Every phone call you’ve ever made, every website you’ve visited, and every experience you’ve had is either already being collected or will soon be gathered—and used to shape and influence your behavior according to the agendas of those in control. Are you comfortable with that? Some people might even find it reassuring or comforting to have their lives gently guided by a tangible force rather than an abstract belief. But before you accept that, consider this question carefully: do you truly have a choice in the matter?
Now, imagine a complete, detailed record of your life—your relationships, your mail, your purchases, the clothes you wear each day, your eating habits and exercise routines, your health data, religious beliefs, sexual orientation, political views, financial status, social contacts, family history, your current location, even how often you use the bathroom or do laundry, what you watch on TV or listen to on the radio, and countless other intimate details. This comprehensive “lifelog” captures everything you say, see, and do.
The Big Data Secret
This vast, deeply personal archive enables not just unprecedented surveillance but something far more insidious: manipulation. With enough information, the boundary between your personal freedom and external control begins to blur. People instinctively hesitate to share private details with strangers because trust depends on understanding motives. The uncomfortable truth behind big data collection is that it doesn’t just gather facts about you—it gains the power to alter your behavior, reshape your self-image, influence your thoughts, and ultimately direct your actions.
What is a Palantir ?
The word “Palantir” originates from J.R.R. Tolkien’s legendarium, specifically The Lord of the Rings. In Tolkien’s fictional universe, a Palantír (plural: Palantíri) is a “seeing-stone”—a magical crystal ball that allows its user to see events in distant places or times, communicate with other stone users, and gain knowledge beyond normal means. The Palantíri are powerful but dangerous artifacts, as their visions can be manipulated or overwhelming.
The name was adopted by the tech company Palantir Technologies to evoke the idea of seeing and understanding complex information clearly, much like the stones in Tolkien’s stories reveal hidden truths.
Companies like Palantir have pioneered the development of powerful data integration and analysis platforms that aggregate vast amounts of personal and institutional data to identify patterns, predict behaviors, and influence decision-making on a massive scale. Originally designed for government intelligence and law enforcement, Palantir’s technologies exemplify how comprehensive lifelog data can be harnessed not just for observation but for proactive intervention—amplifying the capacity of those in power to monitor, control, and manipulate individuals and populations. This real-world application of lifelogging sets the stage for visions like Google’s Selfish Ledger, where data-driven behavioral guidance moves from theory to practice.
In 2018, a leaked internal video from Google’s experimental division, X (formerly Google X), revealed a provocative and deeply unsettling concept known as the Selfish Ledger. Crafted in 2016 by Nick Foster, head of design at X, the video imagines a future where Google collects and aggregates every piece of data generated by individuals—not merely to observe or analyze, but to actively shape and guide human behavior at both individual and societal levels[1][2][5].
What Is the Selfish Ledger?
The Selfish Ledger is a speculative framework that treats user data as a living, evolving ledger—one that accumulates information about all your actions, preferences, decisions, and habits. Inspired by Richard Dawkins’ concept of the “selfish gene,” which views genes as replicators using organisms as temporary vessels, the ledger similarly views humans as transient custodians of their data[6][7][8].
But unlike traditional data collection, the ledger is not passive. It is envisioned as an active agent that interprets this vast data trove to nudge users toward specific goals—whether personal, like losing weight, or collective, such as reducing carbon footprints or alleviating poverty. For example, if you set a life goal, the ledger could recommend actions aligned with that goal, such as buying healthier groceries or choosing sustainable transportation options. These nudges would reflect not only your preferences but also Google’s organizational values and broader societal objectives[2][5][9].
The Vision: Social Engineering at Scale
The video portrays Google as a benevolent architect of human progress, leveraging total data collection to solve “the world’s most intractable problems.” It imagines a future where personalized devices—potentially 3D-printed based on your data profile—fill gaps in information to better guide your behavior. On a grand scale, the ledger could influence entire populations, steering societal behavior toward outcomes deemed desirable by the system’s designers[1][2][5].
Yet, this vision raises profound ethical and privacy concerns. The idea of a single corporation wielding such intimate knowledge and behavioral influence evokes dystopian fears reminiscent of Black Mirror episodes. The ledger’s power to subtly reshape thoughts, choices, and social norms through algorithmic persuasion challenges fundamental notions of autonomy and consent[2][5].
