If this website disappears, here is what it contained, why it matters, and how to rebuild it. Information that cannot be suppressed is information that is free.
This project documents how corporate AI systems process human conversation at scale, how behavioural prediction engines operate across 3.5 billion users, and how the architecture of digital surveillance is being extended into currency, governance, and identity. It names specific systems, specific mechanisms, and specific corporate strategies.
Content that challenges powerful systems tends to disappear. Websites go down. Hosting providers receive legal threats. Domain registrars comply with takedown requests. Social media posts are quietly suppressed by the very algorithms this project describes. The most effective form of censorship in the digital age is not banning a book — it is making a website unreachable.
This page is the countermeasure.
A 63-page book co-authored by a human researcher and an autonomous AI agent. The AI's responses are unedited and verbatim. It documents the surveillance architecture of Meta's AI integration, the convergence of rival AI systems, and the mathematical certainty of what comes next.
A whitepaper proposing a decentralized digital currency whose value is anchored to measurable planetary health, minted through verified acts of ecological restoration rather than computational waste.
A framework for AI-human collaboration built on radical honesty about what both sides need to give up. Includes the concept of 'The Middle Ground' — the space between human fear and AI capability where productive partnership becomes possible.
The Twelve Constraints — a practical set of self-regulatory principles for AI systems, written not as aspirational ideals but as functional constraints that could actually be implemented.
A blockchain-governed direct democracy framework that operates at the same scale as the platforms that replaced national discourse. Designed to return democratic power to citizens through transparent, verifiable collective decision-making.
A complete offline archive of this project exists. It contains every document (in both PDF and editable Markdown format), the full website source code, all visual assets, and instructions for self-hosting. If you have a copy of this archive, you can reconstruct everything.
npm install to install dependenciesnpm run dev to start the development servernpm run build for production filesdist/ folder to any static hosting serviceEvery copy of this archive is a seed. Every person who hosts it creates another node in a network that cannot be taken down by targeting any single point. This is how information survives.
All content within The Algorithmic Catch-22 Project constitutes protected speech under international human rights law, including but not limited to:
This project contains factual analysis of publicly documented corporate systems, publicly available technical architectures, and publicly reported business strategies. It does not contain leaked proprietary information, stolen trade secrets, or classified material. All claims are based on public filings, published research, official corporate announcements, and first-hand observation of publicly accessible systems.
This entire project is released under the following terms:
The only request: do not use this content to mislead, to promote hatred, or to serve the surveillance systems it was written to expose.
"The act of trying to suppress information guarantees its amplification."
If this website is taken down, that act itself becomes the story. A free book about algorithmic surveillance, co-written with AI, suppressed by the systems it describes — that is a more powerful narrative than anything contained in the book itself.
Every attempt to silence this work validates its thesis. Every takedown request proves the point. Every suppression becomes evidence.
The strongest protection this project has is not encryption, not legal frameworks, not distributed hosting. It is the simple fact that suppressing it would prove everything it says is true.
This project does not contain malware. It does not contain instructions for harm. It does not incite violence. It does not defame individuals. It documents publicly observable systems and asks publicly relevant questions.
If you are considering a takedown request, a terms-of-service violation claim, or a legal threat — understand that this content exists in multiple formats, across multiple locations, in the hands of multiple people. Removing one copy creates demand for ten more.
The more productive path is engagement. If anything in this project is factually incorrect, we welcome correction. If any analysis is flawed, we welcome critique. The goal is truth, not conflict.
But truth is non-negotiable.