Monday, October 13, 2025

Polaris of Enlightenment

The internet is a manipulation machine

Be careful you're not playing an avatar in someone else’s propaganda war.

Published 20 September 2025
– By Naomi Brockwell
8 minute read

We’re more polarized than ever. Conversations have turned into shouting matches. Opposing ideas feel like threats, not something to debate.

But here’s something many people don’t realize: privacy and surveillance have everything to do with it. Most people never connect those dots.

Why surveillance is the key to polarization

Surveillance is the engine that makes platform-driven polarization work.

Platforms have one overriding goal: to keep us online as long as possible. And they’ve learned that nothing hooks us like outrage. If they can rile us up, we’ll stay, scroll, and click.

Outrage drives engagement. Engagement drives profit. But when outrage becomes the currency of the system, polarization is the natural byproduct. The more the platforms know about us, the easier it is to feed us the content that will push our buttons, confirm our biases, and keep us in a cycle of anger. And that anger doesn’t just keep us scrolling, it also pushes us further apart.

These platforms are not neutral spaces, they are giant marketplaces where influence is bought and sold. Every scroll, every feed, every “recommended” post is shaped by algorithms built to maximize engagement and auction off your attention. And it’s not just companies pushing shoes or handbags. It’s political groups paying to shift your vote. It’s movements paying to make you hate certain people because you think they hate you. It’s hostile governments paying to fracture our society.

Because our lives are so transparent to the surveillance machine, we’re more susceptible to manipulation than ever. Polarization isn’t cultural drift. When surveillance becomes the operating system of the internet, polarization and manipulation are the natural consequences.

The internet is a manipulation machine

Few people are really aware of how much manipulation there is online. We all fancy ourselves to be independent thinkers. We like to think we make up our own mind about things. That we choose for ourselves which videos to watch next. That we discover interesting articles all on our own.

We want to believe we’re in control. But in a system where people are constantly paying to influence us, that independence is hard to defend. The truth is, our autonomy is far more fragile than we’d like to admit.

This influence creeps into our entire online experience.

Every time you load a web page, you’ll notice that the text appears first, alongside empty white boxes, and there’s a split second before those boxes are filled up. What’s going on in that split second is an auction, as part of what’s called a real-time bidding (RTB) system.

For example, in Google’s RTB system, what’s going on behind the scenes in that split second is Google is announcing to their list of Authorized Buyers, who are the bidders plugged into Google’s ad exchange:

“Hey, this person just opened up her webpage, here’s everything we know about her. She has red hair. She rants a lot about privacy. She likes cats. Here’s her device, location, browsing history, and this is her inferred mood. Who wants to bid to put an ad in front of her?”

These authorized buyers have milliseconds to decide whether to bid and how much.

This “firehose of data” is sprayed at potentially thousands of entities. And the number of data points included can be staggering. Google knows a LOT about you. Only one buyer wins the ad slot and pays, but potentially thousands will get access to that data.

Google doesn’t make their Authorized Buyers list public, but they do publish a list of Certified External Vendors list, which is a public-facing list of vendors like demand-side platforms, ad servers, analytics providers, etc. that Google has certified to interact with their ad systems. This CEV list is the closest proxy the public gets to knowing who is involved in this real-time bidding system.

And if you scroll through the names of some of these vendors, you won’t even find a Wikipedia page for many of them. A huge number have scrubbed themselves from the internet. It’s a mix of ad companies, data brokers, even government shell companies. And many of them you can bet are just sitting quietly in these auctions so they can scrape this data, to share or sell elsewhere, or use for other purposes. Regardless of what Google’s own Terms of Service say, once this data leaves Google’s hands, they have no control.

This real-time bidding system is just one behind-the-scenes mechanisms of the influence economy. But this machinery of influence is everywhere, not just when you load a webpage.

When you go to watch a video, there are thumbnails next to the video suggesting what you should watch next, and you click on one if it looks interesting. Those video thumbnails were not accidental.

When you scroll a social media timeline, the posts that populate are intentional. Everywhere you go, you’re seeing things that people have paid to put in front of you, hoping to nudge you one way or another. Even search results, which feel like neutral gateways to information, are arranged according to what someone else wants you to see.

This system of manipulation isn’t limited to simple commercial influence, where companies just want to get us to buy a new pair of shoes.

