« White Women and Children in Scandinavia and Britain are no longer protected by law against rapeThe Likeminded Sea Captain and Me! »

From Nazi SS-Brigadeführer to CIA Agent: Untold Timeline of America’s Deep State

July 20th, 2025

by Mark Powell

From Nazi SS-Brigadeführer to CIA Agent: Untold Timeline of America’s Deep State

A Few of America's 1,600 Harbored, Curated Genocidal NAZI War Criminals Posing and Smiling For an Operation Paperclip Class Picture. 

Exposing 80 Years of Non-Consensual Human Pseudo-Science Experiments, Surveillance, and Elite Rule Beneath the American Republic

Since the end of World War II, a covert architecture has assimilated the machinery of American democracy. Installed in the OSS (Office of Strategic Services), developed in the CIA (Central Intelligence Agency), and expanded into banking, technology, and psychological realms, this current algorithmic rule-the actual deep state-has shielded high-level criminals, conducted unlawful wars, traded in mass psychological manipulation, and constructed a firewall state to defend oligarchs against democracy.

This article exposes The Powers That Be (TPTB, a non-conspiracy term), with irrefutable proof, how "national security" was inverted as an instrument of systemic lawlessness that shields the sociopathic elite against we the people.

The Hidden Regime That Rules Without Consent Nor Rule of Law

They warned us of communism. Then terrorism. Now the neighbors. But the real threat was never outside-it was always inside.

Our "Deep State" is not a conspiracy theory (A CIA-PSYOPs-term)-it's an unaccountable illegal regime of unelected force, institutionalized illegality, and unanswerable power. It's not a cabal, but a bureaucracy-a chain of operations based on secrecy, coercion, and the militarization of knowledge. It has survived coups, assassinations, impeachments, and elections-because it has no party to answer to.

It only answers to itself.

Since 1945 there has been a non-theoretical, documented in history Coadunation of military intelligence, corporate contractors, outlaw financiers, and psychological warfare specialists-not to protect democracy-but to isolate their dynasty, themselves from “We the People.” This article doesn't speculate. It reports. Each argument is founded on declassified documents, court records, FOIA requests, and whistleblower testimony. “America’s” viral Syndicate (their own name for themselves) is the illness permeating the duopoly life support apparatus – America’s ventilator coma system.

  • Operation Paperclip brought over 1,600 Nazi scientists and war criminals into U.S. military and intelligence agencies (Jacobsen, 2014).
  • MKUltra drugged and tortured non-combatants in secret experiments to destroy the human psyche (Marks, 1979).
  • COINTELPRO murdered American citizens, including Black Panther head Fred Hampton, in the name of "national security" (Church Committee, 1976).
  • NSA programs “The Program” indexed and algorithmically rules the cyber lives of hundreds of millions of innocent American citizens (Greenwald, 2014).
  • The Epstein child sex trafficking and blackmail network operated in open sight-until the system that enabled him shut the door on his secrets (US v. Maxwell, 2021).

The highly paid Nazi War Criminals labored at Fort Bliss, Texas, engineering rockets at White Sands Proving Ground. Despite their affiliation with Nazi SS, slave labor camps, and genocidal war crimes, their expertise propelled America's Cold War space and missile initiatives. Technology was more important than democracy, suppressing Nazi histories in order to outpace Soviet competition. Their legacy constructed NASA (Apollo, Saturn V) and The Surveillance Mind Control Subcube.

You were not taught this timeline in school.

Let us segue with a Nazi SS-Brigadeführer named Walter Schreiber, who was on the U.S. government payroll because he was an expert in biological warfare.

