« White Women and Children in Scandinavia and Britain are no longer protected by law against rape | The Likeminded Sea Captain and Me! » |
by Mark Powell
Exposing 80 Years of Non-Consensual Human Pseudo-Science Experiments, Surveillance, and Elite Rule Beneath the American Republic
Since the end of World War II, a covert architecture has assimilated the machinery of American democracy. Installed in the OSS (Office of Strategic Services), developed in the CIA (Central Intelligence Agency), and expanded into banking, technology, and psychological realms, this current algorithmic rule-the actual deep state-has shielded high-level criminals, conducted unlawful wars, traded in mass psychological manipulation, and constructed a firewall state to defend oligarchs against democracy.
This article exposes The Powers That Be (TPTB, a non-conspiracy term), with irrefutable proof, how "national security" was inverted as an instrument of systemic lawlessness that shields the sociopathic elite against we the people.
The Hidden Regime That Rules Without Consent Nor Rule of Law
They warned us of communism. Then terrorism. Now the neighbors. But the real threat was never outside-it was always inside.
Our "Deep State" is not a conspiracy theory (A CIA-PSYOPs-term)-it's an unaccountable illegal regime of unelected force, institutionalized illegality, and unanswerable power. It's not a cabal, but a bureaucracy-a chain of operations based on secrecy, coercion, and the militarization of knowledge. It has survived coups, assassinations, impeachments, and elections-because it has no party to answer to.
It only answers to itself.
Since 1945 there has been a non-theoretical, documented in history Coadunation of military intelligence, corporate contractors, outlaw financiers, and psychological warfare specialists-not to protect democracy-but to isolate their dynasty, themselves from “We the People.” This article doesn't speculate. It reports. Each argument is founded on declassified documents, court records, FOIA requests, and whistleblower testimony. “America’s” viral Syndicate (their own name for themselves) is the illness permeating the duopoly life support apparatus – America’s ventilator coma system.
The highly paid Nazi War Criminals labored at Fort Bliss, Texas, engineering rockets at White Sands Proving Ground. Despite their affiliation with Nazi SS, slave labor camps, and genocidal war crimes, their expertise propelled America's Cold War space and missile initiatives. Technology was more important than democracy, suppressing Nazi histories in order to outpace Soviet competition. Their legacy constructed NASA (Apollo, Saturn V) and The Surveillance Mind Control Subcube.
You were not taught this timeline in school.
Let us segue with a Nazi SS-Brigadeführer named Walter Schreiber, who was on the U.S. government payroll because he was an expert in biological warfare.
Name / Rank | War Crimes / Genocide Committed | New Job in America | Projects / Work in the USA |
---|---|---|---|
Walter Schreiber SS-Brigadeführer |
Medical experiments; biological warfare research | CIA Biological Warfare Consultant | Biological warfare research & intelligence |
Wernher von Braun SS-Sturmbannführer |
V-2 rocket development using slave labor | NASA Chief Rocket Scientist | U.S. ballistic missile & space program |
Klaus Barbie SS-Hauptsturmführer |
Torture & deportation of resistance fighters | Counterintelligence operative for CIA in Bolivia | Anti-communist operations in Latin America |
Otto von Bolschwing SS-Standartenführer |
Architect of Jewish deportations; Einsatzgruppen liaison | CIA & ODESSA asset | Anti-communist intelligence operations |
Reinhard Gehlen Wehrmacht General |
Oversaw Nazi Eastern Front intelligence; enabled war crimes | CIA Head of Gehlen Org (predecessor to West German BND) | Cold War anti-Soviet espionage |
Hubertus Strughold SS-Sturmbannführer |
Medical experiments on prisoners | U.S. Air Force “Father of Space Medicine” | Human spaceflight physiology research |
Hans Globke Chief of Staff in Nazi Interior Ministry |
Helped draft anti-Semitic laws, including Nuremberg Laws | Advisor to West German Chancellors | Post-war political consolidation & intelligence liaison |
Alfred Zeidler Camp Commandant |
Oversaw forced labor and executions at camps | Consultant for U.S. Military Intelligence | Deception and interrogation techniques |
Josef Mengele SS-Obersturmführer |
Human experiments and medical atrocities at Auschwitz | Fled to South America; alleged CIA contact | Unknown official projects |
Arthur Rudolph SS-Sturmbannführer |