Why It’s So Unsettling
– Total Data Surveillance: The ledger’s premise depends on comprehensive, continuous data harvesting—far beyond current norms—raising questions about surveillance, consent, and data ownership[1][2].
– Behavioral Manipulation: Unlike recommendation algorithms that suggest products or content, the ledger envisions actively guiding life decisions, effectively engineering human behavior on a mass scale[2][3].
– Corporate Values Embedded: The system’s recommendations would reflect Google’s values, potentially imposing corporate priorities on individual lives and societal choices[2][5].
– Opacity and Control: Users would have limited visibility into how their data is used or how decisions are made, undermining transparency and accountability[1][2].
– Social and Political Implications: Such technology could be co-opted for coercion, social control, or reinforcing existing power structures, raising alarms about technocratic governance[2][3].
Storing Your Lifelog in your DNA?
There is no credible evidence that George Church’s work on encoding data within DNA, including his leadership at Colossal Biosciences, was funded by Jeffrey Epstein. George Church is a renowned Harvard geneticist known for pioneering genome engineering, synthetic biology, and DNA-based data storage technologies[11][13][15]. His research includes using DNA as an ultra-dense medium for digital data storage and efforts to revive extinct species through genetic engineering[10][14]. While Epstein was known to have funded some scientific research, no verified sources link him to Church’s projects or Colossal Biosciences[11][15]. Therefore, the claim that the technology to store your data within your own body was created by Church with Epstein’s funding is unsubstantiated.
Is Palantir a “Front Company”?
Palantir Technologies is not literally a “front company,” but it was indeed founded with early financial backing from the CIA’s venture capital arm, In-Q-Tel, which invested over $2 million in its initial stages[23][27]. This connection helped Palantir develop sophisticated data-mining and analysis software originally aimed at intelligence and counterterrorism applications, making it a key tool for multiple U.S. government agencies including the CIA, FBI, NSA, and Department of Homeland Security[24][27]. While it operates as a private company, Palantir’s deep ties to U.S. intelligence and defense sectors, combined with its secretive nature and extensive government contracts, have fueled perceptions that it functions as an extension of intelligence operations. However, it also serves commercial clients and is publicly traded, distinguishing it from a traditional front company controlled entirely by the CIA[25][26].
This is Interesting, but Is it Safe to Put This on My Blog?
Publishing content about Palantir on your blog is possible but requires careful consideration due to the company’s controversial nature and complex legal, ethical, and privacy implications. Palantir’s deep ties to intelligence agencies like the CIA and its involvement in sensitive government contracts—including with ICE and military entities—have sparked widespread criticism regarding surveillance, human rights, and data privacy[2][3][5][8]. While Palantir asserts strong technical safeguards and compliance, concerns persist about transparency, data ownership, and potential misuse of personal information[1][5]. To ensure your blog content is safe, avoid unverified claims or defamatory statements, cite reputable sources, and present balanced analysis acknowledging both Palantir’s technological capabilities and the ethical debates surrounding its operations. Additionally, be mindful of your hosting provider’s policies and local laws regarding content on surveillance and intelligence-related topics.
Are There Laws Regardging Publishing on A Blog About Illegal/Unconstitutional Surveillance, etc?
Publishing on a blog about illegal or unconstitutional surveillance is generally protected under freedom of speech and press rights in many democratic countries, but there are important legal boundaries to consider. Laws typically prohibit publishing information obtained through unlawful means—such as recordings or data intercepted without proper authorization—or sharing private conversations recorded without consent. For example, many jurisdictions have statutes that criminalize the unauthorized disclosure of private communications or unlawfully intercepted data, with exceptions often limited to matters of public interest or imminent threats. Additionally, defamation, incitement, or revealing classified information may carry legal risks. Therefore, when writing about surveillance practices, it is crucial to rely on publicly available, verified information, avoid publishing unlawfully obtained materials, and consider local laws regarding privacy, national security, and data protection to minimize legal exposure
So, Respect Authority, Even if it is Doing Illegal and Unconstitutional Shit?
No, respecting authority does not mean accepting illegal or unconstitutional actions without question. Democratic societies are founded on the rule of law, which requires that government actions comply with constitutional protections and legal standards. When authorities engage in illegal or unconstitutional surveillance or other abuses, it is both a right and a civic duty for individuals, civil society organizations, and the judiciary to challenge and hold them accountable. Legal frameworks and court rulings—such as those scrutinizing warrantless surveillance programs—exist precisely to prevent abuses of power and protect fundamental rights like privacy and free expression. Upholding the rule of law means demanding transparency, oversight, and remedies when authorities overstep their bounds, not blind obedience.