There are faceless entities paying to shape our thoughts, shift our behavior, and sway our votes. They work to bend our worldview, to manipulate our emotions, even to make us hate other people by convincing us those people hate us.

Where privacy comes in

This is where privacy comes into play.

The more a company or government knows about us, the easier it is to manipulate us.

  • If we allow every email to be scanned and analyzed, every message to be read, every like, scroll, and post to be fed into a profile about us…
  • If companies scrape every browser click, every book we read, every piece of music we listen to, every film we watch…
  • When faceless entities know everywhere we go, whom we meet, what we do, and then they trace who those people meet, where they go, and what they do, and our entire social graph is mapped…

In this current reality, the surveillance industrial complex knows us better than we know ourselves, and it becomes easy to figure out exactly what will make us click.

“Oh, Naomi is sad today. She’ll be more susceptible to this kind of messaging. Push it to her now.”

Profiles aren’t just about facts. They’re about state of mind. If the system can see that you’re tired, lonely, or angry, it knows exactly when to time the nudge.

Who are the players?

This isn’t just about platforms experimenting with outrage to keep us online. Entire government departments now study these manipulation strategies. When something goes viral, they try to trace where it started: “Was it seeded by a hostile nation, a domestic political shop, or a corporation laying the groundwork for its next rent-seeking scheme?”

Everyone with resources uses these tools. Governments, parties, corporations, activist networks. The mechanism is the same, and the targets are us.

The entire internet runs on a system where people are competing for our attention, and some of the agendas of those involved are downright nefarious.

These systems don’t just predict what we like and hate, they actively shape it, and we have to start realizing that sometimes division itself is the intended outcome.

Filter bubbles were only the beginning

For years, the filter bubble was the go-to explanation for polarization. Algorithms showed us more of what we already agreed with, so we became trapped in echo chambers. We assumed polarization was just the natural consequence of people living in separate informational worlds.

But that story is only half right, and dangerously incomplete.

The real problem isn’t just that we see different things.
It’s that we are being deliberately targeted.

Governments, corporations, and movements know so much about us that they can do more than keep us in bubbles. They can reach inside those bubbles to provoke us, push us, and agitate us.

Filter bubbles were about limiting information. Surveillance-driven targeting is about exploiting information. With enough data, platforms and their partners can predict what will outrage you, when you’re most vulnerable, and which message will make you react.

And that’s the crucial shift. Polarization today isn’t just a byproduct of passive algorithms. It’s the direct result of an influence machine that knows us better than we know ourselves, and uses that knowledge to bend us toward someone else’s agenda.

Fakes, fragments, and manufactured consensus

We live in a world of deepfakes.

We live in a world of soundbites taken out of context.

We live in an era where it’s easier than ever to generate AI fluff. If someone wants to make a point of view seem popular, they can instantly create thousands of websites, all parroting the same slightly tweaked narrative. When we go searching for information, it looks like everyone is in consensus.

Volume now looks like truth, and repetition now looks like proof. And both are cheap.

Remember your humanity

In this era of artificial interactions, manipulation, and engineered outrage, we can’t forget our humanity.

That person that you’re fighting with might not actually be a human, they might be a bot.

That story about that political candidate might have been taken completely out of context, and deliberately targeted at you to make you angry.

Online, we dehumanize each other. But we should instead remember how to talk. Ideas can be discussed without becoming triggers. They don’t have to send us spiraling after four hours of doomscrolling.

Fear is the mindkiller. When something online pushes you to react, pause. Ask whose agenda this serves. Ask what context you might be missing.

The path forward

We are more polarized than ever, largely because we’ve become so transparent to those who profit from using our emotions against us.

Privacy is our ally in this fight. The less companies and governments know about us, the harder it is for them to manipulate us. Privacy protects our autonomy in the digital age.

And we need to see each other as humans first, not as avatars in someone else’s propaganda war. The person you’re arguing with was probably targeted by a completely opposite campaign.

We’ll all be better off if we lift the veil on this manipulation, and remember that we are independent thinkers with the power to make up our own minds, instead of being led by those who want to control us.

 

Yours in Privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

You’re being tracked – everywhere you drive

Updated yesterday 9:27 Published 11 October 2025
– By Naomi Brockwell
6 minute read

You might have noticed cameras quietly going up all over your city or town. They blend in, mounted next to traffic lights or tucked onto poles by the roadside. They’re easy to miss. But they’re part of a growing network designed to track where everyone drives, at all times.