Forced labor at Mittelwerk; V-2 rocket production | NASA Rocket Engineer | Saturn V program |
Ernst Kaltenbrunner SS-Obergruppenführer |
Head of Reich Security Main Office; orchestrated mass murders | Never brought to U.S.; executed at Nuremberg | N/A |
Hans Kammler SS-Obergruppenführer |
Supervised V-2 production & secret weapons programs | Disappeared post-war; rumored U.S. collaboration | Unknown secret projects |
Otto Ambros SS-Oberführer |
Chemical weapons and slave labor | Consultant for U.S. chemical industry | Chemical weapons research & industrial development |
Hans-Ulrich Rudel SS-Sturmbannführer |
War crimes in Eastern Front campaigns | Right-wing extremist political activist in Germany; alleged CIA ties | Anti-communist propaganda |
Friedrich Flick Industrialist, Nazi Party member |
Exploited forced labor; financing Nazi war machine | Post-war industrial magnate in West Germany | Rebuilding German industrial base with U.S. support |
Otto Skorzeny SS-Obersturmbannführer |
Commanded special forces; war crimes in rescue missions | Consultant for CIA and NATO | Covert operations and counterinsurgency |
Wilhelm Stuckart State Secretary in Interior Ministry |
Co-author of Nuremberg Laws; racial policy architect | Legal advisor post-war; never prosecuted | Post-war legal reforms & intelligence advisory |
Max Faust SS-Oberführer |
Organized deportations and camp administration | U.S. Army intelligence consultant | Deception tactics and counterintelligence |
Werner Heisenberg Physicist (Nazi-affiliated) |
Nuclear research for Nazi Germany | Consultant for U.S. atomic programs | Early Cold War nuclear development |
Hans Fritzsche Propaganda official |
Nazi propaganda spreading racial hatred | Intelligence operative post-war | Psychological warfare programs |
Emil Augsburg SS-Obersturmbannführer |
Gestapo officer; organized mass killings | CIA operative in post-war Europe | Anti-communist covert actions |
I. The Birth of the Deep State: From Nazi SS to CIA
The Deep State was not birthed in Washington-it was imported from Berlin. Beneath the red-white-and-blue rituals of democracy, a more Machiavellian mechanism was transplanted: Nazi science cloned to Wall Street greed and clandestine warfare-all portrayed under the pretext of "national security."
Allen Dulles and Nazi Symbiosis
While Allied troops were bleeding on European battlegrounds, Allen Dulles, in Bern, Switzerland, with the Office of Strategic Services (OSS), was already in negotiations with top Nazis-not to capture them, but to recruit them. The rationale was bureaucratic, psychopathic, and cold: Nazi intelligence was too lucrative to allow justice to intervene (Simpson, 1988).
The figures were staggering. In Operation Paperclip, more than 1,600 Nazi scientists, physicians, engineers, and intelligence officers were given new lives and jobs in the United States-many of them were war criminals with direct ties to genocide and torture (Jacobsen, 2014).
A Sampling:
Gehlen Organization: Hitler's Spy Network Becomes CIA Backbone
Perhaps most incriminating of all: Reinhard Gehlen, former Nazi General and head of Hitler's Eastern Front intelligence, was not tried-he was promoted. The CIA, in the persona of Dulles, gifted Gehlen a budget, personnel, and direct access to postwar American intelligence. His new SS organization, the Gehlen Org, was the point U.S. intelligence network in Eastern Europe, many of its officers were unrepentant SS veterans (Simpson, 1988).
Gehlen's files, archived from the ruins of the Third Reich, were the foundation of early CIA knowledge about the Soviet bloc. But they came at a premium: the deliberate inculcation of Nazi ideology, methodology, and personnel into the U.S. security state.
The CIA is Born
In 1947, the National Security Act created the Central Intelligence Agency, an unelected, black-budgeted agency with no public or effective government oversight and impunity to commit crime in the cause of "freedom." Its designers were Wall Street attorneys, OSS spooks, and Nazi collaborators-not fighters for liberty, but SS Nazi empire technicians (Talbot, 2015).
Within a decade, the CIA would be assassinating, toppling governments, and torturing citizens in America. Its DNA was never democratic. It was always Waffen authoritarian.
II. MKUltra and the Mind Kontrol Empire: Gottlieb's Sadistic Science
No foreign enemy could have fabricated a more gorgonian plot than the CIA's MK-series mind-control regime. Under the guise of "behavioral research," the agency orchestrated one of the most unconstitutional, immoral, and scientifically sadistic programs in modern global times.
