COINTELPRO 2.0: Project Esther, EO 14243, and Palantir

The pattern is familiar, and the escalation is predictable. I warned about this recently, and now it’s unfolding exactly as anticipated.

From my May 22 post:

Just as I anticipated, the blame is being directed at China. Marco Rubio, currently serving in the Trump administration, has previously targeted various leftist organizations for their funding connections to Neville Roy Singham, who has been accused of having ties to the Communist Party of China. These allegations originated from front groups linked to Stratfor, often referred to as the “Shadow CIA,” as well as the State Department and U.S. Intelligence. Additionally, the Network Contagion Research Institute (NCRI) receives backing from the Israel lobby. Recall my previous post about Project Esther, which linked antisemitism to Marxism. Expect a crackdown on leftists and other antiwar activists who are protesting the Gaza war.

On May 28, the Heritage Foundation—architect of Project Esther—officially embraced the narrative linking pro-Palestinian activism to Chinese influence.

The Heritage Foundation’s Project Esther is more than a framework—it’s a blueprint for ideological suppression masquerading as national security policy. By tying anti-Zionism to antisemitism, then layering in foreign influence accusations, the initiative sets the stage for a sweeping crackdown on dissent. Under the guise of national security, any challenge to U.S. policy—whether in opposition to the Gaza war or broader leftist movements—can be framed as a foreign threat. This justification makes mass surveillance not just palatable but necessary.

Enter Palantir—the data engine that makes ideological suppression scalable. While Heritage Foundation shapes the narrative and justification for crackdowns, Palantir provides the technical apparatus to execute them. As I warned in my earlier post, EO 14243 and Trump’s Data Consolidation: The Hidden Agenda Behind Big Tech Surveillance, Palantir is embedding digital IDs across DHS, IRS, and Social Security, consolidating surveillance under the guise of fraud prevention. These tools, once presented as safeguards against fraud, now serve a far clearer purpose: streamlining the targeting and suppression of leftist dissent. Heritage Foundation supplies the blueprint—Palantir builds the machinery.

This isn’t new. The playbook remains the same—COINTELPRO weaponized bureaucratic surveillance to neutralize Black liberation and leftist movements under the guise of national security. Now, Project Esther will leverage EO 14243’s infrastructure to fuse ideological suppression with the mechanics of automated surveillance. Just as COINTELPRO framed activists as subversives to justify government crackdowns, Project Esther weaponizes accusations of extremism and foreign influence to achieve similar ends. The targets have shifted, but the machinery of repression remains intact.

Don’t say I didn’t warn you.

EO 14243 and Trump’s Data Consolidation: The Hidden Agenda Behind Big Tech Surveillance

As the implications of Executive Order 14243 (Stopping Waste, Fraud, and Abuse by Eliminating Information Silos) unfold, concerns about mass data aggregation and AI-driven surveillance are growing. This isn’t a distant possibility—it’s happening now, reshaping governance in ways that will only become clear when the consequences are irreversible. For those still questioning the scale of this transformation, consider this from Brian Berletic on Twitter:

Read More »

An Introduction to Fifth Generation Warfare

How I Learned to Stop Worrying and Love 5GW

We type these words travelling through the Swiss Alps on high-speed rail. As the world becomes smaller, we at The Radio Research Group have witnessed firsthand how nearly everything we knew about modern conflict is changing, under the shadow of Fifth Generation Warfare. The incredible, exponential, accelerating pace of technology has overturned centuries of standard operating procedure. Diplomats and military leaders alike have been thrust into uncharted domains, disrupted by an invisible enemy that makes us question our reality.

An Introduction to Fifth Generation Warfare

Related:

5GW: 2012 NDAA – Propaganda – MISO – InfoOps – PsyOps

Cambridge Analytica and the Right-Wing Populist Movements

Embedded Journalism, Media Manipulation & Apathy

Memetic Warfare

House Votes To Extend Warrantless Spying Powers

House Votes To Extend Warrantless Spying Powers

H/T: The Most Revolutionary Act

Related:

FBI: Warrant Requirement for FBI’s Section 702 Queries Would Impede Investigations, Endanger National Security, Director Says

A Gentleman’s Guide to Trolls, Bots, Sealions, Forum Spies and Other Pests – #SolutionsWatch

The Corbett Report (Unofficial)

Let’s face it: comments often suck. And who’s to say they’re even real? But what’s the solution to these crappy communications? Well, don’t read the comments, of course. But if you do decide to wade into the infowar battlespace that is the comments section, then at the very least you need to arm yourself with knowledge of the various tactics that the trolls, bots, disinformation agents, psyops warriors, sealions and forum spies are employing to derail you from taking meaningful action. Today on #SolutionsWatch I’ll help do just that by reviewing The Gentleperson’s Guide to Forum Spies.

A Gentleman’s Guide to Trolls, Bots, Sealions, Forum Spies and Other Pests – #SolutionsWatch

Related:

The Conspiracy Theory Is True: Agents Infiltrate Websites Intending To “Manipulate, Deceive, And Destroy Reputations”

[2010] Obama staffer wants ‘cognitive infiltration’ of 9/11 conspiracy groups

[2014] HOW COVERT AGENTS INFILTRATE THE INTERNET TO MANIPULATE, DECEIVE, AND DESTROY REPUTATIONS

You Can’t Wish Away The 1st Amendment To Mandate Age Verification

So, we’ve been talking a lot about age verification of late, as governments around the world have all (with the exception of Australia?!?) seemed to settle on that as a solution to “the problem” of the internet (exactly what that problem is they cannot quite identify, but they’re pretty sure there is one). Of course, as we’ve explained time and time again, age verification creates all sorts of problems, including undermining both privacy and speech rights.

You Can’t Wish Away The 1st Amendment To Mandate Age Verification

Related:

Ban Online Porn for Kids

The Moral Panic Over Internet Porn Can’t Overrule the First Amendment

The Protecting Kids On Social Media Act Is A Terrible Alternative To KOSA

We have covered the Protecting Kids On Social Media Act a few times, when it was first introduced back in April, where we highlighted how it was both unconstitutional and the rationale behind it was not supported by any actual evidence, and then again just recently when Senator Chris Murphy (one of the bill’s co-sponsors) wrote a ridiculously confused op-ed for the NY Times, claiming it was necessary because kids these days get too many music recommendations and no longer could discover new music on their own.

The Protecting Kids On Social Media Act Is A Terrible Alternative To KOSA

Related:

Stop the Protecting Kids on Social Media Act

New Twitter CEO Linda Yaccarino is a WEF Executive Chair That Suggested Elon Musk Limit His Tweets

Twitter’s likely new CEO, Linda Yaccarino, a World Economic Forum Executive Chair and NBCUniversal advertising executive, recently tried to get Twitter owner Elon Musk to commit to self-censorship and urged him to allow advertisers to feel that they can “influence” Twitter.

New Twitter CEO Linda Yaccarino is a WEF Executive Chair That Suggested Elon Musk Limit His Tweets