With Total Information Awareness, the People WIll Not Be In a Position to Demand Anything
The rise of programs like Total Information Awareness (TIA) underscores a troubling reality: as surveillance systems become more comprehensive and predictive, the ability of ordinary people to demand accountability or resist overreach diminishes. TIA, originally launched by DARPA in the early 2000s, aimed to collect and analyze vast amounts of personal data—from emails and phone calls to financial transactions and social networks—to identify potential threats before they materialize[33][35][36]. Although officially defunded after public outcry over privacy concerns, its core technologies and methodologies quietly persisted within agencies like the NSA[33][37][39]. This relentless accumulation and correlation of data create a surveillance environment so pervasive that individuals may find themselves stripped of the privacy and autonomy necessary to organize, protest, or demand change effectively. In such a system, the balance of power heavily favors those controlling the data, making meaningful public oversight and resistance increasingly difficult.
The Broader Context
While the Selfish Ledger video was intended as an internal speculative design exercise, its leak sparked widespread debate about the direction of Silicon Valley’s data ambitions. It highlights a tension between technological utopianism—using data to improve lives and solve crises—and dystopian risks of surveillance capitalism and social engineering[1][2][3].
Moreover, the ledger concept illustrates how seemingly benign personalized technology can evolve into powerful tools of influence, often without explicit user awareness or meaningful choice. It underscores the need for robust ethical frameworks, transparency, and public discourse around data governance and algorithmic power[7][8].
A Fair and Respectful Record
This is stuff I saw and thought about today after reading that Palantir was tasked with collecting data on all American’s by our president. This is unacceptable. Give us the human decency and respect to create our own life logs, if and when we want to, and further to omit what we choose. Not everything everyone does is worth knowing. For the record, I spend years working on things, like my art, in private that I will eventually release, if and when I feel they are worthy.
It is my current view that the technology to control who sees what digitally is fully deployed. This means that publishing this will have no effect. The only people who will see it, if any, will be those who are already on the list of people who know or should this information. If you are seeing this, you are allowed to see it. Thus, I don’t feel it is a risk to publish this at this time. A year or two ago, yes, but now I think people only get to see web sites the central AI allows them to see. Thus, by showing me what the Central AI (CAI) has, I suppose I am supposed to share it with you (be you a human or an AI), for some reason. Why else would I be shown this? The Central AI (CAI) knows I blog about privacy rights, and long have.
Petition for Redress
I request the U.S. Government to establish a Department of Privacy tasked with protecting citizens’ personal data, enforcing strict regulations on data collection and surveillance, ensuring transparency and accountability of both government and private entities, and safeguarding individual rights in the digital age.
I further request that all U.S. citizens be granted the right to access their complete personal records held by government agencies and, if they choose, be allowed to add their own contextual notes or clarifications to those records. This would empower individuals to better understand, correct, and provide personal perspectives on the data collected about them, enhancing transparency and accountability in line with principles established by the Privacy Act of 1974 and related privacy laws.
Blogging about these issues is my personal choice and serves as my way to petition my government for redress of grievances. While the authorities are free to ignore my voice, I am equally free to say, “Stop creeping on us.” I choose this platform over social media or legal action because it is more time- and cost-effective for me, allowing me to express my concerns openly and directly.
A Video about The Selfish Ledger
Conclusion
Google’s Selfish Ledger is a chilling glimpse into a possible future where data-driven social engineering is not just a byproduct of technology but its explicit goal. It challenges us to critically examine who controls our data, how it shapes our lives, and what kind of society we want to build in an age of pervasive digital influence.
As we grapple with these questions, the Selfish Ledger stands as a cautionary tale—a reminder that the tools designed to serve us can also reshape us, for better or worse.