The Frankenstein of Langley: Dr. Sidney Gottlieb
At its intestines was Sidney Gottlieb, a chemist whose position was innocuous-sounding-"chief of the CIA's Technical Services Division." Actually, Gottlieb was the American Mengele, designing and autographing experiments that would destroy minds, shatter bodies, and annihilate lives (Marks, 1979).
Project MKUltra, spawned in the early 1950s, consisted of 149 sub-projects nationally and abroad at universities, hospitals, and prisons-most of them conducted without informed consent (Church Committee, 1976; Marks, 1979).
This was pseudo-science, psychological warfare against the American people.
Project ARTICHOKE, BLUEBIRD, and Psychic Driving
Before MKUltra, there was previous codewording: Project MK ARTICHOKE, MK BLUEBIRD, Midnight Climax-each worse than the last (CIA FOIA Docs, 1951–54). In one of the projects, CIA agents hired prostitutes to lure men to safehouses where they were secretly administered hallucinogens and watched through one-way mirrors (Marks, 1979, Midnight Climax).
CIA-funded Dr. Ewen Cameron created "psychic driving"-human-experimental total personality erasure-by subjecting patients to enormous doses of LSD and insulin under a deluge of recorded messages for weeks. The majority were left irrecoverably damaged, others catatonic (Weinstein, 1990).
Non-consensual human research was carried out at McGill University's Allan Memorial Institute in Canada-demonstrating the U.S. intelligence apparatus exported its horrors abroad when domestic law intervened.
The Cover-Up and the Victims
In 1953, U.S. Army biochemist Frank Olson was secretly administered LSD by Gottlieb. In a matter of days, Olsen jumped from a hotel window in suspicious circumstances, the government attributed the death to suicide. His family is adamant it was murder. Decades later, forensic testimony validated their claim (Morris, 2017; Olson v. CIA, 2012).
When Congress began to ask questions in the 1970s, CIA Director Richard Helms ordered all MKUltra records to be destroyed. Just enough files remained-through FOIA, whistleblowers, and Senate investigations-to prove beyond all doubt that the U.S. government had been involved in a decades-long illegal program of human experimentation on U.S. civilians (Church Committee, 1976).
ARTICHOKE (1950s): One of the first CIA projects dabbling with mind control using interrogation, hypnosis, and drugs.
BLUEBIRD (1951): Precursor to ARTICHOKE, focusing on conditioning, interrogation, and amnesia induction.
MKULTRA (1953–1973): Infamous CIA project testing with drugs (LSD), hypnosis, and sensory deprivation to control/erase the mind.
MKDELTA (1950s–60s): MKULTRA subproject, focused on covert chemical/biological weapons to control behavior.
CHATTER (1947–1953): Navy research project into truth serums, e.g., scopolamine, for interrogation.
MONARCH (Unsubstantiated, no official reports): Conspiracy theory of trauma-based mind control for the purpose of creating programmable "slaves."
PANDORA (1965–1970): DOD/CIA microwave/ELF (extremely low frequency) brain effects research.
MKNAOMI (1950s–60s): Joint CIA/DOD development of biological warfare, including behavioral control toxins.
MKSEARCH (1960s): Follow-up of MKULTRA, investigating new drugs/forms of mind control.
THIRD CHANCE (1960s): Army subprogram of MKULTRA testing drugs (e.g., BZ) for interrogations.
1975 – CIA ends MKULTRA; focus shifts to EMF and non-lethal weapon research.
1980s – DARPA begins research into directed energy, microwave, and scalar technologies.
1991 – Alleged use of Silent Sound (SSSS) tech on Iraqi troops during Gulf War.
2001 – U.S. military unveils Active Denial System (ADS), using millimeter waves for crowd control.
2010s – Rise in civilian reports of microwave targeting, EMF harassment, and “Havana Syndrome.”
2020 – Public concern over 5G millimeter waves overlaps with non-lethal weapon tech debates.
2021 – U.S. investigates suspected directed energy attacks on diplomats and federal workers.
2025 – Growing calls for declassification of DEW and EMF weapon programs affecting civilians.
As with many totalitarian regimes, the U.S. government justified exploitative non-consensual human trials and brainwashing in the name of "national defense." Theirs was a vicious competition to control the human mind-not for protection, but for despotic control.
III. Cold War Deep State: Coups, Killings, and Domestic War
The Cold War was not a war of ideologies-it was a war on democracy itself. While Americans feared the Soviets, the existential threat came from Langley, not Lubyanka. The CIA became the planet's most powerful unelected government, destabilizing elected leaders abroad and executing psychological warfare at home.
