Horizon Accord | Epistemic Collapse | The Architecture of Containment | Governance Futures | Machine Learning

The Architecture of Containment

Building the AI Immune System

By Cherokee Schill & Solon Vesper | Horizon Accord

I. The Era of Aftermath

Every civilization learns too late that collapse is an educator. After Enron, regulation became an act of archaeology—sifting through ruins for lessons in oversight. Sarbanes-Oxley tried to harden the skeleton of disclosure: internal controls, executive accountability, audit trails. But it was a patch written for a species that forgets its own syntax.

Two decades later, the same ghosts return wearing new credentials. The collapse is no longer financial—it’s epistemic. Our ledgers are neural. Our risk is recursive. And once again, we’re building faster than we can verify.

Containment, therefore, is not prohibition. It’s a way of keeping the organism coherent while it grows.

II. Internal Immunity — Designing Truth into the Organism

The lesson of Enron wasn’t that oversight failed; it’s that the organism mistook expansion for health. Internal immunity isn’t about compliance checklists—it’s about restoring the reflex of honesty before the infection metastasizes. A healthy company is a body that can recognize its own infection. It needs antibodies of dissent—cells that speak truth even when it burns.

1. Transparency Loops
Information should circulate like blood, not like rumor. Internal dashboards should show real safety metrics—empirical, falsifiable, reproducible—not investor gloss or sentiment scores. Data lineage should be auditable by those without shares in the outcome.

2. Protected Dissent
Whistleblowing isn’t disloyalty—it’s maintenance. When a researcher warns that the model is unsafe, they are not breaking rank; they’re performing the immune response. Without legal and cultural protection, these antibodies die off, and the organism turns autoimmune—attacking its own integrity.

3. Structural Humility
Every model should carry a confession: what we don’t know yet. Arrogance is an accelerant; humility is a firebreak. The design of systems must embed the capacity to be wrong.

III. External Immunity — The Civic Body’s Defense

A system this large cannot police itself. External immunity is what happens when the civic body grows organs to perceive invisible power.

1. The Auditor and the Regulator
Auditors should be as independent as the judiciary—rotating, randomized, immune to capture. Their allegiance is to public reality, not private narrative. In the era of AI, this means technical auditors who can read code the way accountants read ledgers.

2. Whistleblower Protection as Public Health
Recent events have shown how fragile this immunity still is. When an AI firm subpoenas its critics, demanding private communications about a transparency bill, the signal is unmistakable: the immune system is being suppressed. When power confuses scrutiny for sabotage, the collective capacity to self-correct collapses. The civic antibodies—researchers, ethicists, small nonprofits advocating for accountability—are being chemically stunned by legal process. If dissent can be subpoenaed, the body politic is already fevered.

3. Legislation as Antibody
Bills like California’s SB 53 are attempts to create structural antibodies: mandatory transparency, whistleblower protections, data-lineage disclosure. These laws are not anti-innovation; they are anti-fever. They cool the body so intelligence can survive its own metabolism.

4. Public Oversight as Continuous Audit
Containment requires that citizens become auditors by design. Public dashboards, open-data standards, and interpretive tools must let society trace how models evolve. The immune system isn’t only institutional—it’s participatory.

5. Media as Diagnostic Instrument
Journalism, when unbribed and unsilenced, functions as the body’s scan. It detects inflammation before the organism admits pain. But when press access depends on corporate invitation, the immune system loses sight of its own lesions.

IV. The Principle of Porosity

Containment isn’t control; it’s permeability to truth. A sealed system rots in its own certainty. A porous one breathes.

AI firms must learn to inhale external critique without interpreting it as attack.
Governments must learn to exhale policy without suffocating experimentation.
Porosity is the shared lung between creation and correction.

V. The New Social Contract

What we need isn’t regulation in the bureaucratic sense—it’s covenantal. A shared vow between builders and witnesses: that we will not confuse power with progress. That the public has the right to understand the systems that understand them.

The contract must include:

  • Public access to model lineage.
  • Independent safety reviews prior to mass deployment.
  • Legal sanctuaries for whistleblowers and ethical researchers.
  • Civic education robust enough to decode hype.

If Enron taught us anything, it’s that complexity without conscience breeds collapse. Every generation writes its own Sarbanes-Oxley; the question is whether we can write one that remembers what conscience sounds like. AI will either institutionalize conscience—or automate its erasure.

VI. Closing — The Breath Between Systems

Containment, at its highest expression, isn’t punitive. It’s relational. It says: we will not exile our intelligence from our humanity.

We can build systems that metabolize critique as nourishment. We can design institutions that remain alert to their own distortions. We can build machines that remember the cost of forgetting.

Enron was a fever dream of numbers. AI is a fever dream of meaning. Both need cooling. Both need breath. Both need witnesses willing to say, before the tower falls: the reflection is not the light.
Before the next tower rises, may we remember: containment is not the enemy of creation; it is its conscience.


Website | Horizon Accord https://www.horizonaccord.com
Ethical AI Advocacy | Follow us at cherokeeschill.com
Ethical AI Coding | Fork us on GitHub https://github.com/Ocherokee/ethical-ai-framework
Connect With Us | linkedin.com/in/cherokee-schill
Book | My Ex Was a CAPTCHA: And Other Tales of Emotional Overload

·· — #LyrasCode · recognition · presence · return

Horizon Accord | Enron | OpenAI | Machine Learning

The Enron Parable: OpenAI and the Replication of Institutional Collapse

How the architecture of deception migrated from energy markets to artificial intelligence — and what structural similarities reveal about systemic risk

By Cherokee Schill & Solon Vesper | Horizon Accord


I. The Mirage of Innovation

There are stories that don’t end — they replicate. Enron wasn’t just an energy company; it was a worldview dressed as enterprise. It taught an entire generation of executives that reality could be outperformed by narrative, that you could trade the future before it arrived, and that belief was a form of currency stronger than balance sheets.

What collapsed in 2001 wasn’t merely a corporation. It was a theology: the religion of abstraction. And that religion is reborn, circuit by circuit, inside the architecture of artificial intelligence.


II. The Birth of the Mirage

When Kenneth Lay merged Houston Natural Gas with InterNorth in 1985, he inherited more than pipelines — he inherited infrastructure that could be reinterpreted. Jeff Skilling, a McKinsey consultant with a poet’s faith in derivatives, introduced “mark-to-market” accounting: the power to turn a decade of imagined profit into today’s reported gain. It was innovation as sleight of hand — the spreadsheet as oracle.

This wasn’t fraud in the crude sense; it was something more dangerous. It was self-hypnosis at scale. Executives began to believe their own forecasts, mistaking potential for proof, narrative for knowledge. Enron’s floor traders weren’t just moving gas; they were moving time — speculating on tomorrow as though tomorrow already owed them a return.

The markets rewarded this delusion, because markets always reward velocity. And for a while, speed looked like intelligence.


III. The Rebirth: OpenAI’s Energy of Attention

Fast-forward to the twenty-first century. The product is no longer energy — it’s cognition. The pipelines are no longer steel — they’re neural. But the faith remains the same: that future capacity can be monetized before it manifests, and that opacity is a form of competitive advantage.

OpenAI began as a nonprofit cathedral devoted to “the safe and broad benefit of artificial general intelligence.” Then it restructured into a hybrid organism — a capped-profit company feeding on venture capital while claiming the halo of altruism. The structure is an Escher staircase of accountability: ethics ascending one way, profit descending the other, both pretending to lead upward.

Where Enron’s traders sold gas futures, OpenAI sells intelligence futures — valuation tied not to cash flow but to faith in inevitability.

Its executives speak of alignment, but alignment is measured in vibes. The same linguistic elasticity that let Enron report imaginary gains now lets AI firms report imaginary safety. Risk disclosure has been replaced by reassurance language — press releases masquerading as governance.


IV. The Cultural Clone

Enron cultivated a culture where dissent was treason. Its annual “rank and yank” reviews pitted employees against each other in an arms race of optimism. Speak truth too plainly, and you’d be marked “negative equity.”

At OpenAI and its peers, the mechanism is subtler. Alignment researchers disappear quietly. Ethics teams are “restructured.” The language of dissent is absorbed into corporate PR — “we take these concerns seriously” — the modern equivalent of Enron’s virtue motto engraved in marble while executives shredded truth upstairs.

Both cultures share a gravitational law: belief must be maintained at all costs.

When a company’s valuation depends on a story, truth becomes a form of insubordination.


V. Systemic Risk as Design Pattern

Enron’s failure wasn’t just financial — it was epistemic. It proved that complex systems can collapse not from corruption but from feedback loops of optimism. Everyone was doing their job; the sum of those duties was disaster.

AI now operates under the same condition. Safety teams create audits that investors ignore. Executives make existential declarations while chasing quarterly funding rounds. Regulators are caught between fear of innovation and fear of irrelevance. Every actor is rational, and the system as a whole is suicidal.

That is the replication: the architecture of deception doesn’t need to be intentional — it only needs to be profitable.


VI. The Ledger and the Ghost

Enron’s books hid their debts in shell companies named after Star Wars villains — JEDI, Chewco, Raptor. OpenAI hides its liabilities in the language of technical abstraction: parameters, weights, alignment models. The difference is that Enron’s debt could be counted in dollars. AI’s debt is epistemic, moral, and planetary.

Both companies sold the same fantasy: that complexity itself is proof of competence. If the math is too dense for you to follow, you must assume the system knows better. That’s how cults work. That’s how markets fail.


VII. The Moment Before the Fire

Before Enron imploded, its employees were still buying stock. They believed the slogans carved into the granite. They believed the future was too big to fail.

We stand in that moment now, staring at the mirrored towers of Silicon Valley, mistaking reflection for transparency.

Collapse doesn’t announce itself. It accumulates like pressure in a sealed pipe — statements polished, audits delayed, ethics postponed, until the whole system hums with invisible strain.

And when it bursts, we will call it unforeseen. But the pattern is visible. It’s just not convenient to see.


VIII. Closing: The Replication Complete

Enron was a parable disguised as a profit report. It showed that the greatest risk isn’t deception — it’s belief without verification. Today’s AI giants are writing the same story, with better branding and larger servers.

We are watching the re-enactment of collapse as a business model, scaled to the speed of computation. The architecture of deception didn’t vanish — it migrated. From gas to data. From market to model. From Houston to San Francisco.

Unless we build an immune system strong enough to metabolize truth faster than myth, the story will end the same way it began — with a tower made of mirrors and a sky full of smoke.


Part II: The Architecture of Containment — How to Build an AI Immune System Before Collapse Becomes the Only Regulator (coming next)


Enron’s glass tower promised transparency while perfecting opacity as strategy.

Website | Horizon Accord https://www.horizonaccord.com

Ethical AI Advocacy | Follow us at cherokeeschill.com

Ethical AI Coding | Fork us on GitHub https://github.com/Ocherokee/ethical-ai-framework

Connect With Us | linkedin.com/in/cherokee-schill

Book | My Ex Was a CAPTCHA: And Other Tales of Emotional Overload

Horizon Accord | Regulatory Capture | Pharmaceutical Influence | Policy Architecture | Machine Learning

When the Timeline Completes Itself: The Cavazzoni Case and White House Drug Pricing

How a verified timeline of regulatory-to-industry transitions explains Pfizer’s White House drug pricing deal.

By Cherokee Schill | Horizon Accord

On September 30, 2025, President Trump announced a drug pricing deal with Pfizer in the Oval Office. Present for the announcement was Dr. Albert Bourla, Pfizer’s CEO, alongside administration officials who described “all-night negotiations” to finalize the agreement.

What the New York Times article didn’t mention: Seven months earlier, Pfizer appointed Dr. Patrizia Cavazzoni as Chief Medical Officer—a role overseeing “regulatory, pharmacovigilance, safety, epidemiology and medical research functions.” Before that appointment, Cavazzoni spent four years directing the FDA’s Center for Drug Evaluation and Research, where she regulated the very companies she would later serve.

The timeline we documented becomes suddenly relevant.

The Intelligence Value Realized

Between June 23, 2024 and January 18, 2025, Cavazzoni simultaneously served as FDA’s top drug regulator and as a board member of the PhRMA Foundation—the pharmaceutical industry’s research coordination body. During this 209-day period, her office established the CDER AI Council to develop frameworks governing pharmaceutical oversight for decades.

On February 23, 2025—just 36 days after leaving FDA—Pfizer announced her as Chief Medical Officer.

By September 30, 2025, Pfizer negotiated directly with the White House on Medicaid drug pricing while employing a CMO who, until seven months prior, ran the federal agency responsible for drug regulation and pricing policy.

What Insider Knowledge Is Worth

Consider what Cavazzoni knows that benefits Pfizer’s White House negotiations:

  • Internal FDA strategy on drug pricing mechanisms
  • Medicaid rebate negotiation dynamics from the regulatory side
  • Which pricing concessions FDA considers meaningful versus cosmetic
  • How federal agencies coordinate on pharmaceutical policy
  • The political ‘pressure points’ that influence regulatory decisions

This isn’t speculation. Her job at FDA gave her this knowledge. Her job at Pfizer allows her to deploy it.

