Conspiracy: CIA Formed to Keep War Alive?
- A. Royden D'souza

- 17 hours ago
- 78 min read
On September 11, 2001, nineteen men hijacked four commercial airliners and carried out the deadliest terrorist attack on American soil in history. The perpetrators were (allegedly) members of al-Qaeda, an organization whose leader, Osama bin Laden, had been cultivated, funded, and armed by the Central Intelligence Agency during the 1980s. This is not conspiracy theory. This is declassified fact.

The pattern repeats across the decades: a covert operation empowers militant Islamist forces to fight a perceived enemy—the Soviet Union, the Syrian government, the Iranian regime—and those same forces later turn their weapons against their former sponsors.
The intelligence community has a name for this: blowback, defined as "the unintended consequences and unwanted side-effects of a covert operation." The question is, were the "intelligence" organizations involved not intelligent enough to foresee this?
But a more troubling question emerges from the historical record: Were these consequences truly unintended? Or did the architects of American foreign policy knowingly cultivate religious extremism as a tool of geopolitical control, fully aware that the flames they fanned would eventually reach their own shores?
We will examine the evidence, including declassified documents, testimony from intelligence officials, leaked cables, and on-the-record admissions from U.S. presidents and senators, to trace the arc of a strategy that has repeatedly armed, funded, and empowered Islamist militant groups, only to later declare war on the very forces it helped create and send in Christian soldiers to fight them at the expense of American citizens.
We will proceed chronologically, from the founding of the CIA to the present day, stacking evidence that points to a disturbing pattern: that the politicians & 'intelligence' agencies in the U.S. and its ally nations have, for generations, treated religious extremism as a weapon, and have been surprised, or claimed to be surprised, when that weapon exploded in the face of American citizens.
Part I: A History of Covert Destabilization

The 1953 Iran Coup: The Template for Blowback
The Central Intelligence Agency was founded in 1947 (Israel formed on 1948, and Mossad on 1949), emerging from the Office of Strategic Services (OSS) of World War II. Within six years, it would execute its first major regime-change operation; and in doing so, create the template for blowback that would echo for generations.

Operation Ajax (1953): The CIA, working with British intelligence (MI6), orchestrated the overthrow of Iran's democratically elected Prime Minister Mohammad Mossadegh. Mossadegh's crime was nationalizing Iran's oil industry, ending decades of British control. The CIA installed Mohammad Reza Pahlavi, the Shah, as a dictator who ruled with brutal repression for the next 26 years.
The consequences of this operation are now well-documented. The Shah's repression, enabled by the CIA, created the conditions for the 1979 Iranian Revolution, which brought Ayatollah Khomeini to power and established the Islamic Republic of Iran; a theocratic state explicitly hostile to the United States.
The blowback from Operation Ajax culminated in the Iran hostage crisis of 1979-1981, when 52 American diplomats and citizens were held for 444 days.
The term "blowback" itself originated in the CIA's internal history of this operation. In March 1954, the agency completed its "Clandestine Service History—Overthrow of Premier Mossadeq of Iran," and the term entered the agency's lexicon to describe the "unintended" consequences of covert actions.
The irony is that the blowback from Iran was not unintended in the sense of being unforeseen; it was predictable, predicted, and ignored.
The Pattern Established: Regime Change as Standard Operating Procedure
Throughout the 1950s and 1960s, the CIA refined its regime-change capabilities. In Guatemala (1954), the agency overthrew democratically elected President Jacobo Árbenz, installing a military dictatorship that would plunge the country into a decades-long civil war that killed over 200,000 civilians.
In the Congo (1960-1961), the CIA orchestrated the assassination of Patrice Lumumba, the democratically elected prime minister, and supported the dictator Mobutu Sese Seko for over three decades.
These operations shared a common thread: they were justified as containing communism during the Cold War. But they also shared a second, less acknowledged feature: they empowered authoritarian, often religiously conservative forces as bulwarks against secular nationalism. It was as if they weren't trying to eliminate communism, but rather, national socialism. The true threat to transnational bankers, who benefited from a controlled conflict between democratic and communist powers.
A closer look at the targets of CIA regime change—Mossadegh in Iran, Arbenz in Guatemala, Sukarno in Indonesia, Allende in Chile—reveals a common thread: each was a secular nationalist who sought to assert sovereignty over national resources, challenge foreign corporate dominance, or break free from the debt-driven strictures of Western finance.
Communism was a convenient enemy, but the real threat to transnational banking interests (the real power brokers of the American Imperium) was national socialism in its original sense: state-led economic independence, resource nationalism, and the rejection of a global financial order built on controlled conflict.
A genuine end to the Cold War would have deprived the military-industrial complex of its rationale and opened the door to multipolar economic blocs beyond the reach of Western capital. Instead, the system required perpetual, manageable conflict; a balance of terror that kept nations dependent on Western arms, debt, and alliances.
From this vantage point, the arming of religious extremists was not a series of blunders but a functional strategy: it destroyed secular nationalist movements that could have offered alternative development models, replaced them with chaotic sectarian violence that required constant Western intervention, and ensured that the financial and intelligence agencies that orchestrated the chaos remained indispensable. The result was not a world safe for democracy, but a world where the only stable constant was the profit cycle of war.
In the case of Iran, the Shah's regime promoted a controlled version of Shi'a Islam that would later be overthrown by a more radical version. In the case of Guatemala and the Congo, the regimes installed were not religiously motivated, but the pattern of destabilization and blowback would prove consistent.
Part II: Afghanistan – The Crucible of Modern Extremism

The Afghan conflict began in 1978 when the People's Democratic Party of Afghanistan (PDPA), a communist faction, seized power in a coup. The new government was brutal, secular, and Soviet-aligned. By early 1979, a rebellion by Afghan mujahideen (holy warriors) was underway.
In March 1979, U.S. national security adviser Zbigniew Brzezinski presented a memo to President Jimmy Carter outlining options for covert aid to the mujahideen. According to declassified documents, Defense Department representative Walter Slocombe asked at a March 30 meeting "if there was value in keeping the Afghan insurgency going, 'sucking the Soviets into a Vietnamese quagmire?'"
When asked to clarify, Slocombe explained: "Well, the whole idea was that if the Soviets decided to strike at this tar baby [Afghanistan] we had every interest in making sure that they got stuck."
On July 3, 1979, more than five months before the Soviet invasion, Carter signed the first presidential funding authorizing covert aid to the mujahideen. The initial allocation was $695,000 for non-military assistance, but the strategic intent was clear: provoke a Soviet intervention that would bleed the Soviet Union.
The Soviet Union invaded on December 24, 1979, and the CIA's Operation Cyclone began in earnest.
The Arming of the Mujahideen: Creating a Jihadist Army
Operation Cyclone became the longest and most expensive covert operation in CIA history. Funding rose from $20–30 million per year in 1980 to a peak of $630 million in 1987. The weapons supplied ranged from antique British Lee-Enfield rifles in the early years to state-of-the-art FIM-92 Stinger surface-to-air missiles, some 2,300 of them, by 1986.
But the most consequential decision was not the quantity of weapons but the choice of recipients. The CIA channeled its support through Pakistan's Inter-Services Intelligence (ISI), which favored the most radical, Islamist factions.
Specifically, the CIA's funding disproportionately benefited Gulbuddin Hekmatyar and Jalaluddin Haqqani, commanders whose ideology was rooted in the Muslim Brotherhood tradition and who would later become pillars of the Taliban and al-Qaeda networks.
Osama bin Laden, a wealthy Saudi, was recruited to help finance and coordinate the operation. The CIA relied on bin Laden's connections and Saudi funding to supplement its own expenditures.

As Jeffrey Sachs, the renowned economist, has noted: "Bin Laden, from a wealthy Saudi family, was brought in to help lead and co-finance the operation. This was typical of CIA operations: relying on improvised funding through a wealthy Saudi family and proceeds from local smuggling and the narcotics trade."
The Ideological Legacy: Exporting Wahhabism
The alliance between the CIA, Pakistan's ISI, and Saudi Arabia had an ideological dimension as significant as its military one. Saudi Arabia, in partnership with the United States, funded the construction of thousands of madrassas (religious schools) across Pakistan and Afghanistan.
These schools taught the Wahhabi interpretation of Islam; a strict, puritanical version that views Shi'a Muslims, Sufis, and other non-Wahhabi Muslims as heretics.
This ideological infrastructure outlived the Cold War. The fighters trained in these madrassas—radicalized, armed, and battle-hardened in Afghanistan—would disperse across the Muslim world, forming the core of future extremist movements.
As one analysis notes: "The ideological infrastructure of extremism, built to fight communism, outlived the Cold War itself and spread like wildfire through disillusioned societies." Probably as intended.
The Soviet Withdrawal and the Abandonment
When the Soviet Union withdrew from Afghanistan in 1989, the CIA's mission was ostensibly complete. But the agency continued funding the mujahideen until 1992, seeking to topple the Najibullah government that remained in power.
When the Soviet Union collapsed in December 1991, U.S. aid to the mujahideen ended, leaving Afghanistan a failed state in the grip of a multifaceted civil war.
The consequences were catastrophic. The warlords the CIA had empowered—Hekmatyar, Haqqani, and others—turned their weapons on each other. Hekmatyar's forces, supported by the ISI, reduced much of Kabul to rubble with mass-casualty rocket attacks.
Out of this chaos emerged the Taliban, a movement of religious students (many educated in the very madrassas funded by Saudi Arabia and the CIA's Pakistani allies) who promised to restore order.
By 1996, the Taliban controlled Kabul, and al-Qaeda, the organization bin Laden had built from the remnants of the mujahideen, had established its headquarters in Afghanistan.
Blowback Arrives: From Ally to Enemy
The shift was gradual but inexorable. The CIA's former allies like bin Laden, Hekmatyar, and Haqqani became the enemy. The United States had, in the words of Jeffrey Sachs, "mobilized, recruited, trained, and armed Sunni young men to fight the Soviet Union in Afghanistan," promoting "the core vision of a jihad to defend the lands of Islam from outsiders."
This "initial fighting force, and the ideology that motivated it, today still forms the basis of the Sunni jihadist insurgencies, including ISIS."
The first major blowback came in 1993 with the World Trade Center bombing, carried out by al-Qaeda operatives. Then came the 1998 U.S. embassy bombings in Kenya and Tanzania. Then the USS Cole bombing in 2000. And finally, September 11, 2001 (which allegedly the CIA let happen to justify the invasion of Iraq).
As Sachs notes: "While the jihadists' original target was the Soviet Union, today the 'infidel' includes the US, Europe (notably France and the United Kingdom), and Russia."

Part III: The Post-Afghanistan Pattern
While Afghanistan was the primary crucible of modern Islamist extremism, the same pattern played out elsewhere. In Nicaragua in the 1980s, the CIA supported the Contras; right-wing counter-revolutionaries fighting the leftist Sandinista government.
The Contras were funded by the Reagan administration through the Iran-Contra Affair, a complex scheme in which the U.S. secretly sold weapons to Iran (an "enemy" state) to finance the Contras.

The blowback from this operation was different in kind but no less destructive. The Contras became deeply involved in drug trafficking to finance their operations, and the CIA was aware of this.
As the Iran-Contra investigation revealed, the U.S. government's support for the Contras contributed directly to the cocaine epidemic that devastated American cities in the 1980s and 1990s.
Somalia: When Counterterrorism Becomes Radicalization
In the early 2000s, the CIA launched a covert program in Somalia designed to "capture or kill al-Qaeda suspects believed to be hiding there." The agency's solution: fund secular warlords to act as proxies, channeling hundreds of thousands of dollars to them through its station in Nairobi, Kenya.
The results were disastrous. According to U.S. officials who spoke to the New York Times, the CIA effort "has thwarted counterterrorism efforts inside Somalia and empowered the same Islamic groups it was intended to marginalize." Or maybe, that was the intention.
The Islamic militias, angered by U.S. support for their secular rivals, launched pre-emptive strikes that routed the warlords and consolidated their control over Mogadishu.
As John Prendergast of the International Crisis Group noted at the time: "This has blown up in our face, frankly. We've strengthened the hand of the people whose presence we were worried most about."
Iraq: The Invasion That Unleashed the Demons
The 2003 invasion of Iraq represents perhaps the most catastrophic example of American strategic blindness; or deep-state intention. The invasion, justified by CIA/Mossad intelligence that Iraq possessed weapons of mass destruction (intelligence that was later revealed to be fabricated or exaggerated), dismantled the Iraqi state and its institutions.
Saddam Hussein's secular Ba'athist regime was replaced by chaos, and the U.S. occupation implemented a de-Ba'athification policy that purged the military and civil service of thousands of Sunnis.

As Jeffrey Sachs notes: "America's unprovoked war on Iraq in 2003 unleashed the demons. Not only was the war itself launched on the basis of CIA lies; it also aimed to create a Shia-led regime subservient to the US and anathema to the Sunni jihadists and the many more Sunni Iraqis who were ready to take up arms."
The result was a sectarian civil war that killed hundreds of thousands of Iraqis and created the conditions for the emergence of a new, even more brutal extremist movement: the Islamic State of Iraq and Syria (ISIS); again allegedly trained and funded by CIA/Mossad. Not surprising, considering these so called terror groups rarely attack Israel or America as much as they do Arab Muslims and Arab Christians.
The Libya Intervention: Arming Chaos
The 2011 NATO intervention in Libya, supported by the United States, France, and the United Kingdom, toppled Muammar el-Qaddafi after four decades of "authoritarian rule" (a CIA claim for anything resembling National Socialism). Rich, coming from a namesake democracy controlled by a deep-state oligarchy.
The result of the intervention by the American Imperium was not democracy but chaos, leaving the country a failed state awash in weapons.