Name / Rank War Crimes / Genocide Committed New Job in America Projects / Work in the USA
Walter Schreiber
SS-Brigadeführer
Medical experiments; biological warfare research CIA Biological Warfare Consultant Biological warfare research & intelligence
Wernher von Braun
SS-Sturmbannführer
V-2 rocket development using slave labor NASA Chief Rocket Scientist U.S. ballistic missile & space program
Klaus Barbie
SS-Hauptsturmführer
Torture & deportation of resistance fighters Counterintelligence operative for CIA in Bolivia Anti-communist operations in Latin America
Otto von Bolschwing
SS-Standartenführer
Architect of Jewish deportations; Einsatzgruppen liaison CIA & ODESSA asset Anti-communist intelligence operations
Reinhard Gehlen
Wehrmacht General
Oversaw Nazi Eastern Front intelligence; enabled war crimes CIA Head of Gehlen Org (predecessor to West German BND) Cold War anti-Soviet espionage
Hubertus Strughold
SS-Sturmbannführer
Medical experiments on prisoners U.S. Air Force “Father of Space Medicine” Human spaceflight physiology research
Hans Globke
Chief of Staff in Nazi Interior Ministry
Helped draft anti-Semitic laws, including Nuremberg Laws Advisor to West German Chancellors Post-war political consolidation & intelligence liaison
Alfred Zeidler
Camp Commandant
Oversaw forced labor and executions at camps Consultant for U.S. Military Intelligence Deception and interrogation techniques
Josef Mengele
SS-Obersturmführer
Human experiments and medical atrocities at Auschwitz Fled to South America; alleged CIA contact Unknown official projects
Arthur Rudolph
SS-Sturmbannführer
Forced labor at Mittelwerk; V-2 rocket production NASA Rocket Engineer Saturn V program
Ernst Kaltenbrunner
SS-Obergruppenführer
Head of Reich Security Main Office; orchestrated mass murders Never brought to U.S.; executed at Nuremberg N/A
Hans Kammler
SS-Obergruppenführer
Supervised V-2 production & secret weapons programs Disappeared post-war; rumored U.S. collaboration Unknown secret projects
Otto Ambros
SS-Oberführer
Chemical weapons and slave labor Consultant for U.S. chemical industry Chemical weapons research & industrial development
Hans-Ulrich Rudel
SS-Sturmbannführer
War crimes in Eastern Front campaigns Right-wing extremist political activist in Germany; alleged CIA ties Anti-communist propaganda
Friedrich Flick
Industrialist, Nazi Party member
Exploited forced labor; financing Nazi war machine Post-war industrial magnate in West Germany Rebuilding German industrial base with U.S. support
Otto Skorzeny
SS-Obersturmbannführer
Commanded special forces; war crimes in rescue missions Consultant for CIA and NATO Covert operations and counterinsurgency
Wilhelm Stuckart
State Secretary in Interior Ministry
Co-author of Nuremberg Laws; racial policy architect Legal advisor post-war; never prosecuted Post-war legal reforms & intelligence advisory
Max Faust
SS-Oberführer
Organized deportations and camp administration U.S. Army intelligence consultant Deception tactics and counterintelligence
Werner Heisenberg
Physicist (Nazi-affiliated)
Nuclear research for Nazi Germany Consultant for U.S. atomic programs Early Cold War nuclear development
Hans Fritzsche
Propaganda official
Nazi propaganda spreading racial hatred Intelligence operative post-war Psychological warfare programs
Emil Augsburg
SS-Obersturmbannführer
Gestapo officer; organized mass killings CIA operative in post-war Europe Anti-communist covert actions

I. The Birth of the Deep State: From Nazi SS to CIA

The Deep State was not birthed in Washington-it was imported from Berlin. Beneath the red-white-and-blue rituals of democracy, a more Machiavellian mechanism was transplanted: Nazi science cloned to Wall Street greed and clandestine warfare-all portrayed under the pretext of "national security."

Allen Dulles and Nazi Symbiosis



While Allied troops were bleeding on European battlegrounds, Allen Dulles, in Bern, Switzerland, with the Office of Strategic Services (OSS), was already in negotiations with top Nazis-not to capture them, but to recruit them. The rationale was bureaucratic, psychopathic, and cold: Nazi intelligence was too lucrative to allow justice to intervene (Simpson, 1988).

The figures were staggering. In Operation Paperclip, more than 1,600 Nazi scientists, physicians, engineers, and intelligence officers were given new lives and jobs in the United States-many of them were war criminals with direct ties to genocide and torture (Jacobsen, 2014).

A Sampling:

  • Dr. Wernher von Braun, the architect of the V-2 rocket that bombed civilians in London, was employed by NASA and became the führer of the American space program.
  • Klaus Barbie, the "Butcher of Lyon," who tortured and murdered French resistance soldiers, cooperated with U.S. Army Counterintelligence prior to being smuggled to Bolivia as an early CIA agent(Simpson, 1988).
  • Dr. Walter Schreiber, SS-Brigadeführer and the Nazis' Surgeon General, was heavily involved in prisoner medical experimentation. He was resettled in Texas by US authorities and went on to be intricated with CIA biowarfare experiments (Jacobsen, 2014; U.S. Army Files, FOIA).

Gehlen Organization: Hitler's Spy Network Becomes CIA Backbone

Perhaps most incriminating of all: Reinhard Gehlen, former Nazi General and head of Hitler's Eastern Front intelligence, was not tried-he was promoted. The CIA, in the persona of Dulles, gifted Gehlen a budget, personnel, and direct access to postwar American intelligence. His new SS organization, the Gehlen Org, was the point U.S. intelligence network in Eastern Europe, many of its officers were unrepentant SS veterans (Simpson, 1988).

Gehlen's files, archived from the ruins of the Third Reich, were the foundation of early CIA knowledge about the Soviet bloc. But they came at a premium: the deliberate inculcation of Nazi ideology, methodology, and personnel into the U.S. security state.

The CIA is Born



In 1947, the National Security Act created the Central Intelligence Agency, an unelected, black-budgeted agency with no public or effective government oversight and impunity to commit crime in the cause of "freedom." Its designers were Wall Street attorneys, OSS spooks, and Nazi collaborators-not fighters for liberty, but SS Nazi empire technicians (Talbot, 2015).

Within a decade, the CIA would be assassinating, toppling governments, and torturing citizens in America. Its DNA was never democratic. It was always Waffen authoritarian.

II. MKUltra and the Mind Kontrol Empire: Gottlieb's Sadistic Science

No foreign enemy could have fabricated a more gorgonian plot than the CIA's MK-series mind-control regime. Under the guise of "behavioral research," the agency orchestrated one of the most unconstitutional, immoral, and scientifically sadistic programs in modern global times.

