2022 will go down in history as the year in which sci-fi-like artificial intelligence finally became a reality. Suddenly, computers weren’t just programmable machines. Overnight, everything with a screen, from our laptops to our smartphones, became devices we can now talk to just like real people. Neural networks and large language model AIs have, in just three years since, shaken creative industries to their core. However, what if I were to tell you that AI was with us long before ChatGPT?
In early 2025, former Pentagon U.S. National Security Official Matthew Brown used official whistleblowing channels approved by Congress to come forward with information acquired during his time with top-secret clearance within the intelligence services. Specifically, information pertaining to the existence of non-human intelligence and UAP, also known as ‘Unidentified Anomalous Phenomena’—the Pentagon’s preferred term for UFOs.
What on Earth Do UFOs Have to Do with Cryptocurrency?
To be clear, this author has little interest in the existence or non-existence of UFOs. However, parts of the report that Matthew Brown submitted to Congress should be of interest to everyone with a passing interest in cybersecurity and mass state surveillance.
As part of an ongoing disclosure project taking place in the U.S. to get to the bottom of the UAP/UFO phenomenon, Matthew Brown revealed that during his time at the Pentagon, he accidentally became aware of a clandestine, largely AI-dependent surveillance program called ‘Immaculate Constellation.’
Researching Immaculate Constellation today will see search engines usually categorize it as an alleged UAP/UFO monitoring and recovery program, specifically one tasked with identifying unidentified anomalous phenomena in real time, with a secondary objective being to recover what most people might call UFO technology. However, it is how Immaculate Constellation allegedly goes about doing this that should be of interest to cybersecurity researchers.
Skynet Has Possibly Been Live for at Least a Decade
Have you ever noticed how when videos and images of UAP/UFO aircraft go viral, the quality of such images and media is usually quite abysmal? This makes no logical sense. Why are most images of UFOs of the same blurry quality they were half a century ago when almost everyone on the planet now has a 5- to 50-megapixel camera in their pocket?
As it stands, Immaculate Constellation might be the answer.
According to Matthew Brown, Immaculate Constellation has real-time, fully privileged access to all multispectral intelligence from satellites, military equipment, drones, and NSA SIGINT signals intelligence systems. Moreover, keep in mind here that when we are talking about NSA signals intelligence, we can also be talking about everything from tapped undersea internet cables to backdoored global CCTV systems, backdoored consumer tech like smartphones, computers, smart doorbells, and even baby monitors.
In effect, Immaculate Constellation has eyes and ears everywhere. It even has infrared and infrasonic eyes and ears, meaning that it can detect anomalous phenomena that regular humans can’t. However, Immaculate Constellation doesn’t just use satellites and military technologies to scan the sky for evidence of UAP activity. At the same time, it’s watching the world through billions of webcams, smart TV-embedded cameras, and smartphone cameras, with the simultaneous ability to immediately remove media it considers not safe for consumption by the general public from devices as soon as it is detected.
To be clear, UAP/UFO images and media aren’t deleted from devices. Media is (allegedly) completely removed without a trace. Media is then categorized by Immaculate Constellation before being forwarded to specific humans in specific intelligence departments with specific levels of national security clearance. This results in total compartmentalization of knowledge where no two people with access to Immaculate Constellation will ever be aware of what media is being brought to the attention of anyone else in the same intelligence agency or department.
The Ultimate AI-Powered Gatekeeper
The way in which Immaculate Constellation works to obfuscate and compartmentalize UAP data means that even military personnel stationed on a base where UAP/UFO activity is detected by base sensors might never be aware of close encounters. The same is true for people working in aerospace fields, NASA, and even the NSA. This is thanks to the way Immaculate Constellation can identify and remove signals intelligence data pertaining to UAP encounters from government and civilian devices and systems in real time. This is also how UAP information is kept not just from the public but also from entire branches of the U.S. military and government, including Congress.
Do We Have Proof That Immaculate Constellation Exists?
Matthew Brown, the Pentagon whistleblower who first revealed the alleged existence of Immaculate Constellation to Congress in 2025, himself refers to Immaculate Constellation as a “Two-Faced God.” A working, fully deployed, global AI that can frame any individual or group’s perception of reality by deciding in real time what information makes up our perception of reality in the first place. However, Matthew Brown is, to date, the only person known to have ever gone on record to disclose the existence of Immaculate Constellation.
Might Matthew Brown just be hungry for fame on the YouTube conspiracy circuit?
This is possible. However, other mass surveillance programs like Project Echelon have existed since as early as the 1960s, Echelon being a joint Western effort to monitor all the civilian and military communications of the USSR in real time to identify the location of things like Soviet-deployed weapons systems.
This effort was also successful, despite Western governments having nothing like the data processing capabilities we have today thanks to modern computers. The primary objective of Project Echelon was also similar to that of the alleged purpose of Immaculate Constellation today. A potential threat exists, and the security services want to identify exactly where that threat is and what it is doing in real time; hence, they monitor all global communications to achieve this goal.
With Client-Side Scanning, Creating Something Like Immaculate Constellation Is Actually Easy
Does the idea of a rogue NSA AI stealing UFO footage from your phone as you record or stream it sound preposterous? If so, it shouldn’t. Right now, several governments are starting to insist on the use of client-side scanning of smartphones and tech devices to detect child sexual abuse material (CSAM). This will see apps on phones scan phones in real time for CSAM content before notifying authorities should such content be discovered.
In reality, augmenting client-side scanning software to scan devices for media pertaining to UFOs would be ridiculously easy. Likewise, it would also be easy to task such client-side scanning software with the removal of such media from devices after forwarding it to some central database, just like (apparently) Immaculate Constellation does.
As I have already discussed at length in The Crypto Con, backdoors that allow the likes of the NSA to compromise the security of everything from nuclear power plants to military equipment and all the consumer tech we use have also been a reality since at least 2008. The existence of a program like Immaculate Constellation is, therefore, feasible.
The Infamous 4Chan Alien Image
If there is a smoking gun that Immaculate Constellation really exists and really is watching, we may have it in the form of the now-infamous (at least on social media) case of the 4Chan alien photo from 2016.
In 2016, a user of the infamous hacking blog 4Chan posted an image of a supposedly reptilian alien standing in a desert setting by a withered tree. This image immediately began going viral online. This was due to the fact that anyone who saw the image instantly reported feeling disturbed by it. It was too real and too unsettling to look at because, instinctively, you knew it was real when you saw it. However, just as this image began going viral, something happened.
First, 4Chan went down. Then all sites and forum pages where the image from 4Chan had been shared began going down. Then, as people began scrambling to save copies and screenshots of the 4Chan image, the same people began reporting that they couldn’t. Later, the image would just disappear from computer download folders and even external media like USB sticks and hard drives that were no longer connected to computers or the internet.
In effect, the 4Chan alien image was scrubbed from existence so entirely that even today it has never resurfaced. Given what Matthew Brown has since disclosed about Immaculate Constellation, the scrubbing of this image from existence in real time certainly matches how Brown alleges that Immaculate Constellation works.
If Immaculate Constellation Isn’t a Threat Today, It Is Tomorrow
As I stated in my recent post about the NSA Key that ended up being a crash course in NSA spying from WWII to the present day, it is a misnomer to assume that if you have nothing to hide, you have nothing to fear from security agencies like the NSA. Rather, agencies like the NSA like to have real-time, constant data awareness. They don’t discriminate between people of interest and regular people when going about intelligence gathering. Rather, everyone, everywhere is a person of interest. This guarantees near-perfect threat detection.
Given this stance toward national security, it is only a matter of time until something like Immaculate Constellation exists if it doesn’t already. And let’s remember, we’ve already had Echelon.
Let’s also remember that if I told you in 2020 that artificial intelligence programs existed that could write whole newspaper articles, you would likely have written me off as a lunatic. However, ChatGPT did already exist in 2020 and was already being tested by writing articles for the UK Guardian newspaper.
My overall point is that we can never expect to ever have anything like financial freedom when using central bank digital currencies or digital currencies like Bitcoin—especially in a world where mass state surveillance is everywhere and backdoors into the tech we use to participate in any future digital currency economy don’t just exist, but have existed and been exploitable for almost two decades.
Regardless of its failures, hard cash and equivalent physical assets of value are the only methods of exchange that will ever preserve anything like democracy and financial privacy. Any kind of digital equivalents will always and forever just be numbers on a screen that can be wiped instantly if you whistleblow, become a person of interest, or happen to just start becoming a little aware of the digital prison being built around humanity as we know it.