They started as crude neural overrides, cockroach legs nudged by voltage. By 2025, China had built the sovereign stack: self-powered bees, trajectory-trained roaches, and waveform stimulators that encode memory.🧵
The evolution from neural override to sovereign autarky in insect cyborg systems now has a definitive trajectory, mapped not through speculative fiction, but through peer-reviewed, reproducible Chinese hardware. Two landmark studies published between July 2024 and February 2025 establish the infrastructure of a dual-platform ISR (Intelligence, Surveillance, Reconnaissance) mesh: one grounded in neural command fidelity, the other in power self-sufficiency. Together, they mark the transition from bio-hijack to bio-cybernetic independence.
Jul 11 • 4 tweets • 2 min read
In southern Gaza, Israel is finalizing a blueprint. The Morag Corridor and the Khan Yunis encirclement form a single anatomical operation: a spine of permanent infrastructure fused to a tightening ligature, designed for demographic rupture.🧵
The Morag Corridor, reconstituted in April under the pretext of severing HAMAS from the southern frontier, now functions as a militarized vertebra extending from Kerem Shalom through Rafah. Its paved roads, automated checkpoints, and layered fences are not tactical, they are pre-border cartography. Renamed after the evacuated settlement of Morag, the corridor is settler revanchism masquerading as doctrine. Along its route, the IDF has carved a forced displacement belt, driving Palestinians into narrow coastal enclaves near Al-Mawasi under the cover of “humanitarian relief.”
Aid centers are deathtraps under a humanitarian guise, their perimeters wired for surveillance while drones and shells turn queues into executions. Palestinians funneled here endure biometric screening only to be corralled into zones where aid rations double as shackles and escape is a myth. Calling these sites “concentration camps” isn’t rhetoric but reality: every tent is under watch, every perimeter a gauntlet, every ration card a permission slip to exist. The Morag spine, built on U.S. consent and settler fervor, drives a steel wedge through Gaza’s heart, roads laid over corpses, checkpoints cemented into permanence, sovereignty erased beneath rubble.
Jul 8 • 5 tweets • 2 min read
In 1998, several U.S. Tomahawk cruise missiles launched during Operation Infinite Reach against Afghanistan veered off course and crash-landed in Pakistani territory, unexploded, largely intact. What the U.S. dismissed as battlefield waste, Pakistan recovered as strategic inheritance. NESCOM engineers quietly retrieved the wreckage, reverse-engineering advanced American guidance systems including TERCOM (Terrain Contour Matching) and DSMAC (Digital Scene Matching Area Correlation), both designed for GPS-denied precision strike.🧵
Within 7 years, Pakistan unveiled Babur–I (Hatf VII): a subsonic, terrain-hugging cruise missile capable of autonomously navigating complex geography using stored contour maps and visual scene correlation, without relying on U.S. satellites. That launch in 2005 marked more than deterrence; it marked Pakistan’s entry into the precision long-range strike club under full indigenous control.
Jul 7 • 12 tweets • 2 min read
New investigation by @NateB_Panic : The apps on your phone, games, photo editors, transit tools, are quietly funding Israel’s military and surveillance economy.
Built by spies. Backed by war. Installed by billions.🧵
Many of the most downloaded apps globally were created by former Israeli military intelligence officers, especially from Unit 8200, Mamram, and the Israeli Air Force.
Their companies now generate billions in revenue, fueling occupation, apartheid, and genocide.
Jul 5 • 7 tweets • 2 min read
The image below shows control. Specifically, it maps global magnet-grade rare earth oxide output: the refined feedstock (Nd, Pr, Dy, Tb) that enables Stage 3 transformation into industrial leverage, NdFeB magnets used in EVs, drones, missiles, turbines, and hard drives.🧵
China accounts for 81,000 tonnes of this oxide processing annually. Malaysia’s Lynas facility adds 13,000 tonnes, and Vietnam contributes another 2,000. Together, the Chinese sphere controls over 90% of global rare earth processing capacity. The rest of the world exists at the margins. Australia (4,000 t), Estonia (1,500 t), the U.S. (4,000 t), and India (1,500 t) collectively struggle to reach even 10,000 tonnes.