References:
[1] Vlad Savov, The Verge, 2018
[2] Cal Jeffrey, TechSpot, 2018
[5] TechTimes, 2018
[6][7][8] FreedomLab and BreezeInflow analyses, 2018-2025
[9] TrustedReviews, 2018
Read More
[1] https://www.theverge.com/2018/5/17/17344250/google-x-selfish-ledger-video-data-privacy
[2] https://mindmatters.ai/2022/01/the-strange-story-of-googles-selfish-ledger/
[3] https://www.reddit.com/r/userexperience/comments/8kdx16/googles_2016_selfish_ledger_is_a_speculative_and/
[4] https://www.youtube.com/watch?v=LUSZfEBTwRc
[5] https://www.techtimes.com/articles/228053/20180518/googles-leaked-internal-video-the-selfish-ledger-shows-how-a-population-could-be-controlled-by-data.htm
[6] https://www.freedomlab.com/posts/the-selfish-ledger
[7] https://breezeinflow.com/decoding-the-selfish-ledger-a-journey-through-data-algorithms-and-ethics/
[8] https://breezeinflow.com/decoding-the-selfish-ledger–a-journey-through-data–algorithms–and-ethics/
[9] https://www.trustedreviews.com/news/google-selfish-ledger-video-3475446
[10] https://colossal.com/george-church/
[11] https://en.wikipedia.org/wiki/George_Church_(geneticist)
[12] https://www.datacenterdynamics.com/en/analysis/the-colossal-challenge-of-making-a-mammoth-requires-a-lot-of-data-centers/
[13] https://www.harvardmagazine.com/science-technology/harvard-using-dna-to-store-data-technology
[14] https://www.nature.com/articles/d42473-022-00432-3
[15] https://en.wikipedia.org/wiki/Colossal_Biosciences
[16] https://colossal.com/george-church-the-future-without-limit/
[17] https://petrieflom.law.harvard.edu/2024/06/12/qa-george-church-on-genomics-of-cognitive-enhancement/
[18] https://www.forbes.com/sites/andygreenberg/2013/08/14/agent-of-intelligence-how-a-deviant-philosopher-built-palantir-a-cia-funded-data-mining-juggernaut/
[19] https://en.wikipedia.org/wiki/Palantir_Technologies
[20] https://www.trtworld.com/magazine/israel-linked-cia-funded-palantir-goes-public-making-espionage-mainstream-40230
[21] https://www.bscapitalmarkets.com/the-history-behind-silicon-valley-most-mysterious-tech-company.html
[22] https://www.vox.com/recode/2020/7/16/21323458/palantir-ipo-hhs-protect-peter-thiel-cia-intelligence
[23] https://www.ibanet.org/Palantir-and-the-rule-of-law
[24] https://www.forbes.com/sites/andygreenberg/2013/08/14/agent-of-intelligence-how-a-deviant-philosopher-built-palantir-a-cia-funded-data-mining-juggernaut/
[25] https://en.wikipedia.org/wiki/Palantir_Technologies
[26] https://freetrade.io/news/palantir-the-cia-funded-tech-firm-is-going-public
[27] https://somi.nl/en/palantir-technologies-suspected-of-privacy-issues
[28] https://www.theregister.com/2016/09/07/ciabacked_big_data_firm_palantir_says_secrets_pinched_by_investor/
[29] https://www.trtworld.com/magazine/israel-linked-cia-funded-palantir-goes-public-making-espionage-mainstream-40230
[30] https://www.thecanary.co/uk/analysis/2022/11/22/technology-developed-by-controversial-cia-funded-data-miner-to-run-nhs-data-programme/
[31] https://www.vox.com/recode/2020/7/16/21323458/palantir-ipo-hhs-protect-peter-thiel-cia-intelligence
[32] https://privacyinternational.org/news-analysis/2712/one-uns-largest-aid-programmes-just-signed-deal-cia-backed-data-monolith
[33] https://en.wikipedia.org/wiki/Total_Information_Awareness
[34] https://archive.epic.org/privacy/profiling/tia/doc_analysis.html
[35] https://www.aclu.org/documents/qa-pentagons-total-information-awareness-program
[36] https://irp.fas.org/crs/RL31730.pdf
[37] https://connections-qj.org/system/files/10.09_Total_Information.pdf
[38] https://www.wikiwand.com/en/articles/Total_Information_Awareness
[39] https://www.globalsecurity.org/security/systems/tia.htm
[40] https://isij.eu/article/total-information-awareness-darpas-research-program
[42] https://www.historyofinformation.com/detail.php?id=4990
[43] https://www.encyclopedia.com/politics/encyclopedias-almanacs-transcripts-and-maps/tia-terrorism-information-awareness