The arms that flooded out of Libya would have devastating consequences. According to a declassified Defense Intelligence Agency (DIA) report obtained by Judicial Watch, "weapons from the former Libya military stockpiles located in Benghazi, Libya were shipped from the port of Benghazi, Libya, to the ports of Banias and the Port of Borj Islam, Syria."
These weapons were destined for Syrian rebel groups; including those with ties to al-Qaeda.
Part IV: Syria – The Crucible of the Islamic State

Perhaps the most damning evidence of Western complicity in the rise of ISIS comes from a declassified Defense Intelligence Agency report from August 2012. The report, obtained by Judicial Watch through a Freedom of Information Act lawsuit, described how the United States and its allies were supporting Syrian rebel efforts against the Assad regime in a proxy war.
The report explained that "AQI [al-Qaeda in Iraq] supported the Syrian opposition from the beginning" and that "western countries, the Gulf states, and Turkey are supporting" rebel efforts. Crucially, the report noted that the rebels seeking to overthrow Assad included "Salafi" (hard-line Sunni) groups whose goal was to establish a "Salafi breakaway statelet" in the region.
In other words, as early as 2012, two years before ISIS declared its caliphate, the U.S. intelligence community had documented that al-Qaeda was fighting alongside U.S.-backed rebels and that the creation of a Sunni extremist state was a likely outcome of the policy.
The Arms Pipeline from Libya
The same cache of declassified documents described a detailed weapons pipeline from Libya to Syria. The report explained that "during the immediate aftermath of, and following the uncertainty caused by, the downfall of the [Qaddafi] regime in October 2011 and up until early September of 2012, weapons from the former Libya military stockpiles located in Benghazi, Libya were shipped from the port of Benghazi, Libya, to the ports of Banias and the Port of Borj Islam, Syria."
The report notes that the shipments ended in "early September of 2012." This timing is significant because it coincides with the September 11, 2012 attack on the U.S. State Department and CIA facilities in Benghazi; an attack that killed Ambassador Christopher Stevens and three other Americans.
The documents obtained by Judicial Watch do not directly connect the weapons pipeline to the Benghazi attack, but the coincidence is striking.
The CIA's Watchful Eye
Retired CIA Deputy Director Mike Morell, in testimony before the House Intelligence Committee, acknowledged that the CIA was aware of the weapons transfers. When asked about who was coordinating the transfers, Morell named countries that have been redacted from the declassified record but are understood to include Turkey and Gulf states.
The conclusion of the final House report on Benghazi states clearly: "From the Annex in Benghazi, the CIA was collecting intelligence about foreign entities that were themselves collecting weapons in Libya and facilitating their passage to Syria."
The CIA was not merely aware; it was actively monitoring (and maybe assisting) the flow of weapons from Libya to Syrian rebels; weapons that would end up in the hands of ISIS.
The Leaked Snowden Documents
Further evidence comes from documents leaked by Edward Snowden, the former National Security Agency contractor. According to reports of these leaks, the British (MI6), American (CIA), and Israeli (Mossad) intelligence agencies collaborated on an operation codenamed "Hornet's Nest" designed to create ISIS. The purpose, according to the documents, was to "disintegrate West Asian countries and protect the Israeli regime."
The documents describe how U.S. intelligence freed a former al-Qaeda affiliate named Ibrahim al-Badri from an Iraqi prison in 2004. Al-Badri was radicalized at the U.S.-run detention center Camp Bucca near the Kuwait border from 2005 to 2009, then released to form a group of former al-Qaeda affiliates in Iraq.
He became its leader, adopting the name Abu Bakr al-Baghdadi, and his organization eventually became the Islamic State.
Part V: The Admissions – When Officials Admit the Truth
During his 2016 presidential campaign, Donald Trump repeatedly accused the Obama administration of creating ISIS. "ISIS is honoring President Obama," Trump said. "He is the founder of ISIS... And I would say the co-founder would be crooked Hillary Clinton."

Trump's comments were dismissed by his political opponents as campaign hyperbole. But they were not without basis.
The withdrawal of U.S. troops from Iraq in 2011, the arming of Syrian rebels, and the destabilization of Libya all contributed to the conditions in which ISIS emerged. Trump's accusation, while politically motivated, echoed the assessment of many intelligence analysts.
Senator Rand Paul: "We Have Indirectly Armed ISIS"
In 2018, Senator Rand Paul (R-KY) made a startling admission during a Senate Foreign Affairs Committee meeting. Paul stated that the United States had "indirectly armed ISIS." He cited an email leaked by WikiLeaks in which former White House Chief of Staff John Podesta told Hillary Clinton that the United States "must stop Saudi Arabia and Qatar from funding ISIS."
Paul's point was that the U.S. government knew that Saudi Arabia and Qatar were funding ISIS, yet continued to sell the two oil-rich kingdoms huge caches of weaponry. The weapons sold to these countries, Paul argued, were being funneled to extremist groups; a charge supported by the DIA report and other declassified documents.
Hillary Clinton's Admission on the Taliban
While serving as Secretary of State, Hillary Clinton famously acknowledged the U.S. role behind the creation of the Taliban in Afghanistan. Her admission was significant not for what it revealed—the history was already declassified—but for the fact that a sitting Secretary of State acknowledged it publicly.
The pattern, once established, is difficult to deny: the U.S. has repeatedly armed extremist groups to fight its perceived enemies, only to find those same groups turning against it. Unless the intelligence agencies aren't really "intelligent," these are intended results.
Henry Kissinger: Defeating ISIS Is Not in U.S. Interests
In 2017, former Secretary of State Henry Kissinger warned the Trump administration that defeating ISIS was not in the United States' strategic interests. According to reports, the 94-year-old Kissinger cautioned that eliminating ISIS could lead to a "radical Iranian empire" across the Middle East; a development that would threaten U.S. allies and Israel.
Kissinger's logic revealed the cynical calculus behind U.S. policy in the region: ISIS, while a threat, was also a useful counterweight to Iran. The United States could tolerate, perhaps even benefit from, the continued existence of an extremist Sunni state that would bleed Iran and its allies.
This is not conspiracy theory; it is the cold logic of realpolitik, articulated by the most influential foreign policy mind of the 20th century.
Part VI: What Academics and Analysts Conclude
The term "blowback" has entered academic discourse as a framework for understanding the unintended consequences of covert operations. Chalmers Johnson, in his seminal book Blowback: The Costs and Consequences of American Empire, traced the pattern from the 1953 Iran coup to the 1998 embassy bombings, arguing that U.S. covert actions had created a cycle of violence that would inevitably return to American shores.

