The Arrest of Pavel Durov: Unveiling the Plan Behind Telegram's Global Impact and the Rise of Cognitive Warfare
As strange as it may seem, over the entire past week the detention of Pavel Durov could not become the No. 1 favorite in the domestic information field. When you type the word “arrested” into a search engine, the first line that pops up is a hint - anyone has been arrested, but not Durov. It appears at the very bottom of the top ten prisoners. What does this mean? Basically, a lot.
As much as we would like to, we will have to recall the main points of this truly extraordinary event:
- Durov has a passport of a citizen of four countries. Russia, Saint Kitts and Nevis, France and UAE;
- A request to search for Durov was made, attention, by the Department for Combating Crimes Against Minors;
- In France, Durov is suspected of ten administrative and criminal offenses, including complicity in the administration of an online platform for the purpose of committing illegal transactions by an organized group;
- No official charges have been brought.
News of the incident with the owner of Telegram, an instant messaging application with a billion users, instantly produced a thermonuclear effect. All the world’s information resources, social networks, etc. are full of relevant headlines - “Arrested in France!”, “Aiding terrorists!”, “Child porn!” and other variations on topics that are extremely sensitive to all segments of the population.
A couple of days later, advanced experts formulated a more specific version. They say that the entire preliminary pantheon of accusations against Durov is a “cover operation,” and the real intention is to exert pressure and encourage the transfer of decryption tools (keys) to users’ correspondence to the special services. Translated into understandable language, Durov must give global control over the Telegram messenger. We have instructed our IT specialists to provide their professional explanations on this issue. Below is a summary of them. I urge you to read this case carefully. It will not be easy for a non-advanced user to immediately grasp this most important information. Although I tried to convert the rather specific IT language into understandable formulations. I hope this was at least partly successful.
Telegram uses 2 types of encryption.
Type A: Client – Server technology (a type of network architecture in which the data exchange process is distributed between the Client and the Server). Moreover, it should be especially noted that the Client does not mean a Person, but the Telegram application itself installed on the user’s device. In such a scenario, Servers perform the role of courier-delivery (forwarding server) and archivist (backup storage). A postman, in very simple terms. That is, the user data reaches the Server in clear text and is forwarded unchanged to the recipient’s device. Only the Device-Server-Device data transmission channel is protected. This means that the correspondence can be read in at least two cases. If the Server or data transmission channel is unauthorized compromised (hacked by hackers) or physical access to it is voluntarily opened by third parties. In fact, there is nothing wrong with this. Telegram, and not only it, does not even hide the presence of such an opportunity. This is done for the convenience of users, for example, so that all devices at the user's disposal can be synchronized if he needs it.
Type B. End to End encryption. In Telegram terminology – “Secret chat”. When the “secret chat” option is launched, end-to-end encryption technology is activated. Before sending, data is encrypted directly on the sender’s device, passes through the Server (switch function) and is decrypted exclusively on the recipient’s device. Encryption keys are created and stored directly on the devices of users participating in the exchange session.
At the same time, the keys are absolutely inaccessible along the entire route and even on other devices owned by the users themselves. Moreover, new keys are generated every time each subsequent message is sent. Important note. The frequency of generating new keys depends on the type of user’s device and Telegram has nothing to do with this. In other words, it is almost impossible to hack such technology remotely. Physical access directly to the user's devices is required. There are also some interesting factors that are usually not paid due attention. A wide range of metadata cannot be encrypted. For example, the date/time of sending and PUSH notification services, which contain a fairly extensive array of information. For a final understanding, I will give a figurative example.
When using End to End encryption, the letter is sent not in an envelope, as in the case of Client - Server technology, but in a locked safe, the PIN code (key, cipher, etc.) from which only the sender and recipient have. Obviously, it is physically impossible for anyone other than those who have the “keys” to the safe to read the letter. Even the “postman” cannot familiarize himself with it. To date, this is the most advanced encryption scenario in terms of data transmission security. However, such methods of protection, in essence, have existed since ancient times. It is known for certain that Gaius Julius Caesar used the letter shift cipher in written orders to his legates.
Conclusion: the claims of the French authorities to encourage Pavel Durov to cooperate in the transfer of “keys to Telegrams” are absolutely meaningless and futile. You can't ask someone for something if they don't have it. Moreover, it does not exist in nature! It seems that we are no closer to revealing the “Plan”, but we have excluded one of the erroneous factors that led away from the true plans of the real beneficiaries who had not yet emerged, who initiated the persecution of Pavel Durov.
Let's continue our "investigation". Let's return a little higher, to the public claims of the French:
“complicity in the administration of an online platform for the purpose of committing illegal transactions by an organized group” It seems to me that behind this claim, barely noticeable against the backdrop of all the ringing bells of “aiding terrorism,” lies something more than just “illegal transactions.” To continue the chain of reasoning, it is necessary to rely on some initial basis, preferably global and not far-fetched. I will take the liberty of suggesting that UBI – Unconditional Basic Income – can be taken as such a basis.
Quote from Wikipedia: “UBI is a social concept that involves the regular payment of a certain amount of money to each member of a certain community by the state. Payments are made to all community members, regardless of income level and are not conditional on the performance of any work.”