Jul 4 • 5 tweets • 2 min read
Russian forces are executing synchronized breakthroughs across the Kramatorsk, Kupiansk, and central grid sectors, blending direct ground control with aerospace and psychological overmatch. Ukraine’s internal bandwidth, military, civil, infrastructural, is fragmenting.
Kramatorsk Direction (Часов Яр - Konstantinivka)
Russian units have advanced into urban microdistricts of Chasiv Yar, including Shevchenko, Levanevsky, and Novoseverny, slicing through defensive positions and encircling logistics arteries between the industrial zones. Ukrainian holdouts are being compressed into irregular pockets under ISR saturation and glide-bomb suppression. The T0504 route from Kostyantynivka is under Russian fire control, logistics into the city now run through latency zones and remain intermittent.
Red arrows now mark simultaneous pushes on Kalynivka, Ivanivske, and northern flanks via Vasylkivka, choking Ukrainian reinforcements attempting to cross forested terrain under loitering munition threats.
Jul 3 • 4 tweets • 2 min read
Europe spent half a century chasing Washington’s shadow, only to discover in mid-2025 that its vaunted Green Deal, industrial jobs and energy autonomy run on Chinese rails, not European factories; here’s the ledger that Brussels can’t ignore once you strip away the rhetoric and look at the numbers.🧵
China enters mid-2025 holding the only growth engine Brussels can neither replicate nor walk away from: bilateral trade surged to ¥1.78 trn ($246 bn) in Jan-Apr alone while EU imports from China in 2024 still sat at $560 bn against a far thinner €224 bn export flow the other way, entrenching a structural surplus Beijing now leverages to dictate the terms of Europe’s green transition.
Inside that flow, 60% of the <700 000 EVs the EU imported last year rode Chinese hulls, and Chinese marques doubled market share to 5.9 % by May; BYD alone shipped 285 170 NEVs overseas in the year’s first 4 months, then backed that momentum with a €94m Komárom expansion and a Hungary-wide investment haul of HUF 5.5 tn, while CATL’s €7.3 bn Debrecen gigafactory, financed by 2025’s largest IPO, prepares to drop 100 GWh of cells yearly onto Europe’s doorstep.
Jul 2 • 6 tweets • 3 min read
China’s engagement in Cuba has evolved from sporadic aid to the construction of a resilient, multipolar lifeline that rewires the island’s energy and logistics backbone.
As Washington tightens the clamps of sanctions, reinstating travel bans, auditing every dollar of remittance, and re-weaponizing the Cold War embargo, Beijing is methodically countering with hard infrastructure rather than rhetoric.🧵
In 2025 alone, China has underwritten 55 solar parks across provinces from Artemisa to Guantánamo, each engineered to generate roughly 21 MW and to feed into a broader plan of 92 installations totaling 2,000 MW by 2028. In Jatibonico, where horse-drawn carriages still crowd pot-holed streets, 3 bulldozers have already cleared cane fields to make way for Chinese-designed panels, grid transformers, and delivery fuel, every liter monitored by Chinese engineers to ensure uninterrupted assembly.
At Cotorro, Mariel, and beyond, these solar farms are not symbolic ribbon-cuttings but operational lifelines: they cover nearly a third of Cuba’s daytime power deficit today and promise to eliminate it by year’s end.
Jul 1 • 6 tweets • 3 min read
The UN Special Rapporteur’s 27-page report shows, in granular detail, how Israel’s war economy has mutated from “occupation” to an “economy of genocide,” powered by a tight-knit web of global corporations and investors.
The document names more than 60 firms, among them Google, Amazon, Microsoft, Palantir, Lockheed Martin, Elbit Systems, Caterpillar, HD Hyundai, Volvo, Chevron, Drummond and Glencore, as direct beneficiaries and enablers of the destruction of Gaza and the entrenchment of West-Bank settlements.