If you drive to a protest, that trip is logged.
Visit an opposition party meeting? That visit is in a searchable government database.
Go to a shooting range, a reproductive health clinic, a mosque, your lover’s home, your child’s school… every movement is documented.

Welcome to the world of automatic license plate readers, or ALPRs.

How it works

Automatic license plate readers were once a niche police tool. But today, thanks to companies like Flock Safety, they’ve spread into neighborhoods, HOAs, schools, and businesses across the country.

They’re not just cameras, they’re part of a cloud-based surveillance system. Every scan is uploaded to Flock’s servers. The footage (including the license plate, the time, the location, and even the make, model, and color of your vehicle) becomes part of a centralized, searchable database.

Police are one of Flock’s primary clients. When a department buys a Flock subscription, they’re not just getting access to cameras in their city. They’re getting access to a national database of vehicle movements.

Here’s how it works:
If a police department agrees to share its own Flock camera data, it can then search data from every other participant that has done the same.

The result is a real-time surveillance grid.
One that logs where millions of people drive.

Wait… Is this even legal?

Let’s talk about the Fourth Amendment. It was written to protect us from exactly this: blanket surveillance without a warrant.

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized”.

The Fourth Amendment and its warrants requirements is a safeguard against unchecked power. The point is to protect you from government searches (whether that’s your location, your movements, or other personal information) unless there’s a specific reason, backed by probable cause, and approved by a judge.

If police want to track your phone for more than a moment, or access your location history, they need a warrant. The Supreme Court made that clear in Carpenter v. United States.

The court ruled that the government can’t access historical location data from your phone without a warrant, even if that data was collected by a third party.

They also ruled in U.S. v. Jones that tracking your car with a GPS device counts as a Fourth Amendment search.

Put those two decisions together, and the logic is clear:
If tracking your car in real time requires a warrant…
And accessing location data held by third parties requires a warrant…
Then using license plate readers to retroactively trace your movements without a warrant seems like a clear constitutional violation.

And yet, that’s exactly what’s happening.

Police can search databases like those aggregated by Flock without any judicial oversight.

Even if the camera that captured your car was owned by an HOA, a school, or a private business, in many cases, the footage is fed into the same system law enforcement accesses, with no warrant required and no notification to the person being searched.

The government isn’t supposed to go back and retrace your movements using data it didn’t have a warrant for at the time. And the government is not legally allowed to retrace your steps with data that it collected up to usually a few days. Courts have ruled that this kind of retroactive surveillance violates your reasonable expectation of privacy.

So how is this current situation even allowed? It’s not clear that it is. But until we get a ruling, agencies are relying on some semantic acrobatics to justify it.

The loophole

Well, here’s the loophole: the government isn’t building the dragnet.

Private companies are.

The government can’t track your location, but private companies can.
Flock can legally install cameras in neighborhoods, collect location data, and store it all in their own systems.
But they can’t install those cameras on light poles, traffic intersections, or public roads without government approval.

So what happens?
The government gives them permission.
In many cases, the city even pays for the cameras.
And in return, the government gets access to the data.

It’s a perfect circle:
The government can’t build a dragnet directly, because the Constitution forbids it.
Private companies can’t scale a dragnet without government infrastructure.
So they join forces, each side helping the other bypass the restrictions meant to protect our civil liberties.

How law enforcement justifies it

Here’s how it typically works:

A city contracts with Flock or another ALPR vendor. They buy a certain number of cameras. The vendor installs them, usually on city infrastructure like streetlights or utility poles.
Some cities even mount them on garbage trucks or buses, so they sweep entire neighborhoods as they move.

The vendor maintains the cameras, and all footage is uploaded to the cloud.
And if you’re a police department that has opted in to share footage, then you in turn get access to all the footage from everyone who has also opted in.

If law enforcement were the ones actively setting up and operating these cameras, it would be much harder to argue this isn’t a government search, one that triggers a warrant requirement under the Constitution.

So what do they do instead? They argue:

“We’re not collecting this data — the vendor is. We’re just accessing publicly available information”.

But there’s nothing passive about that.
If you’re procuring the cameras, approving the locations, and contracting to receive the footage, you’re not a bystander — you’re an active participant in the surveillance.
In fact one could argue you’re actually building the system.