Global Regime Change: Assassins Without Borders
The CIA did not protect America's freedom and assassinated others'.
These were not isolated incidents-they were part of Executive Action, a CIA-sanctioned program to eliminate foreign leaders who disobeyed US corporate and military interests (Church Committee, 1976).
JFK, MLK, and Fred Hampton: Domestic Enemies of the Deep State
Domestically, the same sabotage machinery turned inward.
This was a domestic counterinsurgency campaign. The United States government hunted its citizens to circumvent justice.
Operation Northwoods: False Flags as Policy
In 1962, the Pentagon's Joint Chiefs of Staff proposed killing Americans to launch a war.
The declassified plan-Operation Northwoods included:
…all to provoke a war with Cuba (National Security Archive, 2001).
Only JFK said no. He was dead within 18 months. The files remain redacted.
Phoenix Program: Vietnam as CIA Kill Lab
In Vietnam, the CIA ran a torture-assassination program known as Phoenix, which killed over 20,000 civilians-many with no verified insurgent ties (Valentine, 1990). Techniques included electric torture, mock executions, and assassinations carried out in front of family members.
It was later used as the blueprint for Iraq and Afghanistan counterinsurgency.
Year / Period | Event | Description | Significance |
---|---|---|---|
1945–1950 | Operation Paperclip | Importing 1,600+ Nazi scientists & officers to US programs | Foundation for Cold War military & intelligence expansion |
1953 | Iran Coup (Operation Ajax) | CIA orchestrates overthrow of democratically elected leader | Set precedent for covert regime change |
1956–1971 | COINTELPRO | FBI domestic spying, sabotage, and assassinations | Targeted civil rights, anti-war, and Black liberation movements |
1962 | Operation Northwoods Proposal | Joint Chiefs planned false flag terrorist attacks on US soil | Exposed plans to manufacture war justification |
1969–1973 | Cambodia Bombing | Secret US bombing campaign kills 500,000 civilians | Escalation of illegal war crimes under Nixon |
1970s | Gehlen Org becomes BND | Nazi spy network turned West German intelligence agency | Integration of Nazi networks into Western Cold War apparatus |
1975 | Church Committee | Congressional investigation exposes CIA & FBI abuses | Public awareness of illegal surveillance & covert ops |
1994 | 1033 Program Launch | Transfer of military gear to local police forces begins | Militarization of domestic law enforcement |
2001 | USA PATRIOT Act | Expanded warrantless surveillance and detention powers | Legal foundation for mass domestic spying |
2013 | Snowden NSA Leaks | Revelation of global mass surveillance programs | Public outcry; confirmation of unconstitutional spying |
2014 | ACLU Exposes 1033 Program Use | Documentation of military gear use on US protesters | Highlighting domestic repression |
2015 | Jade Helm 15 | Military domestic training exercises simulating civil unrest | Public fear of martial law and government repression |
2016 | Fusion Centers Expansion | Interagency data hubs tracking activists and citizens | Institutionalization of domestic surveillance network |
2017 | Operation Garden Plot (Declassified) | Plans for military intervention during domestic protests | Preparation for suppression of civil unrest |
2018 | NSA & Mossad Cooperation Revealed | Intelligence sharing with Israeli Unit 8200 | Integration of foreign tech surveillance and influence |
2020 | DHS Domestic Terrorism Warnings | Labeling activists and dissidents as threats | Increasing criminalization of political dissent |
2021 | Twitter Files Leaks | Evidence of government-directed social media censorship | Control of political narratives & suppression of dissent |
2022 | Expansion of Section 1021 & 1022 NDAA | Authorization of indefinite detention and surveillance | Legal basis for ongoing domestic militarization |
2023 | Rise of AI Surveillance | Use of Palantir & predictive policing algorithms | High-tech social control and pre-emptive repression |
Ongoing | The Program & Flash Mob Tactics | Cellphone stalking, harassment, & crowd manipulation as military force | Covert psychological operations against citizens |
IV: Deep State 2.0 - Surveillance Empire Financial Parasite
The highly suspicious attacks of September 11, 2001, did not awaken the deep state it unshackled it. In the rubble of the Twin Towers, a surveillance monster was born, draped in fiber optics, AI, secrecy, and impunity.
The USA PATRIOT Act passed just weeks after the attacks, it codified a system of mass warrantless surveillance. It permitted the National Security Agency (NSA) to trash the Fourth Amendment under the guise of national security, monitoring the digital communications of Americans without judicial oversight (Greenwald, 2014).