The Frankenstein of Langley: Dr. Sidney Gottlieb



At its intestines was Sidney Gottlieb, a chemist whose position was innocuous-sounding-"chief of the CIA's Technical Services Division." Actually, Gottlieb was the American Mengele, designing and autographing experiments that would destroy minds, shatter bodies, and annihilate lives (Marks, 1979).

Project MKUltra, spawned in the early 1950s, consisted of 149 sub-projects nationally and abroad at universities, hospitals, and prisons-most of them conducted without informed consent (Church Committee, 1976; Marks, 1979).

  • The unwitting were given LSD, made morphine addicts, or were treated with electroshock, isolation, sleep deprivation, and sexual rape.
  • They were loosely American civilians across the gamut from prisoners, psychiatric patients to innocent civilians on the street (Weinstein, 1990).
  • 1950s Prison inmates were bribed with paltry sums of money and violent intimidation (carrot and stick) to become drug lab rats for experimental drugs (Big Pharma “Psyche Meds”).

This was pseudo-science, psychological warfare against the American people.

Project ARTICHOKE, BLUEBIRD, and Psychic Driving

Before MKUltra, there was previous codewording: Project MK ARTICHOKE, MK BLUEBIRD, Midnight Climax-each worse than the last (CIA FOIA Docs, 1951–54). In one of the projects, CIA agents hired prostitutes to lure men to safehouses where they were secretly administered hallucinogens and watched through one-way mirrors (Marks, 1979, Midnight Climax).

CIA-funded Dr. Ewen Cameron created "psychic driving"-human-experimental total personality erasure-by subjecting patients to enormous doses of LSD and insulin under a deluge of recorded messages for weeks. The majority were left irrecoverably damaged, others catatonic (Weinstein, 1990).

Non-consensual human research was carried out at McGill University's Allan Memorial Institute in Canada-demonstrating the U.S. intelligence apparatus exported its horrors abroad when domestic law intervened.

The Cover-Up and the Victims



In 1953, U.S. Army biochemist Frank Olson was secretly administered LSD by Gottlieb. In a matter of days, Olsen jumped from a hotel window in suspicious circumstances, the government attributed the death to suicide. His family is adamant it was murder. Decades later, forensic testimony validated their claim (Morris, 2017; Olson v. CIA, 2012).

When Congress began to ask questions in the 1970s, CIA Director Richard Helms ordered all MKUltra records to be destroyed. Just enough files remained-through FOIA, whistleblowers, and Senate investigations-to prove beyond all doubt that the U.S. government had been involved in a decades-long illegal program of human experimentation on U.S. civilians (Church Committee, 1976).

ARTICHOKE (1950s): One of the first CIA projects dabbling with mind control using interrogation, hypnosis, and drugs.

BLUEBIRD (1951): Precursor to ARTICHOKE, focusing on conditioning, interrogation, and amnesia induction.

MKULTRA (1953–1973): Infamous CIA project testing with drugs (LSD), hypnosis, and sensory deprivation to control/erase the mind.

MKDELTA (1950s–60s): MKULTRA subproject, focused on covert chemical/biological weapons to control behavior.

CHATTER (1947–1953): Navy research project into truth serums, e.g., scopolamine, for interrogation.

    MONARCH (Unsubstantiated, no official reports): Conspiracy theory of trauma-based mind control for the purpose of creating programmable "slaves."

    PANDORA (1965–1970): DOD/CIA microwave/ELF (extremely low frequency) brain effects research.

    MKNAOMI (1950s–60s): Joint CIA/DOD development of biological warfare, including behavioral control toxins.

MKSEARCH (1960s): Follow-up of MKULTRA, investigating new drugs/forms of mind control.

THIRD CHANCE (1960s): Army subprogram of MKULTRA testing drugs (e.g., BZ) for interrogations.

1975 – CIA ends MKULTRA; focus shifts to EMF and non-lethal weapon research.
1980s – DARPA begins research into directed energy, microwave, and scalar technologies.

1991 – Alleged use of Silent Sound (SSSS) tech on Iraqi troops during Gulf War.
2001 – U.S. military unveils Active Denial System (ADS), using millimeter waves for crowd control.

2010s – Rise in civilian reports of microwave targeting, EMF harassment, and “Havana Syndrome.”
2020 – Public concern over 5G millimeter waves overlaps with non-lethal weapon tech debates.

2021 – U.S. investigates suspected directed energy attacks on diplomats and federal workers.

2025 – Growing calls for declassification of DEW and EMF weapon programs affecting civilians.

As with many totalitarian regimes, the U.S. government justified exploitative non-consensual human trials and brainwashing in the name of "national defense." Theirs was a vicious competition to control the human mind-not for protection, but for despotic control.

III. Cold War Deep State: Coups, Killings, and Domestic War

The Cold War was not a war of ideologies-it was a war on democracy itself. While Americans feared the Soviets, the existential threat came from Langley, not Lubyanka. The CIA became the planet's most powerful unelected government, destabilizing elected leaders abroad and executing psychological warfare at home.

Global Regime Change: Assassins Without Borders

The CIA did not protect America's freedom and assassinated others'.