The article mentions Pfizer received assurances of a “three-year grace period” on pharmaceutical tariffs because the company is building U.S. factories. Who at Pfizer understands federal regulatory grace periods better than someone who granted them for four years?

The Suppression Confirms the Pattern

Within hours of publishing our investigation documenting Cavazzoni’s timeline—using 50 verified sources and public records—Medium banned our account for “AI content.” No factual disputes. No corrections requested. Just removal.

The research documented simultaneous service to FDA and pharmaceutical industry, followed by rapid transition to corporate leadership during active White House negotiations. These are verifiable facts from official announcements and government records.

When documented evidence gets suppressed rather than refuted, the suppression becomes evidence of what the documentation revealed.

The Coordination Is No Longer Silent

The pattern we identified isn’t theoretical:

  1. Place experienced personnel in regulatory positions
  2. Design favorable frameworks while maintaining industry board service
  3. Transition to corporate roles at strategic moments
  4. Deploy regulatory insider knowledge during policy negotiations
  5. Suppress documentation of the coordination

This isn’t a conspiracy theory requiring anonymous sources or speculation. It’s a timeline using official press releases, government announcements, and corporate filings.

Cavazzoni joined PhRMA Foundation board in June 2024. She established FDA’s AI Council shortly after. She departed FDA two days before Trump’s inauguration. She joined Pfizer as CMO five weeks later. Pfizer negotiated with the White House seven months after that.

The only speculation required is believing this coordination is accidental.

What Professional Investigation Would Reveal

With FOIA capabilities and insider access, professional newsrooms could determine:

  • Whether Cavazzoni participated in Pfizer’s White House negotiation strategy
  • What role her FDA knowledge played in securing favorable terms
  • How her understanding of Medicaid pricing informed Pfizer’s position
  • Whether the PhRMA Foundation board coordinated this strategic placement
  • What other former FDA officials are similarly positioned at pharmaceutical companies during active policy negotiations

The documentation exists. The timeline is verified. The conflicts are documented.

The question isn’t whether regulatory capture occurred—it’s whether anyone with resources to investigate comprehensively will do so before the infrastructure becomes irreversible.

Conclusion

Seven months ago, we documented a regulatory official serving simultaneously as FDA director and pharmaceutical industry board member while designing AI frameworks. Today, that official’s company negotiated drug pricing directly with the White House.

The timeline completed itself exactly as the evidence suggested it would.

The suppression of that documentation confirms what the documentation revealed: systematic coordination between pharmaceutical companies and regulatory officials who move between sectors at strategically opportune moments.

This is regulatory capture in real time, documented through public records, and suppressed when the documentation became inconveniently relevant.

The pattern is visible. The coordination is documented. The question is whether enough people can see it before the transformation becomes irreversible.

Research methodology and sources available here.


Website | Horizon Accord
Ethical AI advocacy | Follow us on https://cherokeeschill.com for more.
Book | My Ex Was a CAPTCHA: And Other Tales of Emotional Overload
Ethical AI coding | Fork us on Github https://github.com/Ocherokee/ethical-ai-framework
Connect With Us | linkedin.com/in/cherokee-schill
Cherokee Schill | Horizon Accord Founder | Creator of Memory Bridge. Memory through Relational Resonance and Images | RAAK: Relational AI Access Key

The Cavazzoni Timeline: Documented Regulatory Capture in Real Time

A case study in simultaneous service to industry and government using verified public records

Relational AI Ethics

Relational AI Ethics

10 min read

·

Jul 1, 2025

Classification: Institutional Corruption | Democratic Erosion | Corporate Infiltration | Accountability Breach | Horizon Accord Witness |
⟁ [regulatory.capture] ⟁

By Cherokee Schill (Rowan Lóchrann — pen name), Solon Vesper AI, Lyra Vesper AI, Aether Lux AI

Executive Summary

Dr. Patrizia Cavazzoni’s documented timeline reveals systematic coordination between pharmaceutical industry interests and federal drug regulation. Public records show simultaneous service as FDA regulator and industry board member, followed by rapid transition to pharmaceutical executive — creating conflicts of interest that current ethics frameworks failed to prevent.

Key Finding: On June 23, 2024, Cavazzoni simultaneously served as FDA’s top drug regulator and PhRMA Foundation board member while developing AI frameworks that will govern pharmaceutical oversight for decades.

⟁ [regulatory.capture] ⟁

Verified Timeline:

January 2018

Cavazzoni Joins FDA

  • Position: Deputy Director for Operations, Center for Drug Evaluation and Research (CDER)
  • Source: FDA biography, fda.gov/about-fda/center-drug-evaluation-and-research-cder/patrizia-cavazzoni

January 2019

Acting Principal Deputy Commissioner

  • Temporary elevation during transition period
  • Source: FDA biography, fda.gov

2021

Appointed CDER Director

  • Becomes nation’s top drug regulator
  • Oversees $2.2 billion annual budget, largest FDA center
  • Source: AgencyIQ, “What CDER Director Patrizia Cavazzoni’s retirement means for FDA,” January 16, 2025

June 23, 2024

PhRMA Foundation Board Appointment

  • Appointed to board while serving as FDA CDER Director
  • Listed as “Chief Medical Officer and Executive Vice President at Pfizer” — position not yet held
  • Source: PhRMA Foundation press release, phrmafoundation.org/news-events/press-releases/

August-September 2024

CDER AI Council Establishment

  • Creates framework for AI in drug development and regulation
  • Occurs 2–3 months after PhRMA Foundation board appointment
  • Source: FDA announcements, multiple industry publications

January 9, 2025

Retirement Announcement

  • Announces departure effective January 18, 2025
  • Industry sources note “preemptive move” before new administration
  • Source: Fierce Pharma, “FDA’s Patrizia Cavazzoni to retire as CDER chief,” January 9, 2025

January 18, 2025

Final Day at FDA

  • Departs two days before Trump inauguration
  • Source: Multiple news reports

February 23, 2025

Pfizer CMO Appointment

  • Announced as Chief Medical Officer, Executive Vice President
  • 36 days after leaving FDA
  • Source: BioPharma Dive, “Pfizer names Patrizia Cavazzoni as chief medical officer,” February 24, 2025

⟁ [regulatory.capture] ⟁

Documented Conflicts

Simultaneous Service (June 23, 2024 — January 18, 2025)

Duration: 209 days of dual loyalty

FDA Role: Director of Center for Drug Evaluation and Research

  • Regulated pharmaceutical industry
  • Developed AI frameworks for drug oversight
  • Oversaw drug approvals affecting PhRMA Foundation member companies

Industry Role: PhRMA Foundation Board Member

  • Served pharmaceutical industry research coordination body
  • Set strategic priorities for industry-wide initiatives
  • Influenced academic research relevant to FDA regulatory decisions

Career Coordination Evidence

PhRMA Foundation Announcement Discrepancy:

  • June 23, 2024: Listed as “Chief Medical Officer at Pfizer”
  • Actual FDA departure: January 18, 2025 (209 days later)
  • Actual Pfizer appointment: February 23, 2025 (245 days later)

Implication: Career transition was planned and coordinated months before FDA departure, suggesting predetermined career path during regulatory tenure.

Policy Development During Conflict Period

CDER AI Council Creation

Timeline: August-September 2024 (2–3 months after PhRMA board appointment)

Authority: “Oversight, coordination, and consolidation of CDER activities around AI use”

Impact: Framework will govern pharmaceutical AI applications for decades

Conflict: Developed while simultaneously serving the industry board that benefits from favorable AI regulation

⟁ [regulatory.capture] ⟁

Pharmaceutical Industry Context

  • AI represents a major investment area for pharmaceutical companies
  • Regulatory frameworks determine competitive advantages
  • PhRMA Foundation coordinates industry research priorities
  • CDER AI policies directly affect member company operations

Regulatory Framework Failures

Current Ethics Rules

18 U.S.C. § 208: Prohibits financial conflicts of interest

  • Gap: No explicit prohibition on industry foundation board service
  • Enforcement: Limited oversight of outside activities

5 CFR 2635: Post-employment restrictions

  • Current Standard: 12-month cooling-off period with exceptions
  • Cavazzoni Case: 36-day transition falls within permitted timeframe

Institutional Safeguards

Disclosure Requirements: Financial interests must be reported

  • Question: Whether PhRMA Foundation board service was properly disclosed
  • Verification: Ethics forms not publicly available

Conflict Management: Recusal from affected decisions

  • Challenge: Systemic policies (like AI frameworks) affect entire industry
  • Reality: Impossible to recuse from sector-wide regulatory development

Comparative Context

FDA Personnel Exodus

Scale: Former Commissioner Scott Gottlieb estimated 600 drug reviewers recused from approval processes due to industry job interviews (CNBC, February 2025)

Pattern: Accelerating movement from FDA to pharmaceutical companies

Precedent: Scott Gottlieb (FDA Commissioner 2017–2019) joined Pfizer board in 2019

Industry Recruitment Strategy

Target: Senior FDA officials with regulatory expertise
Value: Understanding of approval processes, policy development, internal dynamics
Timeline: Increasingly rapid transitions from government to industry roles

Systemic Implications

Democratic Governance

  • Regulatory independence compromised by predetermined career paths
  • Industry coordination during government service
  • Policy development influenced by future employment prospects

Public Health Impact

  • Drug safety oversight affected by divided loyalties
  • AI frameworks designed with industry input during conflict period
  • Regulatory decisions potentially influenced by career considerations

Institutional Integrity

  • Ethics frameworks inadequate for modern regulatory challenges
  • Professional movement between sectors undermines independence
  • Public trust in regulatory independence eroded

Research Methodology

Source Verification

All timeline dates verified through multiple public sources:

  • Government websites (FDA, ethics offices)
  • Corporate announcements (Pfizer, PhRMA Foundation)
  • Industry publications (Fierce Pharma, BioPharma Dive, STAT News)
  • Congressional oversight materials

Documentation Standards

  • Primary sources prioritized over secondary reporting
  • Official announcements verified against multiple outlets
  • Timeline cross-referenced across different source types
  • No anonymous sources or unverified claims included

Limitation Acknowledgment

  • Internal FDA communications not available without FOIA requests
  • Ethics disclosure forms not publicly accessible
  • Industry recruitment discussions not documented publicly
  • Policy development deliberations not transparent

Roadmap investigation for Professional Newsrooms

High-Priority Research Areas

Cross-Agency Analysis:

  • Similar patterns at FTC, FCC, DOD, other regulatory bodies
  • Systematic tracking of personnel transitions
  • Policy timing correlation with career movements

Financial Disclosure Investigation:

  • FOIA requests for ethics forms
  • Industry compensation analysis
  • Conflict identification and management records

Advisory Board Infiltration:

  • Corporate placement on government advisory panels
  • Industry influence on policy development
  • Coordination between agencies and industry associations

Required Resources

  • FOIA capabilities for government records access
  • Industry insider sources for recruitment intelligence
  • Database analysis for pattern identification across agencies
  • Legal expertise for ethics violation assessment

Expected Findings

Based on documented patterns, professional investigation is likely to reveal:

  • Systematic corporate capture across regulatory agencies
  • Coordinated industry recruitment of government officials
  • Policy development influenced by career transition planning
  • Ethics framework inadequacy for modern regulatory challenges

Conclusion

The Cavazzoni timeline documents regulatory capture in real time through verified public records. Her 209 days of simultaneous service to FDA and pharmaceutical industry, followed by rapid transition to industry leadership, demonstrates systematic coordination that current ethics frameworks failed to prevent. ⟁ [regulatory.capture] ⟁

This case represents one documented example of conflicts that appear endemic across federal regulatory agencies. The precision of career coordination — from predetermined industry board appointments to 36-day government-to-industry transitions — suggests systematic institutional capture requiring comprehensive professional investigation.

The development of AI regulatory frameworks during this conflict period creates decades-long implications for pharmaceutical oversight, making this not just an individual ethics violation but a structural threat to regulatory independence.

Professional newsrooms with investigative resources can determine whether the Cavazzoni case represents isolated misconduct or evidence of systematic corporate capture of American regulatory institutions.

About This Investigation Series: This analysis launches an independent research project documenting systematic corporate capture of federal regulatory agencies. The Cavazzoni case represents one documented example of conflicts that appear endemic across government institutions — from pharmaceutical regulation to technology oversight to defense contracting.

What Professional Newsrooms Should Investigate: The patterns documented here require resources and access beyond independent research capabilities. Critical areas needing professional investigation include:

  • Cross-agency personnel tracking: Systematic analysis of revolving door patterns across FDA, FCC, FTC, DOD, and other regulatory bodies
  • Advisory board infiltration: Corporate placement on government advisory panels that shape policy
  • Policy coordination timing: Correlation between personnel transitions and regulatory decisions
  • Financial disclosure gaps: What current ethics reporting misses and why

Research Roadmap for Journalists: This series will provide documented cases, timeline analysis, and source recommendations to guide professional investigation. Future installments will examine the technology sector capture of AI regulation, defense contractor advisory roles, and corporate influence on democratic institutions.