Former Director of National Intelligence James Clapper lied under oath to Congress in March 2013 when asked if the NSA collected data on millions of Americans. He infamously replied, "Not wittingly." This felony perjury went unpunished (US Senate Intelligence Committee, 2013).
The expansion of state power went fist-in-glove with privatized war profiteering. Vice President Dick Cheney, former CEO of Halliburton, awarded his former firm $39 billion in no-bid contracts (electrocution-showers for U.S. troops) for operations in Iraq, fueling a war machine that simultaneously devoured taxpayer money and foreign lives (Briody, 2004).
CIA "black sites" operated outside US soil, from Thailand to Romania, where detainees were subjected to torture methods including waterboarding, sleep deprivation, drugging and rectal feeding. These acts, crimes under the Geneva Conventions, were retroactively legalized by legal memos crafted by Bush-appointed lawyers (ACLU v. CIA, 2016). When CIA Director Gina Haspel ordered videotapes of the torture destroyed, she was not punished-she was promoted (ACLU v. CIA, 2016).
Covertly, starting under George W. Bush, the true power began to consolidate in financial black holes like BlackRock and Vanguard. These two asset managers now control over $20 trillion in global assets, including dominant shares in weapons manufacturers, tech companies, seeds, water-rights, housing conglomerates, and Big Pharma (ETF.com, 2023).
The Citizens United v. FEC (2010) decision completed the coup, legally conflating money with speech and corporations with people. It opened the floodgates for dark money super-PACs, normalizing corporate bribery at a scale unseen in modern democracies (Lessig, 2011).
The surveillance state is no longer just a state machine; it is a hybridized alliance of private capital and state intelligence and foreign soft power, creating a feedback loop of extraction, oppression, and control. The Fourth Estate, once the watchdog, has become the junk yard dog inverted, while the citizen is invisible, monitored, and disposable. One of its principle duties is soft-kill.
V: Epstein, Censorship, Digital Thought Police
In many empires, control of the body precedes control of the mind. The American deep state, now fully entwined with elite financiers and intelligence cartels, has spun this doctrine further by fusing sexual blackmail networks, algorithmic surveillance, and mass censorship into one monolithic cadre of obedience.
At the epicenter stood Jeffrey Epstein, a convicted sex trafficker whose ties to US intelligence, Mossad, and Wall Street power brokers have been confirmed by court filings and declassified memos (Maurel, 2020; US v. Maxwell, 2021). Flight logs and testimony implicate Prince Andrew, Alan Dershowitz, Bill Clinton, Donald Trump and multiple former US officials, yet the Maxwell trial evidence remains sealed by order of the court.
Epstein's was not merely a pedophile's empire-it was an intelligence operation child honey-trap, weaponizing sex to compromise politicians, academics, and corporate leaders. The goal was never a pleasure. It was blackmail leverage.
The fusion between digital surveillance and behavioral control accelerated when Palantir Technologies, co-founded by Peter Thiel, began selling predictive policing software to ICE and local police forces. Palantir's systems can flag individuals for "pre-crime" based on social media behavior, neighborhood, or associations, transforming Sci-Fi Minority Report into law enforcement policy (Levine, 2021).
Meanwhile, the "Twitter Files," leaked by journalists like Matt Taibbi, revealed direct FBI and DHS influence over content moderation, targeting journalists, dissidents, and activists who questioned COVID mandates, Ukraine funding, or government narratives (Taibbi, 2022). Emails showed blacklists, keyword flagging, and narrative steering in coordination with state agencies-evidence of de facto state mind control censorship.
This mind control is not about "disinformation." It is preemptive narrative warfare, where dissent is algorithmically erased before it trends. As Facebook whistleblower Frances Haugen confirmed, engagement algorithms amplify rage, fear, and conformity, not truth.
Behind it all lies the NSA's real-time dragnet-XKeyscore, PRISM, and FISA court rubber stamps that allow surveillance of every citizen without probable cause (Greenwald, 2014). According to Snowden, even your Google searches and webcam feeds can be accessed retroactively.
This matrix of surveillance is not theoretical. It has been used to silence whistleblowers, blackmail politicians, and build AI-based "threat models" on journalists and organizers. Thoughtcrime is no longer an Orwellian metaphor. It is a normalized counterintelligence policy.
The weaponized censorship-industrial complex is now the unofficial 5th Branch of Government, accountable to no voters, funded by no legislation, yet able to erase dissent, erase history, and erase you.