The mosaic theory

There’s also something called the “mosaic theory” of privacy.

The mosaic theory says that while one tile might not show much, if you put enough tiles together you see the whole picture of someone’s life.

In terms of constitutionality, individual little bits of information can be legally gathered, but once you combine all those bits of information, now you have a full picture and then it becomes illegal.

For example, it might be legal to take a picture of someone’s car in public. But imagine a scenario where someone takes thousands of pictures of your car, and from these pictures is able to recreate your travel patterns.
At that point, it’s not just “observation”. It’s a search, and the Constitutional protections should kick into gear.

At what cost?

Supporters of automatic license plate readers often cherry pick their success stories. ALPRs are marketed as tools to stop crime and protect children.

But we can’t just look at the benefits of this technology. We must also weigh the costs.

The problem with mass surveillance infrastructure is what happens when the wrong people inherit this system:

Imagine the most dangerous person you can think of in power.
Now imagine they inherit the surveillance network you just said yes to.

The stakes are too high to ignore

We need to get back to warrant requirements.

We need real checks and balances.
Because a dragnet system that monitors hundreds of millions of innocent people is a huge danger to freedom.

Jen Barber from Jen’s Two Cents said it plainly:

“I now live in a community where I cannot get in or out of my neighborhood without a Flock camera watching me. I don’t need Big Brother building a lifetime record of my whereabouts. It’s none of their business”.

This isn’t just about your car.
It’s about whether privacy and freedom can exist outside your front door.

Freedom of movement isn’t really free if you can’t go anywhere without being tracked.
And I’m not quite ready to give up my freedom of movement yet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

Researcher: We risk losing ourselves to AI gods

The future of AI

Published 10 October 2025
– By Editorial Staff
"We sell our ability to be courageous and buy security from the machines", argues researcher Carl Öhman.
3 minute read

The upcoming book “Gods of data” examines AI from a religion-critical perspective. Carl Öhman, researcher at the Department of Government at Uppsala University in Sweden, argues that today’s AI systems can be compared to humanity’s relationship with gods – and researches what would happen if power were completely handed over to AI.

As AI has developed, the tool that was initially used as a more personal version of Google has now also taken a place as an advisor in homes. AI is increasingly being used to ask more personal questions, such as healthcare advice, psychology and even as relationship counseling.

Öhman argues that AI has begun to become like gods, that is, a “kind of personified amalgamation of society’s collective knowledge and authority”, and in a research project he studies what humanity would lose if it allowed itself to be completely governed by technology – even a flawless one.

In a thought experiment, he explains how AI can affect, for example, a couple in everyday life who have started arguing due to different values, who get help from an AI relationship counselor.

They ask: ‘Hi, should we continue being together?’ The AI has access to all their data: their DNA, childhood photos, everything they’ve ever written and searched for and so on, and has been trained on millions of similar couples. It says: ‘with 98 percent probability this will end in catastrophe. You should break up with each other today. In fact, I’ve already found replacement partners for you who are much better matches’, he says in the Research Podcast.

Buying security

Öhman argues that even if there are no rational reasons why the couple shouldn’t obey the AI and break up, one gets a feeling here of having lost something. And in this particular case, the couple would lose faith in themselves and their relationship.

Love is always a risk. All interpersonal relationships involve a risk of being betrayed, saddened, that something goes wrong. We can absolutely use technology to minimize that risk, perhaps even completely reduce it. The point is that something is then lost. We sell our ability to be brave and buy security from the machines, he says.

World daddy in AI form

The research project also examines other relationships where AI has taken an increasingly larger role, for example parenthood. Today there are a number of AI apps designed to help adults handle their relationship with their children. Among other things, this can involve AI giving personalized responses or trying to prevent conflicts from arising.

Just like in the example of the young loving couple, something is lost here. In this particular chapter I use Sigmund Freud and his idea that belief in God is a kind of refusal to be an adult. That there is some kind of world daddy who ultimately always has the right answers. And here it becomes somewhat the same. There is a world daddy in the form of AI who then becomes the real parent in your relationship with the children. And you increasingly identify as a kind of child to the AI parent who has the final answers, he says.

Handing over power over ourselves

Öhman argues that it might feel nice to be able to avoid getting your heart broken, or to prevent conflicts with your children, but that one must be aware that there is a price when AI gets the power. He argues that when people talk about AI coming and taking over, it often happens violently and that “the machines come and take our lives from us.”

But the point in my book, and this project, is that it is we who hand over power over our lives, our courage, faith, and ultimately ourselves, he says.

Meet Nextcloud – the collaboration platform that fully replaces Microsoft 365

Advertising partnership with Teuton Systems

Did you know your company can save significant IT costs today without compromising on functionality or user-friendliness? Teuton Systems, as one of the first providers in the Nordic region, offers installation of Nextcloud - the world's leading alternative to Microsoft 365.

Published 8 October 2025
5 minute read

Nextcloud is a collaboration platform that brings together file management, document editing, calendar, contacts and communication tools in one place. Just like Google Workspace or Microsoft 365, it gives employees the ability to work with documents wherever they are, share files with colleagues and have video meetings – but with one crucial difference: you decide where your data is stored and who has access to it.

More than 400,000 organizations worldwide, from the French Ministry of the Interior to Swedish universities, have chosen Nextcloud to maintain control over their information.

Features in Nextcloud

File management that works everywhere: Upload documents, images and files from your computer and access them from your phone, tablet or any other device. When someone updates a document, everyone else sees the change immediately. No emails with “latest version” as an attachment – everyone works with the same file.

Work together in real time: Through integrated office tools, multiple people can edit the same document, spreadsheet or presentation simultaneously directly in the web browser. You see what your colleagues are writing as they write it.

Communicate and organize: Nextcloud Talk offers video meetings, chat and screen sharing without any external services like Zoom or Teams. Shared calendar and contacts make it easy to coordinate meetings and ensure everyone on the team has the same information.

Integration: The system can be connected to existing tools like Active Directory, SharePoint and other business systems. Over 200 add-ons are available to customize the platform according to specific needs.

Open and edit documents directly in the web browser through cutting-edge integration of word processors and other document apps.

Why choose Nextcloud over Google or Microsoft?

1. You decide where your data is stored – and it matters

When you use Google Workspace or Microsoft 365, all your files, emails and documents end up on servers in the USA. This means that US authorities can demand access to your data through laws like the US Cloud Act – often without you knowing about it. For a Swedish company, this could mean that sensitive information about customers, employees or trade secrets is suddenly accessible to foreign authorities.

With Nextcloud, you decide where your data is stored. You can either have the system on your own server in your office, or choose a local hosting provider. Either way, everything stays within your country’s borders, which automatically means GDPR compliance without complicated data processing agreements. This is why Swedish government agencies like Försäkringskassan (the Swedish Social Insurance Agency) and Transportstyrelsen (the Swedish Transport Agency) have chosen Nextcloud – they must be able to guarantee that citizens’ information is protected.

2. Skip monthly costs – save thousands of euros

Google Workspace and Microsoft 365 cost money every month for every person in the company. For a company with Microsoft 365 Business Premium and 50 employees, it amounts to approximately €13,500 per year – that’s €67,500 over a five-year period. And prices tend to increase over time.

Nextcloud is open source and completely free to use. The only thing you pay for is the server it runs on and any support services. A server for 50 people costs around €2,000 to purchase, plus around €500 per year for electricity and maintenance. Over five years: €4,500 instead of €67,500 – a saving of over €63,000.

Even if you choose to let an external provider handle the actual server operation, the cost becomes a fraction of what Google or Microsoft charges. And you get unlimited storage based on your hardware – no limit on how much you can store.

Access all company files and documents in your own “cloud” regardless of where you are without dependence on Microsoft, Google and other tech giants.

3. Complete security control

When your files are with Google or Microsoft, it’s their security routines that apply. You can’t control what happens behind the scenes. With Nextcloud, you have full insight and control.

You can, among other things:

  • Require two-factor authentication for all users
  • See exactly who opened which files and when
  • Set rules for what types of files can be uploaded or downloaded
  • Activate encryption that makes it so not even the system administrator can read the content
  • Decide that certain files are automatically deleted after a certain time

 

Since Nextcloud is open source, anyone can review the code for security flaws. This means that problems are discovered and fixed quickly by thousands of developers worldwide. Compare that to closed systems where security problems can lie hidden for years.

Nextcloud is also the first cloud platform to receive Blauer Engel certification (Germany’s official environmental label), which confirms both security and sustainability.

4. Customize the system according to your needs

With Google or Microsoft, you get the apps and features they offer – no more, no less. With Nextcloud, you can add exactly the features your company needs through over 200 available add-ons.

Do you need tools for visual project management? Forms to collect information from customers? Integration with your existing accounting software or customer system? Custom appearance that matches the company’s graphic profile? All of this can be implemented.

If the company grows, Nextcloud scales with it – from five to five hundred users without you needing to change systems or sign new expensive contracts.

5. No lock-in – you decide

Once you’ve put all your data with Google or Microsoft, it’s troublesome to move. It’s designed that way – the more locked in you are, the harder it is to switch. But what happens if they raise prices? Or if their service is down for a whole day? Or if a conflict arises with American interests that choose to limit access to services in Europe?

With Nextcloud, you own your data and can move it when you want, where you want. All data is saved in open standard formats that work everywhere. Want to change hosting provider? Move from the cloud to your own server? Or vice versa? No problem. You’re never locked in.

Keep all company internal meetings and calls with business partners privacy-secure on your own server without outside surveillance with access to meeting rooms, meeting recording, transcription and modern AI functions.

Getting started with Nextcloud

You don’t need to be a technical expert to use Nextcloud. The interface is intuitive and works exactly as you expect – click to open files, drag and drop to upload, share with a link.

For installation and configuration, there are companies that specialize in this. Teuton Systems is a Swedish technology company based in Dalarna, Sweden that works with privacy-promoting technology and open source solutions. They help companies install, configure and maintain Nextcloud. With support in Swedish and English, you get help through the entire process – from planning to ongoing operation.

Technical overview:

  • Files and storage: Unlimited storage based on your hardware, automatic file versions, password-protected file sharing
  • Collaboration: Real-time document editing, video conferences, chat, calendar, contacts
  • Security: AES-256 encryption, two-factor authentication, detailed logging, GDPR compliance
  • Compatibility: Works in web browsers, available as app for Windows, Mac, Linux, iOS and Android
  • Cost: License-free open source, possibility to sign enterprise support on annual basis

 

Contact: Call Teuton Systems at +46 10 10 11 222 or visit teuton-systems.com to get help getting started and assess whether Nextcloud fits your business.

 

Swedish government proposal: Scraps nuclear power ban along coast and archipelago

Published 7 October 2025
– By Editorial Staff
Even the Stockholm archipelago could become a potential location for nuclear power facilities if the Swedish government's proposal goes through.
2 minute read

The Environmental Code’s ban on nuclear facilities in large parts of Sweden’s coastal and archipelago areas should be removed, the Swedish government proposes. A consultation proposal has been sent out and must be answered by December 15 at the latest.

During a nuclear power conference at the Grand Hotel in Stockholm, Sweden, Climate and Environment Minister Romina Pourmokhtari (Liberal Party) presented plans to make the coast accessible for nuclear power expansion.

— We are now making the entire coast, including our islands, available for nuclear installations. New reactors are necessary for us to be able to live fossil-free lives, she says.

The changes affect several areas along the Swedish coast. Among others, Bohuslän (western Sweden), Öland, Gotland (Baltic Sea islands), and the Stockholm archipelago will become available for nuclear facilities. Coastal areas in Småland and Östergötland (from Simpevarp to Arkösund) as well as in Ångermanland (from Storfjärden to Skagsudde) in northern Sweden are also included in the proposal.

— We need the possibility to evaluate all suitable locations for new nuclear power, we cannot exclude them in advance, says the environment minister in a comment to TT.

“Nuclear power has been badly treated”

The climate minister justifies the changes by saying nuclear power is needed to create a “sustainable future”.

— We propose that nuclear facilities should be exempted from these restrictions, they have a crucial role for a sustainable and reliable future, she continues.

Despite the ban being removed, protection for natural and cultural values should be maintained according to the proposal.

“Today’s ban excludes locations that could be suitable without allowing an assessment in individual cases. The legal change creates conditions for more actors who want to build and invest in nuclear facilities along the coast”, it reads among other things.

The Swedish government expects the changes to take effect on July 1, 2026.

— Nuclear power has been badly treated and neglected for decades. But that has now changed. A new licensing process is being introduced, Pourmokhtari states.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.