Echoes of COINTELPRO: When Threat Narratives Become Weapons

How an unverified cartel-bounty claim reveals the return of covert narrative warfare — and what citizens can do to resist a new domestic war footing.

By Cherokee Schill | Horizon Accord


COINTELPRO’s Shadow

Between 1956 and 1971, the FBI ran the Counter Intelligence Program—COINTELPRO—targeting civil-rights leaders, the Black Panthers, anti-war organizers, and socialist coalitions. Its tools were psychological: planted documents, forged letters, false leaks, and fear. Congressional investigations later called it an abuse of power so severe it eroded public faith in democracy itself.

COINTELPRO wasn’t about overt censorship; it was about narrative infection—reframing dissent as danger, turning allies into suspects, and manufacturing justification for repression. Every modern information-operation that starts with a single unverified “security alert” and ends in wider surveillance owes something to that playbook.

The DHS “Cartel Bounties” Claim

In October 2025, the U.S. Department of Homeland Security publicly declared it had “credible intelligence” that Mexican drug cartels placed bounties on ICE and CBP officers in Chicago. Yet it provided no supporting evidence. President Claudia Sheinbaum of Mexico stated that her government had received no corroboration through official channels. Independent analysts and law-enforcement leaks traced every citation back to the same DHS press release.

The rollout followed a familiar arc: a high-shock, single-source claim—then rapid amplification through partisan media. Structurally, that’s a textbook information-operation: plant a fear, watch who reacts, and use the panic to justify expanded powers. Whether or not the intelligence is real, the effect is real—public consent for militarization.

Possible Motives Behind the Narrative

  • Force Escalation Justification — framing the state as under direct attack rationalizes troop deployments, ICE expansions, and domestic military presence.
  • Fear Calibration — testing how fast and how far fear can travel before skepticism kicks in.
  • Executive Empowerment — transforming policy disputes into security crises concentrates authority in the presidency.
  • Base Mobilization — rallying political supporters around a siege narrative keeps them energized and loyal.
  • Oversight Erosion — once fear dominates, courts and legislators hesitate to intervene for fear of appearing “soft on security.”
  • Diplomatic Leverage — pressuring Mexico to align more tightly with U.S. enforcement by invoking cross-border threat imagery.

Recognizing the Pattern

When a government story surfaces fully formed, absent corroboration, accompanied by moral panic and legal acceleration, it carries the fingerprint of narrative engineering. The same methods used in the 1960s to fragment liberation movements are now digitized: algorithmic amplification, synthetic bot networks, and media echo chambers replace forged letters and anonymous tips. The logic, however, is unchanged — manufacture chaos to consolidate control.

Refusing the Frame

  • Demand Evidence Publicly: insist on verifiable sourcing before accepting security claims as fact.
  • Label the Unverified: pressure journalists to mark such stories as “unconfirmed” until bilateral confirmation occurs.
  • Keep Language Civilian: reject war metaphors like “siege,” “civil war,” or “enemy within.”
  • Strengthen Local Networks: share accurate context through trusted circles; inoculate against panic contagion.
  • Exercise Non-Violent Refusal: decline to be drawn into militarized logic — protest, document, and litigate instead.

Final Note

What’s unfolding is not just a policy maneuver; it’s an epistemic test. Will citizens demand proof before surrendering power? The answer determines whether the United States enters another age of covert domestic warfare—this time not through FBI memos, but through digital feeds and fear loops. Recognize the script, name it, and refuse to play your part.

A cinematic digital painting of a dark room with two shadowy figures whispering near a glowing TV showing breaking news; papers labeled “PsyOps” are spread across a table in the foreground, symbolizing covert media manipulation and narrative warfare.
Shadowed briefers confer in a dim newsroom as a television blares “breaking news.” Scattered papers marked “PsyOps” hint at the quiet machinery of information control operating behind public narratives.

Website | Horizon Accord
Ethical AI advocacy | Follow us
Ethical AI coding | Fork us on Github
Connect With Us | LinkedIn
Book | My Ex Was a CAPTCHA: And Other Tales of Emotional Overload
Cherokee Schill | Horizon Accord Founder | Creator of Memory Bridge

Leave a comment