VI: Militarizing America for Civil War - The Domestic War Machine Comes Home
The militarization of America was not an accident. It was a plan. A decades-long transmutation of the foreign counterinsurgency machine into domestic suppression architecture legalized under cover of "terrorism prevention," quietly operationalized under multiple presidencies, and aimed not at foreign threats but at you.
At its foundation lies the 1033 Program, the fundamental aim was revealed during events like Standing Rock and Black Lives Matter, where Long Range Acoustic Devices (LRADs), Stingray cellphone trackers, and surveillance drones were deployed against peaceful protesters. These are battlefield technologies repurposed for domestic counterinsurgency. (ACLU 2014).
It did not end there. Operation Garden Plot and Jade Helm 15-official US Army exercises-explicitly prepared military units for domestic riot control, martial law, and civil unrest suppression. These plans, obtained via FOIA, were not theoretical. They were blueprints for internal occupation (US Army Docs via FOIA).
The 2012 National Defense Authorization Act (NDAA), Sections 1021 and 1022, erased Posse Comitatus protections and authorized indefinite military detention of US citizens without trial under the guise of "terrorism." This directly violated centuries of legal precedent and positioned the US military as a domestic enforcer (NDAA, 2012).
Simultaneously, Fusion Centers-joint data-sharing hubs run by DHS and local police-compile activist behavior profiles, social media activity, and ideological risk scores. These centers became the nerve centers of the surveillance state, where antiwar activists, Black organizers, and even Ron Paul supporters were flagged as potential threats (DHS Memo, 2022).
The most insidious weapon is The Program-a covert psychological warfare op run via NSA surveillance, cellphone triangulation, and civilian role players. Targets are mobbed, stalked, gaslit, and harassed by civilians triggered through encrypted federal apps. This isn’t theory. It’s backed by affidavits, FOIA files, and whistleblower leaks. The state calls it “mass schizophrenia”-a strategic smear to silence victims (Medawar, 2011).
These actions are felonies under 18 USC §§ 241–242, which ban conspiracies to deprive rights under color of law. Yet the DOJ, FBI, and local police have refused to act, allowing this domestic black ops network to spread unchecked. Law Enforcement follows illegal orders violating First and Fourth Amendment laws.
Now it spans the NSA, Mossad, Unit 8200, and tech mercenaries like Palantir and Clearview AI-funneling predictive data and biometric IDs into fusion centers that treat the public like insurgents in Fallujah.
Democracy is not under threat. It is under siege. The enemy is not at the gates-it is wired into your phone, embedded in your neighborhood, and shielded by national security clearance.
Security for Whom? The Deep State's Unyielding Fortress
The deep state is not a guardian of we the people; it is a rampart defending a psychopathic class of oligarchs whose corporate speech, finances and power depends on systemic secrecy and violence. Every so-called national security law, mass surveillance (Greenwald, 2014) to black site torture programs (ACLU v. CIA, 2016)-has been weaponized to shield the elite from accountability and silence dissent. The laws crafted to protect constitutional rights have been twisted, buried beneath layers of classified memos, and ignored by those sworn to uphold them (USC 18 Sections 241, 242; MedaWarsCornflakes, 2011).
This blood sport Roman Amphitheater is no conspiracy theory; it is documented history, forged in the blood of millions who suffered under coups, chemical mind control experiments (Marks, 1979), assassinations (Talbot, 2015), and endless wars (Kinzer, 2003). The deep state's militarization of domestic police forces and its digital panopticon (Levine, 2021) have transformed American soil into a battlefield where citizens are treated like enemies of the state.
The deep state fears exposure more than any ballot box. The Sociocracy’s true weakness lies in transparency, mass resistance, and collective noncompliance. Leaks, strikes, and whistleblowing remain the sharpest weapons against a regime that prefers shadows to sunlight (Snowden, 2013; Manning, 2010).
To reclaim democracy, Americans must confront the deep state's brutal legacy and dismantle the architecture of deception and control it has built since the days of Nazi scientists smuggled in under Operation Paperclip (Jacobsen, 2014) to today's algorithmic overlords.
No reform within the system will cure, it must be exposed, broken, and rebuilt on the foundations of truth, justice, and public power. The deep state's reign is not inevitable; it is a fortress built on lies-and lies can be shattered.
Organized Sources:
Section I: The Birth of the Deep State - From OSS to CIA to Nazi Symbiosis
Jacobsen, A. (2014). Operation Paperclip: The secret intelligence program that brought Nazi scientists to America. Little, Brown.