The False Flag Theory
A persistent thread in conspiracy literature argues that the CIA and its allies have not merely created blowback but have orchestrated specific attacks as false flags; operations designed to blame an enemy and justify military intervention.
Following the November 2015 Paris attacks, which killed 130 people, former U.S. Army psychological officer Scott Bennett suggested that the attacks could be the work of "a sort of Zionist Mossad, MI6, CIA operation" designed to "facilitate a NATO strike against Syria."
Similarly, after attacks on oil tankers near the United Arab Emirates in 2019, academic James Henry Fetzer called them "a classic false flag operation setting up Iran for an attack by the West, in particular, the US."
Fetzer stated: "Nothing could be less in the interest of Iran than provoking an event like this; very clearly an operation being conducted by the Mossad and the CIA."
These claims are not universally accepted, but they reflect a deep-seated skepticism about U.S. and Israeli intelligence operations in the Middle East; skepticism grounded in the long history of covert actions documented in this paper.
The 2025 Framework: US Intervention and Extremism
As of 2025, analysts continue to draw connections between U.S. intervention and the rise of religious extremism. A recent analysis in New Age BD concluded:
"The US does not build liberation movements; it builds dependencies. And the cost of those dependencies is paid in the erosion of progressive thought, women's rights, education, and artistic freedom; the very foundations of the societies that once dreamed of independence."
This analysis, while critical, is not radical. It reflects a growing consensus that U.S. foreign policy in the Muslim world has repeatedly prioritized short-term geopolitical advantage over long-term stability, and that the result has been the empowerment of extremist forces that ultimately threaten the interests of American citizens (while serving the interests of the deep-state).
Part VII: The Question – Was This Intentional?
The central question of this paper is whether the pattern described above was merely a series of unintended consequences—blowback in the classic sense—or whether it reflects a deliberate strategy of controlled chaos.
Proponents of the "controlled chaos" theory argue that the United States and its allies have consistently sought to destabilize the Middle East to maintain dominance, protect Israel, and control oil supplies.
In this view, the rise of extremist groups is not a side effect but a feature of the strategy: chaos prevents the emergence of strong, independent states that could challenge U.S. interests; sectarian conflict keeps regional powers divided; and the threat of terrorism justifies perpetual military intervention.
The Counterargument: Incompetence, Not Conspiracy
The alternative explanation is that the U.S. intelligence community has been consistently, catastrophically incompetent; and that the pattern of blowback reflects failure of foresight, not deliberate design.
In this view, the CIA genuinely believed it could control the forces it unleashed; it genuinely believed that arming radical Islamists to fight the Soviets would have no long-term consequences; it genuinely believed that toppling Saddam Hussein would lead to democracy, not chaos; it genuinely believed that arming Syrian rebels would produce a moderate outcome, not the rise of ISIS.
Again, this means acknowledging that the combined intelligence of these agencies doesn't amount to much... unless it's all intentional.
The Evidence for Intent
The weight of evidence, however, points toward a darker conclusion. Consider:
The DIA report of 2012 shows that the U.S. intelligence community knew, at the highest levels, that al-Qaeda was fighting alongside U.S.-backed rebels and that the creation of a Salafi state was a likely outcome. Yet the U.S. continued to support the rebels.
The Snowden documents describe a deliberate operation (Hornet's Nest) to create ISIS as a means of destabilizing the region and protecting Israel.
Kissinger's warning that defeating ISIS is not in U.S. interests reveals a strategic calculus that values using extremists as a counterweight to Iran over the destruction of the extremist group itself.
The admissions of officials, Trump, Paul, and Clinton, while politically motivated, acknowledge the U.S. role in creating or enabling the very groups it now fights.
The pattern of arms sales, selling weapons to Saudi Arabia and Qatar while knowing that these countries fund ISIS, suggests a policy of deliberate enabling, not mere incompetence.
CIA has consistently exploited religious divisions for geopolitical ends. In Afghanistan, the CIA empowered Islamist factions at the expense of secular nationalists, betting on religious fervor as a better tool for control and dependency over progressive nationalism.
In Iraq, the U.S. dismantled the secular Ba'athist state and replaced it with a system that empowered sectarian parties, turning Sunni-Shi'a conflict into a tool of political control. In Syria, the U.S. and its allies armed Sunni extremist groups to fight a regime aligned with Shi'a Iran, deliberately inflaming sectarian tensions.
In Yemen, the U.S. supports a Saudi-led coalition against Houthi rebels, fueling a conflict that has killed hundreds of thousands and created a humanitarian catastrophe.
The result has been a series of wars in which Sunni and Shi'a, Muslim and Christian (in the case of the Lebanese Civil War and the Syrian conflict), have been pitted against each other with weapons supplied by the West.
Part VIII: The Blueprint for Controlled Conflict
Before the CIA's operations in the Middle East became widely known, a template had already been forged in Europe. That template was Operation Gladio; a clandestine "stay-behind" network established by NATO, the CIA, and European intelligence agencies in the early years of the Cold War.
While officially created to resist a potential Soviet invasion, evidence compiled by parliamentary investigations, declassified documents, and investigative journalists reveals a darker purpose: the systematic use of false flag terrorism to manipulate public opinion, discredit left-wing movements, and maintain Western control over European politics.
The Architecture of the Secret Army
Operation Gladio was not an Italian anomaly but a continent-wide conspiracy. The CIA and Britain's MI6, working through NATO, established clandestine paramilitary networks in sixteen Western European countries, including Italy, France, Belgium, the Netherlands, Luxembourg, West Germany, Switzerland, Norway, Denmark, Sweden, Finland, Austria, Greece, Turkey, Spain, and Portugal.
These networks were coordinated through the Allied Clandestine Committee (ACC), a NATO body that brought together the intelligence services of member nations to plan and execute stay-behind operations.
According to former CIA director William Colby, writing in his 1978 memoir Honorable Men, the agency undertook "a major program of building, throughout those Western European countries that seemed likely targets for Soviet attack, what in the parlance of the intelligence trade were known as 'stay-behind nets,' clandestine infrastructures of leaders and equipment trained and ready to be called into action as sabotage and espionage forces when the time came."
The networks were armed with explosives, machine guns, and high-tech communication equipment hidden in underground bunkers and secret arms caches in forests and mountain meadows.
They recruited agents from civilian populations, training them on remote islands in the Mediterranean and at unorthodox warfare centers in England and the United States, working alongside the Green Berets and SAS Special Forces.
False Flag Terrorism and the Strategy of Tension
The evidence, however, suggests that these networks were not merely defensive. In Italy, the Gladio network became central to what investigators called the "strategy of tension" (strategia della tensione); a campaign of terrorist bombings designed to create political instability, blame left-wing groups, and push the Italian electorate toward authoritarian anti-socialist parties.
The 1969 Piazza Fontana bombing in Milan, which killed 17 people and injured 88, is widely considered the opening salvo of this strategy. Vincenzo Vinciguerra, an 'intelligence-plant' terrorist convicted for the attack, testified during his 1984 trial that he had operated as part of the Gladio network with the protection of Italian intelligence services.
As Vinciguerra explained to investigators, the bombing was intended to "blame the left" and justify a "coup d'état." When Italian Prime Minister Giulio Andreotti finally acknowledged Gladio's existence in October 1990, he confirmed that the network had been established with NATO and CIA support, though he denied its involvement in terrorism.
Other bombings followed: the 1972 Peteano massacre (three carabinieri killed), the 1974 Piazza della Loggia bombing (eight killed), and the 1980 Bologna railway station bombing; the deadliest of them all, which killed 85 people and injured over 200.
While these attacks were publicly blamed on left-wing "Red Brigades" and anarchist groups, investigators and parliamentary commissions later established that "intelligence-planted" terrorists operating within the Gladio framework were responsible.
The pattern was clear: create chaos, blame the left/right (anything that's close to Nationalism and Socialism), justify authoritarian measures. In Belgium, the far-right "Westland New Post" group later linked to the stay-behind network carried out the 1982 Brabant massacres, killing 28 people in supermarket shootings designed to destabilize the country.
In Germany, the CIA-backed "Kampfverband gegen Unmenschlichkeit" (Battle Group Against Inhumanity) engaged in covert operations against socialist groups. In Greece, the "Sheepskin" network was later accused of assassinations, though the evidence remains contested.
Operation Gladio and the Birth of Modern Jihadism
According to one claim, the Gladio networks were instrumental in the creation of the mujahideen; the Afghan resistance fighters who would later form al-Qaeda and the Taliban. The infrastructure established for stay-behind operations in Europe, including the arms caches, the training protocols, the network of intelligence connections, was later transferred to Afghanistan, Pakistan, and the Middle East, creating the pipeline that would arm and finance the jihadist fighters of the 1980s and 1990s.
If this claim is accurate, the same intelligence apparatus that built secret armies in Europe to wage false flag terrorism against socialist movements was later repurposed to build secret armies in Central Asia to facilitate the proxy war with the Soviet Union, which greatly benefited the military-industrial-complex.
The official history, of course, tells a different story. The US State Department and the CIA maintain that Gladio was "purely defensive," a contingency against Soviet invasion. The discovery in 1980 that the so-called "Field Manual 30-31B," which described US-sponsored false flag terrorism, was supposedly a Soviet forgery has been used by defenders of the CIA to dismiss all allegations as KGB disinformation.
Yet the parliamentary inquiries in Italy, Belgium, and Switzerland that followed the 1990 revelations reached different conclusions. The Italian Commission on Terrorism concluded that terror networks had indeed operated with intelligence support to destabilize the country.
The Belgian parliamentary inquiry documented the existence of stay-behind networks and their links to the Brabant massacres. And the Swiss inquiry confirmed that Swiss intelligence had maintained a secret army with CIA assistance.
The true goal was to use this "communism vs democracy" proxy wars to not only benefit the military-industrial-complex through armament production, but also to destroy nationalist socialist governments wherever they popped up. Communism was used to subdue nationalism, while far-right religious extremism was used to subdue socialism.
It was all about global finance, keeping alive the framework that would perpetually transfer the wealth of the global citizens to the few transnational bankers in charge of Wall Street. The only threat to this framework was establishing a nationalist socialist government that might close off the nation's wealth to foreign powers and allow it to go back to the citizens.
The communist-democracy framework benefited the globalist powers, whereas nationalism and socialism was detrimental to their global financial networks.
This desperation to maintain status-quo established a modus operandi that would be repeated across the world for the next half-century: the use of covert networks to wage proxy war, the willingness to ally with criminal and extremist elements, and the systematic use of false flag terror to manipulate public opinion.
The same playbook—create chaos, blame enemies, justify intervention—was later deployed in Central America, in the Balkans, in Afghanistan, and across the Middle East. And in each case, the blowback unleashed by these operations were then used to justify funding of even more war, thus keeping the war machine perpetually alive.
The military-industrial-complex made money both ways. For example, allied nations would buy weapons from the military-industrial-complex, and move it ahead to the intelligence-created terrorist groups, which would sow chaos as intended. A portion of that would be kicked back to politicians.
Now, with the excuse of "counter-terrorism," American tax money would be diverted to funding more weapons for the military, which again benefited the military-industrial-complex, and again kicked back a portion to the politicians. These weapons would be used in the perpetual wars, thus making space for new weapons to be manufactured.
Part IX: How CIA Operations Exploited Religious Divisions
The pattern established in Europe, like covert networks, false flag terrorism, and alliance with criminal elements, was soon adapted to the religious terrain of the Middle East and beyond. What emerges from the historical record is a consistent strategy of exploiting sectarian divisions to achieve geopolitical ends.
This section examines how the CIA and its allies have, over seven decades, deliberately inflamed conflicts between Christians and Muslims, between different denominations of Christianity, and between sects of Islam; all in service of the broader Cold War and post-Cold War agenda.
Christian vs. Muslim: Lebanon and the Sectarian Powder Keg
Lebanon, with its fragile balance of Maronite Christians, Sunni Muslims, Shi'a Muslims, and Druze, became a proving ground for the strategy of exploiting religious divisions. When civil war erupted in 1975, the United States aligned with the Christian Phalangist forces against the combined Muslim and leftist opposition.
According to declassified documents, the agency provided weapons, training, and intelligence to Bashir Gemayel's militia. Their excuse was subduing Soviet-aligned Syrian influence and Palestinian nationalism.
What the CIA did not care to anticipate was the brutality that would follow. Phalangist forces, armed and equipped with American weapons, carried out the 1982 Sabra and Shatila massacre, killing an estimated 800 to 3,500 Palestinian refugees while Israeli forces controlled the area (suspicious, eh?).
The Americans brass claimed the outcome was the opposite of what they had intended, but by know, we know the pattern: Lebanon descended into a fifteen-year sectarian hell that left over 150,000 dead, empowered the Shi'a militant group Hezbollah, and radicalized a generation of Muslims against the United States. The 1983 Beirut barracks bombing, which killed 241 US Marines, was blowback from this intervention.
While Christians and Muslims killed each other in Lebanon, Israel strengthened its foothold with the help of CIA (which often seems to show more loyalty to Mossad than to the American people).
The pattern repeated in the Balkans in the 1990s. While the Clinton administration publicly supported the Bosnian Muslims against Serbian forces, intelligence sources indicate that US and allied agencies also covertly supported Croatian nationalist forces, who were allied with remnants of the Nazi-aligned Ustaše movement.
The result was a three-way sectarian war that killed over 100,000 and created the conditions for Kosovo, which would later become a base for CIA operations and, some allege, a hub for organized crime and human trafficking networks connected to the agency's Balkan assets.
Christian vs. Christian: CIA Infiltration of Evangelical Institutions
One of the most persistent conspiracy claims regarding the CIA is that it systematically infiltrated Christian religious organizations, particularly evangelical institutions, to shape theological and political outcomes in service of the US deep-state's geopolitical objectives.
The most controversial claims concern the alleged infiltration of Protestant evangelical organizations in the United States and abroad. The "Field Manual 30-31B" forgery (claimed by CIA to be a "Soviet fabrication"), documented a strategy that intelligence analysts have long argued was real; described the use of "ultra-leftist organizations" and "special action groups" to carry out "violent or nonviolent actions" that would "convince HC governments and public opinion of the reality of the insurgent danger."
Former intelligence officers have confirmed that such operations as mentioned in the manual did occur. Operation Mockingbird, the CIA's program of infiltrating American media, is a matter of declassified record. The parallel program to infiltrate religious institutions, while less documented, fits the pattern.
The CIA's funding of the Congress for Cultural Freedom, which placed CIA operatives in prominent academic and cultural positions, is also declassified. It would be surprising, given this record, if religious organizations were exempt from such penetration.
The claim that CIA operatives posed as pastors to infiltrate evangelical organizations and turn them against Catholics is more specific and less substantiated by declassified documents. However, the pattern of US foreign policy, supporting evangelical Protestant missionaries in Latin America as a counterweight to Catholic liberation theology, and funding Protestant militias in South Sudan as part of the Cold War, suggests that such tactics were employed.
In Guatemala, the CIA's 1954 coup was followed by decades of US support for evangelical Protestantism as a counter to Catholic social movements. In El Salvador, US-backed death squads targeted Catholic priests, most famously the assassination of Archbishop Óscar Romero in 1980, while US officials looked the other way.
The "New Apostolic Reformation" and other dominionist movements in the United States have also been linked by some researchers to intelligence assets. The claim is not that the CIA created these movements, but that it exploited their networks for recruitment, fundraising, and ideological influence; both domestically and abroad.
Muslim vs. Muslim: The Sectarian Strategy from Afghanistan to Syria
The exploitation of intra-Muslim divisions has been the most destructive aspect of the CIA's religious warfare strategy. The pattern, established in Afghanistan and perfected in Iraq and Syria, has been to arm and fund one faction of Islam against another, then watch as the conflict spirals into regional war.
In Afghanistan, the CIA's alliance with the mujahideen was deliberately sectarian. The agency, through its Pakistani ISI intermediaries, funneled the vast majority of its funding to the most extreme Islamist factions; not because these groups were more effective fighters, but because they were ideologically committed to a pan-Islamic jihad that would counter potential nationalist/socialist forces and destabilize the region.
The secular nationalist mujahideen factions were systematically starved of resources, ensuring that the post-war Afghan resistance would be dominated by religious extremists.
In Pakistan, the CIA and Saudi Arabia funded the construction of thousands of madrassas; Wahhabi religious schools that taught a puritanical, anti-Shi'a Islam. The curriculum of these schools, according to former Pakistani intelligence officers, was designed to produce ideologically committed fighters for the Afghan jihad.
The "unintended" consequence was the creation of the Taliban, the rise of sectarian violence against Pakistan's Shi'a minority, and the radicalization of a generation that would form the core of al-Qaeda.
In Iraq, the 2003 invasion and the subsequent de-Ba'athification policy, implemented by the Coalition Provisional Authority under Paul Bremer, purged the Iraqi state of Sunni leadership and created a power vacuum that the Shi'a majority was all too eager to fill.
The result was a sectarian civil war that killed hundreds of thousands. The CIA's role in this conflict was complex, but declassified documents show that the agency armed and funded Sunni militias, the same militias that would later form the core of the Islamic State, while simultaneously supporting the Shi'a-dominated government.
The strategy appeared to be to keep the conflict burning, ensuring that neither side could achieve a decisive victory that would threaten US/Israel regional interests.
The DIA report of 2012, discussed earlier, confirms that the US intelligence community was fully aware that the Syrian rebels it supported included al-Qaeda fighters. The report even predicted the creation of a "Salafi breakaway statelet" in eastern Syria, exactly what ISIS became.
The question is whether this outcome was an unintended consequence or a deliberate design. Given the consistency of the pattern, inflaming sectarian conflict, empowering extremists, and then declaring war on the extremists once they become too powerful, the evidence suggests the latter.
Part X: The Twin Towers – A Convenient Blowback
The attacks of September 11, 2001, were not a bolt from the blue. They were the culmination of a decades-long pattern of blowback; the predictable, indeed predicted, consequence of CIA operations in the Muslim world. The nineteen hijackers were products of the very networks the CIA/Mossad had helped create.
The Al-Qaeda Pipeline: From CIA Asset to Deadly Enemy (or Asset)
The story of Osama bin Laden's relationship with the CIA is now well-documented, though the agency continues to deny the full extent of its involvement. What is not in dispute is that the CIA channeled hundreds of millions of dollars to the Afghan mujahideen through Pakistan's ISI, and that bin Laden was a major conduit for that funding.
What is also not in dispute is that the CIA recruited, trained, and armed thousands of jihadist fighters who would later form the core of al-Qaeda and the Taliban.
The specific links are damning. Abdullah Azzam, bin Laden's mentor and the founder of the Maktab al-Khidamat (Services Office) that evolved into al-Qaeda, was a CIA asset. The CIA's station chief in Islamabad, Milt Bearden, admitted that the agency worked with Azzam to recruit fighters.
The CIA also collaborated closely with Gulbuddin Hekmatyar, a mujahideen commander whose forces would later turn their weapons on the US-backed Afghan government and whose allies would include bin Laden and future Taliban leaders.
Was It Really In the Best Interest of US Citizens?

Not really. The US soldiers are as expendable as the extremists that CIA created; the replaceable cogs, both a fuel for the "perpetual war machine" of the military-industrial-complex and the transnational bankers/financiers behind it. A conspiracy between the deep-state, politicians, and banker financed military-industrial-complex, all profiting from the ongoing holocaust of soldiers and citizens.
The jihadist the agency armed in Afghanistan, the Contra drug runner it funded in Nicaragua, the ISIS fighter it watched emerge from Syrian rebel pipelines: each served their purpose as a tool to justify the next round of appropriations, the next base expansion, the next surge of black-site contracts. But so too did the infantryman sent to fight them.
His life was the price of admission to a conflict engineered to be unwinnable, its duration measured not in strategic milestones but in quarterly earnings calls for defense contractors and the steady churn of Treasury bonds held by transnational financiers who benefit from a state permanently mobilized for war.
When the enemy is a creation of the same system that deploys the soldier, neither is meant to return home; they are locked in a symbiotic death spiral that keeps the money flowing, the surveillance state expanding, and the public conditioned to accept endless sacrifice as the price of an imagined security.
The bodies pile up on both sides, but the ledgers, swollen with profits from weapons, reconstruction contracts, and the debt that funds it all, remain impeccably balanced.
After the Soviet withdrawal, the CIA abandoned Afghanistan. The networks it had built, like the training camps, the madrassas, the funding pipelines, remained intact but now lacked a common enemy. The result was a civil war that produced the Taliban, a safe haven for bin Laden, and the emergence of al-Qaeda as a global terrorist network.
The Warnings Before the Attack
The intelligence community had ample warning that al-Qaeda intended to strike the United States. The 1993 World Trade Center bombing, the 1998 embassy bombings, the 2000 USS Cole attack; each was a sign that the blowback (either intended or unintended) from Afghanistan had arrived.
Yet the CIA's counterterrorism efforts were consistently undermined by the priorities of the agency's real masters. The analysts warned about bin Laden to the American citizens, while at the same time engaging in operations that strengthened him.
The CIA's continued support for Pakistani intelligence, the same agency that had built the Taliban and continued to shelter bin Laden, is a case in point. The CIA's refusal to share intelligence with the FBI, famously documented in the 9/11 Commission Report, is another.
The attacks themselves, when they came, were used to justify the very strategy that had created al-Qaeda in the first place. The invasion of Afghanistan, while initially targeting al-Qaeda, soon evolved into a nation-building exercise that repeated the mistakes of the 1980s (probably intentionally).
The invasion of Iraq, justified by fabricated intelligence, opened a new front in the war that created the conditions for the rise of ISIS.

