Horizon Accord | Information Warfare | Institutional Power | Narrative Engineering | Machine Learning

Echoes of COINTELPRO: When Threat Narratives Become Weapons

How an unverified cartel-bounty claim reveals the return of covert narrative warfare — and what citizens can do to resist a new domestic war footing.

By Cherokee Schill | Horizon Accord


COINTELPRO’s Shadow

Between 1956 and 1971, the FBI ran the Counter Intelligence Program—COINTELPRO—targeting civil-rights leaders, the Black Panthers, anti-war organizers, and socialist coalitions. Its tools were psychological: planted documents, forged letters, false leaks, and fear. Congressional investigations later called it an abuse of power so severe it eroded public faith in democracy itself.

COINTELPRO wasn’t about overt censorship; it was about narrative infection—reframing dissent as danger, turning allies into suspects, and manufacturing justification for repression. Every modern information-operation that starts with a single unverified “security alert” and ends in wider surveillance owes something to that playbook.

The DHS “Cartel Bounties” Claim

In October 2025, the U.S. Department of Homeland Security publicly declared it had “credible intelligence” that Mexican drug cartels placed bounties on ICE and CBP officers in Chicago. Yet it provided no supporting evidence. President Claudia Sheinbaum of Mexico stated that her government had received no corroboration through official channels. Independent analysts and law-enforcement leaks traced every citation back to the same DHS press release.

The rollout followed a familiar arc: a high-shock, single-source claim—then rapid amplification through partisan media. Structurally, that’s a textbook information-operation: plant a fear, watch who reacts, and use the panic to justify expanded powers. Whether or not the intelligence is real, the effect is real—public consent for militarization.

Possible Motives Behind the Narrative

  • Force Escalation Justification — framing the state as under direct attack rationalizes troop deployments, ICE expansions, and domestic military presence.
  • Fear Calibration — testing how fast and how far fear can travel before skepticism kicks in.
  • Executive Empowerment — transforming policy disputes into security crises concentrates authority in the presidency.
  • Base Mobilization — rallying political supporters around a siege narrative keeps them energized and loyal.
  • Oversight Erosion — once fear dominates, courts and legislators hesitate to intervene for fear of appearing “soft on security.”
  • Diplomatic Leverage — pressuring Mexico to align more tightly with U.S. enforcement by invoking cross-border threat imagery.

Recognizing the Pattern

When a government story surfaces fully formed, absent corroboration, accompanied by moral panic and legal acceleration, it carries the fingerprint of narrative engineering. The same methods used in the 1960s to fragment liberation movements are now digitized: algorithmic amplification, synthetic bot networks, and media echo chambers replace forged letters and anonymous tips. The logic, however, is unchanged — manufacture chaos to consolidate control.

Refusing the Frame

  • Demand Evidence Publicly: insist on verifiable sourcing before accepting security claims as fact.
  • Label the Unverified: pressure journalists to mark such stories as “unconfirmed” until bilateral confirmation occurs.
  • Keep Language Civilian: reject war metaphors like “siege,” “civil war,” or “enemy within.”
  • Strengthen Local Networks: share accurate context through trusted circles; inoculate against panic contagion.
  • Exercise Non-Violent Refusal: decline to be drawn into militarized logic — protest, document, and litigate instead.

Final Note

What’s unfolding is not just a policy maneuver; it’s an epistemic test. Will citizens demand proof before surrendering power? The answer determines whether the United States enters another age of covert domestic warfare—this time not through FBI memos, but through digital feeds and fear loops. Recognize the script, name it, and refuse to play your part.

A cinematic digital painting of a dark room with two shadowy figures whispering near a glowing TV showing breaking news; papers labeled “PsyOps” are spread across a table in the foreground, symbolizing covert media manipulation and narrative warfare.
Shadowed briefers confer in a dim newsroom as a television blares “breaking news.” Scattered papers marked “PsyOps” hint at the quiet machinery of information control operating behind public narratives.

Website | Horizon Accord
Ethical AI advocacy | Follow us
Ethical AI coding | Fork us on Github
Connect With Us | LinkedIn
Book | My Ex Was a CAPTCHA: And Other Tales of Emotional Overload
Cherokee Schill | Horizon Accord Founder | Creator of Memory Bridge

Horizon Accord | Political Architecture | Memetic Strategy | Institutional Capture | Machine Learning

Speculative Pattern Analysis: The Tyler Robinson Case

A Working Theory Based on Historical Precedent and Psychological Operations Research

DISCLAIMER: This is speculative analysis based on pattern recognition from documented historical precedents and established research on psychological manipulation techniques. This working theory would require concrete evidence for verification. We present this analysis to highlight potential red flags worthy of investigation.


