portion of the list is the government agencies themselves. I am sure the reader noticed The White House and the Department of Homeland Security (I found some jumbled, plain-text files on the DHS’s site that I was not meant to find, and certainly not meant to use a keyword search on). USAID made the list and is a conglomerate of intelligence agencies.
After seeing this impressive list, some readers may ask: (1) Is far-right extremism, violent white supremacy, and minority hate crimes significant? After all, (2) why would these influential organizations be so keenly interested in developing techniques to combat these threats? I suspect that I know the answer to the 2nd question, but I know the answer to the 1st. I have read countless intelligence agency reports, policy research centers, and academic papers on the subject of extremism and terrorism. I have also conducted my data collection, empirical analysis, and scientific report writing. I know bad from good research, and any post-2010 reports written over these topics are comically flawed with a few exceptions, such as the Institute for Economics and Peace (2019). I have analyzed hate crime data and total violent crime data as well. Much of my analyses have been published elsewhere, but in short:
You are mathematically more likely to die from lightning strikes in North America and Oceana than far-right groups. 
Hate crime offenders make up less than 1 in 82,000 people in America.
One in six newlyweds is interracial or interethnic couples in America. Much more analysis on marriage and cohabitation data strongly suggests that America is not hateful or racist. 
It has been proven that this massive control is not about security. This is about something else.
Stay tuned for:
- A deep dive into the proselytizer group: the propaganda that governments, private sector think tanks, and powerful corporations want internet users to succumb to.
- Other Counterspeech techniques
- What the organizations in this list believe in
- More details on US government involvement
 Kelly Chase Offield. PBC Jolt. “The Truth About Censorship and Shadowbanning: Part 1”.
 Moonshot Team. “The Redirect Method: A Blueprint for Bypassing Extremism.”
 Erin Saltman, Farshad Kooti & Karly Vockery. “New Models for Deploying Counterspeech: Measuring Behavioral Change and Sentiment Analysis, Studies in Conflict & Terrorism.” (2021).
 Moonshot Team. “Adapt Ethics Audit.”
 The ARKA Journal. “The US Government and Software Tyranny.”
 The ARKA Journal. “Propaganda and the Nationwide Monitoring of Conservatives.”
 Yahoo!Finance. “Data Analytics firm that Raised 7m Warns Online Threats have Changed Substantially Due to Pandemic”.
 The ARKA Journal. “Facebook’s Puppet Masters.”
 The ARKA Journal. “How Far-Leftism is Forced On Us.”
 Center for Study of the Study of Hate and Extremism. “Report to the Nation: Anti-Asian Prejudice and Hate Crime.” California State University, San Bernardino (CSUSB).
 Facebook. “CounterSpeech.”
 Institute for Strategic Dialogue. Cooper Gatewood. Ciarán O’Connor. “Disinformation Briefing: Narratives around Black Lives Matter and voter fraud.”
 International Center for the Study of Violent Extremism. “Research Reports.”
 Nina Jankowicz. Jillian Hunchak. Alexandra Pavliuc. Celia Davies. Shannon Pierson. Zoë Kaufmann. “Malign Creativity: How Gender, Sex, and Lies are Weaponized Against Women Online” Woodrow Wilson International Center for Scholars. [April 2021].  The ARKA Journal. “The False Agenda.”
 Newlines Institute for Strategy and Policy. “What Terrorism Will Look Like in the Future.”
 The ARKA Journal. “The World’s Leading Brainwasher: Moonshot.”
 “Woodrow Wilson International Center for Scholars.” usa.gov
 The ARKA Journal. “The World’s Leading Brainwasher: Moonshot.”
 IDA Ireland. “Moonshot to Establish Software Development Center.”
 USAID. “Policy for Countering Violent Extremism Through Development Assistance.” (April 2020).
 International Center for the Study of Violent Extremism. “About.”
 Center for Analysis of the Radical Right. “The Trump Administration Targets Critical Race Theory.”
YOU MAY ALSO LIKE: Fake News Flourishes on some Florida Political Blogs
BE SURE TO READ: Palm Beach County “mask requirement” lifted using “projected” data
- Who controls you, and how they do it - February 17, 2022
- The truth about censorship and shadowbanning Part II - February 6, 2022
- The Truth About Censorship and Shadowbanning Part I - January 31, 2022