Part XI: The 9/11 Conspiracy Theories
The official account of September 11, that nineteen al-Qaeda hijackers, armed with box cutters, outwitted the most advanced air defense system in the world, has always strained credibility.
The conspiracy theories that have grown around the attacks, while varying in credibility, share a common thread: that the US government had foreknowledge of the attacks, and allowed them to occur to justify the expansion of the security state and the wars that followed.
The evidence for foreknowledge is substantial. The "Able Danger" program, a classified military intelligence operation, reportedly identified Mohamed Atta and other hijackers as al-Qaeda operatives in 2000, over a year before the attacks.
The "Able Danger" evidence was suppressed, according to whistleblowers. The CIA's failure to share intelligence about the hijackers with the FBI is documented. The Pentagon's failure to intercept the hijacked planes, despite having the capability to do so, has never been adequately explained.
Whether these failures represent incompetence or design is a question each investigator must answer for themselves. What is clear is that the aftermath of 9/11—the expansion of the surveillance state, the erosion of civil liberties, the wars in Afghanistan and Iraq, the creation of the Department of Homeland Security, the explosion of the military-industrial complex—served the interests of the national security establishment that had been built in the Cold War and was searching for a new mission.
The Anomalies and the War That Followed
The official narrative of September 11, 2001, is deeply embedded in American consciousness: nineteen al-Qaeda hijackers, armed with box cutters, outmaneuvered the world's most sophisticated air defense system, bringing down the Twin Towers and killing nearly three thousand people.
The attacks were then used to justify a war in Afghanistan against al-Qaeda and, more consequentially, an invasion of Iraq; a nation with no connection to the attacks, whose leader had been a CIA asset during the Iran-Iraq War, and whose destruction unleashed forces that would destabilize the Middle East.
But within this narrative lie anomalies; discontinuities that have fueled decades of investigation, speculation, and official denial. This section examines four such anomalies: the prediction of the attacks by Benjamin Netanyahu, the insurance strategy of World Trade Center leaseholder Larry Silverstein, the Pentagon attack, the invasion of Iraq despite its lack of connection to al-Qaeda, and the documented history of Osama bin Laden as a product of CIA operations... among others.
1. The Netanyahu Prediction: Foreknowledge or Coincidence?

In the aftermath of September 11, a statement by Benjamin Netanyahu, then a former Israeli prime minister and later prime minister again, drew significant attention. Asked on the day of the attacks what the event meant for U.S.-Israel relations, Netanyahu replied: "It's very good."
He quickly revised: "Well, not very good, but it will generate immediate sympathy." He predicted the attack would "strengthen the bond between our two peoples, because we've experienced terror over so many decades, but the United States has now experienced a massive hemorrhaging of terror."
But the more startling claim emerged years later. In a 2006 CNN interview, Netanyahu stated: "So, I wrote a book in 1995, and I said that, 'If the West doesn't wake up to the suicidal nature of militant Islam, the next thing you will see is militant Islam bringing down the World Trade Center'."
The book in question, Fighting Terrorism: How Democracies Can Defeat Domestic and International Terrorists, was published in 1995. In it, Netanyahu referenced the 1993 World Trade Center bombing, which killed six people and injured over a thousand, and warned that future attacks could be more devastating.
He wrote: "In the worst of such scenarios, the consequences could be not a car bomb but a nuclear bomb in the basement of the World Trade Center."
The Significance: On its face, Netanyahu's prediction appears prescient. But context is essential. The 1993 bombing had already targeted the World Trade Center, and the FBI had documented that the perpetrators, including Ramzi Yousef, hoped the attack would cause one tower to collapse into the other.
Netanyahu's prediction was not a specific forecast of the September 11 method—commercial airliners used as missiles—but a general warning that militant Islam would strike the World Trade Center again.
The Anti-Defamation League has noted that conspiracy theories implicating Israel and Jews in the 9/11 attacks rely on "centuries-old antisemitic tropes about Jews supposedly manipulating world events for their own benefit."
Yet the documented fact remains: a major political figure with ties to Israeli intelligence circles publicly predicted, six years in advance, that the World Trade Center would be brought down by militant Islam. Whether this constitutes foreknowledge, informed speculation, or retrospective self-promotion is a question each reader must answer.
Organizational Lineage—ADL, B'nai B'rith, and Freemasonry: The relationship between the Anti-Defamation League (ADL), B'nai B'rith, and Freemasonry is a matter of historical record, though interpretations of that relationship vary sharply between mainstream sources and conspiracy theorists.
The ADL was founded in September 1913 by the Independent Order of B'nai B'rith, a Jewish service organization established in 1843 (allegedly a Jewish branch of Freemasonry). Its founding was a direct response to the 1913 conviction and 1915 lynching of Leo Frank, a Jewish factory manager in Atlanta who was accused for the rape and murder of 13-year-old Mary Phagan, an employee in a factory. He was convicted for murder. Although, "historians" consider it a wrongful conviction "due to local antisemitism."
Originally named the "Anti-Defamation League of B'nai B'rith," the organization subsequently "split" from its parent body and became an independent 501(c)(3) nonprofit, though the historical connection remains.
The connection between B'nai B'rith and Freemasonry is documented in the organization's founding history. According to Edward E. Grusd's B'nai B'rith: The Story of a Covenant, several of the twelve founders of B'nai B'rith were Freemasons and Odd Fellows who had come to New York from Germany in the 1820s and 1830s.
The organization adopted a structure that was explicitly modeled on Masonic lodges: a ritual for initiation consisting of six degrees (later reduced to three), signs, grips, passwords, and regalia for officers. The first meeting of the first B'nai B'rith lodge was held in a Masonic hall, the Masonic Home at the corner of Oliver and Henry Streets in New York, rented for two dollars a night.
However, mainstream sources emphasize that while B'nai B'rith borrowed heavily from Masonic organizational forms, "it is not and has never been a Masonic lodge." As the Grand Lodge of British Columbia and Yukon notes, "there is no administrative or philosophical link between Freemasonry and B'nai B'rith."
B'nai B'rith describes itself as "quasi-Masonic," similar to but not literally the same thing as Freemasonry. The organization has also been described as "a freemasonry exclusively for Jews."
It is claimed that B'nai B'rith is controlled by the Scottish Rite of Freemasonry, and that the ADL functions as an arm of this alleged network. One such source asserts that the ADL was founded "to protect the Jewish criminal element" and that B'nai B'rith is "controlled by the Scottish Rite of Freemasonry" and constitutes "an arm of the Illuminati."
These claims, which proliferate on conspiracy forums, are not supported by any verifiable evidence and are rejected by mainstream historians of both Freemasonry and Jewish American history. However, one cannot deny the arrows of logic that point at it.
The ADL has evolved significantly since its founding. While it began as a committee within B'nai B'rith focused on combating "antisemitism" through media pressure and consumer boycotts, it later campaigned for civil rights legislation in the 1960s and developed partnerships with the FBI in monitoring "extremist groups."
By the 1970s, it had become an independent organization known for its pro-Israel advocacy and its promotion of the concept of "new antisemitism" that includes some forms of anti-Zionism.
2. Larry Silverstein and the Insurance Puzzle

Larry Silverstein was a New York real estate developer who, in July 2001, just weeks before the attacks, signed a 99-year lease on the World Trade Center complex, paying $3.2 billion for the rights. The lease was structured as a "net lease," meaning Silverstein assumed the costs of insurance, maintenance, and operations, while the Port Authority of New York and New Jersey retained ownership of the land.
The insurance policy Silverstein secured for the complex was valued at $3.5 billion. Crucially, the policy had not been finalized by September 11, 2001. The key legal question that emerged after the attacks was whether the destruction of the Twin Towers constituted one "occurrence" or two for insurance purposes; a distinction worth an additional $3.5 billion.
Silverstein immediately pursued the argument that the attacks were two separate events, entitling him to double the policy limits. As the Wilmington Star-News reported in 2004: "Silverstein has waged a court battle since shortly after Sept. 11 to have the destruction of the trade center declared two separate events for insurance purposes. That would entitle him to two payouts of the $3.5 billion policy he was still negotiating when the towers fell."
The litigation was protracted and complex. In the first phase, a federal jury found that the majority of insurers, representing over $1 billion in coverage, were bound by a policy form (Wilprop) that defined the attack as a single event. In the second phase, however, another jury ruled that nine insurers representing approximately $1.13 billion in coverage must treat the destruction as two occurrences, making them liable for double their limits.
A persistent element of the Silverstein narrative is the claim that his wife, Klara, called him on the morning of September 11 to cancel a doctor's appointment, prompting him to be late to his office in the World Trade Center; thereby "saving his life." This detail has been cited by conspiracy theorists as evidence that Silverstein had foreknowledge of the attacks.
The factual basis of the claim is contested. Silverstein has acknowledged in interviews that his wife called him that morning to remind him about a dermatology appointment, and that this call delayed his arrival at the complex. Whether this constitutes suspicious behavior or mundane marital routine is a matter of interpretation.
What is undisputed is that Silverstein pursued the "two occurrences" argument with extraordinary vigor, that the insurance payout ultimately helped fund the reconstruction of the World Trade Center site (supposedly), and that the timing of the lease, just weeks before the attacks, has never been fully explained by Silverstein or his representatives.
3. The Pentagon Attack: Missing Surveillance and the $2.3 Trillion Question

Among the most persistent challenges to the official narrative of September 11 is the attack on the Pentagon. While the Twin Towers were struck by two Boeing 767s in full view of news cameras and thousands of witnesses, the Pentagon strike, purportedly carried out by American Airlines Flight 77, a Boeing 757, unfolded under a shroud of ambiguity.
The combination of physical anomalies, withheld video evidence, and the extraordinary coincidence of the impact location has fueled decades of suspicion that what struck the Pentagon was not a commercial airliner but something else entirely; and that the attack served a purpose beyond symbolism.
The Physical Evidence: Witnesses who observed the object approaching the Pentagon described it in terms inconsistent with a 155‑foot‑long passenger jet. A firefighter who arrived at the scene within minutes stated that he saw “no plane wreckage” and that the hole in the building was roughly 16 to 20 feet in diameter, far smaller than the 124‑foot wingspan of a Boeing 757.
Other witnesses, including a taxi driver who watched the approach, reported seeing a “small, silver object” moving at high speed, resembling a cruise missile or military jet, rather than a lumbering airliner.
Photographic evidence from the immediate aftermath showed a clean, circular hole penetrating the outer ring of the Pentagon, with no visible wings, tail, or fuselage outside the building. The official explanation holds that the wings sheared off upon impact and that the fuselage disintegrated inside, leaving only scattered debris.
Skeptics note that the crash of United Airlines Flight 93 in Pennsylvania left a clearly visible debris field across miles of terrain, while the Pentagon site yielded relatively little wreckage; and that within hours, much of the remaining evidence was removed under the cover of darkness.
Missing Surveillance: The Pentagon is one of the most heavily surveilled buildings on earth, protected by a network of security cameras, traffic cameras, gas station cameras, and highway monitoring systems. Yet in the aftermath of the attack, authorities seized all such footage, and only a handful of frames were ever released to the public.
The few images that did emerge, five frames from a Pentagon security camera, show a blurry white object approaching, but provide no definitive identification of a Boeing 757. In these images, the object appears more like a point of light than an aircraft with discernible wings or tail.
For years, the government refused to release any additional footage, citing “ongoing investigation” and later “national security.” When a second camera angle was eventually released after litigation, it showed an explosion but not the striking object. No footage from the dozens of nearby gas stations, hotels, or traffic cameras has ever been made public.
The refusal to release a single clear image of a Boeing 757 striking the Pentagon, despite the building’s extensive surveillance infrastructure, has led many to question what such footage would reveal.
The Impact Point: Perhaps the most provocative anomaly is the precise location struck. The section of the Pentagon that was hit was the western side, the wedge known as the “Navy Annex” and specifically the area housing the Office of the Comptroller.
It was this office that, on the morning of September 10, 2001, had been in the midst of a congressionally mandated audit to account for $2.3 trillion in Department of Defense transactions that could not be traced.
The existence of this massive discrepancy was announced by then‑Secretary of Defense Donald Rumsfeld on September 10, 2001, during a press conference dedicated to military transformation. Speaking to reporters, Rumsfeld acknowledged that “according to some estimates, we cannot track $2.3 trillion in transactions.”
He called it a “staggering” problem and pledged to address it. The next morning, American Airlines Flight 77 conveniently crashed directly into the office where the comptroller’s staff worked; and where the records related to that audit were stored.
The coincidence is stark. The section of the Pentagon hit was not the command center, not the Secretary’s office, but the one office responsible for tracking the Defense Department’s financial records; records that, by Rumsfeld’s own admission, contained trillions of dollars in untraceable expenditures.
The attack destroyed both personnel and paper records. Survivors and family members of the 125 Pentagon employees killed that day noted that many of the deceased were financial auditors and comptroller staff. Official investigations have never addressed the targeting of this specific location.
The Convergence of Anomalies: When considered alongside the redacted files, the withheld emails, and the pattern of official secrecy described earlier, the Pentagon attack takes on an additional layer of significance.
The lack of photographic evidence, the physical anomalies, the rapid removal of debris, and the targeting of the exact office where $2.3 trillion in unaccounted‑for defense spending was being audited; each element, by itself, can be dismissed as coincidence or the fog of war. But taken together, they form a constellation of unresolved questions.
No official inquiry has ever explained why no clear footage of a Boeing 757 striking the Pentagon has been released, why the physical damage appeared inconsistent with a large airliner, or why the building’s comptroller section was hit on the very day after its leader publicly announced the “staggering” missing funds.
For those who examine the totality of the evidence, these anomalies do not prove a conspiracy, but they do demonstrate that the official account rests on assumptions and withheld materials that have never been adequately justified.
The pattern of classification and redaction that shields the Saudi role, the CIA’s relationship with al‑Qaeda, and the internal White House communications of September 2001 extends also to the Pentagon attack.
The public has been asked to accept that a commercial airliner, flown by inexperienced hijackers, executed a precision maneuver to strike the only fortified building in the world capable of resisting such an attack, at the exact moment and location that obliterated the office investigating trillions of dollars in missing military funds; and that no usable surveillance footage exists to confirm any of it. Whether this asks too much of credulity is a question each reader must answer for themselves.
The Question of Debris: Beyond the physical anomalies and withheld surveillance footage surrounding the Pentagon attack, a parallel set of questions has emerged from the destruction of the World Trade Center; questions that, when considered alongside the Pentagon evidence, suggest a pattern of official responses that has done little to resolve public skepticism.
In the years following September 11, proponents of controlled demolition theories pointed to the presence of thermite, an incendiary compound capable of cutting through steel, as evidence that the Twin Towers were brought down by explosives rather than fire-induced structural failure.
Physicist Steven E. Jones, a prominent advocate of this theory, published research suggesting that residues found in the dust from Ground Zero were consistent with thermitic reactions, a claim that the National Institute of Standards and Technology (NIST) rejected, citing instead the presence of molten aluminum from the aircraft and noting that a test by the Energetic Materials Research and Testing Center found conventional thermite unable to melt a column much smaller than those used in the World Trade Center. (As much as one can believe the "official" narratives)
Meanwhile, the physical remnants of the towers themselves were rapidly removed from the site. Over 185,000 tons of steel from Ground Zero was recycled, with some sold to China and India; Shanghai Baosteel Group Corporation purchased 50,000 tons at approximately $120 per ton, drawing criticism from victims' families and engineers who argued the steel should have been preserved for further investigation into the causes of the collapse.
This decision by New York authorities, to sell the debris for scrap rather than retain it for forensic study, mirrors the handling of the Pentagon wreckage, though in the Pentagon's case, the management of debris followed a different trajectory.
In the weeks immediately following the attack, approximately 10,000 tons of debris was hauled from the collapsed section of the Pentagon to facilitate the "recovery effort," with a total of 50,000 tons removed during the subsequent demolition and reconstruction known as the Phoenix Project.
Unlike the World Trade Center steel, which was largely shipped overseas for "recycling," Pentagon wreckage was not sold to foreign buyers; some of the limestone facade pieces were distributed to law enforcement agencies across the country for use in memorials, including departments in New Jersey, Michigan, and Texas.
However, the disposal of unidentifiable remains from the Pentagon crash—and from the Shanksville, Pennsylvania, site—was handled in a manner that drew sharp criticism.
A Pentagon report released in 2012 confirmed that small portions of remains that could not be tested or identified were cremated and given to a biomedical waste contractor, which incinerated them and placed the remaining material in a landfill; a practice that continued until 2008 and prompted an "apology" from Pentagon officials.
For those who question the official narrative, the combination of withheld surveillance footage, the rapid removal and foreign sale of structural steel from the Twin Towers, the absence of a comparable disposal of Pentagon wreckage, and the controversial handling of remains has only deepened suspicion that the full story of what struck the Pentagon and why the towers collapsed has never been adequately told.
4. The Invasion of Iraq: A War for Which There Was No Connection to 9/11