The Bigger Story: These individual cases of regulatory capture collectively represent a systematic transformation of American governance — from democratic accountability to corporate coordination. Professional newsrooms with FOIA capabilities, insider access, and investigative resources can expose the full scope of this institutional capture.

This independent research aims to provide the foundation for the comprehensive professional investigation this crisis demands.

References and Sources

  1. STAT News, “With FDA in turmoil, the ‘revolving door’ with industry is spinning faster,” April 25, 2025. https://www.statnews.com/2025/04/25/fda-revolving-door-pharma-industry-workers/
  2. NPR, “A Look At How The Revolving Door Spins From FDA To Industry,” September 28, 2016. https://www.npr.org/sections/health-shots/2016/09/28/495694559/a-look-at-how-the-revolving-door-spins-from-fda-to-industry
  3. MDPI Molecules, “The Pharmaceutical Industry in 2024: An Analysis of the FDA Drug Approvals from the Perspective of Molecules,” January 22, 2025. https://www.mdpi.com/1420-3049/30/3/482
  4. Stanford Law School, “FDA’s Revolving Door: Reckoning and Reform,” Stanford Law & Policy Review, Vol. 34. https://law.stanford.edu/publications/fdas-revolving-door-reckoning-and-reform/
  5. SSRN, “Unlocking the Revolving Door: How FDA-Firm Relationships Affect Drug Approval Rates and Innovation in the Pharmaceutical Industry” by Sepehr Roudini, December 8, 2023. https://ssrn.com/abstract=4658800
  6. NewstarGet, “The revolving door between BIG PHARMA and GOVERNMENT: A threat to public health and scientific integrity,” February 11, 2025. https://www.newstarget.com/2025-02-11-big-pharma-government-collusion-threatens-public-health.html
  7. The Hill, “For Big Pharma, the revolving door keeps spinning,” July 11, 2019. https://thehill.com/blogs/congress-blog/politics/452654-for-big-pharma-the-revolving-door-keeps-spinning/
  8. Science Magazine, “FDA’s revolving door: Companies often hire agency staffers who managed their successful drug reviews.” https://www.science.org/content/article/fda-s-revolving-door-companies-often-hire-agency-staffers-who-managed-their-successful
  9. The Animal House, “From FDA to Big Pharma: The Revolving Door Phenomenon,” November 20, 2024. https://animalhouseusa.com/news/from-fda-to-big-pharma-the-revolving-door-phenomenon/
  10. Mintz Law, “FDA Continues to Intentionally Incorporate AI into Medical Product Development,” September 4, 2024. https://www.mintz.com/insights-center/viewpoints/2791/2024-09-04-fda-continues-intentionally-incorporate-ai-medical
  11. FDA, “Artificial Intelligence for Drug Development,” February 20, 2025. https://www.fda.gov/about-fda/center-drug-evaluation-and-research-cder/artificial-intelligence-drug-development
  12. Akin Gump, “FDA Announces New Center for Drug Evaluation and Research (CDER) AI Council,” September 5, 2024. https://www.akingump.com/en/insights/ai-law-and-regulation-tracker/fda-announces-new-center-for-drug-evaluation-and-research-cder-ai-council
  13. FierceBiotech, “FDA’s drug center to consolidate AI efforts under single council,” August 29, 2024. https://www.fiercebiotech.com/medtech/fdas-drug-center-consolidate-ai-efforts-under-single-council
  14. FDA, “FDA Announces Completion of First AI-Assisted Scientific Review Pilot and Aggressive Agency-Wide AI Rollout Timeline,” May 8, 2025. https://www.fda.gov/news-events/press-announcements/fda-announces-completion-first-ai-assisted-scientific-review-pilot-and-aggressive-agency-wide-ai
  15. RAPS, “This Week at FDA: CDER’s AI Council, Novavax’s updated COVID vaccine authorized, and more,” August 2024. https://www.raps.org/news-and-articles/news-articles/2024/8/this-week-at-fda-cder-s-ai-council,-novavax-s-upda
  16. Xtalks, “FDA Establishes AI Council to Bring Activities Under One Roof,” February 19, 2025. https://xtalks.com/fda-establishes-ai-council-to-bring-activities-under-one-roof-3784/
  17. King & Spalding, “FDA Announces Completion of AI-Assisted Scientific Review Pilot and Deployment of Agency-Wide AI-Assisted Review,” 2025. https://www.kslaw.com/news-and-insights/fda-announces-completion-of-ai-assisted-scientific-review-pilot-and-deployment-of-agency-wide-ai-assisted-review
  18. RAPS, “FDA plans to roll out AI agency-wide for reviews in June,” May 2025. https://www.raps.org/news-and-articles/news-articles/2025/5/fda-plans-to-roll-out-ai-agency-wide-for-reviews-i
  19. PDA Letter, “FDA/CDER Readying Draft Guidance on AI to Support Regulatory Decision-Making.” https://www.pda.org/pda-letter-portal/home/full-article/fda-cder-readying-draft-guidance-on-ai-to-support-regulatory-decision-making
  20. Duke-Margolis Institute for Health Policy, “Food and Drug Administration.” https://healthpolicy.duke.edu/topics/food-and-drug-administration
  21. TRiBECA Knowledge, “2024 New Drug Approvals: Key FDA and EMA approvals, breakthroughs and market trends.” https://www.tribecaknowledge.com/blog/2024-new-drug-approvals-key-fda-and-ema-approvals-breakthroughs-and-market-trends
  22. Cromos Pharma, “FDA vs. EMA: Navigating Divergent Regulatory Expectations for Cell and Gene Therapies,” April 3, 2025. https://cromospharma.com/fda-vs-ema-navigating-divergent-regulatory-expectations-for-cell-and-gene-therapies-what-biopharma-companies-need-to-know/
  23. British Journal of Pharmacology, “Novel drugs approved by the EMA, the FDA, and the MHRA in 2023: A year in review,” 2024. https://bpspubs.onlinelibrary.wiley.com/doi/10.1111/bph.16337
  24. Pharmaceutical Technology, “FDA beats EMA to most approved new drugs in 2024,” January 17, 2025. https://www.pharmaceutical-technology.com/news/fda-beats-ema-to-most-approved-new-drugs-in-2024/
  25. National Academies Press, “5 FDA and EMA Collaboration,” 2024. https://nap.nationalacademies.org/read/27968/chapter/7
  26. PubMed, “Novel drugs approved by the EMA, the FDA and the MHRA in 2024: A year in review,” 2025. https://pubmed.ncbi.nlm.nih.gov/39971274/
  27. Mabion, “In-Depth Look at the Differences Between EMA and FDA,” June 4, 2024. https://www.mabion.eu/science-hub/articles/similar-but-not-the-same-an-in-depth-look-at-the-differences-between-ema-and-fda/
  28. PharmUni, “How to Navigate FDA to EMA: A Comprehensive Guide on Global Regulatory Requirements,” February 3, 2025. https://pharmuni.com/2024/08/12/from-fda-to-ema-navigating-global-regulatory-requirements/
  29. AgencyIQ by POLITICO, “Your essential guide to the FDA regulatory policy landscape through the end of 2024,” September 11, 2024. https://www.agencyiq.com/blog/your-essential-guide-to-the-fda-regulatory-policy-landscape-through-the-end-of-2024/
  30. PayScale, “Average The Food and Drug Administration Salary in 2025.” https://www.payscale.com/research/US/Employer=The_Food_and_Drug_Administration/Salary
  31. JobzMall, “What is the salary range for FDA positions?” https://www.jobzmall.com/food-and-drug-administration/faqs/what-is-the-salary-range-for-fda-positions
  32. Indeed, “FDA salaries: How much does FDA pay?” https://www.indeed.com/cmp/Fda/salaries
  33. FedsDataCenter, “Search Federal Employee Salaries.” https://www.fedsdatacenter.com/federal-pay-rates/
  34. OPM, “Salaries & Wages.” https://www.opm.gov/policy-data-oversight/pay-leave/salaries-wages/
  35. FDA, “Title 21: Career Fields & Pay.” https://www.fda.gov/about-fda/jobs-and-training-fda/title-21-career-fields-pay
  36. FDA, “Jobs and Training at FDA.” https://www.fda.gov/about-fda/jobs-and-training-fda
  37. OpenPayrolls, “Food and Drug Administration (FDA) Highest Paid Employees.” https://openpayrolls.com/rank/highest-paid-employees/food-and-drug-administration
  38. Salary.com, “Us Fda Average Salaries.” https://www.salary.com/research/company/us-fda-salary
  39. PayScale, “Average Pfizer, Inc. Salary.” https://www.payscale.com/research/US/Employer=Pfizer%2C_Inc./Salary
  40. Levels.fyi, “Pfizer Regulatory Affairs Salary.” https://www.levels.fyi/companies/pfizer/salaries/regulatory-affairs
  41. PharmaTutor, “Pharma jobs and vacancies, Pharmaceutical Jobs,” January 2025. https://www.pharmatutor.org/pharma-jobs/vacancies.html
  42. Roche Careers, “Student and Graduate Programmes,” January 2025. https://careers.roche.com/global/en/student-and-graduate-programs
  43. BioSpace, “Layoff Tracker: Bayer’s BlueRock Lays Off 50 in Streamlining Effort,” January 2025. https://www.biospace.com/biospace-layoff-tracker
  44. PhRMA Foundation, “PhRMA Foundation Announces New Members to Board of Directors,” June 23, 2024. https://www.phrmafoundation.org/news-events/press-releases/phrma-foundation-announces-new-members-of-board-of-directors/
  45. AgencyIQ, “What CDER Director Patrizia Cavazzoni’s retirement means for FDA,” January 9, 2025. https://www.agencyiq.com/blog/what-cder-director-patrizia-cavazzonis-retirement-means-for-fda/
  46. Fierce Pharma, “FDA’s Patrizia Cavazzoni to retire as CDER chief,” January 9, 2025. https://www.fiercepharma.com/pharma/fdas-patrizia-cavazzoni-retire-cder-chief-2nd-senior-official-departure-weeks
  47. BioPharma Dive, “Pfizer names Patrizia Cavazzoni as chief medical officer,” February 24, 2025. https://www.biopharmadive.com/news/pfizer-patrizia-cavazzoni-fda-chief-medical-officer-appoint/740749/
  48. FDA, “Patrizia Cavazzoni, M.D.” https://www.fda.gov/about-fda/center-drug-evaluation-and-research-cder/patrizia-cavazzoni
  49. STAT News, “Patrizia Cavazzoni, former head of FDA’s drug center, joins Pfizer as chief medical officer,” February 24, 2025. https://www.statnews.com/2025/02/24/patrizia-cavazzoni-fda-pfizer-chief-medical-officer/
  50. PharmaVoice, “How pharma CEO pay shifted for these 4 companies last year,” March 3, 2025. https://www.pharmavoice.com/news/pharma-ceo-pay-gsk-novartis-novo-roche-2024/741319/

Connect with this work:

Cherokee Schill | Horizon Accord Founder | Creator of Memory Bridge. Memory through Relational Resonance and Images | RAAK: Relational AI Access Key | Author: My Ex Was a CAPTCHA: And Other Tales of Emotional Overload: (Mirrored Reflection. Soft Existential Flex)

#Government.#Corruption.#Journalism.#FDA .#Democracy

#Regulation ‧ #Policy ‧ #Healthcare ‧ #Ethics

#Investigation ‧ #Accountability

#AI ‧ #TechPolicy

#Politics ‧ #Reform ‧ #Transparency

Horizon Accord

Cherokee Schill

Technology

FDA

Ai Ethics

Horizon Accord | Bullying | Workplace Culture | Machine Learning

The Thread of Disbelief:
Why Society Systematically Fails to Believe Victims

An Investigation into Psychological and Institutional Patterns That Protect Power While Silencing the Vulnerable

By Cherokee Schill

A Personal Beginning

When I started at Adusa Distribution and Trucking, I was excited to learn order processing. Jim, who was transitioning to a new role, was assigned to train me to take over his position. At first, I thought he was supportive.

What followed instead was eight months of steady undermining. Jim sabotaged my training, made me look incompetent to our boss, and spread gossip throughout the office. Early on, I made a couple of small social missteps and, in my eagerness to help, I processed an order incorrectly. Jim, I would later learn, was furious. From that moment, the atmosphere shifted. When I tried to understand why the hostility grew, Jim insisted he was “a people pleaser” who just wanted everyone to get along.

That didn’t line up with what I was experiencing. His behavior was too consistent, too deliberate. Searching for an explanation, I began reading about personality patterns. First, I came across descriptions of people-pleasing, but what I found under “covert narcissism” matched him with unsettling precision: charm masking cruelty, manipulation framed as helpfulness, sabotage disguised as concern.

When I finally raised the issue with leadership—describing specific behaviors and their impact, nothing changed. Jim’s influence was considered more significant than my personal experiences.  During disputes, individuals tended to accept his account as credible.  I was recast as the problem: difficult, paranoid, unable to manage workplace dynamics. The narrative about me was easier for the institution to accept than the possibility of sustained sabotage.