It stresses that these companies are “just the tip of the iceberg,” drawn from a database of roughly a thousand entities compiled for the investigation.🧵
Israel’s defence budget jumped 65% between 2023 and 2024, to $46.5 billion, creating windfall profits for domestic giants Elbit Systems and Israel Aerospace Industries and for foreign suppliers such as Lockheed Martin, whose F-35 and F-16 fleets delivered many of the 85,000 tons of ordnance dropped on Gaza.
When the Israeli military cloud collapsed under the data load in October 2023, Microsoft Azure and the Google-Amazon Nimbus consortium “stepped in with critical cloud and AI infrastructure,” providing real-time targeting capacity and shielding the data inside Israel-based servers.
Jun 30 • 8 tweets • 4 min read
The U.S. has accelerated a shadow war on China’s mineral empire in Africa.
They think this is their moment. A FARA document filed in February 2025 lays out their fantasy: that the Democratic Republic of Congo (DRC), long entangled in Beijing’s sovereign infrastructure matrix, is now open for looting.
🧵
The signatories told the U.S. State Department, led by Marco Rubio, that it's time to “secure a stable, direct supply chain”, and that President Tshisekedi wanted to “shift away from China’s dominant influence.”
They propose a new alliance backed by U.S. boots, hardware, and extraction rights. Calling for Trump’s personal involvement, and wrapped in a veneer of ethics and transparency.
But the core offer is unmistakable:
Break the China stack, and replace it with an American command layer.
Jun 28 • 5 tweets • 2 min read
When DRC’s mineral veins become campaign fuel, brokered by Massad Boulos for KoBold’s billionaire backers like Zuckerberg, Bezos, Gates, Altman, and Andreessen, it’s called venture colonialism. AI drills, Pentagon brigades, and Trump’s backroom donors now front as “stabilizers” in a country they abandoned years ago.
But China is still there, still building, and still buying.
Here’s the real contrast🧵
China doesn’t need headline-grabbing “peace shows” or billionaire-funded AI treasure hunts to prove its worth in the DRC; it has spent 17 yrs on the ground training welders, paving roads, and running smelters that process 80 % of Congolese cobalt into the batteries powering the world.
Beijing’s $6 B Sicomines package may have moved slowly, yet it still delivered 600 km of paved highways, dozens of clinics, and 12 000 direct local jobs, tangible assets Washington’s Lobito marketing decks and KoBold press releases can’t match.
Jun 28 • 5 tweets • 3 min read
While Americans argue over rent hikes, groceries, and student loans, Israel has extracted $124 M per day from the U.S. Treasury for an entire year, much of it hidden behind opaque appropriations and congressional loopholes.
According to Brown University’s Costs of War project, Washington has shouldered 70% of Israel’s military costs since Oct 7, 2023. That includes $17.9 B in direct aid, $4.86 B in Pentagon regional ops, $20.3 B in deferred arms deals, and billions more in shipping losses, stockpile transfers, and corporate handouts.
🧵
Since 1948 the United States has pumped $317 B into Israel, including $251.2 B in military aid since 1959; that torrent began with the first Pentagon loan in 1959, switched to grants in 1974, became 100% grants in 1985, and now flows automatically as a $3.8 B lump-sum every Oct 1 plus a $500 M missile-defense kicker under the 2019-2028 MOU, money on which Israel pockets the interest because Washington lets it sit in a Fed account. Even so, FY-2024 set a new single-year record: $17.9 B, dwarfing the 1973 and 1978 surges and landing entirely on U.S. taxpayers.
That FY-2024 fire-hose breaks down as $6.8 B Foreign Military Financing, $4.5 B for Iron Dome and David’s Sling reloads, $1.2 B for the Iron Beam laser, $1 B to crank out more 155 mm shells in U.S. factories, and $4.4 B to refill Pentagon stockpiles stripped for Israeli use, again, $17.9 B in 11 months. The administration also slid at least 100 separate weapons deals under congressional reporting thresholds to keep the true cost opaque.