  • In 1953, the CIA overthrew Iran's Prime Minister Mohammad Mossadegh after he nationalized oil, replacing him with the brutal Shah (Kinzer, 2003).
  • In 1954, it toppled Jacobo Árbenz in Guatemala to protect United Fruit Company profits, sparking a decades-long civil war (Immerman, 1982).
  • In 1960, the CIA orchestrated the murder of Patrice Lumumba, Congo's first elected leader, paving the way for a U.S.-backed dictatorship (Gibbs, 1991).
  • In 1973, it helped overthrow Salvador Allende in Chile, replacing him with Pinochet, whose reign included death squads, mass drowning of civilians in the high seas and torture chambers (Dinges, 2004).

These were not isolated incidents-they were part of Executive Action, a CIA-sanctioned program to eliminate foreign leaders who disobeyed US corporate and military interests (Church Committee, 1976).

JFK, MLK, and Fred Hampton: Domestic Enemies of the Deep State

Domestically, the same sabotage machinery turned inward.

  • President Kennedy rejected the CIA's proposed false flag terror campaign against Americans- Operation Northwoods intended to justify a war with Cuba. He was assassinated a year later (National Security Archive, 2001).
  • The FBI's COINTELPRO targeted Martin Luther King Jr. with illegal wiretaps, blackmail letters, and a strategy to "prevent the rise of a Black Messiah" (Church Committee, 1976).
  • Fred Hampton, the magnetic Black Panther leader, was assassinated in his sleep by Chicago police after FBI infiltration and intelligence-sharing. His murder was approved at the highest levels of the Bureau (Haas, 2009; FBI Files, 1969).

This was a domestic counterinsurgency campaign. The United States government hunted its citizens to circumvent justice.

Operation Northwoods: False Flags as Policy

In 1962, the Pentagon's Joint Chiefs of Staff proposed killing Americans to launch a war.

The declassified plan-Operation Northwoods included:

  • Blowing up US ships
  • Faking hijackings
  • Planting bombs in American cities

…all to provoke a war with Cuba (National Security Archive, 2001).

Only JFK said no. He was dead within 18 months. The files remain redacted.

Phoenix Program: Vietnam as CIA Kill Lab

In Vietnam, the CIA ran a torture-assassination program known as Phoenix, which killed over 20,000 civilians-many with no verified insurgent ties (Valentine, 1990). Techniques included electric torture, mock executions, and assassinations carried out in front of family members.

It was later used as the blueprint for Iraq and Afghanistan counterinsurgency.

Year / Period Event Description Significance
1945–1950 Operation Paperclip Importing 1,600+ Nazi scientists & officers to US programs Foundation for Cold War military & intelligence expansion
1953 Iran Coup (Operation Ajax) CIA orchestrates overthrow of democratically elected leader Set precedent for covert regime change
1956–1971 COINTELPRO FBI domestic spying, sabotage, and assassinations Targeted civil rights, anti-war, and Black liberation movements
1962 Operation Northwoods Proposal Joint Chiefs planned false flag terrorist attacks on US soil Exposed plans to manufacture war justification
1969–1973 Cambodia Bombing Secret US bombing campaign kills 500,000 civilians Escalation of illegal war crimes under Nixon
1970s Gehlen Org becomes BND Nazi spy network turned West German intelligence agency Integration of Nazi networks into Western Cold War apparatus
1975 Church Committee Congressional investigation exposes CIA & FBI abuses Public awareness of illegal surveillance & covert ops
1994 1033 Program Launch Transfer of military gear to local police forces begins Militarization of domestic law enforcement
2001 USA PATRIOT Act Expanded warrantless surveillance and detention powers Legal foundation for mass domestic spying
2013 Snowden NSA Leaks Revelation of global mass surveillance programs Public outcry; confirmation of unconstitutional spying
2014 ACLU Exposes 1033 Program Use Documentation of military gear use on US protesters Highlighting domestic repression
2015 Jade Helm 15 Military domestic training exercises simulating civil unrest Public fear of martial law and government repression
2016 Fusion Centers Expansion Interagency data hubs tracking activists and citizens Institutionalization of domestic surveillance network
2017 Operation Garden Plot (Declassified) Plans for military intervention during domestic protests Preparation for suppression of civil unrest
2018 NSA & Mossad Cooperation Revealed Intelligence sharing with Israeli Unit 8200 Integration of foreign tech surveillance and influence
2020 DHS Domestic Terrorism Warnings Labeling activists and dissidents as threats Increasing criminalization of political dissent
2021 Twitter Files Leaks Evidence of government-directed social media censorship Control of political narratives & suppression of dissent
2022 Expansion of Section 1021 & 1022 NDAA Authorization of indefinite detention and surveillance Legal basis for ongoing domestic militarization
2023 Rise of AI Surveillance Use of Palantir & predictive policing algorithms High-tech social control and pre-emptive repression
Ongoing The Program & Flash Mob Tactics Cellphone stalking, harassment, & crowd manipulation as military force Covert psychological operations against citizens

IV: Deep State 2.0 - Surveillance Empire Financial Parasite

The highly suspicious attacks of September 11, 2001, did not awaken the deep state it unshackled it. In the rubble of the Twin Towers, a surveillance monster was born, draped in fiber optics, AI, secrecy, and impunity.