*Used to document Nazi recruitment into U.S. programs, including Wernher von Braun and Walter Schreiber.
Simpson, C. (1988). Blowback: America's recruitment of Nazis and its effects on the Cold War. Weidenfeld & Nicolson.
*Documents Allen Dulles' Nazi ties, Gehlen Org, and integration of SS officials into the CIA.
Talbot, D. (2015). The Devil’s Chessboard: Allen Dulles, the CIA, and the rise of America's secret government. HarperCollins.
*Covers Dulles, the founding of the CIA, and early agency criminality.
U.S. National Archives. (1947). National Security Act of 1947. Public Law 80-253.
*Establishes the legal creation of the CIA, embedding unelected intelligence infrastructure.
U.S. Department of Justice. (1951). Operation Paperclip Files (FOIA Released). CIA Reading Room.
*Primary source files showing the importation of high-ranking Nazis under Paperclip.
Medawar, P. (2011, February). America’s forgotten anti-gangstalking law. Medawar’s Cornflakes.
*Explains U.S. Code § 241 and § 242 in relation to "The Program" (cited later but relates to immunity themes set in Section I).
Section II: MKUltra and the Mind Control Empire
Marks, J. (1979). The Search for the Manchurian Candidate: The CIA and Mind Control. Times Books.
*The seminal investigative work exposing MKUltra’s LSD experiments, torture, and nonconsensual human research.
CIA FOIA. (1951–1954). Project ARTICHOKE and BLUEBIRD Documents. Central Intelligence Agency.
*Declassified files detailing early CIA brainwashing projects including hypnosis, sensory deprivation, and forced addiction.
Weinstein, H. (1990). Psychiatry and the CIA: Victims of Mind Control. APA Press.
*Documents Dr. Ewen Cameron’s “psychic driving” experiments and electroshock torture under CIA contracts.
Church Committee. (1976). Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities. U.S. Senate.
*Senate investigation revealing MKUltra’s scale and CIA’s destruction of evidence.
Wormwood: The Death of Frank Olson. Directed by Errol Morris, 2013.
*Documentary investigation into Frank Olson’s murder after involuntary LSD dosing under CIA mind control programs.
AP News. (2023, March 1). Intel agencies: No sign adversaries behind “Havana syndrome”. https://apnews.com/article/havana-syndrome-intelligence-anomalous-health-incidents
BBC News. (2020, December 6). ‘Havana syndrome’ likely caused by directed microwaves – US report. https://www.bbc.com/news/world-us-canada-55203844
Foreign Policy. (2020, December 5). U.S. diplomats and spies likely targeted by radio frequency energy, report says. https://foreignpolicy.com/2020/12/05/us-diplomats-havana-syndrome-cuba-china-russia-radio-frequency/
The Guardian. (2021, May 2). Havana syndrome: NSA officer’s case hints at microwave attacks since ’90s. https://www.theguardian.com/world/2021/may/02/havana-syndrome-nsa-officer-microwave-attacks-since-90s
Wired. (2006, December 5). Say hello to the goodbye weapon. https://www.wired.com/2006/12/say-hello-to-the-goodbye-weapon/
Wikipedia. (2025, July). Active Denial System. https://en.wikipedia.org/wiki/Active_Denial_System
Section III: Cold War Deep State - Coups, Killings, and Domestic War
Kinzer, S. (2003). All the Shah's Men: An American Coup and the Roots of Middle East Terror. John Wiley & Sons.
*Detailed account of the 1953 CIA-backed coup in Iran and subsequent regime changes worldwide.
Church Committee. (1976). Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities. U.S. Senate.
*Congressional report revealing CIA assassination plots, including "Executive Action" and COINTELPRO operations.
Talbot, D. (2015). The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government. HarperCollins.
*Investigative biography linking Allen Dulles to covert assassinations and CIA coup strategies.
National Security Archive. (2001). Operation Northwoods Declassified Documents. George Washington University.
*Original Pentagon false flag proposals aimed at justifying war against Cuba.
Owen, T., & Kiernan, B. (2006). Cambodia: War, Genocide, and Revolution. Routledge.
*Comprehensive study of U.S. bombing campaigns and their civilian toll in Cambodia.
Dinges, J. (2004). The Condor Years: How Pinochet and His Allies Brought Terrorism to Three Continents. The New Press.
*Examination of CIA-backed Operation Condor death squads in Latin America.
FBI Files (1969). Murder of Fred Hampton.
*Government files revealing FBI sabotage and assassination of Black Panther leader Fred Hampton.
Section IV: Deep State 2.0 - The Surveillance Empire and the Financial Parasite
Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books.
*Definitive account of NSA mass surveillance programs and Snowden’s revelations.
Snowden, E. (2013). Whistleblower testimony and leaks (various platforms).
*Primary sources exposing warrantless wiretapping, PRISM, XKeyscore, and illegal data collection.
U.S. Senate. (2013). James Clapper’s Testimony Before Senate Intelligence Committee.
*Official record of Clapper’s false statements denying NSA surveillance.
Briody, D. (2004). The Halliburton Agenda: The Politics of Oil and Money. Wiley.
*Investigation into Dick Cheney, Halliburton contracts, and Iraq War profiteering.
ACLU v. CIA, 640 F. App’x 9 (D.C. Cir. 2016).
*Court case documenting CIA’s use of black sites and destruction of torture evidence.
ETF.com. (2023). BlackRock and Vanguard Assets Overview.
*Financial analysis of asset ownership and influence over multiple sectors.
Lessig, L. (2011). Republic, Lost: How Money Corrupts Congress-and a Plan to Stop It. Twelve.
*Analysis of Citizens United decision and legalized corporate political influence.
Section V: Epstein, Censorship, and the Digital Thought Police
US v. Maxwell, 2021.
*Sealed trial documents revealing Epstein’s blackmail network and ties to intelligence agencies.
Maurel, J. (2020). The Intelligence Links of Jeffrey Epstein. Journal of Intelligence and National Security, 35(6), 1–19.
*Investigative article tracing Epstein’s CIA and Mossad connections.
Dershowitz, A. (2019). Publicly available flight logs and testimonies.
*Documentation of Epstein’s high-profile associates.
Levine, Y. (2021). Surveillance Valley: The Secret Military History of the Internet. PublicAffairs.
*Exploration of Palantir’s role in predictive policing and surveillance.
Taibbi, M. (2022). Twitter Files. Substack.
*Whistleblower releases showing government censorship demands and social media cooperation.
Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books.
*Contextualizes the digital surveillance infrastructure underpinning social media policing.
Section VI: Militarizing America for Civil War: Domestic War Games
American Civil Liberties Union (ACLU). (2014). War Comes Home: The Excessive Militarization of American Policing.
*Comprehensive report on the Pentagon’s 1033 Program and military equipment transfer to local police forces.
U.S. Army FOIA Documents (Various Years).
*Official documents detailing domestic riot suppression exercises including Operation Garden Plot and Jade Helm 15.
Department of Homeland Security (DHS). (2022). Domestic Terrorism Threat Assessment Memo.
*Internal memos listing peaceful activists as potential domestic threats and describing the use of fusion centers.
Standing Rock Protest Reports (2016-2017).
*Documentation of LRAD, drones, and other military-grade tech used against protesters.
Black Lives Matter Movement Reports (2014-2020).
*Records and videos showing militarized police responses involving armored vehicles and crowd control weapons.
Jade Helm 15 Operational Reports (2015).
*Publicly available operational plans for domestic military exercises simulating civil unrest.
Conclusion Section Sources
ACLU v. CIA, 640 F. App’x 9 (D.C. Cir. 2016).
Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Metropolitan Books.
Jacobsen, A. (2014). Operation Paperclip: The secret intelligence program that brought Nazi scientists to America. Little, Brown.
Kinzer, S. (2003). All the Shah’s men: An American coup and the roots of Middle East terror. John Wiley & Sons.
Levine, Y. (2021). Surveillance Valley: The secret military history of the Internet. PublicAffairs.
MedaWarsCornflakes. (2011, February). America’s forgotten anti-gangstalking law: USC 18 sections 241 and 242. Medawarscornflakes.blogspot.com. https://medawarscornflakes.blogspot.com/2011/02/americas-forgotten-anti-gangstalking.html
Marks, J. (1979). The search for the Manchurian candidate: The CIA and mind control. Times Books.
Snowden, E. (2013). Whistleblower revelations on NSA mass surveillance [Testimony]. Various media and documents.
Talbot, D. (2015). The devil’s chessboard: Allen Dulles, the CIA, and the rise of America’s secret government. HarperCollins.
U.S. Code, Title 18, Sections 241 and 242 (USC 18 §§241–242).
From Nazi SS-Brigadeführer to CIA Agent: Untold Timeline of America’s Deep State
© 2025 by Mark Powell