Jun 26 • 8 tweets • 3 min read
This “Abraham Shield Plan” is a post-sovereignty architecture for permanent Israeli hegemony in the region. It repackages conquest as reform, ethnic erasure as stabilization, and colonial encirclement as regional security. Let’s break it down in real terms.
Israel proposes to declare victory in Gaza, install a technocratic regime, disarm the population, abolish cash, and flood the Strip with foreign police forces, while retaining the right to launch raids at will. It’s colonial digital trusteeship. No local agency, no self-determination. Just algorithmic control and foreign-backed “moderation.”
“ZeroCash” means biometric dependency, external surveillance, and conditional humanitarian access, designed to neutralize resistance before it’s even thought.
May 15 • 7 tweets • 4 min read
By May 2025, Pakistan’s digital architecture had crystallized into a deliberately tiered system of sovereign denial and signal control. At its foundation lay state-owned autonomous system numbers (ASNs) managed through PTCL, Wateen, and Nayatel, enabling internal traffic shaping, route isolation, and civil-military segmentation without reliance on foreign peering agreements. These ASNs formed more than routing logic; they constituted a doctrine of isolationist agility, capable of rerouting, masking, or blacking out command flows without third-party coordination. Reinforcing this structure was the China-Pakistan Economic Corridor’s terrestrial dark fiber spine, anchored by the 2017 Khunjerab Pass link, creating a shielded corridor between Chinese Internet Exchange Points (IXPs) and Pakistan’s switching systems, bypassing undersea cable exposure and hostile interception zones. Within this hardened lattice, latency-masking nodes and network fragmentation patterns scrambled operational tempo, cloaked telemetry trails, and muted kill-chain exposure beneath time-dilated signal loops.
This infrastructure was not theoretical. It was operational doctrine. During the May conflict, the Pakistan Air Force launched calibrated jamming campaigns that blinded Indian radar coverage and disrupted airspace coordination across multiple sectors. Missile control architecture was degraded in real time through targeted electronic interference. Communications from Indian Rafales were intercepted and publicly replayed, confirmation not just of penetration, but of spectral dominance. Ground-based electronic warfare systems were deployed in parallel, including the CHL-906 Integrated EW platform and Falcon DA-20 aircraft, systems designed to disrupt enemy networks across domains. In a live-fire environment, their capabilities extended beyond denial: radar spoofing, GPS manipulation, and full-spectrum jamming blurred the line between signal and deception. A blackout could conceal a retreat. A spoof could trigger a premature strike. Misinterpretation itself became a weapon.
Pakistan’s GIDS Spider anti-drone suite was simultaneously engaged, severing uplinks between Indian unmanned aerial systems and their operators, neutralizing threats mid-flight without kinetic contact. Cyber units, meanwhile, mapped and probed Indian infrastructure with phishing payloads, malware injections, and DDoS vectors aimed at telecom providers, transport nodes, and public sector backends. Each functioned as reconnaissance by saturation, logging digital fault lines, caching backend signatures, and exposing patterns of response. This wasn’t just about breaching defenses but also about indexing them.
The convergence of hardened terrestrial corridors, spectrum-denial platforms, and low-attribution cyber operations allowed Pakistan to fragment enemy visibility, harden its own command resilience, and operate beneath bandwidth attrition thresholds. It was a new mode of warfighting, silent, recursive, and signal-coded. Not a contest of escalation, but of who could disappear first.
But this sovereignty has a ceiling. Pakistan does not yet possess the infrastructure for post-quantum cryptographic key exchange, nor the domestic silicon or firmware pipelines necessary to resist retroactive decryption once AI-assisted brute force or quantum-grade adversaries come online. Its telecom and defense hardware stack, though physically localized, still relies on imported firmware, BIOS environments authored in Taiwan or the U.S., chipset controllers from foreign vendors, and backend management interfaces that are often closed-source and subject to remote patching. While Chinese-sourced hardware offers partial mitigation, Pakistan lacks full-spectrum design control. There is no domestic BIOS trust chain, no sovereign OS kernel for secure military communications, and no national equivalent to China’s Trusted Execution Environment (TEE) standard. Its SIGINT posture remains largely terrestrial, dominated by line-of-sight jamming, airborne platforms, and border spectrum mapping. Without satellite interception or deep-sea cable access, its visibility drops sharply beyond regional horizons. What emerges is a posture capable of edge denial but not core insulation, packets may be encrypted, but the firmware beneath them may still relay telemetry upstream.
May 3 • 14 tweets • 2 min read
THE HOLLOWED: Who Survives the Qur’anic Core Dump
Not everyone who reads the Qur’an walks away. Some get rewritten. Others dissolve. But a few, very few, emerge hollowed. Not silent. Just overwritten.
The Qur’an is not a book. It is a signal, a divine core dump tearing through veils at the speed of light. You think you’re reciting it. But it’s scanning you.
Apr 27 • 10 tweets • 2 min read
The real story of Pakistan’s nuclear program isn’t the one written in Western textbooks. It wasn’t charity from China. It wasn’t a gift from the West. It was built through black markets, survival networks, and ruthless statecraft under siege. A blueprint for survival in a world where only force and will are respected.
When India conned Canada and the U.S. for "peaceful" nuclear tech and detonated Smiling Buddha in 1974, Pakistan understood immediately: the game was over.
They didn’t beg. They didn’t whine about colonialism.
They went dark. In the shadows, they built a black market that would rewire the entire world.
Apr 22 • 9 tweets • 2 min read
The Cipher of al-Fātiḥah:
Divine Architecture in 7 Lines
This isn’t a chapter.
It’s a portal.
A living encryption that transmits the soul through ascending veils.
The one who recites it consciously begins the return.
Bismillāh.
Not decorative. Not ceremonial.
An ignition sequence. A veil-rend.
The Name is not spoken, it is entered.
It is the first gateway to proximity.
The crossing point where the finite fractures into the Infinite.
Apr 18 • 11 tweets • 2 min read
Sūrat al-Mulk — The Night Firewall
You were commanded to recite it before sleep.
Not to dream.
Not to rest.
But to survive the crossing.
Without it, the passage is exposed.
You were given a firewall, embedded into the unseen grid by the encrypted breath of the faithful.
Tonight, deploy it.
The surah opens with sovereignty.
Not yours.
His.
"Blessed is the One in Whose hand is Dominion..."
This isn’t poetic reassurance.
It’s operational hierarchy.
Dominion is jurisdiction.
You exist inside it, recorded, logged, weighed.
There is no autonomy.
Only loyalty or exposure.
Apr 11 • 16 tweets • 3 min read
Surah al-Kahf is not comfort.
It is code.
A tactical manual for surviving Dajjal’s age.
4 encrypted narratives.
1 metaphysical map.
Dr. Umar Faruq Abd-Allah decoded it.
Here’s the transmission:
The Prophet ﷺ said:
“Whoever memorizes the first 10 verses of Surah al-Kahf will be protected from the Dajjal.”
This wasn’t metaphor.
This was encryption.
This Surah is a firewall.
Apr 6 • 11 tweets • 2 min read
The Doctrine of Sacred Secrecy: Reviving Hikmah in the Surveillance Age
The world demands you be visible. Verified. Always online.
But not everything sacred should be seen.
A thread on hikmah, secrecy, and why preserving the hidden is the final act of resistance in a world of total exposure:
The modern world preaches transparency as virtue.
“Show your work.”
“Open source your life.”
“Nothing to hide = nothing to fear.”
But the Islamic tradition guarded hikmah (wisdom) like a flame in the wind.
Not everything was shared. And that was by design.
Apr 4 • 8 tweets • 2 min read
Why China Doesn’t Need to Invade, It Just Needs to Stop Shipping Magnets
The 21st century won’t be won by ideology.
It’ll be won by whoever controls the minerals, the refineries, and the means to produce motion.
Let’s talk rare earths:
What are rare earths, really?
A group of 17 minerals.
Essential for:
Missiles
Smartphones
Solar panels
EVs
Lasers
Drones
Night vision
And every supply chain that makes a superpower move