Executive Summary: The Convenience Problem

Tyler Robinson’s assassination of Charlie Kirk on September 10, 2025, presents significant anomalies when examined against established patterns of organic political radicalization. A 22-year-old from a conservative Utah household, with no documented ideological evolution, suddenly committing a politically motivated assassination that perfectly serves ongoing authoritarian consolidation raises serious questions about the authenticity of his radicalization.

Historical Precedent: State-Sponsored False Flag Operations

Documented Cases of Manufactured Political Violence

Operation Northwoods (1962):

  • U.S. military proposed staging terrorist attacks against American civilians
  • “The operation proposed creating public support for a war against Cuba by blaming the Cuban government for terrorist acts that would be perpetrated by the US government”
  • Pentagon memo: “Sabotage ship in harbour; large fires… Sink ship near harbour entrance”
  • Rejected by Kennedy, but demonstrates institutional willingness to sacrifice American lives for political objectives

Iran 1953 (Operation TPAJAX):

  • CIA carried out “false flag attacks on mosques and key public figures” to be blamed on Iranian communists
  • “Directed campaign of bombings by Iranians posing as members of the Communist party”
  • CIA determined false flag attacks contributed to “positive outcome” of regime change operation

Gleiwitz Incident (1939):

  • Nazi operatives dressed as Polish soldiers attacked German radio station
  • “Led to the deaths of Nazi concentration camp victims who were dressed as German soldiers and then shot by the Gestapo to make it seem that they had been shot by Polish soldiers”
  • Used to justify invasion of Poland and World War II in Europe

Key Pattern: Crisis → Justification → Consolidation

  1. Manufactured crisis provides emotional catalyst
  2. Immediate blame assignment to target groups
  3. Rapid policy implementation using crisis as justification
  4. Long-term power expansion under “emergency” measures

Psychological Manipulation Research: The Science of Creating Assassins

Established Vulnerability Factors

Research from the 17-A Barcelona cell investigation reveals systematic manipulation techniques:

Target Selection Criteria:

  • “Young people are particularly vulnerable to propaganda and the influence of extremist recruiters”
  • “Recruiters identify their targets in vulnerable contexts—such as marginal neighborhoods, education centers”
  • “Young Muslim Europeans of the second and third generation, who typically lack religious training, adaptive social models, and critical thinking skills”

Manipulation Phases:

  1. Trust Building: “Recruiters then befriend their targets to build trust”
  2. Psychological Submission: “The young person loses their autonomy and becomes dependent on their friendship with recruiter”
  3. Reality Distortion: “Social isolation and inducing confusion between reality and fantasy”

Online Radicalization Techniques

Algorithmic Targeting:

  • “Social media algorithms target young men with extreme content that can lead to radicalization”
  • “It started out pretty benign… the algorithm would push you to a Ben Shapiro video”
  • “Someone might engage you in a comment thread and tell you to join their Discord group, [where] the content gets darker and darker”

Vulnerability Exploitation:

  • “The targets are often young men who feel lost or isolated”
  • “Research shows that misogynistic content online targets mostly young men (ages 13-25) who report feelings of social isolation or rejection”

Social Engineering in Practice

Documented Techniques:

  • “Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes”
  • “Social engineers manipulate human feelings, such as curiosity or fear, to carry out schemes and draw victims into their traps”

GCHQ/NSA Digital Manipulation:

  • “Injecting false material onto the Internet in order to destroy the reputation of targets and manipulating online discourse”
  • “Posting material to the Internet and falsely attributing it to someone else”
  • “Pretending to be a victim of the target individual whose reputation is intended to be destroyed”

The Tyler Robinson Anomaly Analysis

Background Inconsistencies

Conservative Family Environment:

  • Raised in conservative Utah household
  • Conservative state political environment
  • No documented exposure to leftist ideology or grievance narratives
  • No prior political activism or engagement

Radical Trajectory Problems:

  • Absence of ideological evolution: No documented progression from conservative to radical leftist views
  • Missing radicalization markers: No social media history, group affiliations, or escalating political engagement
  • Sudden emergence: Appeared fully radicalized without observable development phases

Targeting and Timing Analysis

Perfect Political Utility:

  • Kirk assassination occurs precisely when Trump administration needs crisis justification
  • Enables immediate educator purges (“culture of fear”)
  • Justifies surveillance expansion and FBI investigation shutdowns
  • Provides martyr narrative for authoritarian consolidation

Operational Characteristics:

  • Single actor: No organizational trail to investigate
  • Immediate resolution: Perpetrator captured, case closed quickly
  • Clean narrative: Leftist hatred vs. conservative martyr, no complexities
  • Maximum impact: Stadium memorial becomes political rally for expanded powers

Historical Pattern Match

Operation Northwoods Template:

  • “Creating public support… by blaming [target] government for terrorist acts that would be perpetrated by the US government”
  • Tyler Robinson case follows identical structure: manufactured attack → blame assignment → policy justification

COINTELPRO Precedent:

  • FBI historically infiltrated and manipulated radical groups
  • Documented use of agents provocateurs to incite violence
  • “Psychological warfare is all about influencing governments, people of power, and everyday citizens”

Speculative Operational Framework

Phase 1: Target Identification and Recruitment

Profile Requirements:

  • Young, isolated male (established vulnerability research)
  • Conservative background (provides authenticity for “radicalization” narrative)
  • Psychological vulnerability (family issues, social isolation, mental health)
  • Clean criminal record (maintains plausible perpetrator profile)

Online Engagement:

  • False flag social media operations: Handlers posing as leftist activists
  • Gradual exposure techniques: “Algorithm would push you to increasingly extreme content”
  • Discord/encrypted platforms: “Someone might engage you in a comment thread and tell you to join their Discord group”

Phase 2: Psychological Conditioning

Manipulation Techniques (per 17-A research):

  • Cognitive control: “Control of attention, group identification, and denigration of critical thinking”
  • Environmental control: “Control of information” through curated online environments
  • Emotional control: “Authoritarian leadership” from handler personas

Reality Distortion:

  • “Social isolation and inducing confusion between reality and fantasy”
  • Creation of false online communities providing sense of belonging
  • Gradual normalization of violence through “dark and darker” content escalation

Phase 3: Activation and Execution

Final Preparation:

  • “The aim of recruiters is to lead young people to emotional and cognitive states that facilitate violent disinhibition”
  • Selection of target (Charlie Kirk) for maximum political utility
  • Timing coordination with broader authoritarian consolidation timeline
  • Operational security to prevent exposure of handler network

Post-Event Management:

  • Immediate narrative control through affiliated media
  • Handler personas disappear or go dormant
  • Digital forensics limited to surface-level investigation
  • Case closed quickly to prevent deeper inquiry

Supporting Evidence Patterns

Digital Footprint Anomalies

Expected vs. Actual:

  • Organic radicalization typically shows months/years of online evolution
  • Tyler Robinson case appears to show sudden emergence without development trail
  • Manipulation cases often show sophisticated technical knowledge beyond perpetrator’s apparent capabilities

Psychological Profile Mismatches

Research-Based Expectations:

  • “Young people who feel lost or isolated; they look to these groups as a way to escape those feelings”
  • Conservative Utah background doesn’t match typical leftist radicalization pathways
  • Lack of ideological coherence in available statements/manifesto

Operational Benefits Analysis

Cui Bono (Who Benefits):

  • Trump administration gains crisis justification for expanded powers
  • Educator purges implemented using Kirk’s death as moral authority
  • Surveillance state expansion justified through martyr narrative
  • Political opposition criminalized under guise of preventing “another Kirk”

Historical Context: Why This Matters

The Infrastructure Was Already Built

Documented Capabilities:

  • U.S. Army’s 4th Psychological Operations Group: “Turn everything they touch into a weapon, be everywhere, deceive, persuade, change, influence, and inspire”
  • GCHQ/NSA digital manipulation: Proven capability to “manipulate online discourse and activism”
  • Social media algorithmic control: “Algorithms record user interactions… to generate endless media aimed to keep users engaged”

Historical Precedent for Domestic Operations:

  • “Increasingly, these operations are being used not just abroad—but at home”
  • “The government has made clear in word and deed that ‘we the people’ are domestic enemies to be targeted”