There have been extensive discussions in the world for quite some time on an unconditional basic income, as one of the effective strategies that will help alleviate the inevitably increasing social tension in the world community due to the potential reduction in available jobs in the foreseeable future. In other words, robotization and the rapid development and application of artificial intelligence technologies could put billions of people out of work. Indeed, we need to think about this seriously. The following problem arises. Where to get funds for such a helicopter “charity”? Classical capital is inclined to close the question in a simple way. Let's give the idlers free Wi-Fi, freedom, democracy and acceptable rations so that they don't go hungry and don't climb the barricades. And the new, rapidly gaining strength, digital capital sees the solution in a different, one might say, revolutionary plane. For example, leading AI guru and network baron Sam Altman has already publicly voiced his decision on UBI, proposing to pay a basic income from the profits from the computing resources of advanced AI models. An interesting proposal, I must admit. Let's return to Pavel Durov. What happened to him that the global hierarchs took extreme measures by authorizing his arrest? From this perspective, the reason is as simple as it is not obvious. He started handing out money. He did not waste precious time discussing and testing the waters in public space. In his typical manner, he immediately got down to business. Durov was able to create and launch an almost ideal mechanism for distributing money to everyone who is interested and without any restrictions on citizenship, gender, race, religion, age and social status. In its design, the amount of UBI is not limited by anything except one single factor - the time spent in the computer game "Hamster Kombat". This is the world’s first business stimulator game of this kind within the Telegram ecosystem, executed on its own TON blockchain (Pavel Durov’s cryptocurrency). Durov declared himself the new messiah. “Don't waste your time working for bread crumbs.
Waste your time on Telegram, and I will give you money for it, my real money. And you don’t have to worry about who invests them, I’ll take care of that.” This is what he said at one of his presentations, describing this project. If we analyze globally, then Durov has already prepared for the launch of a whole deck of new digital currencies with a well-developed mechanism for linking their rates with the main reserve ones (dollar/euro). This is a practical alternative! This is an actual revolution! It is difficult to imagine what the global hierarchs, who control the world community through a monopoly on the global financial system, experienced when some extra-systemic network baron, and even of Russian origin, brazenly encroaches on their diocese exclusively. Such a rebellion cannot be ignored! Under no circumstances! The objective prospect of losing radical control over huge masses of people, obtained by rivers of their own blood, loomed. The audience of active users at the peak of Hamster Kombat's popularity was approximately 300 million people. Hamster attacks! And “using a bad example,” the number of such game projects began to grow exponentially, rapidly turning into a new reality. It is likely that the detention of network baron Pavel Durov is only the beginning of a chain of countermeasures initiated by global hierarchs to counter the growing strength of network barons, the true scale of which we will see in the near future.
In this part of our analysis, we were able to identify the Plan and its beneficiaries. But this is not enough. In my opinion, the question is much deeper. So, let's proceed to the final part of the search for the global Plan.
Cognitive warfare.
This term has long gone beyond the confines of a conspiracy cliche, and directly appears in the official military doctrines of many states. In particular, its essence is revealed in detail in NATO doctrinal documents. “Cognitive warfare” is a method of action available to the state or influence groups seeking to manipulate the mechanisms of cognition of the enemy or citizens of a hostile state, to weaken, penetrate, influence, subjugate them to your will in order to cause maximum damage. This hypnotic formulation contains all existing and promising methods and technologies that will be used in this method of warfare.
Currently, “Soft power”, “information warfare”, “psychological operations” in combination with a host of other components are seriously considered as a superweapon with unlimited possibilities of application. And the latest communication tools, as a means of delivering “changed reality” to satisfy the own interests of global hierarchs, play a decisive role.
By competently manipulating the consciousness of people through the Network, you can achieve completely unimaginable results, without firing a single shot, figuratively speaking. The victim, obeying the will imposed from the outside, may not even realize until the last moment that he has been attacked. For the successful implementation of such ambitious plans, a monopoly on the means of disseminating information is necessary. This is the most important factor. All the prerequisites for the development of this direction have long been materialized and are available in direct access. The basis of modern cognitive warfare is the personal smartphone, a universal tool for communication and social networks. Today's global network is the natural habitat of many billions of people. By the way, they are voluntarily immersed in it 24/7 for their own money. If a person is subscribed to a dozen other information channels, then he lives one hundred percent in a mode of excessive information consumption and under the total influence of professional news editing. Persons with the appropriate skills to distinguish controversial truth from professional manipulation are an absolute minority and have little influence. The widespread use of social media and technology can make ordinary people especially vulnerable to well-orchestrated cognitive warfare attacks. Moreover, the social component of cognitive influence has moved to a more subtle level than primitive lies. Achieving the goals of cognitive warfare no longer requires deliberately false information or fake news. Now a different scenario is in vogue. Often, in order to cause a surge of public indignation and provoke the population to take practical action, including barricades, it is enough to publish a compromising government document or messages from the personal email correspondence of a government official. Passions are then inflamed through a system of mass distribution of social media messages that go viral with the help of online influencers, fake social media profiles, and automated messaging “bots.” Groups and communities on social media can be easily motivated to organize demonstrations and take to the streets. The natural reaction of the authorities to such initiatives will be artificially presented as inadequate, which will further aggravate the radicalization of society. It's done! The enemy sets fire to his own house! Isn't this the dream of every hegemon? Let's look into the future. Nearby. About twenty years, that is.
In the plans of the global hierarchs, trends towards the transformation of modern Man into some kind of easily manageable, highly specialized creature through the technical “improvement” of his mental and physical functions beyond the limits of natural ones are increasingly visible. Replacement of sensory connections with computer interfaces, verbal communication with computer telepathy or external downloading of digital data in a non-contact manner, mutual physical influence or contact - by remote robots or drones controlled by operators or AI. We are talking about the fusion of human biology created by nature and the mechanical drive created by them with the help of AI. However, this is still the future. Let's return to the present, to Pavel Durov. I have no doubt that the previous paragraph speaks for itself.
Therefore, there is no need to summarize at length. The idea exists. The global hierarchs would rather die than allow anyone to have any means in their hands that could effectively counter them in cognitive warfare. And Telegram is a large-caliber weapon.