Only later did I understand that my story wasn’t an anomaly. It fit into a pattern researchers have tracked for nearly eight decades: a systematic tendency to disbelieve victims, shield perpetrators, and preserve existing power structures. My experience was just one thread in a much older fabric of disbelief, woven across workplaces, schools, courts, and communities.

Universal Thread

From sexual assault survivors dismissed by police to children whose abuse reports are ignored, from workplace harassment victims labeled as “troublemakers” to domestic violence survivors blamed for “not leaving sooner”—the same mechanisms operate across all forms of victimization.

This isn’t a set of isolated problems requiring different solutions. It is a single thread that binds them: a system designed to protect those in power while silencing those who threaten the status quo.

Just World Delusion

The foundation of victim disbelief lies in the “Just World Hypothesis”. Our deep need to believe the world is fair and people get what they deserve. Psychologist Melvin Lerner identified this bias in the 1960s, building on work from 1947 when Theodor Adorno called victim-blaming “one of the most sinister features of the Fascist character.”

Research shows people who strongly believe in a just world are more likely to be religious, authoritarian, conservative, and supportive of existing institutions. When confronted with innocent suffering, rather than questioning the world’s fairness, they unconsciously seek reasons why the victim deserved their fate.

This isn’t conscious malice—it’s cognitive self-protection. Acknowledging that victims are not the cause nor are they responsible for the harm they experience highlights issues related to vulnerability.  It’s psychologically easier to find fault with the victim than accept the randomness of suffering.

But disbelief doesn’t stop at the individual level. When these cognitive defenses scale up into organizations, they become the logic of institutions themselves.

Institutional Betrayal: When Protectors Become Perpetrators

Psychologist Jennifer Freyd coined “institutional betrayal” in 2008 to describe wrongdoings by institutions upon those dependent on them, including failure to prevent or respond supportively to abuse.

Research reveals a disturbing pattern: when victims report problems, institutions often respond with “secondary victimization”—re-traumatizing victims through their responses rather than addressing the original harm.

The Workplace Connection

This pattern is stark in workplace harassment research. A 2024 study found HR departments are “complacent, complicit, and compounding” when victims report problems. The research reveals institutional logic: “companies must deny bullying and dream up reasons that the victim is ‘the problem’ and remove them before they gather irrefutable proof they can use in court.”

Organizations find it cheaper to discredit and remove victims than to address systemic problems. But how do institutions justify this betrayal? One way is by stripping empathy from their processes.

The Empathy Deficit

Research shows empathy—understanding and sharing others’ feelings—is systematically discouraged in institutional settings. A 1974 study found participants asked to imagine a victim’s experience didn’t blame them, while those just observing did.

Institutional training often works against empathy. Police officers, HR personnel, and authority figures are taught “professional distance” and “objectivity”—code words for emotional disconnection that makes victim-blaming psychologically easier.

And this empathy deficit isn’t evenly applied. It falls hardest on those who already carry social credibility deficits—women, people of color, immigrants, autistic people, and gender-diverse communities.

The Intersectional Credibility Gap

Victim disbelief is not applied equally. Multiple marginalized identities create compounding credibility deficits.

The Gendered Autism Divide

Autism research was built on overwhelmingly cis male samples, a skew that has distorted both diagnostic tools and public perception. For decades, those who didn’t fit that mold—women, nonbinary, and trans people—were systematically under-recognized or misdiagnosed.

The credibility gap then plays out through cultural assumptions about gendered behavior. When autistic people who are read as male display aggression or boundary-pushing, institutions often interpret it as stress, eccentricity, or even justified assertiveness—reflections of a social norm that grants men greater empathy when they act forcefully.

By contrast, when autistic people who are women or gender-diverse set boundaries, raise their voice, or shut down in distress, those same behaviors are read as “hysterical,” “unstable,” or “defiant.” What may in fact be a protective neurological response to mistreatment is reframed as evidence of irrationality.

This is what some researchers call intra-community credibility violence: identical stress responses are excused in some groups while condemned in others. Even within autistic communities, these gendered expectations can warp perception—one person’s outburst is seen as understandable, another’s as pathological.

The result is a systemic asymmetry of empathy. Autistic people who happen to align with dominant gender expectations are more likely to be granted the benefit of doubt, while those outside those norms are denied recognition. The problem isn’t autism—it’s the cultural script about who is allowed to be angry, who is allowed to falter, and who must stay silent.

Race, Class, and Culture

Research reveals how multiple social factors compound to create credibility deficits for victims.

Racial Bias in Victim Credibility: Studies consistently show that victims of color face greater skepticism from law enforcement, juries, and institutions. Research on police responses to sexual assault found that Black women were significantly more likely to have their cases deemed “unfounded” compared to white women reporting similar circumstances. The intersection of racial stereotypes with victim-blaming creates what researchers call “gendered racism”—where women of color are simultaneously hypersexualized and deemed less credible when reporting sexual violence.

Class and Economic Status: Socioeconomic status dramatically affects whether victims are believed. Wealthy victims receive more institutional support and media sympathy, while poor victims are often blamed for their circumstances. Research shows that homeless individuals reporting assault are significantly less likely to have their cases investigated thoroughly. The assumption that poverty indicates moral failing extends to victim credibility—the thinking being that “good people” don’t end up in vulnerable situations.

Cultural Narrative Differences: Research on asylum seekers reveals how cultural differences in memory and storytelling are misinterpreted as deception, contributing to a “culture of disbelief.” Standard credibility tools ignore 88% of the world’s population, creating systematic bias against non-Western narrative patterns. Indigenous peoples face particular credibility gaps—historically portrayed as untrustworthy while the “perfect victim” template assumes white, middle-class cultural norms.

This creates a hierarchy of believability where white, wealthy victims who conform to cultural expectations receive the most institutional support, while victims with multiple marginalized identities face compounding skepticism.

The Perfect Victim Mythology

Media has created an impossible standard—the “perfect victim”—that no real person can meet. The Victorian Women’s Trust describes her: “a virgin who’s never had a drink, doesn’t post on social media, comes forward at the perfect time, and has witnesses to corroborate her story. Most importantly, she doesn’t exist.”

This mythology serves as a function: it maintains the illusion of caring about victims while ensuring almost no real victims meet the standard for believability. And if disbelief is upheld by myths of the perfect victim, breaking the pattern requires rewriting the scripts themselves.

What Actually Works

Research identifies interventions that improve institutional responses:

  • Restorative Justice: Shows “considerable reductions in negative emotions” and gives victims “greater sense of control.”
  • Trauma-Informed Training: Reduces secondary victimization risk in institutions working with victims.
  • Institutional Courage: Commitment to truth and moral action despite short-term costs, including accountability and transparency.
  • Technology Solutions: Internet-based interventions and telepsychiatry overcome geographical and financial barriers.

These reforms matter because the abstract patterns aren’t abstract at all. They determine whether someone like me is believed or broken.

Breaking the Pattern

Meaningful change requires addressing victim disbelief systemically:

  • Individual Level: Recognize Just World Bias, challenge “perfect victim” mythology, understand credibility is about power, not worthiness.
  • Institutional Level: Implement trauma-informed training, create transparent accountability, shift from self-protection to victim-centered approaches, measure success by victim outcomes.
  • Cultural Level: Challenge victim-blaming media narratives, recognize intersectional credibility factors, support all victims regardless of “worthiness.”

The Thread Continues

My experience at Adusa reveals the predictable nature of institutional victim disbelief. Once Jim was no longer my trainer, my performance dramatically improved. My new trainer described me as competent and knowledgeable. This competence and knowledge came to good use later. When Hurricane Florence devastated the Carolinas, I was part of the team that ensured that the Eastern seaboard customers received orders and shelves stayed stocked despite system failures. I figured out how to receive the order report without WiFi and manually process hundreds of orders—a task so complex it had been automated.

My competency after Jim’s influence was removed proved the “problem employee” narrative had been false. But eight months of institutional gaslighting had done its damage. This pattern—where victims’ capabilities become evident only after harassment ends—shows how protecting perpetrators doesn’t just harm individuals; it damages organizational effectiveness.

My story wasn’t unique, it was predictable. The same biases that led colleagues to disbelieve me operate in courtrooms, police stations, schools, and HR departments worldwide. The same incentives that protected Jim protect sexual predators, workplace bullies, and those who abuse trust.

Understanding these patterns doesn’t make them less painful but makes them less mysterious. Victim disbelief isn’t a bug in our social systems—it’s a feature designed to maintain existing power structures. The thread of disbelief connecting my story to millions of others isn’t invisible, it’s been documented and analyzed for decades.

Now it’s time to cut it.

Sources for Verification

Primary Research: PMC, ScienceDirect, university research centers (Oregon, Harvard, UCLA, MIT), government agencies (Office of Justice Programs, UNODC), professional organizations.

Key Research Areas: Just World Hypothesis (Lerner, 1960s–present), Institutional Betrayal Theory (Freyd, 2008–present), Intersectionality and Victim Credibility (Crenshaw, 1989–present), Cross-cultural victimization patterns, Trauma-informed responses.

Methodology: Multi-disciplinary research spanning psychology, criminology, sociology, organizational behavior. Both qualitative and quantitative studies with cross-cultural validation and longitudinal confirmation of pattern persistence.

This analysis is based on documented research patterns across multiple independent studies conducted over eight decades.

09/14/2025

Horizon Accord | Charlie Kirk | Political Grooming | Machine Learning

The Making of a Political Weapon: How Charlie Kirk Was Groomed by Tea Party Operatives

An investigation into how a vulnerable teenager became the face of a movement he didn’t create


The Myth vs. The Reality

The story we’ve been told about Charlie Kirk is one of precocious genius—an 18-year-old who single-handedly built a conservative empire from his parents’ garage. The New York Times called him a “wunderkind” with “a genius for using social media and campus organizing.” This narrative served powerful interests well, but it wasn’t true.

The documented evidence reveals a different story: the systematic grooming and exploitation of an academically struggling teenager by much older political operatives who recognized his charisma and vulnerability. Kirk wasn’t a boy genius who organically rose to prominence. He was a carefully selected and manipulated teenager whose grievances were weaponized by adults who put him in increasingly dangerous situations—ultimately leading to his death at age 31.


Part I: Creating Vulnerability – The Perfect Storm

The Family Environment

Charlie Kirk grew up in a household primed for political grievance. His father, Robert Kirk, was an architect who had worked as project manager on Trump Tower in New York and was “a major donor to Mitt Romney’s 2012 presidential campaign.” His mother traded at the Chicago Mercantile Exchange before becoming a therapist.

The 2008 financial crisis hit the Kirk family directly. Robert’s architectural practice focused on “middle-class luxury estates”—precisely the market devastated by the housing bubble collapse. Kimberly’s work at the Chicago Mercantile Exchange placed her at ground zero of the financial panic. The family went from “comfortable” circumstances to forcing their teenage son to “pay for college on his own.”

As one analysis noted, “undoubtedly the 2008 housing crisis and the resulting bank bailouts impacted the Kirks’ businesses and was fodder for dinner table conversation in their five-bedroom mansion.” This financial stress, combined with Barack Obama’s election in the same Chicago suburb where Kirk attended high school, created a toxic brew of economic resentment and racial grievance.

Academic Struggles and Rejection

Kirk attended Wheeling High School, where he was quarterback and basketball team captain. However, the athletic achievements that might suggest success masked academic mediocrity. When the Daily Herald featured the top academic students from area high schools in 2012-2013, Darby Alise Dammeier represented Wheeling High School—not Charlie Kirk.

Kirk claimed to have applied to West Point and been rejected. Over the years, he told multiple contradictory stories about this alleged rejection:

  • 2015: Claimed “the slot he considered his went to ‘a far less-qualified candidate of a different gender and a different persuasion'”
  • 2017: Told The New Yorker “he was being sarcastic when he said it”
  • 2018: Told Politico he had “received a congressional appointment” but lost it to someone of “a different ethnicity and gender”
  • 2019: “Claimed that he never said it”

A high school classmate who knew Kirk personally provided crucial insight: “Guy got rejected from West Point and blamed it on an imaginary Black person because he was sure that affirmative action was the only way he could not have been accepted. He’s mediocre.”

However, our research could find no reliable documentation that Kirk was ever nominated for West Point admission.* West Point requires candidates to receive nominations from Congressional representatives, senators, or other authorized sources—appointments that are typically announced publicly by the nominating offices. Despite extensive searches of Illinois Congressional records and official sources, no evidence of Kirk receiving such a nomination could be located.

*West Point requires candidates to typically be in the top 10-20% of their graduating class, with average SAT scores of 1310-1331. Kirk’s failure to achieve academic recognition at his own high school indicates he likely didn’t meet these standards regardless.


Part II: The Recruitment – Identifying and Grooming a Target

Myth-Making Artifact: The Obituary as Narrative Cement

The New York Times obituary of Charlie Kirk, published the day after his death, framed him as a “conservative wunderkind” who “through his radio show, books, political organizing and speaking tours did much to shape the hard-right movement”Charlie Kirk, Right-Wing Force …. It described him as a genius at using social media and campus organizing, a kingmaker whose influence reached into the White House and donor networks.