The USA PATRIOT Act passed just weeks after the attacks, it codified a system of mass warrantless surveillance. It permitted the National Security Agency (NSA) to trash the Fourth Amendment under the guise of national security, monitoring the digital communications of Americans without judicial oversight (Greenwald, 2014).

Former Director of National Intelligence James Clapper lied under oath to Congress in March 2013 when asked if the NSA collected data on millions of Americans. He infamously replied, "Not wittingly." This felony perjury went unpunished (US Senate Intelligence Committee, 2013).

The expansion of state power went fist-in-glove with privatized war profiteering. Vice President Dick Cheney, former CEO of Halliburton, awarded his former firm $39 billion in no-bid contracts (electrocution-showers for U.S. troops) for operations in Iraq, fueling a war machine that simultaneously devoured taxpayer money and foreign lives (Briody, 2004).

CIA "black sites" operated outside US soil, from Thailand to Romania, where detainees were subjected to torture methods including waterboarding, sleep deprivation, drugging and rectal feeding. These acts, crimes under the Geneva Conventions, were retroactively legalized by legal memos crafted by Bush-appointed lawyers (ACLU v. CIA, 2016). When CIA Director Gina Haspel ordered videotapes of the torture destroyed, she was not punished-she was promoted (ACLU v. CIA, 2016).

Covertly, starting under George W. Bush, the true power began to consolidate in financial black holes like BlackRock and Vanguard. These two asset managers now control over $20 trillion in global assets, including dominant shares in weapons manufacturers, tech companies, seeds, water-rights, housing conglomerates, and Big Pharma (ETF.com, 2023).

The Citizens United v. FEC (2010) decision completed the coup, legally conflating money with speech and corporations with people. It opened the floodgates for dark money super-PACs, normalizing corporate bribery at a scale unseen in modern democracies (Lessig, 2011).

The surveillance state is no longer just a state machine; it is a hybridized alliance of private capital and state intelligence and foreign soft power, creating a feedback loop of extraction, oppression, and control. The Fourth Estate, once the watchdog, has become the junk yard dog inverted, while the citizen is invisible, monitored, and disposable. One of its principle duties is soft-kill.

V: Epstein, Censorship, Digital Thought Police

In many empires, control of the body precedes control of the mind. The American deep state, now fully entwined with elite financiers and intelligence cartels, has spun this doctrine further by fusing sexual blackmail networks, algorithmic surveillance, and mass censorship into one monolithic cadre of obedience.

At the epicenter stood Jeffrey Epstein, a convicted sex trafficker whose ties to US intelligence, Mossad, and Wall Street power brokers have been confirmed by court filings and declassified memos (Maurel, 2020; US v. Maxwell, 2021). Flight logs and testimony implicate Prince Andrew, Alan Dershowitz, Bill Clinton, Donald Trump and multiple former US officials, yet the Maxwell trial evidence remains sealed by order of the court.

Epstein's was not merely a pedophile's empire-it was an intelligence operation child honey-trap, weaponizing sex to compromise politicians, academics, and corporate leaders. The goal was never a pleasure. It was blackmail leverage.

The fusion between digital surveillance and behavioral control accelerated when Palantir Technologies, co-founded by Peter Thiel, began selling predictive policing software to ICE and local police forces. Palantir's systems can flag individuals for "pre-crime" based on social media behavior, neighborhood, or associations, transforming Sci-Fi Minority Report into law enforcement policy (Levine, 2021).

Meanwhile, the "Twitter Files," leaked by journalists like Matt Taibbi, revealed direct FBI and DHS influence over content moderation, targeting journalists, dissidents, and activists who questioned COVID mandates, Ukraine funding, or government narratives (Taibbi, 2022). Emails showed blacklists, keyword flagging, and narrative steering in coordination with state agencies-evidence of de facto state mind control censorship.

This mind control is not about "disinformation." It is preemptive narrative warfare, where dissent is algorithmically erased before it trends. As Facebook whistleblower Frances Haugen confirmed, engagement algorithms amplify rage, fear, and conformity, not truth.

Behind it all lies the NSA's real-time dragnet-XKeyscore, PRISM, and FISA court rubber stamps that allow surveillance of every citizen without probable cause (Greenwald, 2014). According to Snowden, even your Google searches and webcam feeds can be accessed retroactively.

This matrix of surveillance is not theoretical. It has been used to silence whistleblowers, blackmail politicians, and build AI-based "threat models" on journalists and organizers. Thoughtcrime is no longer an Orwellian metaphor. It is a normalized counterintelligence policy.

The weaponized censorship-industrial complex is now the unofficial 5th Branch of Government, accountable to no voters, funded by no legislation, yet able to erase dissent, erase history, and erase you.

VI: Militarizing America for Civil War - The Domestic War Machine Comes Home

The militarization of America was not an accident. It was a plan. A decades-long transmutation of the foreign counterinsurgency machine into domestic suppression architecture legalized under cover of "terrorism prevention," quietly operationalized under multiple presidencies, and aimed not at foreign threats but at you.

At its foundation lies the 1033 Program, the fundamental aim was revealed during events like Standing Rock and Black Lives Matter, where Long Range Acoustic Devices (LRADs), Stingray cellphone trackers, and surveillance drones were deployed against peaceful protesters. These are battlefield technologies repurposed for domestic counterinsurgency. (ACLU 2014).