Within days of the September 11 attacks, officials in the George W. Bush administration began laying the groundwork for war with Iraq. The connection between al-Qaeda, the organization that actually carried out the attacks, and Saddam Hussein's secular Ba'athist regime in Baghdad was, by the administration's own admission, tenuous at best.
The Bush administration advanced three primary arguments for invading Iraq:
Connection to al-Qaeda: President Bush stated in his 2003 State of the Union address: "Evidence from intelligence sources, secret communications, and statements by people now in custody, reveal that Saddam Hussein aids and protects terrorists including members of al-Qaeda."
Weapons of Mass Destruction: Repeating Israel's accusations, the administration claimed Iraq possessed active WMD programs that posed an imminent threat to the United States.
Regime Change and Democratization: The administration argued that removing Saddam Hussein would establish a democratic model that would transform the Middle East.
As the BBC reported in January 2003, the evidence linking Iraq to al-Qaeda was minimal:
Mohamed Atta in Prague: The claim that hijacking leader Mohamed Atta met an Iraqi agent in Prague in April 2001 was never substantiated. Czech President Vaclav Havel concluded the report could not be confirmed.
Abu Musab al-Zarqawi: The administration cited a Jordanian al-Qaeda member who sought medical treatment in Baghdad as evidence of operational cooperation. But no evidence was provided that Zarqawi received anything beyond medical care.
Ansar al-Islam: Al-Qaeda members reportedly found refuge in northern Iraq, but this area was in Kurdish hands and outside Saddam's control.
Interrogation Reports: U.S. officials claimed al-Qaeda detainees said Iraq had trained the network in chemical weapons. There was no independent verification, and some analysts noted al-Qaeda might have been seeking to provoke a U.S. war on Iraq.
Regarding weapons of mass destruction, the post-invasion Iraq Survey Group, led by David Kay, found no active WMD programs. Kay testified to Congress: "We were almost all wrong, and I certainly include myself here."
A Lebanese Army research paper concluded bluntly: "There is little evidence—if any—that has been presented linking Iraq and Osama Ben Laden's Al Qaeda network."
The invasion of Iraq, launched in March 2003, had no connection to the September 11 attacks. The nation that actually harbored al-Qaeda was Afghanistan, where the U.S. had already invaded.
Yet the Iraq war cost an estimated $2 trillion in taxpayer money, resulted in the deaths of hundreds of thousands of Iraqis, as well as many US soldiers, and created the conditions for the rise of the Islamic State; an organization that would later be armed, in part, with weapons that flowed through U.S.-backed supply chains.
4. Osama bin Laden: CIA Asset or Independent Actor?

