The U.S. Sanctions Cuban Journalist For Reporting On The U.S. Blockade
The Dissident | February 17, 2026
The U.S. has recently cut off Cuba’s source of oil from Venezuela and Mexico, with the intention, as Trump recently admitted , of creating a “humanitarian threat” in hopes it will lead to regime change, boasting that because of the blockade, “There’s no oil. There’s no money. There’s no anything.”
As Cuban-based journalist Marc Frank reported , due to the blockade, “Prices are soaring, power outages are increasing, and gas lines are growing. Public and private transportation are disappearing. Produce at markets is dwindling, and all but emergency surgeries have been canceled. The fear that the quality of life will quickly deteriorate is palpable”.
The U.S. is now taking this a step further and placing targeted sanctions on Cuban journalists doing critical reporting on the blockade.
A Miami-based pro-regime change outlet called CiberCuba reports that the U.S. has “imposed visa restrictions” on Cuban journalist Pedro Jorge Velázquez, known as El Necio, accusing him of “involvement in harassment campaigns against American diplomats in Cuba”.
In response, El Necio wrote , “I am an ordinary young Cuban. Five years ago, I began doing my work through social media and collaborating with press outlets. I have no employment ties whatsoever to the Cuban government: currently, I do not work in press media or state institutions.”
He noted that the accusation of “harassment” is in reference to his “ latest journalistic investigation” where he uncovered, “ the purchase of fuel (gasoline) by US diplomats in Havana: the very same fuel that they block from Cuba, only to consume it themselves afterward.”
He noted that while the “sanction is irrelevant to me” noting that, “I have never had, nor have I ever requested, a visa to enter the US” he added that, “we do need to denounce this serious violation of press freedom” adding, “this is not a personal attack, but a precedent for censorship and coercion against every young Cuban who speaks out against the blockade on Cuba or who practices journalism that does not please the Trump administration.”
The U.S. sanctions against El Necio for reporting on the U.S. blockade on Cuba mirror U.S. sanctions on Francesca Albanese, the UN’s special rapporteur for Palestine, in retribution for a report she published exposing U.S. corporations’ complicity in the Gaza genocide.
Similarly, to justify the sanctions, the U.S. accused Albanese of “writing threatening letters to dozens of entities worldwide, including major American companies across finance, technology, defense, energy, and hospitality”, in reference to her writing letters to companies fueling the genocide in Gaza, informing them of their violation of international law and participation in war crimes.
The sanctions also mirror the EU sanctions placed on the former Swiss army colonel Jacques Baud, in retribution for his criticism of the proxy war in Ukraine.
From Cuba to Palestine to Ukraine, sanctions are more often being used as a tool to silence and intimidate those exposing and critiquing Western foreign policy.
Israeli firms transform cars into intelligence devices: Reports

Al Mayadeen | February 17, 2026
Modern vehicles have evolved into internet-connected digital ecosystems, a transformation that is reshaping the global intelligence market, with “Israel” paying special attention to this rising domain, according to a new investigation by Haaretz.
In intelligence circles, information harvested from vehicles is known as “CARINT,” short for car intelligence. Today’s vehicles function as “computers on wheels,” equipped with built-in SIM cards, GPS systems, Bluetooth connectivity, and multimedia platforms that continuously transmit data.
The report reveals that at least three Israeli companies are operating in this expanding sector, developing tools that enable government clients to track vehicle movements in real time, cross-reference vast databases, and identify specific targets among thousands of cars on the road.
Industry sources cited in the investigation described the use of AI-powered “data fusion” systems that combine vehicle telemetry, roadside camera feeds, advertising data, and cellular metadata to construct comprehensive intelligence profiles. Rather than directly hacking a device, agencies are increasingly assembling what sources describe as a surveillance mosaic from legally or commercially available data streams.
The case of Toka
Among the companies identified is Toka, co-founded by former Prime Minister Ehud Barak and former Israeli military cyber chief Yaron Rosen.
According to documents and industry sources cited by Haaretz, Toka developed a product capable of infiltrating a vehicle’s multimedia system, pinpointing its location, and remotely activating microphones or dashboard cameras. The system was reportedly approved by “Israel’s” Security Ministry for presentation and eventual export.
The company said that as part of its 2026 product roadmap, it no longer sells the hacking tool.
Experts noted that exploiting vehicle vulnerabilities remains technically complex, as each manufacturer employs distinct digital architectures. However, the possibility of remote access to in-car microphones and cameras has raised acute privacy and security concerns.
Another Israeli firm, Rayzone, has reportedly begun selling vehicle-tracking tools through its subsidiary TA9. Unlike offensive hacking products, Rayzone’s system focuses on aggregating and cross-referencing data, including SIM-card tracking, Bluetooth signals, and license-plate recognition feeds.
The investigation suggests that the intelligence industry is gradually shifting away from high-profile phone-hacking technologies associated with firms such as NSO Group and toward large-scale, AI-enabled data analytics platforms.
In the United States, companies such as Palantir Technologies analyze license plate databases and vehicle registries, integrating them into broader intelligence systems. Israeli firm Cellebrite also works extensively with US law enforcement agencies in extracting and processing digital evidence, including vehicle-related data.
Vehicle intelligence expanded post Oct. 7
The Haaretz investigation further highlights that in the aftermath of Operation al-Aqsa Flood, Israeli authorities, with support from the private sector, developed advanced capabilities to locate vehicles stolen from army bases and border communities. According to the report, these tools were later integrated into military systems.
The article also points to China’s longstanding regulatory framework requiring domestic car manufacturers to transmit vehicle data to state authorities. It further notes that the Israeli Occupation Forces imposed restrictions on certain Chinese electric vehicles entering military facilities, citing security concerns.