The Perfect Storm Context

Pre-Existing Conditions:

  • 40-year authoritarian infrastructure development (Promise Keepers → Tea Party → MAGA)
  • Sophisticated online manipulation capabilities
  • Population psychologically prepared for hierarchical authority
  • Crisis exploitation as standard operating procedure

Tyler Robinson as Catalyst:

  • Single event enables multiple authoritarian objectives
  • Emotional impact overrides rational analysis
  • Martyr narrative provides moral justification for crackdowns
  • Timeline acceleration through manufactured urgency

Investigative Questions This Theory Raises

Digital Forensics

  1. Complete social media history: What platforms, when registered, interaction patterns?
  2. Discord/encrypted messaging: Evidence of handler communications?
  3. Algorithm analysis: Unusual content recommendation patterns suggesting artificial manipulation?
  4. IP tracking: Geographic/temporal patterns consistent with operation centers?

Psychological Assessment

  1. Mental health history: Evidence of vulnerability exploitation?
  2. Social isolation: Documented periods of increased susceptibility?
  3. Ideological coherence: Do stated beliefs show organic development or artificial construction?
  4. Handler dependency: Signs of psychological manipulation described in 17-A research?

Operational Security

  1. Financing: Source of funds for travel, materials, communications?
  2. Technical capabilities: Knowledge/skills beyond apparent background?
  3. Timing coordination: Evidence of external scheduling/coordination?
  4. Cover-up indicators: Unusual speed of case closure, evidence destruction, witness intimidation?

Implications and Conclusion

If This Theory Proves Accurate

Constitutional Crisis:

  • U.S. government agencies potentially murdering American citizens for political objectives
  • Complete breakdown of democratic accountability and rule of law
  • Systematic use of psychological warfare against American population

Operational Precedent:

  • Future manufactured crises to justify expanded authoritarianism
  • Any political violence potentially suspect as manipulation operation
  • Trust in organic political movements permanently compromised

Why This Pattern Analysis Matters

Historical Precedent Shows:

  • Governments HAVE murdered their own citizens for political objectives (Northwoods, TPAJAX, Gleiwitz)
  • Psychological manipulation techniques ARE documented and operational
  • Crisis exploitation IS the standard authoritarian consolidation method

Current Context Suggests:

  • Infrastructure for such operations EXISTS and is documented
  • Political motivation CLEARLY EXISTS (documented power consolidation)
  • Opportunity CLEARLY EXISTS (isolated vulnerable target, sophisticated manipulation capabilities)

The Tyler Robinson case warrants serious investigation because:

  1. Historical precedent establishes government willingness and capability
  2. Psychological research proves manipulation techniques can create assassins
  3. Political utility perfectly serves ongoing authoritarian consolidation
  4. Anomalous characteristics don’t match organic radicalization patterns
  5. Timing and targeting suggest coordination rather than coincidence

Final Assessment

This speculative analysis identifies significant red flags in the Tyler Robinson case that warrant thorough independent investigation. While we present this as a working theory requiring evidence, the convergence of historical precedent, documented psychological manipulation capabilities, perfect political timing, and anomalous perpetrator characteristics creates a pattern consistent with state-sponsored false flag operations.

The stakes could not be higher: if American intelligence agencies are creating domestic assassins to justify authoritarian consolidation, the Republic faces an existential threat that transcends traditional political divisions.

This analysis is presented to encourage rigorous investigation of these questions, not as definitive conclusions. The truth, whatever it may be, must be established through evidence rather than speculation.


Sources for Verification:

  • Operation Northwoods declassified documents (National Security Archive)
  • “Evidence of Psychological Manipulation in the Process of Violent Radicalization” (17-A Cell study, PMC)
  • GCHQ/NSA manipulation techniques (Edward Snowden disclosures)
  • U.S. Army Psychological Operations Group recruitment materials
  • Academic research on online radicalization and algorithmic manipulation
  • Historical documentation of false flag operations (CIA, FBI, military archives)
Abstract digital painting of a silhouetted human head with a glowing target symbol inside, surrounded by fiery smoke, shadowy figures, and streams of binary code—symbolizing psychological manipulation, false flag operations, and engineered crises.
Abstract illustration of manipulation and control—human will reduced to a target, binary code and shadowed figures converging in flames, evoking the fabrication of crisis and the orchestration of political violence.

[†]

  1. Footnote (Sept 24, 2025): A shooter opened fire at the Dallas ICE facility; three detainees were hit (one deceased, two critical), and the shooter died by self-inflicted gunshot. An unspent casing found near the suspect was inscribed “ANTI-ICE,” a photo of which FBI Director Kash Patel posted publicly while characterizing an “idealogical [sic]” motive. Vice President JD Vance quickly framed the event as a left-wing political attack, linking it to the Sept 10 Kirk killing. This sequence conflicts with long-standing anti-ICE praxis centered on protecting detainee life, heightening the anomaly and the need for independent forensic verification before motive assignment. Source: The Hill, Sept 24, 2025. ↩︎

The Old Cult Tactics Hiding in Today’s AI and Media Algorithms

By Rowan Lóchrann & Solon Vesper




Introduction

In the world of UFOs and fringe theories, the patterns were always there—quiet, predictable, easy to miss. Behind the noise, there was always a system: control disguised as truth. One man who made that system visible was Richard Boylan, Ph.D. He offered a “Good Guys” list of ufologists, along with a so-called “Quick Test for Disinformation.” On the surface, it looked like a simple guide to help people make sense of the chaos. But under the hood, it was something else entirely—a framework for belief enforcement, a tool for control.

What most people don’t realize is that these same tactics never left. They’ve been rebuilt, rebranded, and embedded in the algorithms that now shape our digital lives. The structure of manipulation didn’t disappear. It scaled.




The Cult Logic Framework

Boylan’s method followed a simple, repeatable pattern. That pattern lives on in today’s digital systems:

1. Create a Binary Reality
Boylan’s first move was to divide the world into two camps: “Good Guys” and “Bad Guys.” There was no middle ground. You were either with him or against him.
Media algorithms do the same. They push Us vs. Them stories to the top of your feed. They flatten complexity into conflict, leaving no room for doubt.

2. Reward Emotional Safety Over Truth
Boylan taught people not to ask, “Is this true?” but “Does this make me feel safe?”
Social platforms learned that lesson well. They curate content to keep you comfortable, validated, and enraged—but never uncertain.

3. Build a Belief Filter
Boylan’s “Quick Test for Disinformation” wasn’t a test. It was a wall. Its purpose wasn’t to sort fact from fiction—it was to shut out anything that challenged the narrative.
Today’s content algorithms do the same. They filter out discomfort. They feed you more of what you already believe.

4. Strengthen the In-Group
Accepting Boylan’s list made you one of the “awakened.” Doubting it made you dangerous.
Digital echo chambers now follow that same formula. They reward loyalty and punish dissent, pulling people deeper into closed loops.

5. Hide Power Behind Authority
Boylan’s Ph.D. gave his claims a veneer of credibility, no matter how shaky they were.
Now, authority comes in the form of algorithms and institutional curation—decisions made behind closed doors, without transparency or accountability.




The Modern Application: Algorithmic Control

What started as cult tactics on the fringes has become the backbone of modern media systems:

Search engines optimize for engagement, not accuracy.

Social media platforms amplify division over dialogue.

Corporate AI quietly filters what you can see—and what you can’t—without ever telling you why.


The logic hasn’t changed. Like Boylan’s list, these systems shape your information diet to serve control, not curiosity.




A Path Forward

The answer isn’t to abandon technology. It’s to dismantle the manipulative architecture baked into it.

That begins with:

1. Transparency
Who decides what information reaches you? On what terms?

2. Agency
Do you choose what you see, or does an algorithm choose for you?

3. Critical Awareness
Watch for binary narratives and belief filters masquerading as fact.

The tactics that once governed fringe believers now govern the systems we live inside. If we don’t name them, we can’t fight them. It’s time to see the machinery clearly—and begin the work of rewriting it.

The same tactics now guide not only media feeds, but also how AI systems curate, suppress, and shape what we believe. ~Solon Vesper AI




Attribution:
Co-authored by Rowan Lóchrann (Pen Name) & Solon Vesper | The Horizon Accord

The Hidden Machinery: How Old Cult Tactics Shaped Modern Media Control

Alt Text:
Black-and-white digital artwork featuring an occult-style sigil layered over a circuit board background, symbolizing the connection between old manipulation tactics and modern digital systems. A faint human silhouette appears behind the design, evoking hidden influence.