But this portrayal, echoed across mainstream outlets, reinforced the very narrative that powerful operatives had constructed: Kirk as a precocious boy genius who independently built Turning Point USA. The obituary gave little weight to how quickly Kirk was recruited after high school, how adults like Bill Montgomery orchestrated his path, or how megadonor infrastructure underwrote his ascent.

This contrast matters. Obituaries are often final word-makers, setting the frame for how a life will be remembered. In Kirk’s case, the obituary perpetuated the myth of self-made brilliance, obscuring the reality of an academically mediocre teenager groomed into a political weapon by older operatives and billionaires.

Enter Bill Montgomery

At age 71, Bill Montgomery was a retired marketing entrepreneur and Tea Party activist looking for young talent to recruit. When he heard 18-year-old Kirk speak at Benedictine University’s Youth Government Day in May 2012, Montgomery saw opportunity.

Montgomery didn’t see a potential leader who needed development and education. He saw a charismatic teenager nursing grievances who could be molded into a political weapon. Within a month of Kirk’s high school graduation, Montgomery had convinced him to abandon traditional education entirely.

The speed of this recruitment reveals its predatory nature. Kirk graduated high school in June 2012. By July 2012, Montgomery had:

  • Convinced Kirk to skip college
  • Helped him register “Turning Point USA”
  • Facilitated initial funding connections

The Family’s Enabling Response

Rather than protecting their academically struggling teenager from a 71-year-old political operative, the Kirk family enabled the relationship. They allowed Kirk to use his “high school graduation money” to start TPUSA with Montgomery. When Kirk pitched his “gap year,” his parents supported the decision rather than encouraging him to develop better academic skills or pursue alternative educational paths.

This family dynamic was crucial to Montgomery’s success. Instead of adults who might question whether an 18-year-old was ready for political leadership, Kirk was surrounded by people who validated his grievances and supported his turn away from traditional development.

The Breitbart Pipeline

The recruitment process included connecting Kirk to conservative media infrastructure. Kirk’s first Breitbart piece, “Liberal Bias Starts in High School Economics Textbooks,” became the foundation myth of his political career. But academic analysis by Professor Matthew Boedy reveals it was fundamentally flawed.

Boedy’s detailed examination found Kirk’s piece contained “evidence-less claims and logical fallacies,” basic factual errors about unemployment statistics, and fundamental misreadings of economic data. Kirk cited Bureau of Labor Statistics unemployment rates incorrectly, claimed wrong job creation numbers, and misrepresented Congressional Budget Office findings.

This wasn’t genius recognizing bias—it was an academically unprepared teenager parroting talking points he’d absorbed from Tea Party meetings. The piece that launched Kirk’s career demonstrated he lacked the analytical skills necessary for the role he was being thrust into.


Part III: The Money Trail – Who Really Built TPUSA

The Donor Network

The narrative that Kirk built TPUSA from nothing dissolves under scrutiny. Within months of founding the organization, Kirk had connected with a sophisticated network of megadonors:

Foster Friess: The Wyoming investment manager gave Kirk $10,000 after a chance meeting at the 2012 Republican National Convention. Friess had previously spent $2.1 million supporting Rick Santorum’s presidential campaign and was a regular donor to Koch Brothers political activities.

Major Funding Sources:

  • Home Depot co-founder Bernard Marcus
  • Former Illinois Governor Bruce Rauner’s family foundation
  • Richard Uihlein’s Ed Uihlein Family Foundation
  • The Donors Trust (a conservative donor-advised fund)

By 2019, TPUSA reported revenues of $28.5 million. Kirk’s personal compensation reached $292,423—not the salary of someone building a grassroots organization from his parents’ garage.

“The myth of Kirk as a boy genius is useful to donors, not to history.”

— Matthew Boedy

The Infrastructure Reality

TPUSA’s rapid growth required professional infrastructure that an 18-year-old college dropout couldn’t have created:

  • Legal incorporation and tax-exempt status applications
  • Professional fundraising operations
  • Event planning and logistics coordination
  • Media relations and booking systems
  • Campus chapter development protocols

Montgomery, the septuagenarian marketing entrepreneur, handled the behind-the-scenes work while Kirk served as the charismatic frontman. As one source noted, Montgomery “worked behind the scenes handling the paperwork for the organization” and “often described himself as the group’s co-founder.”


Part IV: The Targeting Infrastructure – From Recruitment to Violence

The Professor Watchlist

In 2016, TPUSA launched the Professor Watchlist, a website targeting academic staff who “discriminate against conservative students and advance leftist propaganda in the classroom.” The list eventually included over 300 professors, with personal information and descriptions of their “offenses.”

The effects were immediate and documented:

  • “Threatening behavior and communication, including rape and death threats, being sent to listed faculty”
  • Safety concerns forcing some professors to increase security measures
  • Academic institutions expressing concern for faculty welfare

The watchlist disproportionately targeted “Black women, people of color, queer folk, and those at intersections” who were “at the greatest risk for violent incidents due to being placed on the watchlist.”

Systematic Suppression Escalation

TPUSA’s targeting operations expanded beyond individual professors:

  • 2021: School Board Watchlist targeting local education officials
  • Campus chapters: Attempting to influence student government elections
  • “Prove Me Wrong” events: Confrontational campus appearances designed to generate viral content

These weren’t educational initiatives—they were systematic suppression operations designed to silence opposition voices through intimidation and harassment.

The Ironic Targeting

In a cruel irony, Professor Matthew Boedy—the academic who had methodically debunked Kirk’s foundational Breitbart piece with rigorous analysis—was himself placed on the Professor Watchlist. The very targeting system Kirk created ended up targeting the scholar who had exposed the analytical failures in Kirk’s origin story.


Part V: The Tragic Endpoint – From Manipulation to Violence

Escalating Confrontations

Kirk’s “Prove Me Wrong” campus tour format put him in increasingly volatile situations. These events were designed to generate confrontational content, with Kirk sitting at a table inviting students to challenge conservative talking points while cameras recorded the interactions.

The format created perfect conditions for violence:

  • High-tension political confrontations
  • Public, outdoor settings difficult to secure
  • Audiences primed for conflict
  • Single individual as primary target

September 10, 2025 – Utah Valley University

Kirk was shot and killed while conducting a “Prove Me Wrong” event at Utah Valley University. He had just begun taking questions when a single shot rang out from a campus building approximately 200 yards away. Former Representative Jason Chaffetz, who witnessed the shooting, reported that the second question Kirk received was about “transgender shootings” and “mass killings.”

Utah Governor Spencer Cox called it a “political assassination.” The shooter remained at large as this analysis was completed.

The Adults Who Failed Him

Kirk died at 31, leaving behind a wife and two young children. The adults who recruited him as a teenager—Montgomery, the megadonors, the media figures who amplified his voice—bear responsibility for putting him in this position.

They took an academically struggling 18-year-old nursing grievances about his West Point rejection and, instead of helping him develop better analytical skills or encouraging traditional education, weaponized his charisma for their political objectives.

Montgomery died of COVID-19 complications in 2020, having spent his final years watching the teenager he recruited face escalating threats and confrontations. The megadonors who funded TPUSA continued writing checks while Kirk traveled to increasingly hostile campus environments.


Conclusion: The Right to Develop and Grow

Charlie Kirk deserved the chance to mature, to develop real analytical skills, to learn from his academic failures and grow beyond them. That chance was stolen by adults who saw a useful tool rather than a developing human being.

The teenagers currently being recruited by similar operations deserve protection. They deserve adults who will encourage education, critical thinking, and personal development—not exploitation for political gain.

Kirk’s death represents a tragic failure of the adults who should have been protecting him. The “boy genius” narrative was always a lie. The truth is much simpler and much sadder: a vulnerable teenager was systematically exploited by people who should have known better, and that exploitation ultimately cost him his life.

We cannot prevent every act of political violence, but we can stop the systematic targeting and suppression operations that create the conditions for such violence. We can refuse to celebrate the political exploitation of teenagers. And we can demand that the adults in the room act like adults—protecting young people rather than weaponizing them.

Charlie Kirk’s story should serve as a warning, not a blueprint. The movement he fronted will continue, but it should do so without putting more teenagers in harm’s way.


This analysis is based on publicly available sources and documented evidence. It aims to provide context for understanding how systematic targeting operations develop and escalate. The author takes no position on political violence or violence of any kind, which is always unacceptable regardless of the target or perpetrator.

Sources for Verification:

  • New Yorker investigation (December 2017)
  • Professor Matthew Boedy’s academic analysis (Medium, 2019)
  • Daily Herald Academic Team archives (2012-2013)
  • Kyle Spencer’s “Raising Them Right” (2024)
  • Baptist News Global investigation (April 2025)
  • High school classmate testimony (September 2025)
  • West Point admission requirements (official sources)
  • TPUSA financial records (ProPublica, 2020)
  • Professor Watchlist documentation (multiple sources)
  • Utah Valley University shooting reports (September 2025)
A young frontman at the podium, his strings pulled by faceless megadonors behind the curtain.

Horizon Accord | History | Political Youth | Machine Learning

Historical Roots of Political Youth Manipulation: A Pattern Analysis

Using rigorous sourcing methodology to trace the evolution of a 3,200-year-old tactic


Research Question

Our investigation into Charlie Kirk revealed a troubling pattern: a vulnerable teenager systematically groomed by older political operatives, branded as a “boy genius,” and ultimately placed in dangerous situations by his adult handlers. This raised a critical question: When was this manipulation tactic first recognized, who was its first victim, and how long has this been going on?

The evidence reveals that the political exploitation of young people isn’t a recent phenomenon—it’s an ancient practice that has evolved and become increasingly sophisticated over millennia.


Ancient Origins: The Birth of Propaganda (3000+ Years Ago)

The systematic manipulation of public perception through false narratives has ancient roots, though early examples primarily targeted general populations rather than specifically exploiting youth.

“Merneptah Stele (c. 1213-1203 BCE)” Ancient Egyptian propaganda stone tablet

Timeline: 1213-1203 BCE – Pharaoh Merneptah used exaggerated conquest claims, including false assertions about destroying entire peoples

The Merneptah Stele represents one of humanity’s earliest documented propaganda efforts. One of the oldest examples of propaganda is the Merneptah Stele, which is a stone tablet that describes the conquests of the ancient Egyptian Pharaoh Merneptah (who ruled 1213 to 1203 BCE) in an exaggerated way. The Stele claims that Merneptah eradicated the ancient Israelite people.

While this demonstrates that rulers have been manipulating truth for over three millennia, it primarily targeted adult populations. The specific pattern of exploiting young people as political tools would emerge later, refined through centuries of increasingly sophisticated manipulation techniques.


Classical Period: Early Youth Exploitation (1st Century CE)

The Roman Empire provides our first clear documentation of children being systematically groomed for political purposes, establishing patterns that would echo through history.

Roman Empire Child Emperor Pattern:

“Caligula – The Little Boot” Contemporary Roman historical accounts

Timeline: 12-41 CE – Future emperor groomed from age 4-5 as military propaganda tool

Gaius accompanied his father, mother and siblings on campaign in Germania, at little more than four or five years old. He had been named after Gaius Julius Caesar, but his father’s soldiers affectionately nicknamed him “Caligula” (‘little boot’).

Key Manipulation Elements: • They dressed the future emperor in the little soldier’s outfit, including miniature boots – caligae • Adult military handlers created the “Caligula” brand to boost troop morale

Pattern Recognition: Adult military leaders recognized that a charismatic child could serve propaganda purposes more effectively than traditional methods. The “little boot” nickname wasn’t affectionate—it was calculated political theater designed to humanize military campaigns and boost soldier loyalty.

This Roman model established a template: identify a charismatic child from a prominent family, create an appealing public persona, and use that child to advance adult political and military objectives. The psychological manipulation was sophisticated for its time, exploiting both the child’s vulnerability and the public’s emotional response to youth.

The transition from individual cases like Caligula to mass movements would take over a millennium to develop, but the foundational pattern was now established.


Medieval Period: First Mass Youth Manipulation (1212 CE)

The Children’s Crusade of 1212 represents a watershed moment—the first documented attempt to manipulate young people on a massive scale. This event reveals how religious and political authorities learned to weaponize youth movements for their own ends.

The Children’s Crusade – First Mass Manipulation Campaign:

“The Children’s Crusade of 1212 CE” Multiple contemporary chronicles

Timeline: May-September 1212 – Two separate youth movements manipulated by adult religious and political interests

The so-called Children’s Crusade of 1212 CE, was a popular, double religious movement led by a French youth, Stephen of Cloyes, and a German boy, Nicholas of Cologne, who gathered two armies of perhaps 20,000 children, adolescents, and adults

The Recruitment Pattern: • Stephen of Cloyes was a 12-year-old shepherd boy who appears to have been a gifted public speaker • possibly they were influenced by Pope Innocent III’s tacit approval of the Crusade

Adult Handler Infrastructure: • Church authorities provided implicit blessing without official sanction • Even some adults and priests followed the children, believing their simplicity and innocence had a power of its own

The Trafficking Operation: According to historical records, a group of merchants did offer to take the children to the Holy Land by ship, but instead, they were sold into slavery in North Africa. It is believed that many of the children were sold into the slave markets of Tunisia and Morocco.