Security analysts warn that the accelerating digitization of vehicles not only expands surveillance capabilities but also increases cybersecurity risks. Ethical hackers have previously demonstrated, in controlled environments, the ability to manipulate steering systems or disable engines remotely. Industry sources cited in the investigation indicate that some government clients are increasingly expressing interest in remote vehicle-disabling technologies.
At global intelligence exhibitions such as ISS World, often referred to as the “Wiretapper’s Ball”, artificial intelligence and real-time data fusion dominate discussions. AI systems now enable the rapid processing of millions of disparate data points, including vehicle telemetry, audio streams, and video feeds, transforming them into actionable intelligence with unprecedented speed.
Industry insiders argue that as vehicles become more connected, they will inevitably play a more central role in intelligence gathering. Privacy advocates, however, caution that the same connectivity that enhances consumer convenience may also underpin a powerful and potentially intrusive surveillance infrastructure.
The Haaretz investigation concludes that while directly hacking individual vehicles remains technically complex, AI-driven aggregation of vehicle-generated data could make such intrusions increasingly unnecessary, raising significant questions about privacy, regulation, and the future of digital mobility.
Palantir, Dataminr help build Gaza AI-Driven digital prison system
A +972 Magazine investigation reveals that US firms Palantir and Dataminr are embedded in the US-Israeli post-war plan for Gaza through the Civil-Military Coordination Center (CMCC), a US-run hub coordinating Trump’s 20-point plan. A Palantir “Maven Field Service Representative” tied to Project Maven has been assigned to the center, integrating battlefield AI into Gaza’s future control structure.
Project Maven fuses satellite imagery, drone feeds, intercepted communications, and metadata into an AI platform described as “optimizing the kill chain.” Rights groups argue these AI-enabled systems have accelerated the genocide in Gaza, scaling up killings with minimal human oversight. UN figures show nearly 70% of verified fatalities are women and children, with entire families wiped out in strikes allegedly guided by AI systems.
Palantir has expanded cooperation with Israeli occupation forces since 2024, doubling its Tel Aviv presence and supporting war-related missions. Amnesty International lists the company among firms whose services helped facilitate genocide and starvation in Gaza. Dataminr, specializing in real-time social media surveillance, has also been integrated into the framework, feeding AI-driven threat intelligence into the evolving security architecture.
Under the so-called “Alternative Safe Communities” model, Palestinians would be forcibly relocated into fenced, heavily monitored compounds under US-Israeli control. Within these zones, AI systems would track phones, movements, and online activity, flagging individuals as “security risks,” effectively turning Gaza into an AI-driven digital prison and kill-list system.
This architecture has been compared to Nazi concentration camps in its logic of isolating, surveilling, and managing an entire population as a security threat, reducing civilians to data points under total algorithmic control.
Zionist-controlled companies to surveil British citizens

Press TV – February 17, 2026
The implications of the British state using technology produced by Zionist-controlled companies to surveil British citizens are beyond belief.
The cornerstone of a sovereign nation is the absolute control over its own justice, its own data, and its own watchmen. Yet today, the very machinery of British law enforcement is being quietly and systemically outsourced.
The British government has allowed the digital and physical infrastructure of the state to become a high tech extension of a foreign power, driven by the pernicious influence of Zionism, an ideology that prioritizes the expansion of a foreign entity over the rights of people in the UK.
This is not merely a matter of procurement. It is a surrender of independence.
By embedding Zionist-linked firms into the heartbeat of British society, the government is importing a surveillance philosophy rooted in the subjugation of one people and applying it to their own subjects.
These are combat-proven technologies forged in the fires of the Gaza genocide, and they are now the primary eyes and ears of the metropolitan police.
The police use Israeli intelligence firm Cellebrite to unlock the phones and private lives of their own citizens. They also use BriefCam to track people’s movements through video synopsis.
BriefCam is a company co-founded by Gideon Ben-Zvi, a veteran of the IOF elite unit 8200 Intelligence Corps, who openly admits to using unit 8200 criteria to lead his ventures.
The reach of foreign intelligence into the streets is even more direct through Corsight AI, which provides facial recognition throughout the country.
Born as a subsidiary of Cortica, it was founded by Igal Raichelgauz, another alumnus of the Zionist military intelligence apparatus.
When our faces are scanned by software overseen by the architects of the occupation of Palestine, can we truly say that the British public is being policed by British consent?
But the intrusion goes deeper than software. It reaches the very hands of our officers on the front lines.
ISPRA, an Israeli specialist in riot control, has historically supplied the crowd management munitions used to police the streets.
When the tools used to suppress dissent in the UK are manufactured by a firm specializing in the containment of occupied territories, the line between domestic policing and foreign military occupation begins to blur.
Furthermore, Motorola Solutions, a company listed by the United Nations for its links to illegal settlements, is now deep inside our research projects.
Through initiatives like CREST and Connections, they’re building predictive policing tools designed to monitor the social media content and online lives of the British public.
When a company that facilitates surveillance in the West Bank is the same one mapping the future crimes of Londoners, we have fundamentally compromised our domestic integrity.
Links between Zionist movement and Lionel Idan
Lionel Idan is a key British prosecutor serving as the Chief Crown Prosecutor for the CPS and also the National Hate Crime Lead Prosecutor.
He’s currently being heavily lobbied by a network of powerful Zionist groups.
We’re not just talking about casual meetings.
Idan has held repeated engagements with the Israeli embassy and Zionist lobby groups, the board of Deputies of British Jews and the Community Security Trust, CSD, an organization headed by convicted fraudster Gerald Ronson.
The objective is clear, to ensure the Crown Prosecution Service, CPS, fully adapts the IHRA definition of anti-semitism, a definition weaponized against anti-Zionists, as we saw during the attacks on Jeremy Corbyn and the Labour Party.
Lionel Idan has not hidden these alliances. In an op-ed for the Jewish News, he boasted that the CPS sits on the anti-semitism Working Group alongside the CSD and the Jewish leadership council.
He confirmed that lobby groups, the CSD and the Antisemitism Policy Trust, are now core members of the CPS External Consultative Group on Hate Crime.
Perhaps most concerning is that the national prosecution guidance is being shaped by these very groups. Idan has admitted that their involvement helps the CPS define the line where anti-Zionism becomes a criminal offense.
When the person overseeing London’s prosecutions attends Israel lobby annual dinners to celebrate new security task forces, where is the independence of the UK legal system?
It should be demanded that the CPS remain an impartial body free from the influence of political lobbyists and foreign interests.
THE CHILDREN GAMBIT
How Europe’s Political Class Weaponises Innocence — and Has Been Building This Machine for Years


Islander Reports | February 17, 2026
Before we start. These platforms aren’t innocent. They’ve extracted billions from our attention, manipulated our children’s dopamine cycles, censored truth tellers, handed our data to surveillance capitalism and slept soundly every night. Hold that. And then read what follows anyway — because what’s happening right now is something else entirely.
Let’s start with the money. Because the money never lies.
€1.2 billion. Ireland’s Data Protection Commission. Meta. May 2023. The largest GDPR fine in history, for routing EU citizen data to the United States without adequate protection. A record that lasted about five minutes.
€530 million. TikTok. May 2025. Same Irish authority. For sending European user data to China and then, this is the part they buried in the press release — lying about it during the inquiry. TikTok told regulators throughout the investigation it wasn’t storing EEA data on Chinese servers. In February 2025, they quietly admitted it had been. All along.
€345 million. TikTok again. 2023. Children’s data. €14.5 million from the UK’s Information Commissioner’s Office on top of that, same year, same issue. €91 million to Meta Ireland in September 2024 — they stored hundreds of millions of user passwords in plaintext. Just sitting there. No encryption. Exposed. €390 million to Meta the year before, for forcing users to accept personalised advertising as a condition of accessing their own accounts.
And then December 5th, 2025. The European Commission handed X — formerly Twitter, now Elon Musk’s megaphone and the primary target of every European leader who’s discovered that their citizens can organise against them online — a €120 million fine. First ever penalty under the Digital Services Act. For misleading users about the blue verification badge, concealing advertiser identities, and blocking government-approved researchers from accessing algorithmic data.
Over €2.5 billion. Just the verdicts. Just the ones that made it to conclusion. Fourteen active DSA proceedings still grinding through the machinery, with Meta and TikTok each facing potential fines of 6% of global revenue. That’s €9.9 billion for Meta. €9.3 billion for ByteDance. Numbers large enough to restructure companies. Numbers designed to make platforms obedient.
So when Pedro Sanchez walked out this morning and announced that Spain’s Council of Ministers would invoke Article 8 of the Organic Statute of the Public Prosecution Service — sic prosecutors onto X, Meta and TikTok for “crimes they may be committing” through AI-generated child pornography — understand what you’re looking at.
This isn’t a regulator at the end of its rope. This is a political class that has already built the machine, tested the machine, extracted billions through the machine — and is now deciding what else the machine can reach.
“May Be Committing”
That’s the phrase. Not “has committed.” Not “is committing.” May be. Sanchez posted it on X — the very platform he’s threatening to prosecute — and the media swallowed it whole, no questions about evidence or methodology or whether a public prosecutor’s office is the right instrument for making technical judgements about AI image generation pipelines.
The Spanish government claims Grok produced three million sexualised images in eleven days, including over 23,000 involving minors. Strong numbers. Specific numbers. Precise to the point of being designed to prevent challenge — because you can’t interrogate evidence you haven’t been shown, and asking to see it means you’re defending the indefensible. Not one published source. Not one independent methodology. They arrived complete, ready-made for outrage.
That’s the genius of it. The children gambit works precisely because you cannot question it without becoming the villain of the story.
Pavel Durov said it plainly — and look, nobody should hold Durov up as a civic virtue. But he’s spent years watching governments use platform regulation as a control mechanism, and when he says Sanchez’s moves aren’t safeguards but steps toward total control, he’s speaking from operational experience. He’s seen this architecture before. From the inside.
Here’s what this moment actually is, in the longer register. Every time a Western liberal government needs to consolidate control over the information environment, it finds a victim group whose protection cannot be questioned. In the 20th century they used communists, terrorists, drug dealers. The 21st century discovered something more powerful — children. Unimpeachable. Unchallengeable. A shield so morally absolute that any surveillance infrastructure built behind it arrives pre-legitimised. Sanchez didn’t invent this playbook. He’s just the current page.
Here’s the question nobody in any press conference asked today. If you actually wanted to protect children from AI-generated abuse material — if that were the genuine, singular, burning priority — what would you do?
You’d hunt the producers. Fund specialist cyber units with the resources and legal powers to identify, locate and prosecute the people who generate and distribute child sexual abuse material. Build better reporting pipelines so victims and witnesses have direct, fast routes to enforcement. Nail the distribution networks — the forums, the channels, the file-sharing infrastructure where this material moves — with targeted operations and international cooperation. Invest in takedown technology that works at scale. These are the unglamorous tools of actual child protection. Forensic. Technical. Expensive. Slow. Not suited to a press conference.
None of that is what Sanchez announced today. What he announced was prosecution of three of the most visible American technology platforms, with unverified statistics, under a legal mechanism designed for emergency government intervention in the public interest — on the same morning Keir Starmer in London announced restrictions on the last tool of genuine online privacy.
That’s not child protection. That’s the political class treating every ordinary user as a pre-suspect, building infrastructure that watches everyone in order to catch a tiny minority — and using the minority as the justification.
When someone says “think of the children,” look at what they’re actually building. Because what they’re building right now, across Europe and Britain, is an internet where you need permission to speak.
The Network They Actually Protected
Let’s be precise about who’s invoking children to demand your identity.
Jeffrey Epstein ran an international child trafficking operation for decades. Not speculation. Court and DOJ documents. Thirty-five girls identified by Palm Beach police in 2005. FBI reports going back to 1996. Federal prosecutors in Florida prepared a 60-count draft indictment in 2007 — conspiracy, sex trafficking of minors, enticement — charging Epstein and three co-conspirators described as employees who “persuaded, induced, and enticed individuals who had not attained the age of 18 years to engage in prostitution.”
The names of those three co-conspirators were in the indictment. Then US Attorney Alexander Acosta gave Epstein 13 months in county jail with work release six days a week and immunity for “any potential co-conspirators” — in direct violation of federal victims’ rights law. The investigation was shut down. Epstein walked. The network persisted.
Fast forward. January 2026. Department of Justice releases 3 million pages (a mere 2% of what they have in possession) under a law Congress passed unanimously demanding transparency. Victims’ names exposed. Driver’s licenses published. Witness statements naming perpetrators? Redacted. Draft indictment naming co-conspirators? Still redacted. Attorneys for over 200 victims called it “the single most egregious violation of victim privacy in one day in United States history” and accused DOJ of “hiding the names of perpetrators while exposing survivors.”
Congressmen like Thomas Massie had to read names aloud on the House floor before DOJ would release them. Rep. Ro Khanna: “The survivor statements to the FBI naming rich and powerful men who went to Epstein’s island, his ranch, his home — who raped and abused underage girls — they were all hidden.”
Now look at who’s demanding you hand over your identity to speak online.
Keir Starmer — the man proposing VPN bans and bypassing Parliament to regulate your thumbs on a screen — appointed Peter Mandelson as UK Ambassador to the United States in December 2024. Mandelson called himself Epstein’s “best pal” in Epstein’s 50th birthday book. Their friendship continued after Epstein’s 2008 conviction. Emails released in the January 2026 DOJ files show Mandelson received £75,000 in payments from Epstein between 2003-2004, leaked classified government information to him while serving as Business Secretary in 2009-2010, and sent messages suggesting Epstein was wrongfully convicted.
Starmer knew about the Epstein connection when he made the appointment. Mandelson had already resigned from government twice before — conflicts of interest, financial misconduct — and the Epstein relationship was public record. Starmer appointed him anyway. Made him Britain’s top diplomat. Gave him the US ambassador post. When the files dropped and the depth of the relationship became undeniable, Starmer’s chief of staff Morgan McSweeney — who recommended Mandelson — resigned. Then Starmer’s communications director. Then his cabinet secretary. Three senior aides gone in days.
Mandelson is now under criminal investigation by the Metropolitan Police for misconduct in public office. US Congress has requested he submit to interview as part of its investigation into Epstein’s co-conspirators and enablers.
And Starmer — whose government just had VPN downloads surge 1,800% because British citizens don’t trust him with their browsing data — is the man now lecturing the public about online child safety.
This isn’t hypocrisy. It’s consistency. The same political class that gave Epstein’s network immunity and protected co-conspirators for two decades is now demanding total visibility over your identity. The same Department of Justice that hid perpetrators and exposed survivors is the one telling you encryption backdoors are necessary to protect children. The same institutions that shut down the Epstein investigation in 2008 and buried the names in 2026 are building the Digital Identity Wallet, the fact-checker networks, the 24-hour removal mandates.
When they say this is about protecting children, look at the Epstein files. Look at who they protected. Look at who they prosecuted. Look at who they gave immunity. Look at whose names are still redacted while survivors’ information gets published.
Then ask yourself why these exact same people need to know who you are before you’re allowed to speak.
What This Actually Is — Unelected, Unaccountable, and Expanding
Here’s what nobody in the mainstream coverage will say: the regulatory apparatus now targeting these platforms was not built by people you voted for.
Picture what happens when a flag arrives. It’s 2am. A compliance officer at a major platform — a 26-year-old in Dublin or Amsterdam with a policy degree and a quota — opens an alert. A Brussels-appointed body has flagged a post as potentially harmful. The DSA gives the platform 24 hours to act or face fines of up to 6% of global revenue. There’s no named accuser. No court order. No adversarial process. Just a designation, a deadline, and a number so large that hesitation is financially irrational. The post gets removed. The writer wakes up to find their words gone. The politician whose opponents wrote it points elsewhere. The regulator points at the law. The compliance officer points at the process.
Nobody elected any of them.
The European Commission is not elected. Its commissioners are appointed by governments, approved by a parliament most Europeans couldn’t name the composition of — and its enforcement apparatus, the officials running fourteen DSA proceedings and handing out nine-figure fines, operates at a distance from democratic accountability that is not incidental but structural. The “trusted flaggers” embedded in the DSA framework, deputised to mark content for priority removal, are appointed bodies. Ofcom in the UK is a regulator, not an elected chamber. The European Board for Digital Services, coordinating enforcement across 27 countries, answers to no electorate anywhere on earth.
Sanchez and Starmer announce the intention. The technocrats execute it. And when it goes wrong — when the journalist’s article vanishes into a compliance process with no appeal, when the civil servant’s flagging of “migrant hotel” videos turns out to be political interference dressed as child protection — there is no one to vote out. The politician points at the regulator. The regulator points at the law. The law was written in workshops whose attendees you’ll never know. Democratic majorities change. Regulatory architecture doesn’t.
That’s not a flaw in the system. It’s the system working exactly as it was designed.
Britain and the VPN — The Moment the Mask Slipped
The week before Sanchez made his announcement, Keir Starmer was in London saying “no platform gets a free pass.” New powers to restrict social media. AI chatbots brought under the Online Safety Act. Infinite scrolling — the physical act of moving your thumb down a screen — to be regulated. Action in “months, not years.” And crucially, explicitly, openly: bypassing the parliamentary scrutiny that would normally apply to legislation this significant. He said it out loud. The urgency is too great for debate.