It did not end there. Operation Garden Plot and Jade Helm 15-official US Army exercises-explicitly prepared military units for domestic riot control, martial law, and civil unrest suppression. These plans, obtained via FOIA, were not theoretical. They were blueprints for internal occupation (US Army Docs via FOIA).

The 2012 National Defense Authorization Act (NDAA), Sections 1021 and 1022, erased Posse Comitatus protections and authorized indefinite military detention of US citizens without trial under the guise of "terrorism." This directly violated centuries of legal precedent and positioned the US military as a domestic enforcer (NDAA, 2012).

Simultaneously, Fusion Centers-joint data-sharing hubs run by DHS and local police-compile activist behavior profiles, social media activity, and ideological risk scores. These centers became the nerve centers of the surveillance state, where antiwar activists, Black organizers, and even Ron Paul supporters were flagged as potential threats (DHS Memo, 2022).

The most insidious weapon is The Program-a covert psychological warfare op run via NSA surveillance, cellphone triangulation, and civilian role players. Targets are mobbed, stalked, gaslit, and harassed by civilians triggered through encrypted federal apps. This isn’t theory. It’s backed by affidavits, FOIA files, and whistleblower leaks. The state calls it “mass schizophrenia”-a strategic smear to silence victims (Medawar, 2011).

These actions are felonies under 18 USC §§ 241–242, which ban conspiracies to deprive rights under color of law. Yet the DOJ, FBI, and local police have refused to act, allowing this domestic black ops network to spread unchecked. Law Enforcement follows illegal orders violating First and Fourth Amendment laws.

Now it spans the NSA, Mossad, Unit 8200, and tech mercenaries like Palantir and Clearview AI-funneling predictive data and biometric IDs into fusion centers that treat the public like insurgents in Fallujah.

Democracy is not under threat. It is under siege. The enemy is not at the gates-it is wired into your phone, embedded in your neighborhood, and shielded by national security clearance.

Security for Whom? The Deep State's Unyielding Fortress

The deep state is not a guardian of we the people; it is a rampart defending a psychopathic class of oligarchs whose corporate speech, finances and power depends on systemic secrecy and violence. Every so-called national security law, mass surveillance (Greenwald, 2014) to black site torture programs (ACLU v. CIA, 2016)-has been weaponized to shield the elite from accountability and silence dissent. The laws crafted to protect constitutional rights have been twisted, buried beneath layers of classified memos, and ignored by those sworn to uphold them (USC 18 Sections 241, 242; MedaWarsCornflakes, 2011).

This blood sport Roman Amphitheater is no conspiracy theory; it is documented history, forged in the blood of millions who suffered under coups, chemical mind control experiments (Marks, 1979), assassinations (Talbot, 2015), and endless wars (Kinzer, 2003). The deep state's militarization of domestic police forces and its digital panopticon (Levine, 2021) have transformed American soil into a battlefield where citizens are treated like enemies of the state.

The deep state fears exposure more than any ballot box. The Sociocracy’s true weakness lies in transparency, mass resistance, and collective noncompliance. Leaks, strikes, and whistleblowing remain the sharpest weapons against a regime that prefers shadows to sunlight (Snowden, 2013; Manning, 2010).

To reclaim democracy, Americans must confront the deep state's brutal legacy and dismantle the architecture of deception and control it has built since the days of Nazi scientists smuggled in under Operation Paperclip (Jacobsen, 2014) to today's algorithmic overlords.

No reform within the system will cure, it must be exposed, broken, and rebuilt on the foundations of truth, justice, and public power. The deep state's reign is not inevitable; it is a fortress built on lies-and lies can be shattered.

Organized Sources:

Section I: The Birth of the Deep State - From OSS to CIA to Nazi Symbiosis


Jacobsen, A. (2014). Operation Paperclip: The secret intelligence program that brought Nazi scientists to America. Little, Brown.

*Used to document Nazi recruitment into U.S. programs, including Wernher von Braun and Walter Schreiber.

Simpson, C. (1988). Blowback: America's recruitment of Nazis and its effects on the Cold War. Weidenfeld & Nicolson.

*Documents Allen Dulles' Nazi ties, Gehlen Org, and integration of SS officials into the CIA.

Talbot, D. (2015). The Devil’s Chessboard: Allen Dulles, the CIA, and the rise of America's secret government. HarperCollins.

*Covers Dulles, the founding of the CIA, and early agency criminality.

U.S. National Archives. (1947). National Security Act of 1947. Public Law 80-253.

*Establishes the legal creation of the CIA, embedding unelected intelligence infrastructure.

U.S. Department of Justice. (1951). Operation Paperclip Files (FOIA Released). CIA Reading Room.

*Primary source files showing the importation of high-ranking Nazis under Paperclip.

Medawar, P. (2011, February). America’s forgotten anti-gangstalking law. Medawar’s Cornflakes.

*Explains U.S. Code § 241 and § 242 in relation to "The Program" (cited later but relates to immunity themes set in Section I).

Section II: MKUltra and the Mind Control Empire


Marks, J. (1979). The Search for the Manchurian Candidate: The CIA and Mind Control. Times Books.