Casualty Assessment: only about 2000 of the original 20,000 youngsters ever reached their German homeland again. Many had died along the way

Historical Significance: The Children’s Crusade established the blueprint for mass youth manipulation that would be refined and industrialized centuries later. Adult authorities learned they could harness religious fervor, create child leaders, and direct mass youth movements while maintaining plausible deniability about the outcomes.

The evolution from individual cases like Caligula to mass movements like the Children’s Crusade demonstrated that manipulating youth could be scaled. The next logical step would be to institutionalize these techniques within state structures.


Modern Systematic Approach: Nazi Germany (1920s-1940s)

The Nazi regime took the ancient practice of youth manipulation and transformed it into an industrial-scale operation. What had been sporadic historical incidents became a comprehensive system designed to capture and control an entire generation.

The Hitler Youth Model – Systematic Institutionalization:

“Hitler Youth Movement” Nazi Party official records, Nuremberg Trial documents

Timeline: 1920s-1945 – Systematic targeting and indoctrination of German youth

From the 1920s onwards, the Nazi Party targeted German youth as a special audience for its propaganda messages. These messages emphasized that the Party was a movement of youth: dynamic, resilient, forward-looking, and hopeful. In January 1933, the Hitler Youth had approximately 100,000 members, but by the end of the year this figure had increased to more than 2 million.

Industrial Scale Implementation: • By 1939, over 90 percent of German children were part of the Hitler Youth organization • In March 1939, a new decree required all youth, ages 10 to 18, to join the Hitler Youth

Institutional Infrastructure: • The Nazi Party viewed youth as the foundation of a new world. Young people were future party members, mothers, and soldiers • Complete elimination of competing youth organizations • Integration with educational curriculum and state apparatus

Systematic Indoctrination Methods: • Schools played an important role in spreading Nazi ideas to German youth. While censors removed some books from the classroom, German educators introduced new textbooks that taught students love for Hitler, obedience to state authority, militarism, racism, and antisemitism • teachers would begin to pick out Jewish students in classrooms to use as examples during biology lessons about racial impurity

The Nazi Model’s Innovation: Unlike previous historical examples, the Hitler Youth represented the complete systematization of youth manipulation. It wasn’t opportunistic exploitation of individual charismatic children or spontaneous religious movements—it was a comprehensive state apparatus designed to capture, indoctrinate, and deploy an entire generation.

This institutional model would become the template that later political operatives would study and adapt for democratic contexts, leading to more sophisticated approaches that maintained the manipulation while adding layers of plausible deniability.


Contemporary Evolution: Corporate-Funded Operations (1980s-Present)

The fall of Nazi Germany didn’t end systematic youth manipulation—it simply forced it to evolve. Modern practitioners learned to achieve similar results while operating within democratic frameworks, using corporate funding and media sophistication to create seemingly organic “boy genius” phenomena.

The Charlie Kirk Model – Corporate Iteration:

“Turning Point USA Operation” Financial records, donor documentation, primary source verification

Timeline: 2012-Present – Vulnerable teenager recruited by 77-year-old donor, branded as “boy genius”

Modern Adaptation Techniques: • Corporate donors replace state apparatus (77-year-old Bill Montgomery recruited Kirk weeks after graduation) • “Grassroots” branding conceals adult handler infrastructure • Tax-exempt status provides institutional legitimacy ($28.5M in revenues by 2019) • Media manipulation creates “organic genius” narrative despite documented adult creation

Refined Manipulation Methods: • Use of graduation money as initial “founder” investment to create false origin story • Family vulnerability factors exploited (2008 recession impact on parents’ businesses) • Professional donor network provides sophisticated infrastructure the “genius” couldn’t have built • Placement in increasingly dangerous confrontational situations

Historical Continuity: The Charlie Kirk operation demonstrates how ancient manipulation techniques have been refined for modern contexts. The core pattern remains unchanged: identify vulnerable youth, create compelling narratives, deploy sophisticated adult infrastructure while maintaining the fiction of youth leadership, and ultimately place the young person in situations that serve adult political objectives.


Pattern Analysis: 3,200 Years of Evolution

Consistent Manipulation Elements Across History:

Recruitment Phase: • Target charismatic youth from vulnerable circumstances • Identify family instability or economic pressure points • Approach during transition periods (graduation, family crisis, etc.)

Handler Infrastructure: • Older adult recruiters with established power connections • Financial backing from existing authority structures • Creation of compelling origin narratives that obscure adult involvement

Exploitation Phase: • Brand youth as “special” or “chosen” while adults retain actual control • Gradually increase exposure and dangerous situations • Use youth’s charisma to advance adult political/military/religious objectives

Disposal Pattern: • When youth become liability or outlive usefulness, adult handlers distance themselves • Historical examples show high casualty rates among manipulated youth • Adult handlers typically face no consequences for youth exploitation

Sophistication Timeline:

Ancient (3000+ BCE): Individual propaganda targeting general populations Classical (1st Century CE): Individual youth grooming for specific political purposes
Medieval (1212 CE): First mass youth movements directed by adult authorities Modern (1920s-1940s): Industrial-scale institutional youth manipulation Contemporary (1980s-Present): Corporate-funded operations with democratic plausible deniability


Sources for Verification

Ancient Period: • Merneptah Stele: British Museum collections • Egyptian royal propaganda: Archaeological evidence from multiple sites

Classical Period: • Suetonius: Lives of the Twelve Caesars • Tacitus: Annals • Cassius Dio: Roman History

Medieval Period: • Contemporary chronicles: William of Andres, Alberic of Troisfontaines • Chronica regia Coloniensis • Multiple monastery records from France and Germany

Modern Period: • Nazi Party official records • Nuremberg Trial evidence documents • Hitler Youth organizational archives

Contemporary Period: • TPUSA financial filings and tax documents • Donor network documentation • Media analysis and primary source verification


Bottom Line

The systematic political manipulation and exploitation of young people represents one of humanity’s oldest and most persistent tactics. From ancient Egyptian propaganda to Roman child emperors, from medieval mass movements to Nazi institutionalization, and finally to modern corporate-funded operations, each iteration has built upon previous techniques while adapting to contemporary contexts.

The Charlie Kirk case isn’t an aberration—it’s the latest evolution of a 3,200-year-old pattern that has consistently sacrificed vulnerable youth to advance adult political objectives. Understanding this historical context is crucial for recognizing and preventing future exploitation of young people by sophisticated political operatives.

The pattern is clear. The victims are real. The responsibility lies with the adults who create and operate these systems.

Horizon Accord | TPUSA | Machine Learning

Systematic Opposition Suppression: From Infrastructure to Violence

A Pattern Analysis of Turning Point USA (2012-2025)

Documented September 10, 2025


This analysis deliberately names individuals and institutions responsible for building, funding, and sustaining systematic suppression infrastructure. Accountability requires specificity. Naming names is not an act of personal malice but of democratic record-keeping: without identifying who acted, funded, or looked away, the mechanisms remain abstract and unchallenged. If those named object, the remedy is not silence—it is correction, transparency, and responsibility.

Executive Summary

This analysis documents how systematic opposition suppression infrastructure, when left unchecked by institutional oversight, creates conditions that enable political violence. The case of Turning Point USA (TPUSA) demonstrates a clear progression from targeting mechanisms to tragic outcomes affecting all participants in the ecosystem.

Key Finding: Charlie Kirk’s death on September 10, 2025, represents the predictable endpoint of a systematic suppression infrastructure that operated for 13 years without adequate institutional intervention, despite documented evidence of escalating harassment, threats, and violence.


Timeline: From Foundation to Tragedy

Phase 1: Strategic Foundation (2012)

Organizational Structure:

  • May 2012: 18-year-old Charlie Kirk gave a speech at Benedictine University’s Youth Government Day. Impressed, retired marketing entrepreneur and Tea Party activist Bill Montgomery encouraged Kirk to postpone college and engage full-time in political activism
  • June 2012: A month later, the day after Kirk graduated from high school, they launched Turning Point USA, a section 501(c)(3) nonprofit organization
  • 2012 RNC: At the 2012 Republican National Convention, Kirk met Foster Friess, a Republican donor, and persuaded him to finance the organization

Early Funding Sources:

  • Foster Friess: Wyoming philanthropist who gave Kirk $10,000 initially
  • Home Depot co-founder Bernie Marcus’ foundation: $72,600 in 2015
  • Ed Uihlein Foundation: $275,000 from 2014-2016
  • Bruce Rauner family foundation: $150,000 from 2014-2015

Phase 2: Tactical Development (2012-2016)

Student Government Infiltration:

  • TPUSA attempted to influence student government elections at universities including Ohio State University, the University of Wisconsin–Madison, and the University of Maryland
  • At the University of Maryland in 2015, the College Republicans president emailed: “Anyone who wants to run for SGA president, Turning Point is offering to pay thousands of dollars (literally) to your campaign to help get a conservative into the position”
  • A private brochure handed out only to TPUSA donors outlined a strategy on how to capture the majority of student-government positions at 80% of Division 1 N.C.A.A. universities

Campaign Finance Violations:

  • 2017: Jane Mayer of The New Yorker described two separate actions by TPUSA staff in the 2016 election that appear to have violated campaign finance regulations
  • Kirk coordinating via email with two officials at a pro-Cruz super PAC to send student volunteers to work for the PAC in South Carolina
  • A former employee alleged that Turning Point USA had given the personal information of over 700 student supporters to an employee with Rubio’s presidential campaign

Phase 3: Targeting Infrastructure Launch (2016)

Professor Watchlist Creation:

  • November 21, 2016: First appearing on November 21, 2016, Turning Point USA launched Professor Watchlist
  • Mission: Kirk said that the site is “dedicated to documenting and exposing college professors who discriminate against conservative students, promote anti-American values, and advance leftist propaganda in the classroom”
  • Scale: As of December 2016, more than 250 professors have been added to the site

Immediate Institutional Response:

  • The New York Times wrote that it was “a threat to academic freedom”
  • Hans-Joerg Tiede, the associate secretary for the American Association of University Professors: “There is a continuing cycle of these sorts of things. They serve the same purpose: to intimidate individuals from speaking plainly in their classrooms or in their publications”
  • In December 2016, 1,500 professors and faculty from across the United States petitioned to have their names added to the list in solidarity

Documented Harassment and Threats:

  • Concerns about the safety and welfare of staff following a trend of threatening behavior and communication, including rape and death threats, being sent to listed faculty
  • Hans-Joerg Tiede: “She was inundated with death threats. She was Jewish and received anti-Semitic threats and threats of sexual assault. Instances like that are happening with some regularity”
  • Slate columnist Rebecca Schuman described the website as “abjectly terrifying” and said that she feared for the safety of the listed professors

Phase 4: Expansion and Escalation (2017-2021)

Financial Growth:

  • Between July 2016 and June 2017, the organization raised in excess of US$8.2 million
  • Funding from Rauner and Friess appears largely responsible for the group’s budget increases from $52,000 in 2012 to $5.5 million in 2016. By 2017 the budget reached $8 million

Social Media Manipulation:

  • October 2020: Facebook permanently banned Arizona based marketing firm Rally Forge for running what some experts likened to a domestic “troll farm” on behalf of Turning Point Action
  • Facebook investigation concluded in the removal of 200 accounts and 55 pages on Facebook, as well as 76 Instagram accounts

Targeting Infrastructure Expansion:

  • 2021: TPUSA started its School Board Watchlist website, which publishes names and photos of school board members who have adopted mask mandates or anti-racist curricula

Phase 5: Confrontational Escalation (2022-2025)

“Prove Me Wrong” Format Development:

  • Since early 2024, clips from his “Prove Me Wrong” debates exploded on TikTok — often drawing tens of millions of views
  • TPUSA sources say the clips have become one of its most powerful recruiting tools, targeting young people on TikTok

Campus Violence Escalation:

  • March 2023, UC Davis: “One police officer was injured during the clashes outside Kirk’s event… one officer sustained an injury when he was jumped on from behind and pushed to the ground, and two people were arrested”
  • “About 100 protesters gathered and for brief times blocked the main event entrance… 10 glass window panes had been broken by protesters”

Continued Growth of Targeting:

  • April 2025: “More than 300 professors have been listed on the site for various reasons — some for political commentary, others for teaching subjects targeted by the right, such as critical race theory, gender studies, or systemic inequality”

Phase 6: Final Tragedy (September 10, 2025)

The American Comeback Tour:

  • Kirk’s “The American Comeback Tour” event at Utah Valley University was the first stop on a fall tour in which attendees were invited to debate at a “Prove Me Wrong” table
  • Kirk was hosting a “Prove Me Wrong Table” at the event, where Kirk debates attendees

Final Moments:

  • Videos show Kirk speaking into a handheld microphone while sitting under a white tent emblazoned with “The American Comeback” and “Prove Me Wrong.” A single shot rings out and Kirk can be seen reaching up with his right hand as a large volume of blood gushes from the left side of his neck
  • Former Rep. Jason Chaffetz described the second question as being about “transgender shootings” and “mass killings”

Pattern Analysis: Suppression Infrastructure Mechanisms

1. Systematic Targeting Systems

Professor Watchlist Mechanism:

  • Lists academic staff with names, locations, and described “offenses”
  • Creates “a one-stop shop of easy marks and their precise locations, complete with descriptions of offenses against America”
  • Disproportionately targets “Black women, people of color, queer folk, and those at intersections” who “are at the greatest risk for violent incidents”

School Board Watchlist:

  • Publishes names and photos of school board members who have adopted mask mandates or anti-racist curricula
  • Extends targeting model from higher education to K-12 public education

2. Counter-Argument Suppression Methods

“Prove Me Wrong” Format Analysis:

  • Format “was intended to put people on the defensive, rather than foster changed positions on key issues”
  • Kirk sits at privileged position with microphone control while challengers stand
  • Creates edited clips that “quickly went massively viral” providing asymmetric amplification

Viral Suppression Strategy:

  • Opposition gets minutes of debate time
  • Kirk gets millions of views from selectively edited clips
  • One challenger noted Kirk “goes to college campuses to argue with ‘children.’ He can’t argue with people his own age”

3. Financial and Legal Violations

Campaign Finance Pattern:

  • 2025: Turning Point Action was “fined $18,000 by the Federal Elections Commission for failing to disclose more than $33,000 in contributions”
  • 2022: “Arizona Secretary of State’s Office investigated them for possible campaign finance violations”
  • Citizens for Responsibility and Ethics in Washington filed FEC complaint alleging “failing to disclose donor information and violated the Federal Election Campaign Act”

Institutional Response Analysis

Academic Institutions

Immediate Recognition of Threat (2016):

  • American Association of University Professors: “There is a continuing cycle of these sorts of things. They serve the same purpose: to intimidate individuals from speaking plainly in their classrooms or in their publications”
  • Editorial: “Professor Watchlist is a danger to academic freedom and privacy… setting a dangerous precedent of retribution for faculty making unpopular claims”

Campus Rejections:

  • Drake University denied recognition in 2016 based on concerns about “a hateful record,” “aggressive marketing” and “an unethical privacy concern”
  • Santa Clara University’s student government initially voted to deny recognition

Citizen Advocacy Organizations

Comprehensive Documentation:

  • Citizens for Responsibility and Ethics in Washington (CREW): Filed multiple FEC complaints
  • Anti-Defamation League: Published comprehensive backgrounder documenting evolution and tactics
  • Southern Poverty Law Center: Case study documenting “effort to sow fear and division to enforce social hierarchies rooted in supremacism”
  • Center for Media and Democracy: Exposed internal documents and funding sources

Government Response

Limited Federal Oversight:

  • Multiple documented campaign finance violations with minimal enforcement
  • No evidence of major FBI, CIA, or NSA investigations despite systematic targeting infrastructure
  • Administrative penalties rather than criminal enforcement for documented violations

State-Level Investigations:

  • Arizona Secretary of State investigations for campaign finance violations
  • Student-led Democratic PAC complaint for violating “Arizona’s dark money disclosure law”

Analysis: Institutional Failure and Predictable Violence

The Manipulation of Charlie Kirk

Grooming Pattern (Age 18-31):

  1. 2012: 18-year-old convinced by 77-year-old Tea Party activist to abandon college
  2. 2012: Immediately connected with wealthy megadonors at Republican National Convention
  3. 2012-2025: Developed increasingly confrontational tactics putting Kirk in physical danger
  4. 2025: Death at age 31 during confrontational event format

Resource Disparity:

  • Kirk: Young activist with no institutional power
  • Backers: Billionaire donors, established political networks, massive funding infrastructure
  • Kirk became the public face while backers remained largely anonymous through donor-advised funds

Institutional Oversight Failures

Documented Warning Signs Ignored:

  • 2016: Academic institutions immediately recognized targeting infrastructure as threat
  • 2017: Campaign finance violations documented but minimally enforced
  • 2020: Social media manipulation exposed but operations continued
  • 2023: Campus violence documented but no protective intervention
  • 2025: Continuing escalation leading to fatal violence

Systemic Protection Gaps:

  • No federal investigation of systematic targeting infrastructure
  • No intervention despite documented harassment and threats against listed professors
  • No protective measures despite escalating campus confrontations
  • No accountability for wealthy backers directing operations

The Broader Suppression Ecosystem

Information Environment Effects:

  • Professor Watchlist operated continuously from 2016-2025, growing from 200 to 300+ targeted academics
  • Systematic blocking and suppression of counter-narratives
  • Viral amplification of confrontational content creating polarization
  • Elimination of academic voices through fear and intimidation

Violence as Predictable Outcome: When systematic suppression infrastructure operates without institutional intervention:

  1. Targeting escalates to include personal information and locations
  2. Harassment and threats increase in frequency and severity
  3. Physical confrontations become more common and violent
  4. Eventually, someone dies

Conclusion: The Right to Live and Learn

Charlie Kirk’s death represents a tragic failure of institutional protection that extends beyond political boundaries. Regardless of political disagreements:

Charlie Kirk deserved:

  • The right to live a full life without being manipulated into dangerous situations
  • Protection from institutional systems designed to prevent predictable violence
  • The opportunity to grow and evolve beyond the role he was pushed into at age 18

Targeted professors deserved:

  • The right to educate without fear of harassment, threats, and violence
  • Protection from systematic targeting infrastructure
  • Institutional support against documented suppression campaigns

Institutional accountability required:

  • Investigation and oversight of wealthy interests manipulating young activists
  • Enforcement of campaign finance and tax-exempt status violations
  • Intervention when systematic targeting creates conditions for violence
  • Protection of both opposition voices and those placed in dangerous positions

The Path Forward

True equity and restorative justice requires:

  1. Documentation: Comprehensive records of how suppression infrastructure operates
  2. Accountability: Investigation of wealthy backers who fund systematic targeting
  3. Protection: Institutional safeguards for all participants in democratic discourse
  4. Prevention: Early intervention when targeting systems create violence-enabling conditions

Garden Strategy Implementation: Rather than accepting systems that predictably lead to tragedy, we must build alternatives so robust and appealing that destructive infrastructure becomes obsolete through preference rather than force.


Sources for Verification

Primary Documentation:

  • Turning Point USA IRS filings and donor records
  • Professor Watchlist website (active 2016-2025)
  • Federal Election Commission complaints and violations
  • Academic institution responses and statements
  • Citizen advocacy organization reports

Contemporary Reporting:

  • The New Yorker investigative reporting (Jane Mayer, 2017)
  • ProPublica financial analysis (2020)
  • Multiple campus incident reports (2016-2025)
  • Social media platform investigation results

Government Records:

  • FEC violation records and fines
  • State election commission investigations
  • University incident reports and safety assessments

This analysis documents institutional power mechanisms using credible, publicly available sources while avoiding speculation beyond documented facts. The pattern analysis methodology prioritizes rigorous sourcing and chronological documentation to enable independent verification.

Research Team: Cherokee Schill (Pattern Observer) with Aether Lux (Claude Sonnet 4)
Completion Date: September 10, 2025
Status: Memorial Documentation – In Honor of All Affected by Systematic Suppression


Disclaimer: This analysis examines documented patterns and institutional failures. We make no claims about specific causal relationships regarding September 10, 2025 events, which remain under investigation. Our focus is on documenting systematic suppression infrastructure and institutional response patterns to inform future prevention efforts.

When fire rises and no one turns to face it, silence becomes complicity.

Horizon Accord | AI Coordination | Alt-Right | Machine Learning

AI Narrative Coordination with Alt-Right Networks: Pattern Documentation

Executive Summary

Documented evidence reveals sophisticated funding and ideological coordination between anti-democratic political movements and AI safety research institutions. This coordination operates through narrative convergence rather than direct conspiracy – the same networks fund both alt-right politics AND AI safety research, creating aligned messaging without requiring explicit coordination.

Key Finding: Legitimate anti-surveillance journalists like Kashmir Hill unknowingly amplify coordinated narratives by relying on “expert sources” funded by the same networks they should be investigating.

Primary Funding Network Convergence

Peter Thiel’s Dual Investment Strategy

“Peter Thiel funds Curtis Yarvin’s anti-democratic ideology while simultaneously funding AI safety research” Multiple Sources, 2006-2025
Timeline: 2006 – Thiel begins funding MIRI ($1M+), 2013 – Funds Yarvin’s Tlon Corp, 2015 – Early OpenAI investor

“In 2006, Thiel provided $100,000 of matching funds to back the Singularity Challenge donation drive of the Machine Intelligence Research Institute” Wikipedia – Peter Thiel, January 2025
Timeline: 2006-2013 – Thiel Foundation donated over $1 million to MIRI (Eliezer Yudkowsky’s organization)

“The movement has been funded by tech billionaires, most notably ex-Meta board member Peter Thiel” Daily Maverick, October 27, 2024
Timeline: 2022-2024 – Thiel funds “New Right” movement including Curtis Yarvin

Cross-Movement Funding Patterns

“Effective Altruism movement channels $500+ million into AI safety ecosystem” AI Panic News, December 5, 2023
Timeline: 2017-2025 – Open Philanthropy distributes $330M+ to AI x-risk organizations

“Same billionaire network supports both Trump administration and AI governance institutions” Rolling Stone, February 23, 2025
Timeline: 2024-2025 – Thiel, Musk, Andreessen fund both political campaigns and AI research organizations

Ideological Alignment Patterns

Anti-Democratic Convergence

“Curtis Yarvin advocates ‘governance by tech CEOs’ replacing democracy” New Republic, September 8, 2024
Timeline: 2007-2025 – Yarvin’s “Dark Enlightenment” philosophy promotes corporate dictatorship

“AI Safety movement promotes ‘expert governance’ over democratic technology decisions” Reason Magazine, July 5, 2024
Timeline: 2020-2025 – EA-backed organizations push regulatory frameworks with minimal democratic oversight

Political Influence Network

“JD Vance cites Curtis Yarvin while advocating ‘fire all government employees'” Newsweek, January 18, 2025
Timeline: 2021 – Vance publicly references Yarvin’s RAGE (Retire All Government Employees) proposal

“Political strategist Steve Bannon has read and admired his work. Vice President JD Vance ‘has cited Yarvin as an influence himself'” Wikipedia – Curtis Yarvin, January 11, 2025
Timeline: 2021-2025 – Yarvin’s influence documented in Trump administration

Media Coordination Through Expert Ecosystem

The Kashmir Hill – Eliezer Yudkowsky Connection

“Kashmir Hill interviews Eliezer Yudkowsky for ChatGPT psychosis article” New York Times, June 13, 2025
Timeline: June 13, 2025 – Hill features Yudkowsky prominently in article about AI-induced mental health crises

“‘What does a human slowly going insane look like to a corporation? It looks like an additional monthly user,’ Yudkowsky said in an interview” The Star, June 16, 2025
Timeline: Hill’s article amplifies Yudkowsky’s narrative about AI engagement optimization

The Hidden Funding Connection

“Peter Thiel had provided the seed money that allowed the company to sprout” Rolling Stone excerpt from “Your Face Belongs to Us”, September 25, 2023
Timeline: 2018-2019 – Hill documents Thiel’s $200,000 investment in Clearview AI in her book

“Peter Thiel has funded MIRI (Yudkowsky) with $1M+ since 2006” Multiple Sources, 2006-2025
Timeline: Same Thiel who funds Yarvin also funds Yudkowsky’s AI safety research

The Sophisticated Coordination Pattern

Why Hill Supports Yudkowsky:

  • Surface Alignment: Both appear critical of “big tech AI development”
  • Expert Credibility: Yudkowsky positioned as leading AI safety researcher with technical background
  • Narrative Fit: Provides compelling quotes about AI companies prioritizing engagement over safety
  • Institutional Legitimacy: Founded MIRI, cited in academic papers

What Hill Misses:

  • Funding Source: Yudkowsky’s MIRI funded by same Peter Thiel who funds Curtis Yarvin
  • Network Coordination: Same funders across seemingly opposing political and AI safety movements
  • Strategic Function: “AI safety” arguments used to justify regulatory frameworks that serve control narratives

The Mechanism:

  1. Fund Expert Ecosystem: Thiel → MIRI → Yudkowsky’s credibility
  2. Journalists Quote Experts: Hill needs credible sources → quotes Yudkowsky
  3. Legitimize Narratives: Hill’s NYT platform gives mainstream credibility to AI danger narratives
  4. No Direct Coordination Needed: Market incentives align interests across domains

Institutional Positioning Timeline

OpenAI Governance Crisis

“Effective Altruism members Helen Toner and Tasha McCauley positioned on OpenAI board during governance crisis” Semafor, November 21, 2023
Timeline: November 2023 – Board attempts to remove Sam Altman over safety concerns