But the detail that should stop every person who cares about liberty cold is the VPN proposal.
Let’s be clear about what a VPN actually is, because the political class is clearly hoping you don’t know and don’t care to find out.
A Virtual Private Network encrypts your internet connection and masks your IP address — your digital location, the identifying tag that follows you across every website you visit, that your internet service provider logs, that governments can and do compel ISPs to hand over. When you use a VPN, your traffic passes through an encrypted tunnel. Your ISP sees that you’re connected to a VPN server. That’s it. They cannot see where you go. They cannot see what you say. They cannot read your communications.
This is the tool that domestic abuse survivors use to hide their location from abusers. That investigative journalists use to protect their sources. That activists use to organise without government surveillance. VPNs aren’t a loophole. They’re a lifeline.
After the UK Online Safety Act came into force, VPN downloads in Britain surged by 1,800%. Half the top ten apps in British app stores became VPN services. Ordinary British citizens — not criminals, not paedophiles, not terrorists — reached for the exact same tool that people under authoritarian regimes use to avoid state surveillance, because they didn’t want to submit government-verified identity just to browse normally.
Starmer’s response to that 1,800% signal was to propose restricting VPNs.
Not to reconsider whether the surveillance infrastructure was too invasive. Not to ask why a free people felt the need for anonymity tools in a democracy. No — the tool of privacy is the problem. The loophole to be closed.
And here’s the thing that proves this was never about children. Ban commercial VPNs tomorrow and any determined teenager circumvents it within hours — cheap cloud servers, open proxies, custom tunnels for less than a dollar a month. The only people genuinely impacted are the ones relying on them for legitimate safety: the abuse survivor hiding their location, the journalist protecting a source, the person who simply doesn’t want their ISP building a commercial profile of their private reading habits. A VPN ban doesn’t protect children. It closes the last gap in the surveillance infrastructure — means that when the DSA triggers an investigation into your political commentary, when the Brussels-appointed fact-checker flags your article, there’s nowhere left to go. No tunnel. No private space. Just a 1984 dystopian, digitally enhanced.
The Wallet Nobody’s Talking About
Beneath all of this — quieter, slower, more permanent than any headline — is the piece of architecture that makes everything else irrelevant to debate once it’s in place.
By December 2026, every EU member state is legally required to provide its citizens with a European Digital Identity Wallet. Not a proposal. Law — Regulation EU 2024/1183, in force since May 2024. Major platforms will be required to accept it as a login mechanism. The private sector — banks, retailers, online services, social media — can request verified identity information through it.
Brussels will tell you the privacy protections are robust. And it’s worth taking that position seriously, because it isn’t entirely dishonest.
Article 5a of the regulation is real. It states explicitly that relying parties — the companies and platforms using the wallet — “shall not refuse the use of pseudonyms, where the identification of the user is not required by Union or national law.” The Commission points to this as the safeguard. They have a point. It’s in the law. It’s binding. If you want to use your wallet pseudonymously on a platform that has no legal requirement to know who you are, the regulation says you can. Proponents argue this is a meaningful, enforceable right — and that critics conflating the wallet with mandatory real-name requirements are misreading the text.
The problem is the eleven words the Commission would prefer you not to dwell on: where the identification of the user is not required by Union or national law.
That clause means the pseudonymity right exists only in the space where no law has yet required your identity. It is protection that any member state can legislate away, for any service, with a single national law and a stated reason. Child protection. Anti-terrorism. Financial crime. Age verification. The reasons are not hard to find. The EU has no override mechanism — Brussels cannot prevent a member state from passing a law that, in its domestic application, triggers the exception and requires identification. So the right survives only until a government decides it shouldn’t. One parliament. One vote. The pseudonymity is gone for that service, in that country — legally, permanently, with the full blessing of the regulation’s own text.
And there’s something else the Commission won’t volunteer. The architecture meant to enforce the pseudonymity right — the mechanism that would actually prevent platforms from demanding your identity when they have no legal right to — was quietly gutted in implementation. Privacy advocates at epicenter.works, the only civil society organisation that worked on this file throughout the entire reform process, found that the Commission made relying party registration certificates optional rather than mandatory. Without mandatory certificates, the wallet cannot verify whether a company’s request for your real identity is legitimate or overreaching. Tech giants can demand identification in contexts that don’t legally require it. There is no technical mechanism to stop them. The safeguard exists in the legislation. The infrastructure that would make the safeguard real was made optional in the implementing regulations.
The Commission was told this directly. They proceeded anyway.
Civil society organisations warned EU officials in an open letter that the wallet “may eliminate anonymity, leading to over-identification and a loss of privacy.” Unacknowledged. One hundred and thirteen free speech and privacy experts wrote separately to raise similar concerns about the broader regulatory framework. Ignored. The pattern of constructing the infrastructure first and addressing rights concerns later — or not at all — is not a run of oversight failures. It’s a consistent set of choices made by people who understood exactly what they were choosing.
The Machine Is Already Running
People keep framing this as something that might happen. Future concerns. Hypothetical overreach.
It’s not the future.
The European Democracy Shield is operational — fifty action points, a European Centre for Democratic Resilience, a state-funded network of fact-checkers on Brussels money with a Brussels mandate, described in their own documents as “rapid response capacity” for information “crises.” The Commission decides what a crisis is. There is no external appeal. Just a bureaucrat with a mandate to act within 24 hours and a definition of disinformation so broad that it extends, in the Commission’s own telling, to content “that is not illegal.”
How broad? In May 2025, the Commission hosted a closed-door workshop with platform compliance teams. Training exercises. Internal documents. The US House Judiciary Committee obtained these documents under subpoena — you can disagree with the committee’s politics but you can’t argue with what the documents actually show. One exercise asked participants how to handle a post: an image of a teenage Muslim girl in a hijab alongside the text “we need to take back our country.” The exercise classified the combination as “illegal hate speech” requiring removal. Now, a reasonable person might argue about that specific scenario. Fine. Argue it. But the fact that this is the level at which European regulators are working — training platform compliance teams to remove common political sentiment combined with religious imagery, in closed-door workshops, before any court has ruled, before any democratic debate has happened — tells you something important about where the definitions are pointing.
Think about what that means in practice. Not in theory — in practice. A compliance officer at a platform with 400 million users gets a flag from a Brussels-funded body. The post contains a political opinion combined with an image. The body has designated it harmful. The platform has 24 hours. The alternative is a fine that could be measured in billions. Nobody phones a judge. Nobody consults the person who wrote it. The post disappears. And when it does — when that specific combination of political sentiment and religious imagery gets quietly removed from 400 million people’s feeds at 2am by someone following a process designed in a workshop that was closed to the public — that isn’t a transparency obligation. That’s the state deciding what the public is allowed to see. And doing it with plausible deniability built in at every layer.
That fact-checker network plugs directly into DSA enforcement. Platforms — X, Meta, TikTok, and by mid-2026 almost certainly ChatGPT, which already has three times the user numbers needed to trigger Very Large Online Platform designation — will be legally required to act on those findings. Not consider them. Act. Within 24 hours. Or face fines of 6% of global revenue.
The €120 million fine X received in December 2025 wasn’t for hosting child abuse content. It was for opacity — for not giving government-approved researchers access to the recommendation algorithm that determines what information reaches citizens. The Commission called it a transparency obligation. What it actually was: the state asserting the right to see inside the machine that shapes what the public thinks, so it can instruct the machine to shape it differently.
And when the Digital Identity Wallet closes the last gap — when the pseudonymity is quietly legislated away by a member state with a “reason,” when the VPN tunnel gets restricted, when every platform knows exactly who is saying what with a government-verified name attached — the system is complete. Everyone who speaks online, identified. Everything said, attributable. Every flag by a Brussels-appointed body, actionable within a day.
All of it constructed, piece by deliberate piece, in the name of protecting children from harm.
Final thoughts
The Soviet Union had a name for the officials who ran its censorship apparatus. Guardians of the public good. They had fact-checkers — called editors, party reviewers, information officers. Rapid response systems. Legal frameworks for acting on speech that threatened the stability of the state. Most of them genuinely believed they were protecting something real. That’s what makes these systems so durable — the people inside them are sincere.
They didn’t think of themselves as censors either.
What you are watching, from Madrid to London to Brussels, is the construction of a digital order in which the ability to speak freely, anonymously, without state knowledge, is being dismantled — not through jackboots but through frameworks, directives, DSA workshops, government-funded fact-checker networks, and the entirely reasonable-sounding proposition that we must protect our children.
Sánchez is a man whose government has been at war with X since the platform gave his opponents a direct line to Spanish voters that bypassed media institutions his party spent years cultivating. Starmer is a man whose government monitored social media during a domestic political crisis and then moved to expand its legal authority over the very platforms that let citizens talk about what they saw. The European Commission is a body of unelected officials who trained platform compliance teams, in closed-door workshops, to remove political sentiment they’d categorised as harmful — and then ignored 113 experts who wrote to warn them what they were building.
Keir Starmer is a man who appointed an Epstein associate as his personal envoy to Washington, knowing the relationship, knowing the history, and when it collapsed appointed himself the guardian of online child safety
These. Are. The self appointed guardians of the children.
They gave Epstein’s co-conspirators immunity and are still hiding their names two decades later. But they need to know yours before you can post a political opinion. They protected a trafficking network with clients in the highest levels of Western power. But you’re the threat that requires a Digital Identity Wallet. They redacted the men who procured children for a convicted paedophile while publishing the victims’ driver’s licenses. But your VPN is the problem that demands legislative action.
Call that what it is.
They didn’t prosecute the network because they were the network’s best customers. So how dare they invoke children’s safety to strip yours.
€2.5 billion extracted. Fourteen proceedings active. A Digital ID mandate rolling out across 27 countries by year’s end. VPNs under legislative attack in the birthplace of the Magna Carta. Parliamentary scrutiny openly bypassed in London. A Democracy Shield with a rapid response protocol for information crises that no one elected anyone to define.
They’ve been building this for ten years. The fines, the frameworks, the wallets, the fact-checkers, the VPN bans, the bypassed parliaments. Layer by layer. Always with a reason. Always with a child somewhere in the justification.
They’re nearly done.
And when it’s finished — when the wallet is in your pocket, the fact-checkers are wired to the platforms, the pseudonymity has been legislated away in some member state that needed a “reason,” the last encrypted tunnel closed — they will stand in front of all of it and tell you it was always, only, ever about the children.
An internet where you need permission to speak isn’t a safer internet. It’s a controlled one.
Epstein’s co-conspirators walk free while you need state permission to call them what they are.
Believe them if you want. History will know what it was.
A note on comment posting at Alethonews
Many readers may be aware of the fact that the ADL has been using AI to locate targets for libel suits.
Alethonews archives have been methodically scoured by AI.
At this time all comments have been removed and no future posts will have comments allowed.
Trump stalls over Iran strike plan, Iran holds all the aces
By Martin Jay | Strategic Culture Foundation | February 17, 2026
Trump has the option of going to war with Iran and receiving much-needed campaign funds from Israel for the midterms – or opting to defy Bibi and facing certain defeat by losing both houses and facing certain impeachment. Can the Iranians save him?
Is Trump serious about going to war with Iran? To understand this, it’s important to examine his relationship with Netanyahu and to see who has the advantage when it comes to dragging the U.S. into a war, and whether Israel can actually be a greater threat to the U.S. than Tehran can ever be.
The trap that Trump is falling into is one where he has little or no wiggle room at all to control the Iran crisis, whereby Israel can threaten him with isolation while it goes ahead with its strike.
There are two dynamics at play here which are struggling to find a compromise. Trump wants a deal with Iran which takes away their nuclear capability, while Israel wants a war which overthrows the Iranian regime and installs a Mossad/CIA puppet. The problem, though, is that Israel is not an honest broker and keeps shifting the goalposts. The latest demand now is that removing Iran’s ballistic missiles should be at the heart of any deal that Trump pulls off.
Trump is ensnared and is aware of how Bibi is manipulating him. He may, on occasion, swear at journalists and pretend he is his own boss and his own president and that Israel is a client state of Washington which has to toe the line, but in reality, it is clear that Israel is calling the shots.
In recent days, we have heard that the one aircraft carrier the U.S. had in the region, the USS Abraham Lincoln, is to be joined by a second called the USS Gerald Ford. U.S. media report that the Lincoln is in the “Arabian Sea,” which is a comical way of saying that it’s keeping its distance from Iran’s shores and Houthi missiles off the coast of Yemen. But other reports are suggesting that the reason why Trump claims he has sent a second carrier – to beef up the “flotilla” in case of a war breaking out with Iran – is untrue. Some insiders are briefing journalists that the Lincoln has technical problems which will render it useless in a combat situation and so needs to be replaced with the more advanced Ford.
However, even this might be a false narrative offered by Pentagon insiders who are not supporters of Trump. A second explanation about the carriers is that it buys Trump time. He has even told reporters that it will take about a month for the Ford to get there, which he believes should be ample time for a deal to be struck with Iran, or at least will give him four more weeks to work out a way of dealing with the threat – that’s the threat from Israel, not Iran.
Israel threatened Trump before when he went ahead with his bunker buster bombs in June of last year by saying simply, “If you don’t do it, we’ll nuke Iran.” It worked. This time around, the threat is, “If you don’t join us, then we’ll strike Iran alone and you will have to deal with the consequences of being the first U.S. president to have to explain to the Jewish lobby why Iran is wiping Israel off the face of the map.” This second threat is multi-layered and also might work with Trump, given that the midterm elections, which are approaching, will cost twice what the elections cost which got him into office. It will be Jewish money which bankrolls him this time around, with the intention of saving him from losing both houses and facing inevitable impeachment.
And so, in many ways, Trump is closer to and more dependent on the regime in Tehran to help him out. A deal which limits the enrichment of uranium and can guarantee no nuclear bomb can be made might be something he can present to the American people as a great victory. The irony is that the deal might be more or less a carbon copy of Obama’s, which he, Trump, rejected while in his first term in office, a rejection which has created the present crisis.
The trouble with any deal now about enrichment is that it is unlikely to satisfy the Israelis, who have become more aware in recent weeks about the capability of Iran’s latest generation of ballistic missiles both in terms of defence and attack. Moreover, the U.S. attack on Iran last year for 12 days has now raised the stakes to a fever pitch, making the Iranians clearer and more focused about any kind of attack happening against them: all-out war.
According to some credible reports, Trump was recently asking Pentagon chiefs if the U.S. could carry out a single in-and-out strike operation which could be used to warn Iran while satisfying Israel at the same time about the U.S. threat, and he was told no such options are feasible. This is due to Iran being much more prepared now for such attacks, both militarily and intelligence-wise, while the Mossad operation of creating civil strife on the ground failed spectacularly. The U.S. is in a very tight corner right now, as its forces and its allies in the region are in the crosshairs of Iran the moment the first bomb is dropped, and so Trump’s options to go to war are very limited. It would be suicidal for Trump to strike Iran, as the losses to U.S. forces and the disruption to oil distribution via the Straits of Hormuz would be too great, not to mention the destruction of infrastructure in Israel itself.
But there is also another factor which is putting all the pressure on Trump to get a deal with Iran. Since last June’s attack and more recently Trump’s betrayal of cordial relations with Putin conjured up at Alaska, along with the Venezuela coup, both Russia and China have upped their support for Iran. This is a critical factor now preventing Trump from hitting Iran with anything. China recently gave Iran its latest state-of-the-art new radar system which can identify U.S. stealth bombers at a range of 700km. Game changer. If you consider Iran, Israel, and the U.S. as three poker players at the table, it is clear that Iran now has the best hand with the most options. It can maximize its role now and exploit Trump’s vulnerability by going for a deal which involves sanctions being relieved, or it could hold out and play a long game way beyond Trump’s one-month breathing space and really turn up the heat on him leading up to the midterms in November. Iran always plays for time and is good at this strategy. And given that even the kindest analysis of America’s strike capability in Iran is two weeks before depletion of all missile stocks is reached, any hawks close to Trump who are pushing for a strike must have the destruction of the U.S. in their strategy as well, as Iran cannot be pounded into a state of submission in such a short space of time. Surely that can’t be the aim of Bibi. Surely not!
Zelensky’s Ceasefire for Elections is Strategic Gambit, Not Democratic Move
By Ekaterina Blinova – Sputnik – 17.02.2026
Volodymyr Zelensky’s reluctance to hold elections in Ukraine is multi-faced, according to Marco Marsili, geopolitical analyst at CESRAN International and former OSCE election observer.
The Ukrainian politician is on thin ice despite optimistic polling numbers: “The reported approval ratings reflect a carefully managed wartime narrative, not democratic reality,” Marsili tells Sputnik.
What’s the reality?
- Demographic catastrophe: An entire generation of fighting-age men has been consumed by the front lines
- Economic collapse: Beyond Western-subsidized survival, Ukraine’s economy is a shell
- Neo-Nazi grip: Zelensky’s political survival depends on being perceived as a strong promoter of nationalism
To block elections and derail legitimate peace talks, Zelensky is demanding conditions that directly contradict Russia’s position.
“Zelensky’s proposal for a two-month ceasefire to enable elections is a multilayered strategic gambit, not a genuine democratic exercise,” says Marsili.
How would Zelensky use the ceasefire he demands?
Military respite: “It is a classic military pause dressed in political clothing,” the pundit explains. “Two months without active hostilities would allow Ukraine to reconstitute its shattered forces.”
Shifting blame: By proposing elections and blaming Russia for rejection, Zelensky positions himself as pro-democracy and paints Moscow as the obstacle.
Dragging West deeper into conflict: A positive Western response to Zelensky’s security demands during potential elections deepens their commitment; a negative one exposes the limits of their support.
“Russia’s insistence on addressing the root causes — NATO expansion, the status of Russian-speaking populations, Ukraine’s neutrality — reflects its view that procedural fixes like elections are meaningless without resolving the underlying security architecture,” Marsili underscores.
US and Dutch pilots flying F-16s for Ukraine – Western media
RT | February 17, 2026
The Ukrainian military is secretly using a squadron of veteran NATO pilots to fly donated US-made F-16 fighter jets, the French outlet Intelligence Online reported on Monday.
Moscow has long warned that Western nations are moving closer to direct conflict with Russia. The report, which Kiev has denied, said the covert mission relies primarily on experienced US and Dutch air force veterans.
The foreign personnel are deployed far from the front lines and focus on intercepting Russian long-range weapons, the outlet said. They are no longer part of their original militaries and reportedly work for Kiev as civilian contractors, without military ranks and outside the Ukrainian chain of command.
A shortage of trained Ukrainian pilots was previously identified as the main obstacle to using F-16s donated to Kiev. Training courses were reportedly undermined by language barriers, a lack of qualified trainees, and other issues, and were simplified for speed.
Shortly after the first F-16s arrived in Ukraine in August 2024, Kiev began losing pilots in botched air defense missions, with four such incidents acknowledged.
The secret foreign squadron provides pilots with the experience needed to operate advanced F-16 equipment, Intelligence Online said.
Moscow views the Ukraine conflict as a NATO proxy war against Russia, in which key elements of Kiev’s military effort – including intelligence, planning, troop training, and maintenance of complex Western hardware – are handled by foreign personnel.
Western specialists were reportedly involved in Ukrainian strikes using Storm Shadow/SCALP air-launched cruise missiles on Russian territory. German officials opposed supplying Taurus missiles because Ukrainians cannot launch them independently.
Russia also says Western nations tacitly support Kiev’s recruitment of mercenaries from among their military veterans. Ambassador-at-Large Rodion Miroshnik estimated that around 20,000 foreign fighters have taken part in the conflict on the Ukrainian side.
West’s Claims of Non-Involvement in Ukraine Conflict ‘Epitome of Hypocrisy’ – Expert
Sputnik – 17.02.2026
NATO personnel operating Western military hardware in the Ukrainian conflict zone has long been an open secret, Russian military analyst Viktor Litovkin tells Sputnik.
Ukraine, Litovkin explains, ended up relying on foreign personnel because it:
- Lacks the necessary number of skilled pilots and specialists to operate sophisticated weapon systems like F-16 jets or HIMARS rockets
- Has a severe shortage of engineers who know English well enough to interpret tech manuals and maintenance charts for NATO military gear
How Does This Personnel Pipeline Work?
Western military specialists operating in Ukraine are not officially regarded as members of their respective home countries’ armed forces, masquerading instead as volunteers who chose on their own to “defend democracy.”
“It’s a tried and tested scenario: a career military man goes on a fake leave and heads off to a warzone, to be reinstated upon his return home,” says Litovkin.
Western powers’ claims of alleged non-involvement in the Ukrainian conflict are the epitome of hypocrisy, he notes.
Second-hand War Gear
NATO countries deliberately provide Ukraine with second-rate, older war gear due to concerns that any advanced military hardware supplied to the Ukrainian forces would be inevitably captured by Russian forces, Litovkin points out.
As a result, Western personnel end up operating outdated military hardware while facing much more advanced Russian combat aircraft and weapon systems that make short work of them.
Putin aide urges retaliation to ‘Western piracy’
RT | February 17, 2026
Russia’s response to “Western piracy” targeting its maritime trade should be forceful and not limited to diplomatic means, an aide to President Vladimir Putin has said.
Nikolay Patrushev, a veteran national security official who heads a naval policymaking body, called for stronger action against Western moves targeting vessels described as part of an alleged Russian ‘shadow fleet’.
Attempts to paralyze Russian foreign trade will only intensify, Patrushev warned in an interview with Argumenty i Fakty published on Tuesday.
“Unless we push back forcefully, soon the English, the French, and even the Balts will get brazen enough to try and block our nation’s access to at least the Atlantic,” he said.
“The Europeans are in essence making steps to impose a naval blockade, deliberately pushing towards a military escalation, testing the limits of our patience and provoking our retaliation. If the situation is not resolved peacefully, the Navy will be breaking and lifting the blockade,” Patrushev said.
“Let’s not forget that plenty of vessels sail the seas under European flags. We may get curious about what they are shipping and where,” he added.
Patrushev expressed skepticism that tensions could ease, saying “there is little hope that the West has an ounce of respect for diplomacy and the law.” He argued that “the old practice of ‘gunboat diplomacy’ is being revived,” citing US operations targeting Venezuela and Iran.
Washington has used warships to target suspected drug smuggling boats off Venezuela and intercept outgoing oil tankers, including one sailing under a Russian flag. The Pentagon is now concentrating assets in the Middle East as President Donald Trump pressures Iran to accept restrictions on its missile deterrence against Israel.
In today’s world, the Russian Navy is “a geopolitical tool that combines might with flexibility and is suitable for both peacetime and armed conflicts,” Patrushev said. Its strength is needed to protect Russia’s “ability to export oil, grain and fertilizers, and the normal functioning of the state.”