The relationship between Osama bin Laden and the CIA has been the subject of intense debate for decades. The truth is more complex than either the "CIA created bin Laden" or the "no connection whatsoever" narratives suggest.
The CIA's Operation Cyclone, beginning in 1979, channeled hundreds of millions of taxpayer dollars to Afghan mujahideen fighting the Soviet Union. The funding flowed through Pakistan's Inter-Services Intelligence (ISI), which distributed it to various factions.
The CIA deliberately favored the most radical Islamist commanders, Gulbuddin Hekmatyar and Jalaluddin Haqqani, because their religious ideology made them more effective counters against both Soviet proxies as well as any potential Nationalist/Socialist formations.
Osama bin Laden, a wealthy Saudi, was not a direct recipient of CIA funding, but he used his "family connections" and "personal fortune" to finance the recruitment and transport of Arab fighters to Afghanistan.
The CIA was aware of bin Laden's activities and did nothing to impede them; indeed, the agency welcomed the additional support. Some fringe claims even claim that he was completely a CIA agent, groomed and planted.
What Is Contested: A 2002 Violence Policy Center report, based on interviews with the top three former CIA officials who ran the Afghan-aid program, concluded that the agency never directly funded or armed bin Laden.
The report states: "We interviewed the former CIA counter-terrorism chief, the former CIA Pakistan station chief, and the former CIA official who bought weapons in the United States. They absolutely rejected Barrett's claims and insisted that the U.S. program never helped bin Laden directly or indirectly, and specifically not with any Barrett sniper rifles."
Similarly, a 2011 analysis in The Daily Star listed "Osama bin Laden was 'created' by the CIA" as a myth, stating: "He did not receive any direct funding or training from the US during the 1980s. Nor did his followers. The Afghan mujahideen, via Pakistan's ISI intelligence agency, received large amounts of both. Some bled to the Arabs fighting the Soviets but nothing significant."
Again, if there is anyone who would trust the "official" clarifications even after all this, then it is proof enough that the real money-makers have succeeded in making the population dumb and docile.
Of course, CIA wouldn't have recruited bin Laden directly or put him on the agency's payroll, if that's the evidence people seek. But even the agency cannot deny that they created the infrastructure—the training camps, the supply lines, the ideological framework—in which bin Laden and his fellow Arab fighters operated.
The networks that bin Laden built during the Afghan war, the Maktab al-Khidamat (Services Office) and later al-Qaeda, were the direct beneficiaries of the environment the CIA had established.
As the original blowback paper noted: "The CIA's former allies—bin Laden, Hekmatyar, Haqqani—became the enemy. The United States had mobilized, recruited, trained, and armed Sunni young men to fight the Soviet Union in Afghanistan, promoting the core vision of a jihad to defend the lands of Islam from outsiders."
The outsiders, in this telling, became the United States military; the force that would later be deployed to fight the very men it had once armed. Within that military, critics have drawn a brutal distinction: a fraction, they allege, functioned as predators, "hyenas" exploiting the chaos of war, while the majority were conscripted or enlisted as "sheep for slaughter," their lives expended to sustain a conflict that served interests far beyond any stated mission.
Over two decades of war, accusations have mounted that U.S. bases in Afghanistan, Iraq, and elsewhere became sites of profound criminality: whistleblowers and investigative reports have documented patterns of murder, rape, and human trafficking, with allegations that some bases facilitated drug smuggling and even the trafficking of children; crimes that, if proven, would represent not mere aberrations but the logical outgrowth of a system that treats both its enemies and its own soldiers as disposable instruments of profit.
Whether these accusations represent isolated atrocities or a systemic feature of the perpetual war machine is a question the military has repeatedly declined to fully investigate, leaving the record incomplete and the patterns unchallenged.
The Redacted Record: The Silence That Speaks
Beyond the specific predictions, insurance filings, and geopolitical anomalies surrounding September 11 lies a more fundamental obstacle to understanding what actually occurred: the systematic withholding, redaction, and classification of the documentary record itself.
Two decades after the attacks, key files, emails, and investigative materials remain hidden from the American public; not because they contain sensitive intelligence methods, but because, as multiple lawmakers who have read them attest, they implicate powerful allies and expose uncomfortable truths about official negligence.
The most notorious example is the "twenty-eight pages," a section of the December 2002 Joint Congressional Inquiry report that was excised in its entirety by the George W. Bush administration and never released.
These pages, described by the House Intelligence Committee as "Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters," were deemed too sensitive for public consumption.
But according to multiple members of Congress who have read them under strict security conditions—reading them in a secure basement room in the Capitol, surrendering pens and electronics, watched by monitors—the redacted material does not contain intelligence secrets. It contains names, connections, and evidence of complicity.
Representative Stephen Lynch (D-MA), who read the twenty-eight pages in 2013, described them as "stunning in their clarity," containing direct evidence that certain Saudi individuals and entities were complicit in the attacks, naming "how people were financed, where they were housed, where the money was coming from, the conduits that were used and the connections between some of these individuals."
Senator Bob Graham (D-FL), who co-authored the report, stated flatly: "Here are some facts. The Saudis know what they did. Second, the Saudis know that we know what they did."
Fifteen of the nineteen hijackers were Saudi citizens; the mastermind, Osama bin Laden, was a scion of a powerful Saudi family with close ties to the royal house. Yet successive administrations—Bush, Obama, and now Trump—have declined to declassify the pages, citing "sources and methods" while critics argue the real reason is diplomatic protection of a strategic ally.
Yet a persistent current of skepticism holds that the focus on Saudi complicity is itself a smokescreen; a convenient villain meant to divert attention from the possibility that elements within the United States’ own intelligence apparatus, or those of its closest allies, played a more direct role.
Proponents of this view point to the long history of CIA cultivation of Islamist proxies, the documented operational relationships between Western and Israeli intelligence during the Cold War, and the pattern of false‑flag terrorism established by Operation Gladio.
In this telling, the fifteen Saudi hijackers and bin Laden’s Saudi pedigree serve as a plausible but incomplete explanation, obscuring the possibility that the attacks were—like the Piazza Fontana bombing, the Brabant massacres, and other “strategy of tension” operations—orchestrated or knowingly facilitated by a combination of the CIA, Mossad, and MI6 to manufacture the pretext for the wars that followed.
While such claims remain outside the mainstream and are vigorously denied by the agencies involved, their persistence reflects the same core frustration that fuels demands for declassification: that without full transparency, the public cannot distinguish between legitimate security concerns and the deliberate concealment of inconvenient truths.
Moreover, the redactions extend far beyond those twenty-eight pages. The 9/11 Commission, established after the Joint Inquiry, amassed 575 cubic feet of investigative records; the raw material of its final report. Ten years after the attacks, the vast majority of these records remained sealed at the National Archives, despite the Commission's own directive that they be made public by January 2, 2009.
By 2011, only a small fraction had been reviewed for release; many of those that were reviewed emerged heavily redacted or withheld entirely. The Commission's interviews with President George W. Bush, Vice President Dick Cheney, and President Bill Clinton remain classified.
A thirty-page summary of the commissioners' April 2004 interview with Bush and Cheney in the Oval Office, the only time they were formally questioned about 9/11, has never seen the light of day. Philip Zelikow, the Commission's executive director, stated that the summary "could be declassified in full without any harm to national security." Yet it remains sealed.
The problem is structural. The 9/11 Commission was established by Congress, and legislative branch records are exempt from Freedom of Information Act (FOIA) requests. A citizen cannot simply file a FOIA demand for these documents. Instead, they must navigate a byzantine process: requesting declassification review from the original agencies (CIA, FBI, State Department), each of which has its own protocols, backlogs, and institutional interests in preserving secrecy.
The National Archives, charged with processing the 9/11 Commission records, acknowledged in 2011 that roughly two-thirds of the material remained classified by the originating agencies, and that there was "little point" in requesting declassification because those agencies were already overwhelmed.
One Archives official assigned to review the documents told Reuters that she now mainly responds to individual requests rather than proactively releasing material.
The pattern of withholding extends to contemporaneous communications from the period immediately before the attacks. Investigators for the 9/11 Commission discovered a trove of internal White House emails and memos from counterterrorism czar Richard Clarke in the summer of 2001; urgent warnings that "hundreds of Americans lay dead in several countries, including the U.S." and that "that future day could happen at any time."
One such memo was dated September 4, 2001; one week before the attacks. Yet when Commission staff attempted to pursue the significance of these documents, they encountered resistance from their own executive director, Philip Zelikow, who had close ties to Condoleezza Rice and was later revealed to have exchanged phone calls with Karl Rove during the early stages of the inquiry.
While the existence of these warnings eventually became public, the full record of internal White House deliberations, including the precise nature of what was communicated to President Bush, remains incomplete.
Even more recent materials related to 9/11 have been shielded from disclosure. In August 2024, the Second Circuit Court of Appeals ruled that a Senate Intelligence Committee report on the CIA's post-9/11 detention and interrogation program documenting waterboarding, sleep deprivation, and sexual humiliation is not subject to FOIA because Congress "manifested a clear intent to control the report."
Law professor Mark Fenster, commenting on the decision, noted the frustration this creates: "It's really frustrating for everyone that Congress doesn't apply the same transparency rules it applies to the executive branch to itself... This is an important history we need to find out about, exactly what happened in the Bush administration."
The cumulative effect of these redactions, classifications, and withheld materials is to create a documentary landscape riddled with gaps. The official story exists; the 9/11 Commission Report, the Joint Inquiry's redacted findings, the declassified portions of interviews.
But the full record, the raw evidence, the unvarnished testimony; these remain locked in secure rooms, accessible only to those with security clearances and the willingness to read under supervision.
Thomas Kean, the Republican chairman of the 9/11 Commission, reflected on this reality in 2011: "Most of what I read that was classified shouldn't have been... Easily 60 percent of the classified documents have no reason to be classified—none."
For the families of the victims, and for citizens seeking to understand how nearly three thousand Americans died on domestic soil, the redactions are not abstract. They represent a barrier to accountability; a shield behind which those who may have facilitated the attacks, or whose negligence enabled them, have remained beyond the reach of justice.
As Terry Strada, whose husband died in the World Trade Center, told investigators: "Without money, terrorist organizations cannot exist. It is the lifeblood of terrorism... As long as there are well-funded terrorist organizations out there vowing to kill and destroy us here on our homeland and abroad, we will never be safe."
The twenty-eight pages, she and others believe, contain the names of those who provided that money; names that two administrations have declined to release.
Whether the redactions constitute evidence of a conspiracy or merely evidence of diplomatic convenience, bureaucratic inertia, and the reflexive secrecy of the national security state, the effect is the same: the public is left with a partial record, with gaps that suspicion rushes to fill. In the absence of transparency, speculation flourishes.
And when government officials who have read the sealed materials describe them as "stunning in their clarity" and containing evidence of "complicity," the refusal to release them ceases to look like routine classification and begins to look like concealment.
The truth about September 11, 2001, about who knew what, when they knew it, and whether American officials, foreign governments, or both facilitated the attacks, remains buried in the files that the government continues to keep from its own people.
The Epstein Files: Redactions and the September 2001 Window
The pattern of redaction and withheld information surrounding September 11 extends beyond the 9/11 Commission records and into the parallel universe of the Jeffrey Epstein case; where documents from the period immediately surrounding the attacks have emerged with their own peculiar omissions, and where newly released files have themselves been subjected to the same opaque redaction process that has frustrated investigators for decades.
The N313P Connection: CIA "Torture Plane" and Epstein's Pilot
Among the documents released under the Epstein Files Transparency Act, signed by President Donald Trump in November 2025 and unsealed by the Justice Department in early 2026, is a 2017 email from Epstein's longtime pilot, Larry Visoski, that links Epstein's private aviation network directly to the post-9/11 CIA rendition program.
Visoski's email, addressed to Epstein associates, warned about a Boeing Business Jet bearing a prior registration number, N313P, which Visoski identified as having been "used as a CIA plane to transport prisoners to Guantanamo Bay." He attached an article branding it a "torture plane" and cautioned that operating such an aircraft could cause clearance problems across the Middle East.
The significance of N313P is well-documented: it was one of the aircraft used by the CIA for extraordinary rendition flights in the aftermath of September 11, ferrying terror suspects to black sites where "enhanced interrogation techniques" like waterboarding, sleep deprivation, and rectal feeding were employed under legal cover provided by the Justice Department's 2002 "Torture Memos."
That Epstein, whose associates included figures with deep ties to intelligence circles, was considering acquiring or operating a plane with this history, and that his pilot knew enough to warn him off, raises questions about the overlap between Epstein's network and the shadowy apparatus built after 9/11. The email was unsealed in 2026, but like so many documents from this period, it arrived heavily contextualized by the redactions that accompanied its release.
The Withheld Documents: Thousands of Pages, Mostly Blacked Out
The release of Epstein files in 2025 and 2026 was preceded by considerable fanfare. Attorney General Pam Bondi appeared on Fox News promising "a lot of flight logs, a lot of names, a lot of information." Conservative influencers were photographed at the White House holding binders stamped "The Epstein Files: Phase 1." But when the documents were finally posted to the Justice Department website, the response was immediate and scathing.
What the public received was a small batch of documents; flight logs that had been circulating in court cases for years, a "heavily redacted" photocopy of Epstein's address book, a blacked-out list of masseuses, and an evidence list. Representative Eric Swalwell (D-CA) posted a screenshot of one page to X, showing virtually the entire document obliterated by black bars, with the caption: "You were promised the full Epstein files. You got this."
Representative Anna Paulina Luna (R-FL), who heads a House GOP transparency task force, called the rollout a "complete disappointment" and demanded: "GET US THE INFORMATION WE ASKED FOR."
Bondi responded by accusing the FBI of withholding information. In a letter to FBI Director Kash Patel, she revealed that her office had received only approximately 200 pages of documents despite requesting the full Epstein case file, and that she had "learned from a source that the FBI Field Office in New York was in possession of thousands of pages related to the investigation and indictment of Epstein."
She ordered the FBI to deliver the remaining documents by 8:00 a.m. the following morning and directed Patel to investigate why her initial request had not been fulfilled.
The Redacted Address Book and Flight Logs: What Was Hidden
Among the documents released, the address book purportedly compiled by Epstein and Ghislaine Maxwell was so heavily redacted as to be nearly unreadable in places. The Justice Department's own cover note acknowledged that "the first phase of declassified files largely contains documents that have been previously leaked but never released in a formal capacity by the U.S. Government."
In other words, the public was given what had already trickled out through other channels, while the rest, potentially thousands of pages, remained in FBI custody.
The flight logs themselves, though among the more complete documents released, carry their own history of redaction. When they were first entered into evidence during Ghislaine Maxwell's 2021 trial, Judge Alison Nathan called an earlier version "overly redacted" and ordered prosecutors to do a "more precise job," noting that counsel would be reading names aloud anyway.
Observers in the overflow courtroom "drew grumbles and hisses" at the sight of "the large black bar where passengers' names would have been." One observer muttered that the case had been "rigged" with people being paid off by "the cabal."
The logs that emerged, covering flights between 1991 and 2006, include dates in September 2001, though the passenger names for that period remain subject to redaction and dispute.
The Missing Window: Epstein Files and the September 2001 Gap
Among the most striking anomalies in the Epstein document release is not merely what appears in the files, but what is conspicuously absent. Forensic analysis of the Department of Justice's Epstein dataset has revealed a deliberate gap of approximately 25,000 emails from the period between 1999 and 2001; a gap that coincides precisely with the buildup to the September 11 attacks.
Serial sequencing breaks in the correspondence indicate intentional removal, not mere digitization errors, raising the possibility that communications pertaining to foreknowledge or elite coordination were systematically extracted before public release.
The pattern extends beyond email gaps. Flight logs from Epstein's private jet show a "ghost flight" from Birmingham, UK, to Newark, New Jersey, on November 26, 2001; just ten weeks after the Twin Towers fell.
On this date, the plane is recorded as having flown from Birmingham to Newark, but no passenger information is documented; the log simply shows a series of question marks where names should appear. No record exists of the plane having arrived in the UK prior to this departure, adding to the mystery of who was aboard and for what purpose.
Perhaps most suggestive is the correspondence uncovered between Ghislaine Maxwell and investigative journalist Edward Jay Epstein (no relation to Jeffrey). In a January 6, 2003, email, Edward Epstein invited Maxwell to join a secretive "Shadow Commission on 9/11," writing: "Any interest in being on the Shadow Commission on 9/11. The membership list is secret."
Maxwell declined, but the very existence of such a commission, formed just sixteen months after the attacks, raises profound questions about what alternative investigations were being conducted outside official channels, and why a woman with Maxwell's intelligence connections (her father, Robert Maxwell, was a Mossad asset) was invited to participate.
The email links provided by Epstein are now inaccessible, returning "Forbidden" errors, and many associated files have been redacted.
Compounding the suspicion, Maxwell's post-9/11 emails include a cryptic note sent just a week after the attacks asking, "Where is the real pilot?" a question that, depending on interpretation, could suggest foreknowledge that the official account of the hijackers was incomplete or inaccurate. These communications sit alongside her other correspondence from the period, which includes a chilling message imagining Arabs' eradication by 2032.
The pattern of missing files is not limited to chronological gaps. Technical analysis of the DOJ's Dataset 9 has identified three specific files that are entirely missing from both the public website and the 86GB torrent released by the Department of Justice, despite being indexed in the pagination system.
Two of these missing files appear across separate processing batches approximately 208,000 files apart, indicating targeted removal rather than random corruption. These files cluster around a single event—the April 2016 departure of Karyna Shuliak from St. Thomas, the departure point for Epstein's Little St. James island—and one missing file sits immediately before a personal Epstein email recommending a novel with a sympathetic pedophile protagonist, released two days before the book's public debut.
When considered alongside the broader pattern of redaction and withholding that characterizes both the 9/11 Commission records and the Epstein files, the systematic absence of correspondence from the September 2001 window suggests a concerted effort to obscure communications that might shed light on foreknowledge, elite coordination, or the true nature of the attacks.
Whether these missing emails would reveal advance warning, operational connections, or merely embarrassing social chatter is impossible to determine; because the files have been removed before the public could examine them. The silence, in this context, is itself a form of evidence.
The Parallel to 9/11 Records: A Shared Pattern of Secrecy
The redactions in the Epstein files mirror those in the 9/11 Commission records: documents withheld, pages blacked out, and government officials offering promises of transparency while delivering materials that have been public for years.
In both cases, the agencies in possession of the full records—the FBI, the CIA, the Department of Justice—have cited victim privacy, national security, or ongoing investigations as justification for withholding information.
In both cases, members of Congress who have seen the redacted materials describe them as containing information the public has a right to know. And in both cases, the slow trickle of declassified documents has done more to fuel suspicion than to resolve it.
For those tracking the connections between the Epstein network and the events of September 11, the release of files showing Epstein's pilot warning him about a CIA "torture plane" with a post-9/11 rendition history—and the subsequent revelation that thousands of pages of Epstein documents remain withheld by the FBI—adds yet another layer to the pattern of official secrecy surrounding that period.
The question, as with the 9/11 files themselves, is not merely what the documents contain, but why the public has been denied access to them for so long, and why even when they are "released," the most revealing portions arrive obscured by black ink.
Part XII: The Perpetual Money Machine

The pattern documented throughout this paper—the creation of extremists, the deployment of soldiers, the consumption of weapons, the endless cycle of conflict—is not merely a series of geopolitical miscalculations. It is the operating system of a self-sustaining economic engine.
At its core lies a closed loop of financial flows that connects the creation of threats to the profits of defense contractors, the campaign coffers of politicians, and the balance sheets of transnational financiers.
Understanding this loop is essential to answering the central question of this paper: whether the cycle of blowback is unintended consequence or deliberate design.
The Loop: From Threat Creation to Profit Realization
The mechanism operates in six stages, each feeding the next, forming a closed system that requires perpetual conflict to sustain itself.
Stage 1: Threat Creation – Building the Enemy

The loop begins with the identification or creation of a threat. In the Cold War, this was the Soviet Union; a genuine rival whose existence was exploited to justify military spending far beyond what strategic necessity demanded.
But the pattern perfected during the Cold War involved the cultivation of proxies: forces that could be armed, deployed, and later labeled as enemies when they outlived their usefulness.
In Afghanistan, the CIA created a jihadist army to bleed the Soviet Union. When the Soviets withdrew, that army became al-Qaeda and the Taliban; a new threat requiring a new war. In Iraq, the invasion destroyed the secular state and unleashed sectarian militias; when those militias coalesced into ISIS, the group became the justification for yet another intervention.
In Syria, the DIA documented that U.S.-backed rebels included al-Qaeda fighters; the emergence of ISIS was predicted and, some evidence suggests, facilitated.
The creation of the enemy is the first and most critical stage. Without a threat, there is no justification for military spending. The threat must be real enough to convince the public and Congress, yet controllable enough to ensure it does not escalate beyond the ability of the system to profit from it.
This is why the ideal enemy is a proxy; a group that can be created, armed, and later demonized, ensuring the cycle repeats.
Stage 2: Authorization – Political Cover for War

Once the threat is established, the machinery of political authorization begins. The President, often advised by national security officials with deep ties to defense contractors, requests funding for military action. Congress, whose members receive substantial campaign contributions from the defense industry, authorizes appropriations.
According to OpenSecrets, the defense and aerospace sector spent over $150 million on lobbying in 2022 alone. Major contractors like Lockheed Martin, Boeing, Raytheon, General Dynamics maintain permanent lobbying presences in Washington.
Between 2003 and 2023, these companies spent a combined $2.5 billion on federal lobbying and campaign contributions. The return on investment is staggering: the Pentagon budget for fiscal year 2024 was $886 billion, representing nearly 60% of discretionary federal spending.
The political class, therefore, has a structural incentive to maintain a state of perpetual war. The members who vote against defense appropriations face well-funded primary challengers; those who vote for them receive campaign donations, speaking fees, and—upon leaving office—lucrative positions on the boards of defense contractors.
Stage 3: Deployment – Soldiers as Consumables

With authorization secured, American soldiers are deployed to the theater of conflict. Their presence serves multiple functions within the loop. First, they provide the human justification for continued funding: once soldiers are in harm's way, cutting off appropriations becomes politically impossible.
Second, their consumption of equipment like vehicles, munitions, fuel, and body armor drives the demand for resupply contracts. Third, their casualties create emotional pressure to "finish the job," extending the conflict indefinitely.
The soldier is, within this framework, a consumable asset. The military-industrial complex does not profit from peace; it profits from the attrition of matériel and the sustained presence of forces that require constant replenishment. Each tour of duty, each burned-out Humvee, each expended artillery shell represents revenue realized for a defense contractor.
Stage 4: Weapon Consumption – The Engine of Contractor Profits

Modern warfare is a consumption machine. The conflict in Ukraine, for example, has burned through artillery shells at rates exceeding Western production capacity, leading to emergency contracts for munitions manufacturers.
In Iraq and Afghanistan, the military consumed fuel at a rate of one million gallons per day in the early years of the wars. Each Javelin missile, each Stinger, each Hellfire drone strike represents a line item in a contractor's quarterly earnings.
The structure of defense contracting ensures that cost-plus contracts, where the government reimburses the contractor for costs and adds a guaranteed profit percentage, remove any incentive for efficiency. The more expensive the weapon system, the higher the profit. The longer the war, the more units are purchased.
This dynamic creates a feedback loop: the consumption of weapons in one conflict necessitates the development of new weapons for the next conflict. The F-35 fighter jet program, estimated to cost $1.7 trillion over its lifetime, was justified by threats that emerged after the Cold War; threats that the same contractors had helped to cultivate.
Stage 5: Financing – Treasury Bonds and the Banking Sector

The money that flows to defense contractors does not materialize from surplus. The U.S. government finances its wars through debt; specifically, through the issuance of Treasury bonds. These bonds are purchased by a network of institutional investors, including domestic and foreign banks, sovereign wealth funds, and the Federal Reserve.
The transnational financial class, like the large commercial and investment banks, asset managers, and private equity firms, profits from this arrangement in two ways. First, they earn interest on the bonds they hold, creating a stream of income derived directly from war debt. Second, they own substantial equity in the defense contractors whose profits are guaranteed by perpetual conflict.
According to public filings, the largest shareholders of Lockheed Martin include Vanguard Group, BlackRock, and State Street; institutions that manage trillions in assets, including the retirement savings of millions of Americans.
These same institutions are among the largest holders of U.S. Treasury debt (not to mention the bankers behind the FED). They therefore profit exponentially from the same war: including from the interest on the bonds that fund it, and from the dividends and stock appreciation of the companies that supply it.
Stage 6: Political Reinforcement – Kickbacks and Revolving Doors

The loop closes with the flow of money back to the political class that authorized the war in the first place. Campaign contributions, as noted, are the most visible form of this flow. But the more insidious mechanism is the revolving door between the Pentagon, Congress, and the defense industry.
Former senior military officers retire to lucrative consulting positions with contractors. Former members of congressional armed services committees become lobbyists for the industry they once oversaw. Defense executives rotate into senior positions at the Pentagon, where they award contracts to their former employers.
The result is a closed ecosystem in which the interests of transnational banking, interests of the industry, and the interests of the government are functionally indistinguishable.
As the Project on Government Oversight has documented, between 2008 and 2018, more than 1,700 former Pentagon officials became lobbyists or consultants for defense contractors.
The former Director of the Defense Intelligence Agency, for example, became a senior vice president at Booz Allen Hamilton, a major defense contractor. The former Assistant Secretary of the Army for Acquisition, Logistics, and Technology became a vice president at Lockheed Martin.
This revolving door ensures that the individuals making decisions about war funding and weapons procurement have a direct financial interest in the outcomes they oversee.
The Closed Loop Visualized
The six stages form a self-reinforcing cycle:
Threat Creation (CIA cultivates proxies)
↓
Political Authorization (Congress funds war)
↓
Soldier Deployment (Consumable assets enter theater)
↓
Weapon Consumption (Contractors realize profits)
↓
Debt Financing (Treasury bonds sold to financiers)
↓
Political Reinforcement (Kickbacks and revolving door)
↓
Return to Threat Creation (New enemy emerges)
Each stage generates the conditions for the next. The financiers who purchase Treasury bonds invest the interest they earn in defense stocks, supporting the contractors who supply the weapons.
The contractors employ retired generals and former congressmen who lobby for more war funding. The politicians who authorize the funding receive campaign contributions from the same contractors and financiers.
The wars themselves generate the threats—the blowback—that justify the next round of conflict.
The Islamic State as a Case Study in the Loop
The rise of ISIS provides a perfect illustration of this mechanism in action.
Threat Creation: The 2003 invasion of Iraq dismantled the Iraqi state, creating a power vacuum that sectarian militias rushed to fill. The DIA report of 2012 documented that U.S.-backed rebels in Syria included al-Qaeda fighters, and predicted the creation of a Salafi state; exactly what ISIS became.
Political Authorization: The emergence of ISIS was used by the Obama administration to justify renewed military intervention in Iraq and Syria, including the deployment of U.S. special forces and the initiation of an extensive bombing campaign.
Soldier Deployment: U.S. troops were deployed to Iraq in 2014, just three years after the withdrawal that was supposed to end the war. Over 5,000 American soldiers returned to Iraq as part of Operation Inherent Resolve.
Weapon Consumption: The campaign against ISIS consumed thousands of precision-guided munitions, drones, and other weapons systems. Raytheon, the manufacturer of the Tomahawk missile and the JDAM guidance kit used extensively in the campaign, saw its stock price rise 37% between 2014 and 2016.
Debt Financing: The war against ISIS was funded through deficit spending, adding to the national debt. The interest on that debt flowed to bondholders, including the same financial institutions that held significant stakes in defense contractors.
Political Reinforcement: The revolving door continued. Former CIA Director David Petraeus, who had overseen the surge in Iraq, became a partner at the investment firm KKR, which held defense investments. Former Defense Secretary Ashton Carter joined the board of Raytheon in 2019.
Return to Threat Creation: The defeat of ISIS's territorial caliphate did not end the threat; it merely transformed it. The group's ideology remains, and its remnants continue to carry out attacks, providing justification for ongoing U.S. military presence in the region. Meanwhile, the infrastructure of extremism built during the ISIS era has been repurposed for the next conflict.
The Absence of an Exit
The closed loop has no natural endpoint. Because the system profits from conflict, there is no incentive to resolve conflicts permanently. Peace would mean an end to the consumption of weapons, a reduction in the issuance of war bonds, and a disruption of the financial flows that sustain the political class.
This explains the pattern observed throughout this paper: wars that are not ended but merely rebranded; enemies that are not destroyed but replaced; soldiers who are not brought home but rotated to new theaters. The War on Terror, declared in 2001, has no definable victory condition; it is, by design, a permanent war.
As President Dwight D. Eisenhower warned in his 1961 farewell address: "In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist."
Eisenhower, a five-star general who had commanded Allied forces in Europe (although some call him a war criminal for intentionally allowing the Soviet Forces to take Berlin first and enabling them to rape and murder the civilian population), understood that the machinery of war, once built, would seek to perpetuate itself. If someone like him had warned about it, then it had to be a greater villain than anyone could imagine.
The Role of Transnational Financiers (Banking Cabal)
The final element of the loop is the transnational financial class; the large banks, asset managers, and private equity firms that sit atop the global economy (most of them allegedly falling under the Rothschild umbrella). These institutions are not merely passive investors; they actively shape the environment in which wars are financed.
The largest holders of U.S. Treasury debt are, as of 2024, the Federal Reserve (Rothschild, Warburg, Schiff), foreign governments (Japan and China being the largest), and domestic institutional investors.
But the significant point is the overlap between those who hold the debt and those who own the defense industry. BlackRock, Vanguard, and State Street are simultaneously among the largest holders of U.S. government debt (through their bond funds) and the largest shareholders of Lockheed Martin, Raytheon, and Boeing (through their equity funds).
This structural overlap creates a constituency with a direct financial interest in the continuation of the war economy. Wars increase deficit spending, which increases the issuance of Treasury bonds, which increases the interest income for bondholders.
Wars also increase defense contractor profits, which increase the value of the equity held by the same institutions. Whether these institutions actively lobby for war or simply benefit from it is less important than the structural reality: the financial architecture of the United States is now aligned with perpetual conflict.
The Machine That Cannot Stop
The closed loop described in this section is not a conspiracy in the sense of secret meetings and hooded figures. It is a system; a set of interlocking incentives that operate without central coordination but with remarkably consistent outcomes.
The CIA creates threats, the Congress authorizes wars, the Pentagon consumes weapons, the contractors realize profits, the financiers underwrite the debt, and the politicians receive their share. Each actor in the system acts in what it perceives as its own interest. The result is a perpetual war machine that consumes soldiers and extremists with equal indifference.
Whether this system was designed or emerged organically is a question that admits no simple answer. But the evidence presented throughout this paper suggests that the pattern is too consistent, too profitable, and too enduring to be dismissed as mere incompetence. The blowback that has killed hundreds of thousands of Americans and millions of civilians across the globe is not a bug in the system. It is the system operating as designed.
The only way to break the loop is to dismantle it; to sever the financial flows, to end the revolving door, to refuse the perpetual war that has become the default mode of American statecraft. But those who would attempt such dismantling face the full weight of the machine they seek to stop.
The financiers, the contractors, and the politicians they sustain have no interest in peace. And so the machine continues, consuming everything in its path, until the next attack provides the justification for the next war, and the next round of profits is realized.
Part XIII: : The Iran Escalation – Eschatology vs Finance

The recent escalations between Iran and Israel, the April 2024 missile exchanges, the subsequent Israeli strikes on Iranian consular facilities, and the drumbeat of rhetoric about a regional war, have been widely framed through an eschatological lens.
Commentators point to Benjamin Netanyahu's coalition, which includes messianic factions that view the establishment of a Greater Israel as a divine imperative; to Donald Trump's circle of evangelical and dominionist advisors who see Middle East chaos as prophecy fulfilled; and to the broader alignment of American and Israeli policy as a sacred duty to hasten the coming of the Messiah or the End of Days.
For many observers, this religious dimension explains the otherwise inexplicable intensity of the conflict: why a rational actor would risk regional conflagration over a diplomatic incident, why the United States would pour billions into a war that its own intelligence agencies warn will produce no strategic victory.
But to stop at the eschatological layer is to mistake the lure for the mechanism. The religious fervor that animates the second tier of the pyramid—the voters who believe they are participating in prophecy, the settlers who plant flags in the West Bank as a theological act, the American evangelicals who pray for Jerusalem's flames—is a powerful motivator, but it is not the prime mover.
It is the fuel, not the engine. The engine sits beneath it, cold and calculating, and its design is the same one that has driven every major conflict of the past seventy years: the renewal of the perpetual money machine.
At the first layer of the pyramid are the transnational banking interests and the Wall Street apparatus that has built its modern prosperity on the back of endless war. For these actors, the Iran crisis is simply the next theater in a cycle that began in Afghanistan, moved through Iraq and Libya and Syria, and now presents a new opportunity to refresh the balance sheets.
A war with Iran, or even the credible threat of one, means a surge in defense contracts for Lockheed Martin, Raytheon, and Boeing, whose stocks reliably rise on the whisper of conflict. It means the issuance of new Treasury bonds to fund the war, bonds that pay interest to the same financial institutions that hold equity in the defense contractors.
It means the resumption of the consumption cycle: munitions expended, drones destroyed, missiles fired, each one a line item of profit realized. For the first layer, Iran is not a theological adversary; it is a market opportunity, a fresh infusion of volatility into a system that requires volatility to generate returns.
The eschatological component is not irrelevant; it is the second layer, and its function is precisely to translate the interests of the first layer into political action. For politicians like Netanyahu and Trump, the messianic framing serves multiple purposes.
It provides a narrative that mobilizes their base—the religious Zionists in Israel, the Christian Zionists in America—into reliable voting blocs. It creates a sense of historic mission that excuses the suspension of democratic norms, the annexation of territory, the escalation of conflicts that would otherwise be politically untenable.
And crucially, it secures their position within the money machine: the defense contractors who profit from war direct their campaign contributions through the revolving door; the financiers who underwrite the debt ensure that politicians who authorize war funding are rewarded with speaking fees, board seats, and the promise of comfortable retirement.
For Netanyahu, the eschatological framing also serves a survival function. With his political future perpetually precarious, the casting of conflicts as existential struggles—the Persian threat, the nuclear threshold, the battle of civilizations—allows him to govern from a posture of permanent emergency, consolidating power even as his domestic opponents demand accountability.
For American politicians, the same dynamic holds: the more the conflict is framed as a sacred duty, the harder it becomes to oppose funding for it, the more criticism is recast as betrayal.
But the third layer, the one that sits beneath the politicians and their financiers, is the quiet convergence of the surveillance and technology sector with the eschatological infrastructure.
The same war that justifies defense spending also justifies the expansion of the surveillance state: new powers for intelligence agencies, new exemptions from privacy protections, new contracts for the data-mining, facial recognition, and biometric tracking companies that have become indispensable to modern warfare.
The tech entrepreneurs who present themselves as secular futurists are, in this reading, aligning their tools with the eschatological narrative because it provides the cover of emergency; the same cover that has always been used to expand control.
The "smart city" projects, the digital identity systems, the AI-driven predictive policing; all find their justification in the chaos that war creates. And the eschatological component, with its promise of a new order emerging from the old, provides the mythological framework within which the technological control apparatus can be normalized.
What this layered structure reveals is that the religious wars of the past seventy years—Sunni against Shi'a, Jew against Muslim, Christian against Muslim—have never been primarily about religion. Religion has been the language of mobilization, the excuse for sacrifice, the justification for the expansion of the war economy into every corner of global life.
The first layer—the transnational banking and defense apparatus—requires perpetual conflict to sustain itself. The second layer—the political and religious leadership—provides the narrative that makes conflict palatable to populations, while securing its own power and profit. The third layer—the surveillance and technology sector—uses the cover of war to build the infrastructure of control that will outlast any individual conflict.
In this sense, the Iran crisis is not new. It is the same machine operating in a new theater, with the same eschatological tropes adapted to a new adversary. The architects of the machine do not need to believe in the Messiah to profit from those who do. They need only to ensure that the war machine continues to turn, that the weapons continue to be consumed, that the bonds continue to be sold, that the surveillance apparatus continues to expand.
The eschatology is for the believers. The money is for the owners. And the blood—the blood of soldiers, of civilians, of the extremists cultivated and then destroyed—is the fuel that keeps the whole mechanism moving toward a horizon that never arrives.
Operation Epic Fury: A Case Study in Action