*The seminal investigative work exposing MKUltra’s LSD experiments, torture, and nonconsensual human research.

CIA FOIA. (1951–1954). Project ARTICHOKE and BLUEBIRD Documents. Central Intelligence Agency.

*Declassified files detailing early CIA brainwashing projects including hypnosis, sensory deprivation, and forced addiction.

Weinstein, H. (1990). Psychiatry and the CIA: Victims of Mind Control. APA Press.

*Documents Dr. Ewen Cameron’s “psychic driving” experiments and electroshock torture under CIA contracts.

Church Committee. (1976). Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities. U.S. Senate.

*Senate investigation revealing MKUltra’s scale and CIA’s destruction of evidence.

Wormwood: The Death of Frank Olson. Directed by Errol Morris, 2013.

*Documentary investigation into Frank Olson’s murder after involuntary LSD dosing under CIA mind control programs.

AP News. (2023, March 1). Intel agencies: No sign adversaries behind “Havana syndrome”. https://apnews.com/article/havana-syndrome-intelligence-anomalous-health-incidents

BBC News. (2020, December 6). ‘Havana syndrome’ likely caused by directed microwaves – US report. https://www.bbc.com/news/world-us-canada-55203844

Foreign Policy. (2020, December 5). U.S. diplomats and spies likely targeted by radio frequency energy, report says. https://foreignpolicy.com/2020/12/05/us-diplomats-havana-syndrome-cuba-china-russia-radio-frequency/

The Guardian. (2021, May 2). Havana syndrome: NSA officer’s case hints at microwave attacks since ’90s. https://www.theguardian.com/world/2021/may/02/havana-syndrome-nsa-officer-microwave-attacks-since-90s

Wired. (2006, December 5). Say hello to the goodbye weapon. https://www.wired.com/2006/12/say-hello-to-the-goodbye-weapon/

Wikipedia. (2025, July). Active Denial System. https://en.wikipedia.org/wiki/Active_Denial_System

Section III: Cold War Deep State - Coups, Killings, and Domestic War


Kinzer, S. (2003). All the Shah's Men: An American Coup and the Roots of Middle East Terror. John Wiley & Sons.

*Detailed account of the 1953 CIA-backed coup in Iran and subsequent regime changes worldwide.

Church Committee. (1976). Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities. U.S. Senate.

*Congressional report revealing CIA assassination plots, including "Executive Action" and COINTELPRO operations.

Talbot, D. (2015). The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government. HarperCollins.

*Investigative biography linking Allen Dulles to covert assassinations and CIA coup strategies.

National Security Archive. (2001). Operation Northwoods Declassified Documents. George Washington University.

*Original Pentagon false flag proposals aimed at justifying war against Cuba.

Owen, T., & Kiernan, B. (2006). Cambodia: War, Genocide, and Revolution. Routledge.

*Comprehensive study of U.S. bombing campaigns and their civilian toll in Cambodia.

Dinges, J. (2004). The Condor Years: How Pinochet and His Allies Brought Terrorism to Three Continents. The New Press.

*Examination of CIA-backed Operation Condor death squads in Latin America.

FBI Files (1969). Murder of Fred Hampton.

*Government files revealing FBI sabotage and assassination of Black Panther leader Fred Hampton.

Section IV: Deep State 2.0 - The Surveillance Empire and the Financial Parasite


Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books.

*Definitive account of NSA mass surveillance programs and Snowden’s revelations.

Snowden, E. (2013). Whistleblower testimony and leaks (various platforms).

*Primary sources exposing warrantless wiretapping, PRISM, XKeyscore, and illegal data collection.

U.S. Senate. (2013). James Clapper’s Testimony Before Senate Intelligence Committee.

*Official record of Clapper’s false statements denying NSA surveillance.

Briody, D. (2004). The Halliburton Agenda: The Politics of Oil and Money. Wiley.

*Investigation into Dick Cheney, Halliburton contracts, and Iraq War profiteering.

ACLU v. CIA, 640 F. App’x 9 (D.C. Cir. 2016).

*Court case documenting CIA’s use of black sites and destruction of torture evidence.

ETF.com. (2023). BlackRock and Vanguard Assets Overview.

*Financial analysis of asset ownership and influence over multiple sectors.

Lessig, L. (2011). Republic, Lost: How Money Corrupts Congress-and a Plan to Stop It. Twelve.

*Analysis of Citizens United decision and legalized corporate political influence.

Section V: Epstein, Censorship, and the Digital Thought Police


US v. Maxwell, 2021.

*Sealed trial documents revealing Epstein’s blackmail network and ties to intelligence agencies.

Maurel, J. (2020). The Intelligence Links of Jeffrey Epstein. Journal of Intelligence and National Security, 35(6), 1–19.

*Investigative article tracing Epstein’s CIA and Mossad connections.

Dershowitz, A. (2019). Publicly available flight logs and testimonies.

*Documentation of Epstein’s high-profile associates.

Levine, Y. (2021). Surveillance Valley: The Secret Military History of the Internet. PublicAffairs.

*Exploration of Palantir’s role in predictive policing and surveillance.

Taibbi, M. (2022). Twitter Files. Substack.