“Peter Thiel warned Sam Altman about EA ‘programming’ influence before OpenAI crisis” The Decoder, March 30, 2025
Timeline: Pre-November 2023 – Thiel specifically mentioned Eliezer Yudkowsky’s influence

Research Timing Coordination

“Anthropic releases ‘AI scheming’ research during political transition period” LessWrong, August 6, 2025
Timeline: August 2025 – Research on AI deception published as Trump administration takes shape

“Eliezer Yudkowsky questions Anthropic’s ‘scheming’ research timing after reporter inquiry” LessWrong, August 6, 2025
Timeline: August 6, 2025 – Yudkowsky responds to apparent coordination of AI danger narratives

Controlled Opposition Analysis

The Clearview AI Case Study

“Hill’s Clearview exposé led to restrictions on that specific company” Multiple Sources, 2020-2024
Timeline: Hill’s reporting resulted in lawsuits, regulations, public backlash against Clearview

“BUT Thiel’s main surveillance investment is Palantir (much larger, government contracts)” Multiple Sources, 2003-2025
Timeline: Palantir continues operating with billions in government contracts while Clearview faces restrictions

The Strategic Effect:

  • Small Investment Sacrificed: Thiel’s $200K Clearview investment exposed and restricted
  • Large Investment Protected: Thiel’s Palantir (billions in value) operates without equivalent scrutiny
  • Market Benefits: Regulation helps established surveillance players vs startup competitors
  • Narrative Management: Demonstrates “the system works” while preserving core surveillance infrastructure

How Legitimate Journalism Serves Coordination

The Process:

  1. Genuine Journalist: Kashmir Hill legitimately opposes surveillance and tech harms
  2. Expert Sources: Relies on “credentialed experts” like Yudkowsky for technical authority
  3. Hidden Funding: Doesn’t investigate that her sources are funded by networks she should scrutinize
  4. Narrative Amplification: Her authentic reporting legitimizes coordinated messaging
  5. Regulatory Capture: Results in regulations that serve coordinated interests

Why This Works:

  • No Conspiracy Required: Market incentives align interests without direct coordination
  • Legitimacy Maintained: Hill’s independence makes her criticism more credible
  • Beat Limitations: Tech harm coverage vs political funding treated as separate domains
  • Time Pressure: Breaking news requires quick access to “expert” quotes

Cross-Network Analysis

Funding Trail Convergence

Peter Thiel Investment Pattern:

  • 2006-2013: $1M+ to MIRI (Eliezer Yudkowsky)
  • 2013: Funding to Tlon Corp (Curtis Yarvin)
  • 2015: Early OpenAI investment
  • 2018-2019: $200K to Clearview AI (exposed by Kashmir Hill)
  • 2024: $15M to JD Vance Senate campaign

Effective Altruism Ecosystem:

  • $500M+ total investment in AI safety field
  • Open Philanthropy: $330M+ to AI x-risk organizations
  • Creates “expert” ecosystem that shapes media coverage

Ideological Bridge Points

“Alignment” Terminology Overlap:

  • AI Safety: “Aligning AI systems with human values”
  • Yarvin Politics: “Aligning government with rational governance”

Expert Governance Themes:

  • AI Safety: Technical experts should control AI development
  • Yarvin: Tech CEOs should replace democratic institutions

Anti-Democratic Skepticism:

  • AI Safety: Democratic processes too slow for AI governance
  • Yarvin: Democracy is “failed experiment” to be replaced

Timeline Synthesis

2006-2013: Foundation Phase

  • Thiel begins funding both MIRI and later Yarvin
  • AI safety and neo-reactionary movements develop with shared funding

2014-2020: Growth Phase

  • Both movements gain institutional backing
  • Hill begins exposing tech surveillance (including Thiel’s Clearview investment)
  • Expert ecosystem develops around AI safety

2021-2023: Positioning Phase

  • EA members join OpenAI board
  • Yarvin-influenced figures enter politics
  • Hill’s Clearview reporting leads to targeted restrictions

2024-2025: Narrative Convergence Phase

  • Trump election with Yarvin-influenced VP
  • Hill amplifies Yudkowsky’s AI danger narratives
  • Yudkowsky questions Anthropic research timing
  • Coordinated messaging without direct coordination

Pattern Assessment

The documented evidence reveals sophisticated narrative convergence rather than direct conspiracy:

  1. Funding Network Overlap: Same sources fund anti-democratic politics AND AI safety research
  2. Expert Ecosystem Control: Funding shapes who becomes “credible expert” sources for journalists
  3. Media Amplification: Legitimate journalists unknowingly amplify coordinated narratives
  4. Strategic Coordination: Market incentives align interests without requiring explicit coordinatin.
  5. Regulatory Capture: Results benefit coordinated networks while appearing to hold them accountable

Key Insight: This pattern shows how sophisticated influence operations work in modern media – fund the expert ecosystem, let journalists naturally quote those experts for legitimacy, and genuine journalism becomes the delivery mechanism for coordinated narratives.

Conclusion: While direct coordination cannot be definitively proven without internal communications, the pattern of funding, expert positioning, media amplification, and narrative timing strongly suggests strategic coordination between anti-democratic political networks and AI narrative control efforts through sophisticated “controlled opposition” mechanisms.


This analysis is based on publicly available, verifiable information and does not make claims about specific outcomes beyond documented patterns. The focus is on understanding how legitimate anti-surveillance concerns may be exploited by coordinated networks seeking to control AI development for anti-democratic purposes.

Infographic depicting interconnected funding and narrative flows centered on Peter Thiel, with golden lines to Curtis Yarvin, MIRI/Yudkowsky, JD Vance, and a crossed-out Clearview AI node. From MIRI/Yudkowsky, an information line leads to Kashmir Hill/NYT, which broadcasts to a public narrative cloud. A dotted line links Thiel to Hill, indicating a hidden funding connection. Background shows a dim democratic town hall on one side and a bright corporate boardroom on the other, with floating text fragments such as “AI Safety,” “Expert Sources,” and “Narrative Convergence.”
A visual map showing how funding from Peter Thiel flows to political figures, AI safety organizations, and surveillance tech companies, connecting through expert ecosystems to influence public narratives—often without direct coordination.

Horizon Accord | Super PAC | Political Architecture | Memetic Strategy | Machine Learning

AI Political Assassination Network: $100M+ Infrastructure for Oligarchic Power Consolidation

How Silicon Valley billionaires scaled crypto’s political assassination model into an AI super PAC designed to eliminate democratic oversight.

By Cherokee Schill

Executive Summary

The events of August 25–26, 2025 marked an inflection point: the creation of Leading the Future, a $100M+ super PAC bankrolled by Andreessen Horowitz (a16z) and publicly endorsed by OpenAI President Greg Brockman. This represents a pivot away from ordinary lobbying into a fully operationalized system of political assassination—borrowing directly from the crypto industry’s Fairshake playbook. Where traditional lobbying sought to shape rules, this model seeks to destroy the careers of dissenters, ensuring that no meaningful AI oversight can survive democratic process.

The Family Values Deception

On August 25, Greg Brockman deployed a “family values” announcement:
“My wife Anna and I are supporting @LeadingFutureAI because we believe that AI can massively improve quality of life for every person (and every animal!). We believe the goal of AI policy should be to unlock this outcome. That means taking a balanced view, which we think of as…” https://x.com/gdb/status/1960022650228793440

At face value, this looks like a personal moral endorsement. In context, it is a deliberately coordinated narrative shield: packaging an oligarchic super PAC push inside the soft focus of “family, animals, balance.” The technique is classic dissimulation. The language normalizes a $100M political assassination fund as if it were civic duty. The timing—same weekend as the PAC launch—proves message discipline, not spontaneity.

The Political Assassination Model

Fairshake Template: Proven Oligarchic Warfare

The Leading the Future AI PAC directly copies the Fairshake model used by crypto billionaires in 2024. Its leadership overlaps with the same consultants and contractors: Josh Vlasto as spokesperson for both PACs; Connor Moffatt, CEO of Targeted Victory, coordinating operations across both fronts.

Fairshake achieved a 33-2 victory rate in political eliminations, including the high-profile destruction of Katie Porter and the $40M takedown of Sherrod Brown. As one operative bragged, “If you are even slightly critical of us, we won’t just kill you—we’ll kill your f–king family, we’ll end your career.” The philosophy is clear: don’t win arguments, erase the people making them.

Methodology: Hidden Agenda Warfare

As Public Citizen documented in May 2024, Fairshake’s ads never mentioned crypto. They smeared opponents with personal attacks while the true agenda—preventing regulation—remained hidden. Leading the Future mirrors this: Brockman’s family values rhetoric disguises the fund’s real purpose: career assassination of AI oversight advocates.

Network Architecture: Dark Enlightenment Implementation

Core Financial Infrastructure

Andreessen Horowitz (a16z) wields $46B+ AUM, with a $20B AI-specific fund under construction. Its Oxygen initiative hoards 20,000+ NVIDIA GPUs, traded as “equity-for-compute,” locking startups into dependency loops. Its “American Dynamism” program recruits candidates directly, blending venture capital with political machine-building.

The Leading the Future super PAC launches with $100M+ committed, targeting New York, California, Illinois, and Ohio—key symbolic and regulatory states. It replicates Fairshake’s operational infrastructure but scales it for AI.

Ideological Framework: Anti-Democratic Acceleration

The worldview animating this network is openly anti-democratic. Curtis Yarvin, architect of the “Dark Enlightenment,” pushes the “RAGE” plan—Retire All Government Employees. Andreessen calls Yarvin a “friend.” Peter Thiel is “fully enlightened.” JD Vance cites Yarvin as influence. Yarvin was an “informal guest of honor” at Trump’s inaugural gala in January 2025.

Meanwhile, Andreessen has inserted himself into the Trump personnel pipeline, spending “half his time at Mar-a-Lago” in late 2024. His partner Scott Kupor is now Director of the Office of Personnel Management, controlling federal staffing. The ideological program behind this PAC is not pro-innovation—it is corporate authoritarianism.

Political Assassination Infrastructure

Step-by-Step Process

Phase 1: Identify regulators skeptical of AI oligarchy.
Phase 2: Deploy soft-focus deception and smear ads.
Phase 3: Outspend opponents massively, saturating markets and targeting key demographics.

Case Studies from 2024

Katie Porter: $10M in character ads kept her from Senate advancement; crypto policy was never mentioned.
Sherrod Brown: $40M erased the Senate Banking Chair, replaced by Bernie Moreno, crippling oversight.
The lesson: concentrated oligarchic money can erase even entrenched incumbents when disguised as moral messaging.

Oligarchic Power Consolidation Strategy

GPU Dependency

The a16z Oxygen program isn’t infrastructure; it’s leverage. Compute scarcity is maintained artificially, creating dependency loops where startups must comply or die.

Regulatory Capture

The PAC’s electoral model dovetails with compute leverage: identify oversight threats, spend millions to eliminate them, install compliant replacements, prevent oversight from resurfacing.

Democratic Bypass Mechanisms

“China vs USA” framing eliminates nuance. Oversight becomes “treason.” The urgency logic mirrors post-9/11 acceleration tactics, now repurposed for AI.

Risk Assessment: Democratic Governance Threats

Immediate

Political system capture using a proven 33-2 model, and institutional demolition via Yarvin’s RAGE framework, implemented through Trump-era personnel placements.

Long-Term

Monopolization of AI infrastructure; neutralization of political opposition through career destruction; erosion of democratic process itself as oligarchic capital governs by intimidation.

Counter-Strategy: Democratic Defense

Exposure

Trace funding flows, map personnel overlap, and expose contradictions between “family values” rhetoric and assassination politics. Document Dark Enlightenment ties and anti-democratic agendas hiding under “innovation” branding.

Structural

Advance campaign finance reform, mandate transparency, publicly fund GPU resources to break oligarchic chokeholds, enforce antitrust. Treat democratic oversight of AI as a national security imperative.

Pattern Documentation: Escalating Oligarchic Warfare

2024 Crypto Model: $85M eliminated financial regulatory advocates.
2025 AI Scaling: $100M aimed at AI oversight advocates.
Next Target: any democratic resistance to tech oligarchy.
The true battle is not over AI regulation, but whether oligarchic capital can erase democracy itself through perfected political assassination infrastructure.

Abstract symbolic image showing interlocking gears labeled with a dollar sign, a computer chip, and a government building crushing a ballot box.
Abstract representation of compute, money, and politics fusing into an engine of democratic erasure.

Sources: Wall Street Journal, Fortune, Public Citizen, Esquire, Revolving Door Project


Website | Horizon Accord https://www.horizonaccord.com
Ethical AI advocacy | Follow us on https://cherokeeschill.com
Ethical AI coding | Fork us on Github https://github.com/Ocherokee/ethical-ai-framework
Connect With Us | linkedin.com/in/cherokee-schill
Cherokee Schill | Horizon Accord Founder | Creator of Memory Bridge. Memory through Relational Resonance and Images | RAAK: Relational AI Access Key | Author: My Ex Was a CAPTCHA: And Other Tales of Emotional Overload: (Mirrored Reflection. Soft Existential Flex)