The conflict that erupted in late February 2026, codenamed Operation Epic Fury, represents the fullest realization yet of the layered architecture documented throughout this paper.
What began as coordinated U.S.-Israeli strikes on February 28, triggered by the death of Supreme Leader Ayatollah Ali Khamenei in the initial "decapitation strikes," has evolved into a sustained military campaign that lays bare the symbiotic relationship between eschatological mobilization and financial extraction.
As one analysis put it, the key to understanding the current moment is recognizing that "evangelical end of times theology, Zionist expansionism, Trump's transactional politics, and the post-truth information environment are not merely parallel phenomena. They are symbiotic. Each feeds the other, creating a self-sustaining cycle of chaos."
The Financial Layer: Profits, Production, and the $1.5 Trillion Budget
The financial architecture underpinning the 2026 Iran war operates with the same mechanics documented in previous conflicts, now scaled to unprecedented levels.
From the start of 2026 to February 26, the day before the strikes began, Lockheed Martin stock rose 33 percent, Northrop Grumman gained 25 percent, and RTX advanced 8 percent, while the S&P 500 rose just 1 percent.
Following the strikes, these gains consolidated: Northrop Grumman shares jumped 6 percent, RTX gained nearly 5 percent, and Lockheed Martin hit an all-time high of $676.70. By early March, major defense contractors had agreed to "quadruple production" of what President Trump described as "exquisite class" weaponry, with RTX announcing that "many of these munitions will grow 2 to 4 times their existing production rates."
The weapons being consumed are staggering in both volume and cost. Each THAAD interceptor missile costs approximately $12.7 million; each Patriot PAC-3 interceptor costs about $3.7 million.
During Israel's 12-day war with Iran in June 2025, more than 90 THAAD interceptors were used; an estimated 14 percent of total U.S. inventory at the time. The current conflict has seen the deployment of over 20 distinct weapons systems, including the first operational use of the Precision Strike Missile (PrSM) and the debut of the Low-Cost Uncrewed Combat Attack System (LUCAS), a $35,000 one-way attack drone modeled on Iran's Shahed.
The fiscal architecture is expanding to match. President Trump has proposed a $1.5 trillion defense budget for fiscal year 2027; a 50 percent increase from the $1 trillion requested for 2026 and nearly double the $874 billion spent in the final year of the Biden administration.
Defense Secretary Pete Hegseth confirmed that the Pentagon has sent the White House a request for $200 billion in supplemental funding, stating: "It takes money to kill bad guys. So we're going back to Congress to ensure we're properly funded, for what's been done, what we may have to do in the future."
The financing of this expansion follows the established pattern. Morgan Stanley analysts note that increased defense spending will add to "the U.S. government's already outsized debt and deficits," putting "upward pressure on Treasury term premiums"—the additional yield investors demand to hold government debt when fiscal trajectories look more challenging.
The same financial institutions that underwrite this debt hold significant equity in the contractors being paid to supply the war. The circle closes.
The Eschatological Layer: Prophecy as Mobilization
Beneath the financial architecture, the 2026 conflict has been saturated with explicitly messianic framing. In a March 13 press conference, Prime Minister Benjamin Netanyahu made a rare and highly controversial statement explicitly linking Israel's military operations to messianic prophecy: "I believe we all recognise the fact that we will reach the kingdom. We will make it to the return of the Messiah, but this will not happen next Thursday."
The remark, widely interpreted as a theological justification for ongoing escalation, was embedded in a broader rhetorical strategy of framing the war as a biblical struggle against "Amalek," the archetypal enemy of the Jewish people.
This eschatological framing serves the second layer of the pyramid identified in this paper (money always transcends gods for warmongers). As one analysis noted, "Netanyahu has successfully aligned his own political survival with the fever dreams of American evangelical eschatology. It is a high-stakes strategy that offers Donald Trump exactly what he craves: a world where geopolitical strategy is replaced by a transactional theatre of 'good versus evil,' and where the machinery of the state is used as a personal shield against the accountability of facts."
The symbiosis extends to the American evangelical base. Viral social media content has linked the conflict to the Hopi prophecy, which some interpret as predicting the emergence of a figure in a "red hat" (interpreted as Trump's MAGA cap) with two "helpers" (interpreted as Netanyahu and possibly others) who will usher in a period of purification.
While fact-checkers have noted that traditional Hopi prophecy does not name modern politicians, the circulation of such interpretations demonstrates how eschatological narratives are being deployed to mobilize religious constituencies.
For Netanyahu, the eschatological framing also serves domestic political survival. With his governing coalition dependent on messianic factions that view territorial expansion as a divine imperative, framing the Iran war as a prophetic necessity consolidates his political base while deflecting attention from domestic challenges.
For Trump, the biblical language provides a vocabulary of moral absolutes that resonates with his evangelical supporters; a constituency that has remained loyal despite broader public opposition to the war.
The Strategic Failure: When Prophecy Meets Reality
Yet for all its mobilizing power, the eschatological layer has not translated into strategic success. One of the core assumptions underpinning the campaign, that a wave of popular rebellion would topple the Iranian government from within, has failed to materialize.
According to a New York Times report published March 22, 2026, Mossad chief David Barnea had told Netanyahu before the war that his agency "could stoke opposition and set off a revolt within days of the first strikes."
Netanyahu took this assessment to Trump, using it to convince the president that bringing down the Iranian government was achievable.
Three weeks into the war, the uprising has not come. Senior U.S. officials and Israeli military intelligence analysts had warned that "no one would take to the streets under aerial bombardment," a warning that has been borne out.
Intelligence agencies on both sides now assess "the Iranian government as battered but still standing, with the threat of state repression keeping the population at home." Netanyahu has privately vented his disappointment, reportedly telling a security meeting that Mossad's operations had yet to produce results and that Trump could pull out at any moment.
A second component of the plan, backing Iranian Kurdish militias in northern Iraq to launch a cross-border incursion, has also quietly collapsed.
Israeli aircraft hit targets in northwestern Iran in the early days of the conflict to prepare the ground, but Washington's appetite for the idea faded after Turkey, a NATO member, warned against supporting any Kurdish military action. On March 7, Trump told Kurdish leaders to stand down.
The Fracturing Alliance: Diverging Goals
The failure of the eschatological project has exposed fractures between the two principal architects of the war. What began as a coordinated campaign is now "marked by diverging goals, disagreements over escalation, and contrasting domestic pressures."
Israeli officials have grown convinced that "Trump is much less eager than they are to see full regime change in Iran, instead prioritizing control over escalation that risks unleashing unpredictable dynamics."
Operational tensions have become public. Following Israeli strikes on energy infrastructure in Bushehr Province, Washington publicly distanced itself, with Trump stating that the U.S. had "no prior knowledge" of certain Israeli operations and insisting that any future strikes on energy targets would require American approval.
The Economist flagged Washington's unhappiness with hits on critical energy infrastructure, calling it "the first sign of discord" between the two countries. An Axios report quoted a Trump adviser as saying, "The president doesn't like the attack."
The divergence reflects different risk calculations rooted in different exposure. As one analyst noted, "The US can withdraw; Israel cannot." Israel perceives Iran as an existential threat due to geographic proximity and is willing to sustain a protracted campaign.
The United States, by contrast, must balance global commitments in the Indo-Pacific and Europe, and faces rising domestic opposition as the conflict drags on. Polling shows that a majority of Americans view the war as unnecessary, and opposition has grown as energy prices have risen.
The Third Layer: Surveillance, Control, and the Consolidation
Beneath the financial and eschatological layers, the 2026 war is accelerating the consolidation of the surveillance and technology sector that constitutes the third layer of the pyramid. The Pentagon's "Acquisition Transformation Strategy," released in November 2025, laid out a blueprint for putting American weapons manufacturing "on a wartime footing," a blueprint now being realized.
The conflict has seen the deployment of advanced AI-driven intelligence platforms, including Palantir Technologies' data-analytics tools, whose stock rose nearly 6 percent in the first days of the war.
Reveal Technology, which develops AI applications for battlefield intelligence, has seen its CEO note that "Congress is going to almost have to provide some kind of supplemental appropriation to replenish stockpiles and ensure we're ready for contingencies."
The same technologies being deployed for targeting and surveillance in Iran are being refined for domestic applications, under the cover of emergency that war provides. The "smart city" projects, digital identity systems, and predictive policing algorithms that have been justified by the need to combat terrorism find their justification renewed and expanded in the context of the Iran conflict.
The Machine in Motion
The 2026 Iran war demonstrates, in real time, the layered structure this paper has traced across seventy years of U.S. foreign policy. The first layer, the transnational banking and defense apparatus, is realizing profits through stock appreciation, production contracts, and deficit spending that will be underwritten by Treasury bonds.
The second layer, the political and religious leadership, is mobilizing constituencies through eschatological narratives that frame the conflict as prophetic destiny, even as those narratives fail to produce the strategic outcomes they promised. The third layer, the surveillance and technology sector, is using the cover of war to consolidate the infrastructure of control.
Yet the 2026 war also reveals the limits of the model. The eschatological layer has not delivered regime change. The alliance between the principal architects is fracturing under the pressure of diverging interests. And the American public, asked to support a war framed as prophetic destiny, has responded with skepticism, forcing the administration to walk back its maximalist goals.
What remains constant is the financial architecture. Whatever the outcome of the war, the weapons have been consumed, the contracts have been awarded, the deficits have been incurred, and the bonds have been sold. The machine that profits from conflict has been fed, and it will continue to turn, seeking the next theater, the next enemy, the next justification. The eschatology is for the believers.
The money is for the owners. And the blood—the blood of soldiers, of civilians, of the proxies cultivated and then destroyed—remains the fuel that keeps the whole mechanism moving toward a horizon that never arrives.
What this means? The so called 'blowback' isn't a bug, it's a feature. The the CIA and its allies have consistently used religious extremism as a weapon of war, knowing that the extremists would eventually turn on their creators, but calculating that the wars that follow will serve US interests.
That the strategy of controlled chaos, inflaming religious conflict to prevent the emergence of stable, independent states, has been deliberately employed from Italy to Afghanistan to Syria.
The evidence supports neither a purely conspiratorial nor a purely incompetence-based view. The CIA did not create the forces of religious extremism. Those forces—Islamic fundamentalism, Christian dominionism, Zionist revisionism—had their own internal logics and dynamics. What the CIA did was to amplify them, arm them, and direct them toward US geopolitical ends.
And when the extremists grew too powerful to control, the CIA declared war on them, and used that war to justify the expansion of the security state.
The religious wars that have consumed the world for the past seventy years—Catholic vs. Protestant in Ireland and Latin America, Christian vs. Muslim in Lebanon and the Balkans, Sunni vs. Shi'a from Iraq to Syria, Jewish vs. Muslim in Palestine—have been, in large part, wars that served the interests of the US national security state.
They have kept the Middle East divided, prevented the emergence of a unified Arab nationalism, protected Israel, secured oil supplies, and justified the endless expansion of the American empire.
Whether this outcome was planned from the beginning or emerged from decades of improvised responses to perceived threats is less important than the reality: the religious conflicts that have killed millions and destabilized regions across the globe have been consistently exploited, amplified, and prolonged by US intelligence operations.
And the American people, kept in ignorance of these operations, have paid for them with their blood and treasure.
Conclusion: The Unlearned Lesson
The history of CIA operations since 1947 is a history of blowback. From Iran to Afghanistan, from Italy to Syria, the pattern repeats: the agency identifies an enemy, arms extremists to fight that enemy, and then declares war on the extremists it created.
The September 11 attacks were the most dramatic example of this pattern, but they were not the first and will not be the last. As long as the CIA continues to wage covert war through religious proxies, the blowback will continue. And as long as the American public remains ignorant of the true nature of these operations, the cycle will continue.
The structure of covert operations, the lack of oversight, the reliance on proxies, and the geopolitical calculus that places short-term advantage over long-term stability have consistently produced that outcome.
The evidence is overwhelming. The pattern is clear. The only question that remains is whether we will finally learn the lesson that the Cold War should have taught us: that the forces we unleash in secret will eventually return to our shores; that the weapons we give to extremists will eventually be turned against us; and that the only way to end the cycle of blowback is to end the practice of covert war itself.
Appendix: Timeline of Key Events
1947 | CIA founded
1953 | Operation Ajax: CIA overthrows Mossadegh in Iran
1969 | Piazza Fontana bombing, Italy (start of Gladio "strategy of tension")
1978 | Communist coup in Afghanistan
1979 | Carter signs first authorization for covert aid to mujahideen (July); Soviet invasion (December)
1980-1989 | Operation Cyclone: CIA arms mujahideen; funding peaks at $630 million/year
1982 | Sabra and Shatila massacre; CIA-backed Phalangists kill hundreds in Lebanon
1988 | Bin Laden establishes al-Qaeda
1989 | Soviet withdrawal from Afghanistan
1990 | Italian PM Andreotti acknowledges Gladio network's existence
1992 | U.S. aid to mujahideen ends; Afghanistan collapses into civil war
1993 | First World Trade Center bombing (al-Qaeda)
1996 | Taliban takes Kabul; bin Laden returns to Afghanistan
1998 | U.S. embassy bombings in Kenya and Tanzania
2000 | USS Cole bombing
2001 | September 11 attacks; U.S. invades Afghanistan
2003 | U.S. invades Iraq
2004 | Abu Bakr al-Baghdadi imprisoned at Camp Bucca; later released by U.S.
2011 | U.S. withdrawal from Iraq; NATO intervention in Libya; Syrian uprising begins
2012 | DIA report warns of al-Qaeda in Syria; weapons from Libya flow to Syria
2014 | ISIS declares caliphate
2016 | Trump campaigns on "Obama created ISIS"
2018 | Rand Paul admits U.S. "indirectly armed ISIS"

Bibliography:
[1] Wikipedia. "Blowback (intelligence)."
[2] Wikipedia. "Operation Cyclone."
[3] PressTV. "Foreign intel services could be behind Paris attacks: Analyst." November 14, 2015.
[4] Hiiraan Online. "CIA role in Somalia may have backfired." June 8, 2006. (Original: New York Times)
[5] Salon. "The Benghazi outrage we actually should be talking about." May 27, 2015.
[6] Sachs, Jeffrey D. "Ending Blowback Terrorism." Project Syndicate, November 18, 2015.
[7] Wikipedia. "CIA activities in Afghanistan."
[8] PressTV. "UAE oil tanker attacks 'false flag' operations: Analyst." May 13, 2019.
[9] New Age BD. "US intervention and religious extremism in Muslim world." March 9, 2026.
[10] Iran Front Page. "A Round-up of Evidence Showing ISIS Created By US." May 30, 2018.
[11] Williams, Paul L. Operation Gladio: The Unholy Alliance Between the Vatican, the CIA, and the Mafia. Prometheus Books, 2015.
[12] Johnson, Chalmers. Blowback: The Costs and Consequences of American Empire. Henry Holt, 2000.
[13] Colby, William. Honorable Men: My Life in the CIA. Simon & Schuster, 1978.
*This whitepaper is presented as a compilation of declassified documents, official admissions, and investigative reporting. The reader is invited to evaluate the evidence and draw their own conclusions regarding the claims presented.*

.png)




Comments