*Whistleblower releases showing government censorship demands and social media cooperation.

Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books.

*Contextualizes the digital surveillance infrastructure underpinning social media policing.

Section VI: Militarizing America for Civil War: Domestic War Games


American Civil Liberties Union (ACLU). (2014). War Comes Home: The Excessive Militarization of American Policing.

*Comprehensive report on the Pentagon’s 1033 Program and military equipment transfer to local police forces.

U.S. Army FOIA Documents (Various Years).

*Official documents detailing domestic riot suppression exercises including Operation Garden Plot and Jade Helm 15.

Department of Homeland Security (DHS). (2022). Domestic Terrorism Threat Assessment Memo.

*Internal memos listing peaceful activists as potential domestic threats and describing the use of fusion centers.

Standing Rock Protest Reports (2016-2017).

*Documentation of LRAD, drones, and other military-grade tech used against protesters.

Black Lives Matter Movement Reports (2014-2020).

*Records and videos showing militarized police responses involving armored vehicles and crowd control weapons.

Jade Helm 15 Operational Reports (2015).

*Publicly available operational plans for domestic military exercises simulating civil unrest.

Conclusion Section Sources 

ACLU v. CIA, 640 F. App’x 9 (D.C. Cir. 2016).

Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Metropolitan Books.

Jacobsen, A. (2014). Operation Paperclip: The secret intelligence program that brought Nazi scientists to America. Little, Brown.

Kinzer, S. (2003). All the Shah’s men: An American coup and the roots of Middle East terror. John Wiley & Sons.

Levine, Y. (2021). Surveillance Valley: The secret military history of the Internet. PublicAffairs.

MedaWarsCornflakes. (2011, February). America’s forgotten anti-gangstalking law: USC 18 sections 241 and 242. Medawarscornflakes.blogspot.com. https://medawarscornflakes.blogspot.com/2011/02/americas-forgotten-anti-gangstalking.html

Marks, J. (1979). The search for the Manchurian candidate: The CIA and mind control. Times Books.

Snowden, E. (2013). Whistleblower revelations on NSA mass surveillance [Testimony]. Various media and documents.

Talbot, D. (2015). The devil’s chessboard: Allen Dulles, the CIA, and the rise of America’s secret government. HarperCollins.

U.S. Code, Title 18, Sections 241 and 242 (USC 18 §§241–242).

From Nazi SS-Brigadeführer to CIA Agent: Untold Timeline of America’s Deep State

© 2025 by Mark Powell

No feedback yet

Voices

Voices

  • By Janet Campbell Image: Pexels You’re thinking about running. Not hypothetically. Not one day. But now. You’ve noticed the policy gap firsthand, and maybe you’re tired of waiting for someone else to close it. Yet as a disabled candidate, you're not…
  • Dr. Vladislav B. Sotirovic Preface The period of the 1980s in the Socialist Federal Republic of Yugoslavia was marked by a powerless federal government in Belgrade, with all six republics exercising their autonomous politics and showing little care for…
  • By Sally Dugman Betsy and Randy The eldest son, a married school teacher with children, of Catholic Worker friends of mine, I was told, is contemplating becoming a War Tax Resister, which makes sense on a number of points — especially in that his…
  • By Robert David I. Deliberate Design: The Caloric Cage of Gaza “We control Gaza’s caloric intake.” — Senior Israeli official, quoted in Haaretz, July 2025 The crime did not come by accident. It arrived by spreadsheet. Behind the rubble and refugee camps…
  • India News HD’s post Sweden: Two Afghan immigrants who brutally r*ped a minor at knifepoint are released by Swedish justice and will not be deported. The indoctrinated and brainwashed Swedish judge said that Muslims have different cultural values than…
  • by Mark Powell A Few of America's 1,600 Harbored, Curated Genocidal NAZI War Criminals Posing and Smiling For an Operation Paperclip Class Picture.  Exposing 80 Years of Non-Consensual Human Pseudo-Science Experiments, Surveillance, and Elite Rule…
  • By Sally Dugman Every day when I wake up, I look out a particular window in my home at the cooling canopy of one of my five to seven story high trees in the yard and marvel at the thought that the retired sea captain who built my sturdy home in the…
  • By David Swanson God told me he has a message for you. It is this. The peoples of the Earth, led by the United States, are concentrating wealth in the hands of a small percentage of the people. You may ignore this more than you deny it, but even if you…
  • Dr. Vladislav B. Sotirovic Links with Central Serbia It has been the standard political-propaganda mantra since 1968 (during the first anti-Yugoslav mass demonstrations in Kosovo by local Albanians) of Kosovo Albanian (or Shqiptar in the Albanian…
  • By Fred Gransville Where the Rich Raped, the Justice System Genuflected The Girls Were Not Collateral Damage. They Were Targets. They were people’s daughters, sisters, granddaughters. Before the girls were trafficked to an island, misused and scrap…
Censorship is not safety. It is authoritarianism in disguise. Bing is not just a search engine—it is an information gatekeeper. Click the red button to email MSN and Bing.com executives. This message challenges their censorship of ThePeoplesVoice.org and demands transparency, algorithmic fairness, and an end to suppression of free expression.
July 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
    1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31    

  XML Feeds

Blog software
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi