AN INVESTIGATIVE REPORT

Government Goons? My Neighbors? - It's More Likely Than You Think!

A Statistical and Evidentiary Investigation into the Probability That a U.S. Citizen's Functional Community Contains Active Domestic Discourse-Shaping Operatives

By: Muhammad Khan (Guest Contributor)

Published: March 2026 | Research Standard: General Public Readability with Peer-Review-Grade Sourcing | Methodology Tier: Documented Facts / Triangulated Inferences / Explicitly Modeled Probabilities

Think about the last community meeting you attended. Your place of worship, a school board night, a neighborhood association, a political organizing session. Picture the faces. The person who arrived a few minutes early and seemed to know just the right things to say. The one who asked a few more questions than felt quite normal, but who you wrote off as just being curious. The newcomer who somehow already knew everyone.

According to a probability analysis built from public federal budgets, declassified government programs, federal court records, and peer-reviewed academic research, approximately 1 in every 17,200 American adults is, right now, an active government-directed operative whose assignment involves shaping what communities think, say, and do. A single person, dispersed somewhere across the larger social world Americans collectively move through. The question this article investigates is how large your world needs to be before the probability of encountering that one person crosses from unlikely into near-certain.

The answer scales with how broadly you define your world. Your stable social circle of roughly 150 people — the figure social scientists consistently find for human close-contact networks — gives you less than a 1% probability of containing an active operative. But most Americans do not live inside only 150 people. Add your workplace, your congregation, your children's school community, your neighborhood, the gym, the regulars at the coffee shop. A socially active American adult moves through a functional orbit of 2,000 to 5,000 people over the course of a year — and a cumulative orbit of considerably more over a decade of community life. At 2,000 people, the probability of at least one operative in that orbit reaches approximately 11%. At 5,000, it approaches 25%. At around 12,000 — roughly the combined reach of a mid-sized workplace, a congregation, a school community, and a neighborhood — it crosses 50%. Near-certainty arrives somewhere around 51,000 cumulative contacts. For an urban American who has participated in community life for a decade, that number is not implausible. For members of communities that government programs have specifically and documentably targeted — Muslim congregations, racial justice organizations, environmental groups, LGBTQ+ advocacy communities — the per-person operative density is estimated to be ten to seventeen times the national baseline, compressing all of these thresholds dramatically.

Those numbers describe the average American. For members of communities that government programs have specifically and documentably targeted — Muslim congregations, racial justice organizations, environmental advocacy groups, LGBTQ+ communities — the math is different in kind, not just in degree. Operative density in these communities is estimated at ten to seventeen times the national baseline. That compression is not a small adjustment. It means that a congregation of 700 people — not 12,000, not 51,000, just 700 — crosses the threshold where there is a statistically even chance that at least one person inside it is an active operative. A mid-sized mosque, a regional racial justice coalition, an environmental nonprofit with a few hundred members: these are not edge cases in the data. They are, by the evidence examined in this report, the communities where operative presence is not a remote possibility but an expected feature of the landscape. If you belong to one of them, this article is not a general-interest piece. It is about your community.

You may feel the instinct to dismiss this. The programs documented in this article have always relied on that instinct. The moment these words sound like fringe territory is the moment the operative's job becomes easier. So before you move on, consider one documented fact: in 2006, the FBI paid a man named Craig Monteilh $177,000 to pose as a Muslim convert, attend multiple Southern California mosques, secretly record hundreds of hours of conversations — including private pastoral counseling sessions — and actively steer community members toward extremist positions. His handlers called it an experiment to see if he could fool an entire community. He very nearly did. This was not COINTELPRO. This was 2006. The operational facts — the payment, the recordings, the mission — are confirmed through Monteilh's sworn declarations in federal litigation and FBI documents disclosed through FOIA and congressional proceedings. (The Supreme Court ultimately ruled 9--0 in 2022 that the government could invoke state secrets to block a merits ruling on the surveillance's legality — meaning the community members never received accountability, which is itself a finding.)

Craig Monteilh is not an outlier. He is a documented data point in a much larger pattern. The FBI currently operates approximately 15,000 active confidential human sources — a tenfold increase since 1975. Eighty government fusion centers now span all fifty states, co-staffed by federal agents, local police, and private contractors. Post-9/11 legal changes authorized opening investigations with no factual basis for suspecting individual wrongdoing — meaning that attending the wrong meeting, belonging to the wrong organization, or simply living in the wrong zip code can make you a subject of active intelligence interest. Every one of these facts comes from Congressional hearings, Inspector General reports, or the government's own budget documents.

What follows is not an invitation to paranoia. Paranoia is indiscriminate — it corrodes trust in everyone and ultimately serves the very programs it fears. What follows is an invitation to something more useful: informed awareness. This article will show you which communities the evidence says are most heavily targeted, how operatives embed themselves in ordinary life, what a successfully infiltrated community looks like from the inside, and — in the section most readers return to — the specific behavioral patterns that have historically distinguished an operative from a genuinely friendly neighbor, along with the counter-techniques trained operatives use to suppress those same patterns. You will finish this article more difficult to deceive. Given what the evidence shows about the scale of these programs, that is not a small thing.

_____________________________________

ABSTRACT

This report examines the statistically defensible probability that an average American citizen — in their post-9/11 daily life — encounters at least one person actively engaged in government-directed domestic discourse-shaping operations somewhere in their broader community life. Using publicly available budget data, contract records, declassified program documents, court filings, Inspector General reports, and peer-reviewed academic literature, we construct a three-tiered analytical model distinguishing documented facts, defensible inferences, and explicit probabilistic modeling. Our central finding has two parts that must be read together. First, the per-person base rate: approximately 1 in 17,200 American adults is an active discourse-shaping operative or tasked asset — a small but non-trivial fraction of the population. Second, the network probability: because most Americans' functional orbits span thousands of people across workplaces, congregations, schools, neighborhoods, and civic organizations, the probability of encountering at least one operative somewhere in that orbit rises substantially with orbit size — from less than 1% for a stable social circle of 150, to approximately 25% for an orbit of 5,000, to 50% at roughly 12,000, to near-certainty (95%) at approximately 51,500. For members of communities historically and documentably targeted by domestic intelligence programs, operative density is estimated at 10--17 times the national baseline, compressing all of these thresholds dramatically — to a 50% probability at roughly 700 people for a targeted-community member, compared to 12,000 for the national average. A mid-sized congregation, a regional advocacy organization, a community of practice: at that density, the probability of operative presence becomes difficult to dismiss — which is a different claim from certainty, but a significant one. A note on the model: the probability figures show what follows mathematically from the operative pool estimates. Those estimates are triangulated from public records and labeled throughout by evidence tier — some are documented facts, others are defensible inferences, and the pool size itself is a modeled figure, not a directly measured one. Readers should hold the historical record (extensively documented, not seriously disputed) and the probabilistic output (meaningful but uncertain) as distinct claims that reinforce each other without either standing in for the other. This report is not an invitation to paranoia. It is an invitation to informed awareness. It only takes one operative to poison the well of an entire community's discourse.

_____________________________________

I. What This Report Is Not

Before proceeding, this investigation requires a clear statement of what it does not claim, because the subject matter sits at the intersection of documented government conduct and the kind of unfounded suspicion that can harm innocent people and communities.

_____________________________________

THIS REPORT DOES NOT:

  • Claim that every federal employee, law enforcement officer, or community outreach worker is an operative engaged in covert discourse manipulation.

Assert that readers should distrust all of their neighbors or treat any specific individual as suspect based on this analysis alone.

Claim that any specific current government program is identical in scale or brutality to COINTELPRO.

Attribute any specific election outcome, community conflict, or social movement outcome to operative activity without documentary evidence.

Constitute legal advice, and does not recommend any action toward any individual.

Apply to foreign influence operations, which are a separate and distinct phenomenon.

Claim that all community-level fractures or political disagreements are manufactured by operatives.

_____________________________________

What this report does claim is more precise and more limited: that the documented existence, budgetary scale, and operational history of domestic discourse-shaping programs makes operative presence in ordinary American communities not merely possible, but statistically probable — and that an informed public is better equipped to identify and resist these effects than an uninformed one.

II. Historical Precedent: These Programs Are Not Theoretical

A recurring obstacle to public engagement with this subject is the reflexive dismissal of domestic intelligence programs as "conspiracy theory." This dismissal is historically illiterate. The programs described in this report are not inferences from circumstantial evidence: they are matters of Congressional record, court documentation, Inspector General findings, and declassified archives.

COINTELPRO: The Established Baseline

From 1956 to 1971, the FBI operated a program formally titled the Counter Intelligence Program — COINTELPRO — whose stated goal was to "expose, disrupt, misdirect, or otherwise neutralize" political organizations the FBI deemed subversive. Targets included the civil rights movement, anti-war organizers, feminist organizations, environmental and animal rights groups, the American Indian Movement, and student organizations. Tactics included anonymous letters designed to create internal conflicts, planting false stories with journalists, using informants to instigate violence, and "neutralizing" leaders through manufactured scandals.[1]

COINTELPRO was not discovered through journalism or whistleblowing. It was exposed in 1971 when activists burglarized an FBI field office in Media, Pennsylvania, and leaked the documents. When Congress investigated through the Church Committee in 1975 and 1976, it found evidence of over 2,000 COINTELPRO operations. The Church Committee found that the FBI had employed roughly 1,500 active informants at the time of its investigation — a level that represented a post-COINTELPRO reduction from earlier highs — and this became the documented baseline against which the post-9/11 expansion would be measured.[2]

COINTELPRO is used in this report not as evidence that current programs are identical, but as proof of concept: that the U.S. government has previously designed, funded, staffed, and deployed large-scale domestic discourse-shaping operations, and that these operations have specifically targeted communities engaged in ordinary First Amendment activity.

III. The Post-9/11 Expansion: Budget, Infrastructure, and Mandate

September 11, 2001 produced the most significant expansion of domestic intelligence infrastructure in American history. The changes were structural, budgetary, and legal — and their cumulative effect was to create an apparatus for domestic community monitoring and engagement that dwarfs anything that existed during COINTELPRO.

A. The Budget Signal

The National Intelligence Program (NIP) — the publicly disclosed top-line budget for the U.S. Intelligence Community — grew from approximately $40 billion in FY2001 to $76.5 billion in FY2024, a 91% real-dollar increase. Combined with the Military Intelligence Program (MIP), total intelligence spending reached $106.3 billion in FY2024.[3] [4]

This number is, however, a floor. As Congressional Research Service analysis notes, it excludes the Homeland Security Intelligence Program (HSIP), departmental intelligence activities at agencies including the Treasury and State Departments, and a significant contractor layer that is partially but incompletely reflected in these figures.

_____________________________________

METHODOLOGY NOTE — BUDGET TRIANGULATION

The NIP/MIP toplines are publicly disclosed by the Office of the Director of National Intelligence. Domestic-focused program budgets within these figures are classified. This analysis applies standard intelligence community cost benchmarks: historical per-agent cost ratios from declassified programs, known FBI/DHS domestic operational budgets from appropriations testimony, and contract award data from USASpending.gov. These triangulation methods are standard practice in open-source intelligence analysis and investigative journalism.

_____________________________________

B. The FBI's Expansion

The FBI grew from approximately 27,000 employees in 2001 to approximately 35,000 by the mid-2010s. More significantly, the bureau's internal organization shifted: the Counterterrorism Division — previously a marginal component — became the FBI's best-funded division, a transformation confirmed in court documents related to the Fazaga v. FBI case (discussed below).

The most operationally significant change was the expansion of the Confidential Human Source (CHS) program. In 1975, the FBI operated approximately 1,500 confidential informants. By the 2010s, according to reporting by The Intercept based on FBI policy documents, that number had grown to approximately 15,000 active Confidential Human Sources — a tenfold increase.[5]

The FBI's Domestic Investigations and Operations Guide (DIOG), partially declassified and published by the Electronic Frontier Foundation, establishes that CHS assets can be tasked with: attending community meetings, building relationships within targeted communities, conducting "otherwise illegal activity" in the course of operations, and communicating with persons of interest online. Critically, the 2008 Mukasey Guidelines — named for then-Attorney General Michael Mukasey — authorized a new category of investigation called an "assessment" which required no factual basis for suspecting individual wrongdoing before agents could employ intrusive techniques including recruiting and tasking informants.[6]

C. The Fusion Center Network

Post-9/11 legislation and executive action created a network of intelligence fusion centers — joint federal, state, and local information-sharing hubs. As of 2024, approximately 80 state and local fusion centers operate across the United States, connected to nearly 200 Joint Terrorism Task Forces (JTTFs). These centers are co-staffed by personnel from DHS, FBI, Customs and Border Protection, the Drug Enforcement Administration, the Coast Guard, the National Guard, state highway patrols, departments of corrections, local police, and — notably — the private sector.[7]

A 2012 bipartisan Senate investigation found that fusion centers had yielded few counterterrorism benefits while producing reports that frequently targeted people engaged in ordinary First Amendment activities. Documented examples include: a North Texas fusion center that labeled Muslim lobbyists a security threat; a DHS analyst in Wisconsin who flagged both pro- and anti-abortion activists; a Pennsylvania contractor that monitored environmental activists and Tea Party groups; the Maryland State Police entering anti-death penalty and anti-war activists into a federal terrorism database; and a Missouri center that treated third-party voters and Ron Paul supporters as potential militia members.[8]

D. The CVE Architecture

In 2011, the Obama administration formalized a Countering Violent Extremism (CVE) program whose stated mission was prevention but whose operational structure embedded government-connected actors into community institutions. CVE, as implemented through DHS and DOJ, funded community-based organizations, religious groups, mental health providers, educators, and NGOs to serve as surveillance-adjacent early-warning networks — and, in some cases, narrative-shaping ones.[9]

The DHS's own program documentation describes CVE community partners as charged with "countering extremist narratives" and "creating competing narratives."[10] The FY2016 CVE Grant Program distributed $10 million to 26 state and local governments, nonprofits, and universities. DHS received over 200 applications from 42 states — revealing the scale of community penetration achieved through grant dependency.[11]

IV. Community-by-Community Analysis

This section examines the evidence for operative presence across different community types, weighted by the density of available documentation. The strength of evidence varies significantly across community types — this variation is itself a finding, not a limitation.

A. Houses of Worship — EVIDENCE DENSITY: HIGH

The most extensively documented domain of domestic discourse-shaping operative activity in the post-9/11 era is the infiltration of Muslim houses of worship. What makes this domain uniquely valuable for this analysis is that it has been litigated — producing court records, sworn testimony, Inspector General reports, and internal FBI documents that would otherwise remain classified.

Operation Flex and the Southern California Muslim Community

In 2006, the FBI launched Operation Flex in Southern California, deploying a paid informant named Craig Monteilh — rebranded as "Farouk Al-Aziz" — to pose as a Muslim convert and systematically infiltrate mosques throughout Orange County. As confirmed in subsequent court proceedings and FBI testimony, Monteilh: • Professed a public conversion to Islam before hundreds of congregants at multiple mosques during Ramadan • Built relationships with community members, including a local imam and congregants, over a period of months • Secretly recorded conversations using devices hidden in everyday objects (including a car key fob) • Filmed inside people's homes, businesses, and mosques • Received $177,000 in compensation from the FBI for his work • Was explicitly instructed by his FBI handlers to penetrate the community as deeply as possible — handlers described it as an "experiment to see if I could actually fool an entire community" • Ultimately raised red flags when he began actively advocating for violence to fellow congregants — behavior that caused mosque leadership to report him to the FBI

The FBI's Southern California operations were part of a broader program called "Domain Management," which, as reported by The Intercept, FBI official Phil Mudd expanded to include government and commercial data in a way that allowed the FBI to systematically map Muslim communities throughout the United States. Inside the bureau, veteran agents reportedly described the expanded program as "Battlefield Management" — for the way it allowed the bureau to target specific geographic areas based on estimated Muslim populations.[12]

The NYPD Demographics Unit

Operating independently of but parallel to FBI programs, the New York Police Department's Intelligence Division created a "Demographics Unit" that, as revealed in a Pulitzer Prize-winning 2011 Associated Press investigation, mapped, photographed, or infiltrated more than 250 mosques and 31 Muslim student organizations throughout New York City. Informants known internally as "mosque crawlers" conducted surveillance activities including photographing congregants, recording license plates, and recording private conversations.[13]

The NYPD settled related civil rights lawsuits in 2018. The settlement included requirements to limit suspicionless mapping of communities based on religion, ethnicity, or national origin. Importantly, however, the settlement did not include any finding that the underlying surveillance was illegal — a distinction that reveals the legal architecture supporting these operations.

The Broader Pattern: From Mosques to All Houses of Worship

The evidence is most dense for Muslim houses of worship, but it is not exclusive to them. Historical records include the FBI's multi-decade surveillance of Catholic worker organizations, Quaker meetings, and Jewish community organizations. In the post-9/11 period, a Brennan Center analysis notes that "the FBI continues to treat Muslims as suspicious and warranting surveillance even where there is no indication of criminal or terrorist activity — a trend spanning both Republican and Democratic administrations."[14] The DHS fusion center network has flagged activities at mosques, churches, and synagogues alike when those institutions host groups involved in environmental, anti-war, or social justice advocacy.

_____________________________________

DOCUMENTED: What a Worship-Embedded Operative Looks Like

Based on court records and sworn testimony from the Fazaga v. FBI case and related proceedings:

Presents as a new convert or newly relocated community member

Expresses religious devotion rapidly and visibly

Seeks closeness with community leadership (imams, pastors, rabbis)

Shows unusual curiosity about other congregants' backgrounds, travels, and views

Gradually introduces more extreme or provocative discourse

May have unusual financial resources or business opportunities to offer

In some cases: plants recording devices in pastoral or counseling spaces

_____________________________________

B. Political Organizations — EVIDENCE DENSITY: HIGH

The surveillance and infiltration of political organizations represents one of the most extensively documented areas of post-9/11 domestic intelligence activity. What distinguishes this domain is the breadth of political orientation of targeted groups — left-wing, right-wing, libertarian, and centrist advocacy organizations have all been documented targets, though the distribution of resources has been highly asymmetric.

Black Lives Matter and Racial Justice Movements

Beginning in 2014, following the police killing of Michael Brown in Ferguson, Missouri, the FBI and DHS began systematic monitoring of the Black Lives Matter movement. DHS monitoring began just two days after Brown's death, using social media surveillance and Google Maps to track protest participants. Documents obtained by The Intercept in March 2015 show that an FBI Joint Terrorism Task Force sent email notices about a BLM protest at the Mall of America to other task force members.[15]

In 2017, the FBI's Counterterrorism Division produced an internal assessment categorizing a new threat called "Black Identity Extremists" — a designation that, as the ACLU and Brennan Center documented, lacked any factual basis for the claimed violence threat and appeared designed to justify surveillance of Black civil rights organizations.[16] The FBI has also confirmed using surveillance aircraft to monitor BLM protests in both Baltimore (following the killing of Freddie Gray) and Washington, D.C.

Leaked documents referenced by UC Berkeley researchers revealed an FBI operation titled IRON FIST, designed to "proactively address this priority domestic terrorism target by focusing FBI operations via enhanced intelligence collection efforts" — including the use of undercover agents embedded in racial justice communities.[17]

Environmental and Anti-Pipeline Activists

Fusion centers have documented a consistent pattern of treating environmental activism as a terrorism-adjacent threat. In 2019, the Virginia Fusion Center issued an intelligence assessment equating tactics used by pipeline protesters — including ignoring police commands and threatening a boycott — with terrorism. An Oregon fusion center supported a task force monitoring protest groups opposing fossil fuel projects. In Pennsylvania, a homeland security contractor monitored Tea Party groups, environmental activists, and a Second Amendment rally simultaneously — revealing the ideologically non-selective nature of this surveillance infrastructure.[18]

Anti-War, Immigration Rights, and Economic Justice Groups

The civil liberties organization Defending Rights & Dissent has cataloged documented instances of FBI political surveillance since 2010. The organization found that the FBI devoted disproportionate resources to monitoring peaceful left-leaning civil society groups, including Occupy Wall Street, economic justice advocates, racial justice movements, environmentalists, Abolish ICE, and various anti-war movements. Following the George Floyd protests in 2020, then-Attorney General William Barr deployed JTTFs nationally to surveil racial justice protesters.[19]

C. LGBT Communities — EVIDENCE DENSITY: MODERATE-HIGH (with recent escalation)

The surveillance of LGBTQ+ organizations and communities has a long documented history that predates the post-9/11 era and is currently experiencing a documented policy shift that represents the most significant change to the legal framework governing this surveillance in recent memory.

Historical Foundation: The Sex Deviates Program and Lavender Scare

From the 1950s through the 1970s, FBI Director J. Edgar Hoover operated a program called the "Sex Deviates" program that compiled files on gay Americans, shared this information with the Civil Service Commission to enable employment termination, infiltrated organizations including the Mattachine Society and the Daughters of Bilitis, and placed surveillance on gay bars. Hundreds of thousands of documents from this program were destroyed — a fact that itself confirms the program's scope.[20]

Post-Stonewall Through the AIDS Era

Declassified records show that the FBI maintained surveillance of the Gay Activist Alliance and continued monitoring LGBTQ+ organizations through the 1970s and 1980s. During the AIDS crisis of the 1980s, activist organizations including ACT UP were subjected to FBI surveillance, as documented by GLAD Law and confirmed in partially declassified FBI vault records.[21]

The 2025 Policy Shift

In early 2025, the DHS Office of Intelligence and Analysis quietly updated its policy manual to remove explicit prohibitions on intelligence activities targeting individuals or groups based solely on their sexual orientation or gender identity. The change — made without press conference or announcement — eliminated Biden-era protections that had been added to the I&A operations manual. As Bloomberg Law first reported, and as civil liberties organizations including GLAD Law and the ACLU subsequently confirmed, this removal represents a deliberate policy rollback that legally reopens the door to sexual orientation- and gender identity-based surveillance that the Biden administration had formally closed.[22] [23]

The practical import is significant: without explicit prohibitions, intelligence analysts have broader legal discretion to target individuals and organizations based on LGBTQ+ identity in the name of "threat assessment" — a pattern thoroughly documented in the historical record.

D. Workplaces — EVIDENCE DENSITY: MODERATE (inferred from labor history and contractor patterns)

Direct documentation of workplace infiltration by discourse-shaping operatives in the post-9/11 era is thinner than for houses of worship or political organizations, in part because workplace surveillance more often takes passive forms (data collection, HR record access) than active human placement. However, several lines of evidence support the inference that active operative presence extends to some workplace environments.

First, the FBI's DIOG explicitly authorizes the recruitment of informants from "a wide range of occupations" and permits the tasking of informants in workplaces when those workplaces are connected to investigative subjects. Second, fusion center "Terrorism Liaison Officer" programs in multiple states have recruited private-sector employees — including those in transportation, energy, and communications sectors — as community intelligence assets. Third, documented cases from labor history include FBI infiltration of union organizing campaigns and political advocacy organizations, practices that post-9/11 legal changes did not prohibit.

The most operationally significant workplace-adjacent concern involves contractors who work in or alongside government agencies. The intelligence contractor ecosystem has grown to approximately 1.5 to 2 times the size of direct government employment in relevant agencies — meaning that a significant fraction of the personnel conducting domestic intelligence-related activities are employed by private firms, and may be positioned within corporate, nonprofit, or academic environments in ways that are difficult to distinguish from ordinary employment.

E. Schools and Universities — EVIDENCE DENSITY: MODERATE

The evidence for operative presence in educational settings spans K-12 through graduate education, with the density of documentation concentrated at the university level, particularly around Muslim student organizations, environmental advocacy groups, and racial justice organizations on campuses.

The NYPD Demographics Unit, referenced above, specifically targeted 31 Muslim student organizations in the New York area. FBI agents have visited the homes of Muslim university students to inquire about their campus activities, mosque attendance, and overseas travels. The DHS CVE program explicitly engaged university students through the Peer-to-Peer: Challenging Extremism (P2P) program — a public-private partnership with Facebook's EdVenture Partners that enrolled more than 5,000 students at 250 colleges and universities across 30 states to develop counter-narrative social media campaigns, funded and shaped by DHS.[24]

A 2017 DHS Academic Subcommittee report noted that fusion centers lacked formal liaisons for K-12 schools and universities, but explicitly recommended addressing this gap — a gap whose noted absence suggests active programs to fill it were under development.[25] The GCHQ JTRIG documents (see Section VII below), shared with the NSA and U.S. Five Eyes partners, specifically describe "Islamist activity in schools" as a JTRIG operational domain, providing a documented allied-nation template for school-based influence operations.

F. Community and Youth Sports — EVIDENCE DENSITY: LOW-MODERATE (inferred)

Direct documentation of discourse-shaping operative deployment in sports contexts is thin. However, this context deserves analytical attention for two reasons: it is a community setting where trust is built rapidly and organically, and it is a setting where operative presence would be nearly invisible against baseline social behavior.

Inference from documented patterns: The FBI's DIOG authorizes the use of CHS assets in any community setting where an assessment target is active. If a community activist, mosque leader, or political organizer regularly coaches youth soccer, a handler could task an asset to participate in that same community — using sports as a cover for relationship-building. This is not speculation about current programs; it is a documented operational principle applied in a new context.

The most relevant documented analog is the FBI's use of community outreach settings — including sporting events and community gatherings — as venues for voluntary FBI "interviews" that carry implicit pressure. Multiple documented cases involve FBI agents approaching people at community events, youth sports venues, and neighborhood gatherings to ask about third parties' activities, views, and associations.

_____________________________________

EVIDENCE DENSITY SUMMARY

Houses of Worship: HIGH — direct court-documented operative cases Political Organizations: HIGH — documented in Inspector General reports, Congressional investigations, civil rights litigation LGBT Communities: MODERATE-HIGH — historical documentation strong; post-9/11 with active 2025 policy escalation Workplaces: MODERATE — inferred from known frameworks; direct cases less publicly documented Schools/Universities: MODERATE — documented for university Muslim orgs; K-12 less documented but infrastructure noted Community/Youth Sports: LOW-MODERATE — inferred from general CHS deployment principles; no direct documentation

_____________________________________

V. The Digital Trigger: Post, Get Watched, Get a Knock

The preceding sections describe programs — budgets, infrastructures, court cases from years past. This section is different. The cases here are recent. Some are from last month. They describe the operational endpoint of everything above: what it looks like when someone posts on social media and, days or weeks later, a stranger appears at their door.

This is not, it turns out, an unusual sequence of events. In March 2024, a federal agent admitted on camera that the FBI conducts exactly this kind of visit "every day, all day long." That admission — made on a doorstep in Oklahoma — is the most candid description of routine social media-triggered surveillance to enter the public record. What follows is the evidentiary context that makes it legible.

A. The Backend: Section 702 and the Warrantless Surveillance Pipeline

Before the knock at the door, there is the database query. Understanding how the government moves from "person posts something online" to "agents appear at that person's home" requires understanding Section 702 of the Foreign Intelligence Surveillance Act — and what the government's own court records reveal about how it has been used.

Section 702 was enacted after 9/11 to allow warrantless surveillance of foreign intelligence targets located overseas. In practice, because foreigners communicate with Americans, Americans' communications are swept into the same databases — and FBI agents can then search those databases for any American's messages using what the government calls "U.S. person queries." This happens without a warrant. In 2021 alone, the FBI conducted an estimated 3.4 million such queries.[48]

In May 2023, the Foreign Intelligence Surveillance Court — the oversight court that is typically highly deferential to the government — declassified a 2022 opinion documenting what it called a "persistent and widespread" pattern of illegal searches. Among the specific violations documented: the FBI had conducted 278,000 non-compliant queries between 2020 and early 2021. The targets of those queries included 133 people arrested in connection with racial justice protests following the murder of George Floyd, thousands of individuals related to the January 6 Capitol events, over 19,000 donors to a congressional campaign, journalists, political commentators, a sitting U.S. Senator, a state senator, a state court judge who had complained to the FBI about civil rights violations by a police chief — and, in one documented case, a person simply because two men "of Middle Eastern descent" had been seen loading cleaning supplies into a truck nearby.[49]

The FISA Court's own opinion noted that the FBI's queries of the 133 racial justice protesters were conducted "without any specific potential connections to terrorist-related activity" known to those running the searches, and that the Justice Department itself conceded the searches were unlikely to return evidence of either foreign intelligence information or any crime — the two legally required purposes for such queries. The Department of Democracy and Technology's Security Project stated in 2023 that the systemic misuse of Section 702 had made it "as toxic as COINTELPRO and the FBI abuses of the Hoover years."[50]

The significance of this for the article's central argument is direct: Section 702's documented misuse establishes that the pipeline from "protected political expression" to "government database query" to "agent appears at your door" is not hypothetical. The FISA Court has confirmed it happens. The Justice Department has conceded it happens. What is not known is how often a warrantless database query is the hidden precursor to the kind of doorstep visit documented in the cases below.

B. The Front End: Three Recent Cases

Case 1: "We Do This Every Day, All Day Long" — Stillwater, Oklahoma (March 2024)

On the morning of March 19, 2024, three people appeared at the home of Rolla Abdeljawad, a 43-year-old Egyptian-Muslim woman living in Stillwater, Oklahoma. They identified themselves as FBI agents. They said they wanted to talk to her about her social media posts. She filmed the encounter on her phone.

Abdeljawad had been posting on Facebook about the Israel-Gaza conflict — pro-Palestinian posts that her attorney described as political speech expressing concern for Palestinian civilians. None called for violence. When she demanded to see credentials, the agents refused to show them on camera. One told her that Facebook had provided the FBI with screenshots of her account. When she challenged them — "We can't arrest you for freedom of speech, we live in America" — one agent replied: "We do this every day, all day long. It's just an effort to keep everybody safe and make sure nobody has any ill will."

She declined to speak without a lawyer, did not allow them in, and posted the video to Facebook where it went viral and was reported by the Washington Post, Fox News, and multiple civil liberties organizations. Her attorney, Hassan Shibly, told reporters he doubted Facebook had actually sent the screenshots — Abdeljawad's timeline was public, meaning the FBI could have accessed the posts directly without a platform request. He called it "a fishing expedition." Local police confirmed the visitors were FBI agents.[51]

The Abdeljawad case was not unique. Palestine Legal, a civil rights organization that tracks government pressure on Palestinian rights advocates, documented multiple accounts in 2023 and 2024 of activists being visited by FBI agents carrying printed copies of their tweets, Facebook posts, and TikTok videos — physical printouts of online expression, brought to people's doors. In at least two documented cases, the agent's questions were based on false allegations published by right-wing anti-Palestinian websites. In a third, the agent's questions mirrored allegations from a known extremist commentator. Palestine Legal also documented that agents arrived with knowledge of social media activity even when the accounts in question had privacy filters enabled.[52]

Case 2: The Wrong Address, Then the Right One — Extinction Rebellion, New York and Boston (2025--2026)

In January 2025, a former member of Extinction Rebellion NYC — a climate activist group known for nonviolent disruption of public events, including theatrical protests at Broadway shows and sporting venues — received a phone call from a woman who identified herself as an FBI agent. She said she was standing outside his home. But she was at his old address. He thought it was a scam call.

A few weeks later, she found his new address. She arrived at his home upstate — 200 miles north of New York City — with a second agent. The man was having breakfast. He declined to answer questions and consulted an attorney. His lawyer, Ronald L. Kuby, told The New York Times: "The fact that they went to the wrong address of a member who has not been active suggests that they are starting an investigation. They are digging."

The pattern extended beyond New York. On March 6, 2025, FBI agents accompanied by Massachusetts State Troopers visited six Extinction Rebellion activists in Boston. Nathan Phillips, an ecology professor at Boston University, received a call at his office from his wife saying an FBI agent had appeared at their home while he was at work. The agent left. Phillips called the local FBI field office to confirm the visit was legitimate. He was hung up on. He submitted a FOIA request for his own records. The response stated that his files were exempt from disclosure because there was "a pending or prospective law enforcement proceeding relevant to these responsive records."[53]

Extinction Rebellion's global organization confirmed that these visits were "not an isolated situation," characterizing them as part of a broader crackdown on climate activism under the Trump administration's promise to designate environmental protest groups as domestic terrorist organizations. The Intercept, reporting on the February 2026 visit, noted that one of the two agents who appeared was from the FBI's Joint Terrorism Task Force — the same infrastructure used in post-9/11 mosque surveillance.

C. The Pattern These Cases Document

Taken together, the Section 702 data and these doorstep cases establish several things that are relevant to this article's central argument.

First: the surveillance pipeline is real, documented, and confirmed by the government's own court records. The FISA Court found 278,000 illegal queries. The DOJ admitted many of those queries had no authorized purpose. The FBI itself acknowledged improper searches of peaceful protesters.

Second: the doorstep visit is one operational endpoint of that pipeline — not the only one, but a documented one. The FBI agent's admission that this happens "every day, all day long" is consistent with the FISA Court's finding that the bureau conducts hundreds of thousands of U.S. person queries per year. Some percentage of those queries, in some cases, result in physical visits.

Third: the communities being targeted are the same ones documented in Section IV. The Abdeljawad visit followed pro-Palestinian Facebook posts by a Muslim woman. The Extinction Rebellion visits followed climate activism. The FISA Court's documented illegal queries targeted racial justice protesters, a state judge who complained about police, and political donors. This is not random. It is the post-9/11 targeted-community pattern, moving from mosque surveillance into the social media age.

Fourth: the chilling effect is the point. The documented purpose of programs like JTRIG (see Section VII below) is not primarily to arrest — it is to "discredit, disrupt, dissuade, delay, and deter." A visit from three federal agents asking about your Facebook posts, followed by refusal to show credentials on camera, is not an arrest. It is a message. The Abdeljawad case went viral in part because she filmed it; most such visits do not. Extinction Rebellion noted afterward that the visits produced exactly the effect one would expect from a deterrence program: fear, self-censorship, and organizational disruption among members who had not been contacted but who learned of the visits.

_____________________________________

THE DOCUMENTED PIPELINE: POST → DATABASE → DOOR

STEP 1

Post: Person posts on social media. Platform may share data with law enforcement under legal process, or FBI monitors public posts directly under its "assessment" authority (no factual predicate required). STEP 2

Database query: FBI runs U.S. person query on Section 702 databases (confirmed: 3.4M queries in 2021 alone; 278,000+ documented illegal). Query returns communications between target and any foreign persons — or returns nothing. Either way, the query has occurred. STEP 3

Assessment: FBI opens "assessment" under Mukasey Guidelines (no factual basis for suspicion of crime required). Assessment authorizes tasking informants, attending community meetings, conducting additional monitoring. STEP 4

The knock: Agents appear at person's home for a "voluntary" interview about their speech. No warrant. No arrest. The person is not a suspect. The visit is the message. All four steps are documented in the public record. Each is legal under current law. None requires notifying the person that it happened.

_____________________________________

VI. The Five Eyes Analog: What GCHQ's JTRIG Tells Us About U.S. Practice

One of the most significant bodies of evidence bearing on domestic discourse-shaping operations is not American at all. It is British — and it was shared with the United States.

Documents leaked by NSA contractor Edward Snowden and published by The Intercept and NBC News revealed the existence and operational methods of GCHQ's Joint Threat Research Intelligence Group (JTRIG). The key evidentiary fact for this analysis is the classification markings on those documents: SECRET//SI//REL TO USA, FVEY — indicating they were produced for and shared across the Five Eyes intelligence alliance, of which the United States is the senior member.[26]

JTRIG's documented methods include: injecting false material onto the internet to destroy the reputation of targets; using social sciences and behavioral psychology to manipulate online and offline discourse; deploying "honey traps" (including sexual entrapment); conducting false flag operations (posting material falsely attributed to targets); "astroturfing" — creating the appearance of grassroots support for a position that is in fact manufactured; using named technical tools to manipulate online polls (UNDERPASS), inflate page views (SLIPSTREAM), amplify approved content (GESTATOR), and spoof email identities (CHANGELING).[27]

The 2011 JTRIG behavioral science document, titled "Behavioural Science Support for JTRIG's Effects and Online HUMINT Operations," describes in academic detail how to leverage psychological principles — flattery, social compliance, herd effects, consistency, reciprocity, distraction, and time pressure — to manipulate targets online. Critically, JTRIG's documented targets included not just foreign adversaries but domestic U.K. targets: political groups deemed "extremist," Islamist activity in schools, online fraud networks, and — with particular relevance to this analysis — internal U.K. communities.[28]

The evidentiary weight of JTRIG for this analysis is as follows: the United States is the intelligence partner to which JTRIG's methods were shared and with whom they were developed. The NSA's domestic authorities post-9/11 are broader in some respects than GCHQ's. There is no documented evidence that the U.S. declined to develop analogous capabilities. The JTRIG documents therefore constitute a documented allied-nation template for methods the U.S. had access to, motive to adopt, and legal authorities to deploy.

VII. The Probability Calculation: Methodology and Findings

This section constructs the central probabilistic finding of this investigation. The methodology is explicitly three-tiered, and the tier of each input is labeled throughout. It also corrects a framing error that is common in public discussions of operative density: the difference between the per-person base rate and the network probability.

A. The Critical Distinction: Per-Person Rate vs. Network Probability

These are two entirely different numbers and must not be conflated.

_____________________________________

THE TWO NUMBERS — READ THIS FIRST

THE PER-PERSON RATE: Approximately 1 in 17,200 American adults is an active discourse-shaping operative or tasked asset. This is the probability that any specific individual you meet is an operative. It is small. Most people you know are not operatives. THE NETWORK PROBABILITY: As your social orbit grows — from 150 stable contacts to the thousands of people a socially active American encounters over years of community life — the probability that at least one of them is an operative grows with it. These are not the same question. Confusing them produces either false reassurance ("the rate is tiny, so there's nothing to worry about") or false alarm ("one in four people I know is a spy"). Neither is accurate.

_____________________________________

B. Defining the Social Orbit

This analysis uses two social orbit sizes, not one.

STABLE NETWORK (Dunbar's Number, ~150): The approximately 150 people with whom a person maintains regular, meaningful social contact. This is the figure most commonly cited in discussions of social network size, and it is the correct denominator for asking about close, ongoing relationships.

FUNCTIONAL ORBIT (~2,000--12,000+): The full set of people a person regularly encounters across all their institutional affiliations — workplace, congregation, school community, neighborhood, civic organizations, regular service venues. This is the correct denominator for asking about exposure to any single operative embedded anywhere in your broader community life. For a socially active urban American, this number can reach 5,000--15,000 over a decade of community participation.

C. Estimating the Active Operative Pool

This is the most consequential and most uncertain variable in the model. The following triangulation uses multiple independent lines of evidence.

_____________________________________

OPERATIVE POOL TRIANGULATION
SourceEstimate & Basis
FBI CHS (total active)~15,000 — per The Intercept reporting on FBI policy documents (DOCUMENTED)
FBI CHS (community-engagement-tasked)~3,000--5,000 — MODELED ASSUMPTION: estimated 20--33% of CHS pool carries active community-engagement tasking. Basis: FBI DIOG confirms CHS assets may be tasked with attending community meetings and building community relationships; proportional allocation is a modeling inference, not a directly measured figure. No public document specifies the fraction of the CHS pool so tasked. (MODELED — NOT DIRECTLY DOCUMENTED)
DHS CVE community assets~500--2,000 — based on 26 direct grantees with field staff plus documented expansion to multiple cities (INFERRED)
Fusion center active community sources~2,000--8,000 — 80 fusion centers x estimated 25--100 active community contacts each (INFERRED)
Private contractor community-embedded personnel~1,000--5,000 — derived from USASpending.gov contract data for community engagement and counter-narrative services (INFERRED)
Total estimated active pool~7,500--20,000 — CENTRAL ESTIMATE: ~15,000 (MODELED)
Per-person base rate15,000 / 258,000,000 adults = approximately 1 in 17,200 (0.0058%)
_____________________________________

D. The Calculation

Using the complementary probability method: P(at least one operative in orbit of N) = 1 − (1 − p)^N, where p = 1/17,200 ≈ 0.0058%.

_____________________________________

PROBABILITY BY ORBIT SIZE — NATIONAL AVERAGE (1 in 17,200)

ScenarioOrbit SizeProbability
Stable social networkN = 1500.87% — less than 1 in 100
Small extended orbitN = 5002.9%
Moderate orbitN = 1,0005.6%
Active community memberN = 2,000~11%
Broad urban orbitN = 5,000~25%
Large institutional orbitN = 10,000~44%
50% thresholdN = 12,000

For a socially active urban American who has lived in one city for ten or more years, a cumulative orbit of 10,000--20,000 people is not implausible — placing them firmly in the 44--69% probability range.

_____________________________________

_____________________________________

PROBABILITY FOR TARGETED COMMUNITIES (estimated 10--17x national density)

For members of communities with documented heavy operative presence

Muslim congregations, racial justice organizations, environmental advocacy groups, LGBTQ+ organizations — the estimated per-person operative rate rises to approximately 1 in 1,000. At this density: Stable network (N=150): ~14% Small congregation or org (N=300): ~26% Moderate community (N=700): ~50% threshold Larger community (N=2,300): ~90% threshold Large institution (N=3,000): ~95% threshold At the 95% confidence level, a targeted-community member whose religious, civic, or advocacy institution has 3,000 or more participants has near-certain operative exposure somewhere in that community.

_____________________________________

_____________________________________

CORRECTED PROBABILITY SUMMARY TABLE
ScenarioN (orbit size)
Stable friend/family network150
Average American, extended orbit2,000
Socially active urban American5,000--10,000
Urban American, 10+ year resident10,000--20,000
50% threshold (national avg)~12,000
95% threshold (national avg)~51,500
Targeted community member, small org300
Targeted community member, mid org700
Targeted community member, large institution3,000
95% confidence range on pool estimatevaries
_____________________________________

_____________________________________

SENSITIVITY ANALYSIS

The calculation is most sensitive to the assumed size of the active operative pool. Lower bound (7,500 operatives): all N thresholds approximately double — e.g., 50% probability requires ~24,000-person orbit. Upper bound (20,000 operatives): all thresholds shrink by roughly one-third — 50% probability at ~9,000-person orbit. The second most sensitive variable is the geographic and community-type concentration of operatives in targeted communities, which is inferred rather than directly measured. Full sensitivity tables are in Appendix A.

_____________________________________

VIII. Expected Operatives Per Social Orbit

A complementary framing of the same data: rather than asking the probability of encountering at least one operative, we can ask the expected number of operatives across a given orbit size.

Expected value = N × p, where p = the per-person base rate (1/17,200 ≈ 0.0058%).

At the national base rate, a stable social network of 150 people yields an expected operative count of 0.0087 — meaning that across roughly 115 randomly selected Americans, their combined stable networks would together be expected to contain one operative. That is the correct reading of the small-network probability: the operative is rare, not absent.

Scaled to larger orbits: across a community institution of 2,000 people — a mid-sized congregation, a school parent body, a workplace — the expected number of active operatives is approximately 0.12, or roughly one operative per eight such institutions. Across a community of 17,200 people, the expected value reaches 1.0: one operative on average. Across a city neighborhood of 50,000 people, the expected count is approximately 3.

For targeted communities (estimated density 1 in 1,000): a congregation or organization of 1,000 people would be expected to contain approximately 1 active operative. An institution of 3,000 would be expected to contain approximately 3. This is consistent with documented cases where multiple informants were found to be operating in the same mosque or political organization simultaneously — a pattern that emerges naturally when operative density in targeted communities is substantially higher than the national average.

_____________________________________

THE TAKEAWAY ON NUMBERS

The per-person rate (1 in 17,200) tells you: most individuals you know are not operatives. The network probability tells you: across the full breadth of your community life, operative exposure is not remote. These are not contradictory. They describe different things. One needle in a haystack of 17,200 straws is still a needle — and most haystacks in targeted communities are considerably smaller than 17,200.

_____________________________________

IX. How to Recognize Operative Presence: The "Tells"

This section is, for many readers, the most practically valuable portion of this report. It is also the section that requires the greatest interpretive discipline. The cardinal rule is this:

_____________________________________

THE CARDINAL RULE OF TELLS

No single behavioral indicator is reliable as an identifier. Any individual tell listed below has a completely innocent explanation for the overwhelming majority of people who exhibit it. The signal is in clusters of behaviors over time, the pattern of community-level effects, and the combination of individual indicators with contextual factors. Misapplying this section to suspect innocent people would be both wrong and counterproductive — it would make operative work easier, not harder, by filling the community with false positives.

_____________________________________

A. Individual Behavioral Indicators

The following indicators are derived from court records, Inspector General reports, declassified COINTELPRO documents, and academic literature on human intelligence operations. Each is described with its innocent alternative interpretation.

1. Rapid Trust-Building with Unusual Depth

An operative's primary mission requirement is relationship-building. Trained operatives are often remarkably good at it — unusually good. The tell: someone who within weeks or months of joining a community has established unusually close relationships across multiple community factions, and who seems to work at building these relationships with a purposefulness that others notice but find difficult to articulate. Innocent explanation: extroverted, socially skilled new community members; people going through life transitions (new city, divorce, job change) who are actively seeking community.

2. Cross-Community Presence Without Obvious Reason

Operatives are often tasked with building relationships across community lines — attending multiple mosques, multiple political meetings, or multiple civic organizations simultaneously. The tell: someone who seems to move between otherwise separate community circles with unusual ease or purpose, particularly if their presence in each circle seems slightly incongruous with their stated identity or interests. Innocent explanation: community volunteers, journalists, academics, people with genuinely broad social interests.

3. Disproportionate Curiosity About Third Parties

Intelligence operatives are tasked with gathering information, not just building relationships. The tell: a pattern of asking detailed questions about other community members' backgrounds, beliefs, travels, associations, or finances that is disproportionate to the apparent relationship or context. The questions often feel more systematic than conversational — as if running through a mental checklist. Innocent explanation: genuinely curious people; journalists; people doing research.

4. Narrative-Steering in Group Conversations

Active discourse-shaping operatives are specifically tasked with steering group conversations toward or away from particular topics, framings, or conclusions. The tell: a pattern of consistently redirecting community discussions in a particular direction; introducing topics that seem designed to create division; pushing extreme positions that others in the group don't hold; consistently framing internal community disagreements in ways that amplify conflict. Innocent explanation: people with strong opinions; ideological community members; people going through radicalization genuinely (as opposed to performing it).

5. Introduction of Wedge Topics or Divisive Framings

COINTELPRO's most documented tactic was creating internal divisions within targeted communities. This tactic is confirmed in post-9/11 contexts by multiple court cases. The tell: someone who consistently introduces or amplifies the most divisive interpretations of community conflicts; who seems to take sides in ways designed to maximize fracturing rather than resolution; who spreads rumors or negative information about community leaders. Innocent explanation: people with genuinely strong views on internal community disputes; people experiencing conflict with specific individuals; ideologically committed members.

6. Encouragement Toward Illegal or Extreme Actions

This is the most distinctively operative tell, documented in multiple court cases including Fazaga and multiple terrorism entrapment cases. The tell: someone who consistently and specifically encourages others toward illegal activity, violent rhetoric, or extreme actions — particularly when others in the community have no interest in such activity. In documented cases, this often takes the form of repeated probing questions ("Have you ever thought about...?") or enthusiastic validation of others' angry statements combined with escalation. Innocent explanation: genuinely radicalized community members (though the operatives and the genuinely radicalized are often functionally indistinguishable, which is documented in court records as a recognized problem). This tell carries the highest weight of any individual indicator.

7. Unusually Easy Access to Resources, Platforms, or Connections

Operatives often carry resources — money, media connections, organizational connections, venue access — that serve as inducements for relationship-building. The tell: someone who seems to have an unusual ability to open doors, offer funding, or connect people with influential figures, in ways that are not clearly explained by their stated background. Innocent explanation: wealthy community members; well-connected professionals; philanthropists.

8. Inconsistencies in Background or Biography

Cover identities are difficult to maintain perfectly, especially over extended periods. The tell: small inconsistencies in biographical details that emerge over time; gaps in history that don't quite fit; stories that change slightly; an online presence that is either unusually thin or unusually constructed. Innocent explanation: people who have reasons to be private about their backgrounds; immigrants; people recovering from difficult personal histories.

B. Cluster Patterns: When Combinations Matter

Individual tells are noise. Clusters are signal. Based on the documented operational profiles in court records and declassified materials, the combinations that most warrant attention — not as accusations, but as factors justifying heightened caution in what information you share — are:

HIGH CAUTION CLUSTER

Rapid trust-building + cross-community presence + disproportionate questioning + narrative steering. This combination describes the documented profile of Craig Monteilh and multiple other confirmed operatives in court records.

ELEVATED CAUTION CLUSTER

Resource-offering + encouragement toward extreme positions + biographical inconsistencies. This combination describes documented FBI entrapment cases where agents or informants provided material support for operations that the target could not have independently executed.

MODERATE CAUTION CLUSTER

Consistent wedge-driving + disproportionate interest in community leadership + unusual attention to community information flows. This combination is documented in COINTELPRO records and is consistent with a monitoring and disruption function.

C. Community-Level Effects: The Most Reliable Signal

Paradoxically, the most reliable indicator of operative presence is not any individual's behavior but a community's collective experience. A successfully infiltrated community exhibits recognizable pathological patterns that are documented in the literature on COINTELPRO and its successors:

TRUST DEGRADATION

Community members begin to self-censor at meetings, become reluctant to discuss organizational plans, or withdraw from community participation altogether. This chilling effect is documented in the Fazaga case, in CAIR-NY accounts of New York Muslim communities, and in academic studies of communities targeted by post-9/11 surveillance.

LEADERSHIP ATTACKS

Documented operative programs specifically target community leaders for discrediting. If a community experiences a pattern of allegations, rumors, or scandals targeting its most effective advocates, this is a documented tactic, not merely a sociological pattern.

UNUSUAL FRACTURING

Communities naturally have conflicts, but operative-induced conflicts have a characteristic quality: they tend to divide otherwise aligned factions on lines that serve external interests, to appear suddenly around high-stakes moments (elections, major campaigns, public statements), and to persist despite community efforts at resolution.

EXTERNAL INFORMATION LEAKS

If community discussions that were not public somehow surface in press coverage, law enforcement actions, or opposition campaigns, this is a documented operative function — information gathering and dissemination.

D. Counter-Tells: What Trained Operatives Do to Suppress Detection

This subsection is critically important for the correct use of all information above. Trained operatives are explicitly taught to suppress their tells. The GCHQ JTRIG documents describe a ten-principle system for managing targets online that includes, as its first principle: flattery — build rapport and positive association before introducing doubt or gathering information. The JTRIG "Art of Deception" materials describe in academic detail how to build credible cover identities, manage inconsistencies, and avoid patterns that trained counterintelligence analysts would recognize.[29]

Key counter-tell strategies documented in operational literature:

GENUINE RELATIONSHIP-BUILDING

The most effective operatives invest real time in building relationships that feel authentic. They may be genuinely liked by community members. In multiple court cases, community members described initial disbelief that someone they considered a friend was an operative. This is a feature of the program, not a bug.

INFORMATION PATIENCE

Rather than pressing for information immediately, skilled operatives allow information to emerge organically over months or years. This patience makes the disproportionate questioning pattern harder to detect.

AVOIDING OPERATIONAL CLUSTERS

A skilled operative may exhibit only one or two of the individual tells listed above, specifically to avoid the cluster pattern. The operational playbook warns against creating detectable signatures.

USING CUTOUTS

In many cases, the operative does not personally gather information or steer discourse. They build a relationship with a trusted community member, and that trusted member — without knowing their contact is an operative — becomes the actual information conduit or discourse-shaper. This is the mechanism behind the cultivated community member dynamic discussed in Section X.

THE IMPLICATION FOR READERS

The tells section is most useful not for identifying specific individuals but for recognizing systemic patterns in your community. If your community is experiencing trust degradation, leadership attacks, and unusual fracturing, the cause may be operative activity — and awareness of that possibility changes how you respond to it.

X. The Cultivated Community: How Discourse Spreads Beyond the Operative

The operative is a pebble. The community is the pond. The ripple is the point.

This section addresses a phenomenon that is numerically more significant than the operative pool itself: the "cultivated community member" — an ordinary person who, without knowing they are doing so, has been seeded with narratives or framings that they then amplify organically through their genuine social networks. They are not operatives. They are not "in on it." They are the intended result of the operation.

A. The Mechanism: Trusted Messenger Theory

Public health communication research and military PSYOP literature converge on a principle documented as early as World War II: the most effective way to change community attitudes is not direct persuasion by authorities, but seeding ideas through trusted community members. This principle — known variously as "trusted messenger theory," "opinion leader theory," or "social diffusion" — is foundational to both public health campaigns and documented influence operations.

In the intelligence context: an operative builds a relationship with a respected community figure — a pastor, a union leader, a popular parent at the school, a well-liked neighbor. They introduce framings, narratives, or information to that person in the context of normal conversation. That person, trusting the operative as a friend, processes the information and may then share it with their own network — not as information from an operative, but as their own considered view. The operative's fingerprints are not on the transmitted idea.

B. The JTRIG Documentation

GCHQ's JTRIG documents describe this mechanism in academic detail. The "Behavioural Science Support" document describes using psychological principles — flattery, herd effects, social proof, authority signaling — to foster compliance and conformity in targets. It specifically describes using "leaders" as transmission vectors: creating the appearance of consensus where none exists (the Herd principle), and leveraging individuals' social relationships to amplify desired messages without those individuals knowing they are being used as amplification vectors.[30]

C. The Cascade Effect

The logical endpoint of this mechanism, applied at scale with modern social media amplification, is not simply community-level discourse shaping. It is — at the outer limit of documented logic — the shaping of national political discourse, electoral outcomes, and the selection of leadership at the highest levels of government.

This is not a claim that any specific election has been manipulated by domestic discourse operatives. It is a claim that the documented mechanics of trusted messenger seeding, applied to the national scale with the resources described in Section III, produce effects that are logically capable of reaching from street-level community conversations to media narratives to electoral choices. The chain is: operative seeds trusted community figure → figure amplifies to local network → local network shapes local political climate → aggregated local political climates determine electoral outcomes.

The academic literature on social influence and political behavior — particularly Robert Cialdini's work on influence principles, Cass Sunstein's research on information cascades, and Eli Pariser's documentation of filter bubbles — provides the civilian scientific backing for what JTRIG's "Behavioural Science Support" documents describe as operational tradecraft.

The honest analytical statement is this: the gap between "documented community-level discourse shaping" and "potential national electoral effects" is a gap in confirmed evidence, not a gap in logical mechanism. The mechanics are documented; the scale of application is classified.

XI. Faces in the Crowd: Documented Cases of Deep Operative Embedding

The programs described in this article are not abstractions. They have faces. Some of those faces have been revealed through court records, FBI documents obtained via FOIA, whistleblower disclosures, and congressional investigations. Others remain unknown to the people who trusted them.

This section examines confirmed cases of government-directed individuals who embedded themselves in American communities without disclosing their identity or purpose. The cases are organized into three clearly labeled tiers, because the evidence base differs significantly across them — and because that difference matters for how honestly we can characterize each one.

_____________________________________

HOW TO READ THIS SECTION

TIER 1

Confirmed Government Employees Operating Undercover: Direct federal employees whose identity was concealed from the community they entered. These cases are confirmed through FBI documents, congressional subpoenas, or court testimony. TIER 2

Government-Tasked Civilian Assets: Civilians paid and directed by federal agencies to embed themselves in communities under false identities. Legally and operationally distinct from Tier 1, but functionally similar from the community's perspective. RELATED

State and Local Programs: Cases involving local or state law enforcement, often connected to federal programs through fusion centers or joint task forces. The rarity of confirmed Tier 1 cases in the public record is not evidence that such embedding is rare. It is evidence that the program is designed to be invisible. The cases below are the ones that broke through that design — through leaks, litigation, and the rare operative who talked.

_____________________________________

TIER 1: Confirmed Government Employees, Identity Concealed

Case 1: The FBI Inside Richmond's Catholic Churches (2022--2023)

In January 2023, a whistleblower named Kyle Seraphin — a former FBI special agent — leaked an internal FBI document to the public. What it revealed surprised even many who had been watching domestic surveillance closely for years.

The document, dated January 23, 2023, and titled "Interest of Racially or Ethnically Motivated Violent Extremists in Radical-Traditionalist Catholic Ideology Almost Certainly Presents New Mitigation Opportunities," had been produced by the FBI's Richmond, Virginia field office. It identified Catholics who prefer the Traditional Latin Mass as a potential recruitment pool for violent extremists — and proposed using local churches as "new avenues for tripwire and source development." In plain English: the FBI planned to build a network of sources inside Catholic parishes.

The document was quickly retracted after it became public. FBI Director Christopher Wray called it "aghast"-inducing and said it didn't meet bureau standards. But the damage to the claim of ignorance was already done. Congressional investigation revealed something the FBI had not initially disclosed: at least one undercover FBI employee — not a civilian informant, but an actual federal government agent — had already been operating inside Catholic church settings in the Richmond area, and that agent's reporting was used to develop the memo. The FBI had also already begun interviewing members of local Catholic clergy before the memo was finalized. This was confirmed through the FBI's own heavily redacted response to a congressional subpoena and through subsequent House Judiciary Committee reports.[[31]]

The investigation uncovered additional details that illustrate how far the program had extended. The FBI had interviewed a priest — not as a suspect, but to get him to inform on a parishioner. When the priest became uncomfortable and said he needed to speak with church leadership and an attorney before answering questions, the FBI opened an investigation into the priest himself. Agents investigated his background, monitored his travel, and looked into his financial records. The Judiciary Committee's report concluded: "There appeared to be no legitimate law-enforcement purpose for investigating this priest."[[32]]

The memo was accessed by over 1,000 FBI employees before its deletion. Multiple field offices — including Los Angeles, Milwaukee, Louisville, and Portland — were involved in coordinating the effort. The FBI's own Operational Technology Division was directed to delete not just the memo but the logs identifying who had accessed it — a destruction of records that itself prompted a separate congressional inquiry.[[33]]

The congregants who sat next to the undercover agent in those Richmond pews never knew. They still don't know who it was.

_____________________________________

WHAT MAKES THIS TIER 1

This was a government employee — not a paid civilian — sitting in a house of worship without identifying themselves. Their identity was concealed both from the congregation and from the public record. It was discovered only because a whistleblower leaked the planning document. Without that leak, the operation would have continued without any public knowledge.

_____________________________________

Case 2: The FBI Undercover at a Toledo Mosque (2004--2006)

Before Operation Flex in Southern California, there was Toledo, Ohio. An FBI undercover employee using the cover name "Griffin" spent months embedded in the Toledo Muslim community. He established a cover identity as a disgruntled ex-soldier with sympathies toward jihad. He attended a local mosque. He wore a wire.

His mission, according to Newsweek reporting on the case, was initially to "hang around a local mosque" and gather information on individuals the FBI had flagged as "persons of interest" — up to 20 targets at the outset, whose names were not even shared with Griffin at first. He was simply tasked with mapping the community. As the Newsweek report noted, the proposed Mukasey Guidelines of the same era would explicitly expand this model: giving FBI agents "greater latitude to task undercover informants to collect intelligence in entire communities where potential threats are deemed to exist, rather than simply targeting specific individuals suspected of wrongdoing."[[34]]

The case ultimately produced convictions. But the process that led to those convictions — a government employee embedded in a mosque under false identity, gathering information on people who had no idea they were being watched — was identical in structure to what the article describes as the operative template. Griffin's identity was only disclosed because the case went to court and he had to testify.

TIER 2: Government-Tasked Civilian Assets

These cases involve civilians paid and directed by federal agencies to embed themselves in communities using false identities. They are not federal employees, but they operate at the direct instruction of federal handlers, carry out mission tasks assigned by those handlers, and report back to them. From the community's perspective, they are indistinguishable from Tier 1.

They are separated here not to minimize their significance but because the legal and operational architecture is different — and because that architecture is itself a finding. The government appears to use civilian assets as the primary human face of community penetration specifically because doing so creates legal distance and operational deniability that a direct government employee cannot provide.

Case 3: "Farouk al-Aziz" — The Man Who Converted to Islam for the FBI (Southern California, 2006--2007)

His real name was Craig Monteilh. He was a fitness trainer with a criminal history who had been working as a confidential informant for various federal agencies for years. In 2006, two FBI agents approached him with an unusually ambitious assignment.

They wanted him to pose as a Muslim convert and infiltrate mosques across Southern California — home to an estimated half-million Muslims. He would adopt a new name. He would take the shahada — the Islamic declaration of faith — in front of hundreds of congregants during Ramadan. He would work out at gyms with Muslim men, play video games, go on dates with Muslim women, and attend up to four mosques in a single day. His FBI handlers gave him daily quotas for the number of Muslims whose contact information he should collect. They told him to focus on the most devout — those who prayed regularly and wore traditional clothing. His handlers called the operation "an experiment to see if I could actually fool an entire community." He was paid $177,000.[[35]]

For fourteen months, he recorded hundreds of hours of conversations inside mosques, people's homes, and businesses — using a car key fob and other hidden devices. His FBI handlers had a listening device inside the imam's private counseling office, where the imam — a licensed therapist — held confidential sessions with parishioners. When mosque members left Monteilh's key fob behind in the prayer hall as a lost item, it recorded from inside the imam's office when the keys were brought there. Not a single terrorism charge resulted from the operation.[[36]]

The community discovered who he was only in 2009 — two years after he left — when Monteilh was identified as an informant in an unrelated fraud case. "They looked us all in the eyes and assured us unequivocally that they were not spying on us," the imam later said of the FBI officials who had held a community town hall meeting at the mosque. "We trusted them. But they lied, and our sacred community was shaken to its core."[[37]]

Case 4: "Karen Sullivan" — The Activist Who Held the Keys (Minneapolis, 2008--2010)

She came to her first Anti-War Committee meeting in early 2008, presenting herself as a lesbian with a teenage daughter who had recently left a difficult relationship. Her name was Karen Sullivan. She was passionate, organized, and reliable. She showed up to every meeting. She started chairing them. She handled the group's bookkeeping. She held a key to their office.

She traveled with members. She attended birthday parties. She visited people at home when they were sick. She got to know their children. Over two and a half years, she became one of the most trusted members of two organizations: the Twin Cities Anti-War Committee and, later, the Freedom Road Socialist Organization. She was so trusted that when early accusations surfaced that she might be an informant, a close friend of hers publicly called it "a COINTELPRO lie." He was wrong.[[38]]

In the summer of 2009, Sullivan joined two of her fellow activists on a solidarity trip to Palestine. Somehow, Israeli security forces were waiting when the plane landed. The two activists traveling with Sullivan were barred from entry and eventually deported. Sullivan took the flight home. What the other two women didn't know was that Sullivan had passed their identities to Israeli authorities on behalf of the U.S. government.[[39]]

On September 24, 2010, the FBI raided the homes and offices of anti-war activists across the Midwest. At the Anti-War Committee's office in Minneapolis, FBI agents did not break the door down. They used Karen Sullivan's key. She had disappeared weeks earlier, saying she had family business to attend to. She never came back. One activist later sent her a text message, half-hoping the whole thing wasn't true. The message was never answered.[[40]]

Prosecutors confirmed to defense attorneys that "Karen Sullivan" was a law enforcement officer working undercover. Her real identity has never been publicly disclosed.

Case 5: Brandon Darby — The Hurricane Katrina Hero (Texas/New Orleans, 2007--2008)

Brandon Darby was not a stranger who appeared out of nowhere. He was a co-founder of Common Ground Relief, the beloved grassroots disaster relief organization that became famous for its work in New Orleans after Hurricane Katrina. He was respected. He was charismatic. He was a mentor to younger activists. People called him a hero.

He began secretly working for the FBI in November 2007. He admitted this himself, in a December 2008 open letter, only after his former colleagues were about to go public with the evidence. In the eighteen months before his admission, he had worn recording devices to protest planning meetings. He wore a transmitter embedded in his belt at the 2008 Republican National Convention in St. Paul. He encouraged escalation toward violence — "always the one to suggest violence, when the rest of us clearly disagreed," according to fellow activist Gabby Hicks. Two young men he mentored ended up in federal prison.[[41]]

When the accusations first surfaced against him, his closest allies defended him. "I trusted him completely," one longtime co-worker said. The community had worked alongside him for years. Some had built relief programs with him in the rubble of New Orleans after one of the worst natural disasters in American history. None of them knew he was reporting to federal handlers throughout.

Case 6: "Anna" — The Romantic Informant (Environmental Movement, 2004--2006)

She was eighteen years old when she started her career as a government informant. She had gotten a taste for the work after infiltrating an anti-globalization protest group for a community college paper. A police officer in her class was impressed and put her in touch with law enforcement contacts. Within a short time, she was working for the FBI.[[42]]

Known only as "Anna," she embedded herself in radical environmental activist circles in the mid-2000s. She was young enough to pass without suspicion. She cultivated a romantic relationship with a man named Eric McDavid. The relationship — including flirtatious emails she wrote to him — was referred to FBI behavioral psychologists as part of the operation. McDavid was convicted of conspiracy to bomb infrastructure and sentenced to nearly twenty years in prison.

Throughout the entire trial, prosecutors insisted there was no romantic relationship. "The defendant's claim of a romantic relationship between him and the informant is categorically untrue," they told the court. The government also insisted that approximately 2,500 pages of discovery documents did not exist. They existed. Supporters filed FOIA requests for years. In late 2014, the government was forced to hand over the hidden files. They included her flirtatious emails leading him on. They included evidence that the FBI had referred those private messages to behavioral psychologists. The government had lied to the court.[[43]]

McDavid was released with time served after nine years. His conviction was reduced to a lesser charge in a settlement. "Anna's" real name has never been publicly disclosed.

RELATED: State, Local, and Fusion Center Programs

The cases below involve local or state law enforcement rather than direct federal agencies. They are included because they illustrate the same operational logic applied at the state and local level — and because the fusion center architecture specifically blurs the federal/local line, with federal agencies funding, training, coordinating, and receiving intelligence from these programs.

The "Bob Smith" Account (Memphis, 2015--2018)

A white Memphis police detective named Timothy Reynolds created a Facebook profile named "Bob Smith": a left-leaning, pro-BLM man of color from Fayette County who described himself as a "Protestant, anarchist, protester, and activist." In private Facebook messages, when one activist grew suspicious, Bob Smith wrote: "I'm not a cop."[[44]]

For at least three years, Bob Smith befriended dozens of Black Lives Matter activists in Memphis, accessing their private posts and group discussions. The Memphis Police Department used the intelligence gathered to compile dossiers on activists, collect the names of people who "liked" particular posts, and create Joint Intelligence Briefings with names, addresses, and social media accounts of people to watch. Officers in plain clothes attended Black-owned food truck festivals, church meetings, and a memorial service for a young man killed by police. When an activist was placed on a watch list, the Mayor of Memphis instructed police to arrest anyone on that list at a community protest.[[45]]

Reynolds admitted in court to the Bob Smith account. A federal judge ruled the department had violated a 1978 consent decree specifically banning political intelligence gathering. Facebook disabled the Bob Smith account when the story broke — and found six more fake police accounts linked to the department.[[46]]

The NYPD Undercover on the College Rafting Trip

An NYPD undercover officer joined a college camping and rafting trip organized by a Muslim student group. The officer recorded how often the students prayed during the trip. No criminal activity was alleged or discovered. The surveillance was part of the NYPD's Demographics Unit program, which mapped, photographed, or infiltrated more than 250 mosques and 31 Muslim student organizations across New York City. In six years of operation, the unit produced not a single criminal lead.[[47]]

_____________________________________

THE PATTERN ACROSS ALL CASES

Every person in every case above had a plausible reason to be there. Every one of them built relationships that felt real — because the relationships were designed to feel real. Every community found out only through a whistleblower, a lawsuit, a FOIA request, or an operative who broke from their handlers and talked. None of the communities found out by noticing. That is the point. The programs are successful precisely because they are undetectable in the moment. What this section gives you is not a method for spotting the next operative. It gives you something more important: the documented proof that the next operative is, statistically, already there.

_____________________________________

XII. What This Means for Communities: Awareness Without Paranoia

This report's purpose is not to leave readers paralyzed by suspicion. The correct response to the probability finding is not to trust no one. It is to be a better, more deliberate participant in your community's information environment.

A. Protect Your Community's Information Hygiene

Operational targeting depends on information gathering. Communities that are thoughtful about what they share, with whom, and in what settings are harder to map and monitor. This does not mean secrecy about legitimate activities — it means discretion about internal organizational planning, membership lists, and strategic discussions, particularly in communities that have historically been targeted.

B. Invest in Trust Infrastructure

Operative campaigns depend on exploiting thin or brittle trust. Communities with deep, long-standing relationships among members, transparent decision-making processes, and robust conflict resolution practices are more resilient to operative-induced fracturing. The chilling effect of surveillance is real and documented — but its antidote is community solidarity, not withdrawal.

C. Be Alert to Community-Level Effects

The community-level effects described in Section X.C — trust degradation, leadership attacks, unusual fracturing — are more actionable signals than individual behavioral tells. If your community is experiencing these patterns, the possibility of operative activity deserves consideration alongside other explanations.

D. Know Your Rights

The Electronic Frontier Foundation, ACLU, and National Lawyers Guild publish current guides on rights when approached by FBI agents or law enforcement. FBI agents are not legally required to identify themselves as agents in all contexts, but voluntary interviews can be declined. Knowing this is protective without requiring any accusatory action toward any individual.

E. Document Anomalies

If you experience patterns consistent with operative activity — or if your community does — maintaining records of specific incidents, dates, and statements, and sharing these with civil liberties organizations (ACLU, Council on American-Islamic Relations, Center for Constitutional Rights, Brennan Center) can contribute to the litigation and legislative record that has historically been the primary accountability mechanism for these programs.

XIII. Conclusion

This investigation set out to answer a question that most Americans have never thought to ask: what is the probability that someone in my community — at my place of worship, my child's school, my political organization, my neighborhood — is actively working to shape the discourse of that community on behalf of a government entity?

The answer, built from public budgets, court records, Inspector General findings, declassified programs, and peer-reviewed research, has two parts that must be held together. The per-person rate — approximately 1 in 17,200 American adults is an active discourse-shaping operative — is small. Most people you know are not operatives. But the network probability — the chance that at least one such person exists somewhere in the thousands of people a socially active American moves through over years of community life — grows steadily with orbit size, crossing 25% at around 5,000 people and 50% at around 12,000. For members of historically targeted communities, operative density is estimated to be ten to seventeen times higher, compressing the 50% threshold to a congregation or organization of roughly 700 people. These are probabilistic inferences from the best available public evidence, transparently constructed, with explicit sensitivity analysis in Appendix A.

Those numbers change substantially for members of communities the evidence identifies as heavily targeted. For a Muslim American whose mosque has 700 active congregants, the probability of at least one operative somewhere in that community crosses 50%. For members of racial justice organizations, environmental advocacy groups, or LGBTQ+ communities of similar size, the same threshold applies. These are not fringe estimates derived from speculation — they follow directly from the documented operative density in communities where court records, Inspector General reports, and congressional investigations have confirmed repeated, sustained, intentional infiltration. The 10-17x multiplier is not an alarm designed to frighten. It follows from the documented evidence applied to the probability model — and readers should hold two things simultaneously: the historical record of targeted infiltration is extensively documented and not in serious dispute; the specific operative density estimate is a triangulated inference, not a directly measured figure. What the model shows is what the math produces given those estimates. That is a meaningful finding even under uncertainty. Members of these communities deserve to encounter it in the first pages of this report, not buried in its appendices.

What the evidence does establish with certainty is: these programs exist, they have always existed, they have targeted ordinary Americans exercising ordinary constitutional rights, their scale has grown significantly since 2001, and their methods have been shared with and shaped by close intelligence allies whose techniques are documented in detail in publicly available materials.

A word on what the probability model does and does not claim: the figures in this report show what follows mathematically from the operative pool estimates. The historical record — COINTELPRO, Operation Flex, Karen Sullivan, the Richmond Catholic churches, Section 702 — is documented, confirmed, and not in serious dispute. The operative pool size (central estimate: 15,000 community-tasked assets) is a triangulated inference from public records, not a directly measured figure. The two should be read as reinforcing but distinct claims: one establishes that the phenomenon is real and has been deployed against American communities; the other models its probable current scale. Readers should not conflate the strength of the historical evidence with the precision of the probabilistic output. The model's value is in showing the implications of the documented scale — not in asserting those implications with the same certainty as the underlying court records. The most important conclusion is not the probability number. It is the frame. For decades, the suggestion that the government might have someone in your mosque, your community meeting, or your political organization has been the kind of thing that gets people dismissed as paranoid. This investigation demonstrates that this dismissal is not warranted by the evidence. The programs are real. The people are real. The communities are real.

Awareness is not the same as paranoia. Paranoia mistakes the possible for the certain and treats every individual as a threat. Awareness recognizes that a statistically probable phenomenon can shape community dynamics without requiring that any specific individual be identified or accused. The goal of this report is not to make you look at your neighbor differently. It is to make you look at your community's discourse differently — with appropriate epistemic humility about where the ideas circulating in it came from, and who may have an interest in keeping them circulating.

It only takes one operative to poison a well. The remedy is not to stop drinking — it is to know that the well can be poisoned, to recognize the symptoms, and to build communities robust enough to notice and resist.

Appendix A: Full Methodology and Sensitivity Analysis

The probability calculation in Section VII uses the following explicit assumptions, all of which are subject to revision as better data becomes available.

Per-Person Base Rate

Central estimate: 15,000 active operatives / 258,000,000 U.S. adults = 0.0058%, or approximately 1 in 17,200. This is the probability that any specific individual selected at random from the U.S. adult population is an active discourse-shaping operative or tasked asset. Lower bound (7,500 operatives): 1 in 34,400. Upper bound (20,000 operatives): 1 in 12,900. All network probability thresholds scale proportionally.

Active Operative Pool (Central Estimate: 15,000)

Lower bound: 7,500 — conservative interpretation of FBI CHS figures (15,000 total x 20% community-engagement-tasked = 3,000) plus DHS/fusion center estimates at lower ends, plus contractor floor. Central estimate: 15,000 — FBI CHS (15,000 x 25% community-tasked = 3,750) plus DHS CVE field staff (~1,000) plus fusion center active community sources at midpoint (~5,000) plus contractor community personnel at midpoint (~3,000) plus state/local assets (~2,250). Upper bound: 20,000 — applying higher percentage estimates for each category.

Network Probability Formula

P(at least one operative in orbit of N) = 1 − (1 − p)^N For small p, this approximates 1 − e^(−pN). Both formulations were used; results agree to four decimal places at the values used in this analysis. Key thresholds at central estimate (p = 1/17,200):

  • N = 150stable network0.87%

Targeted Community Density Estimate

The targeted community density (estimated 1 in 1,000, or 10--17x the national baseline) is derived by allocating approximately 5,000 of the 15,000 central-estimate operatives to historically documented targeted communities (Muslim Americans ~3.5M active community participants, Black activist organizations, environmental groups, LGBTQ+ advocacy organizations — combined estimated active community participant pool ~5M). This yields 5,000/5,000,000 = 1 in 1,000. This is an inference, not a directly measured figure, and carries wider uncertainty than the national base rate. Key thresholds at targeted density (p = 1/1,000): • N = 105: 10% • N = 288: 25% • N = 693: 50% • N = 1,386: 75% • N = 2,301: 90% • N = 2,994: 95% • N = 4,603: 99%

Social Orbit Size Assumptions

Stable network (Dunbar, 1992, 1998): ~150 people. Extended functional orbit: estimated 2,000--12,000+ for socially active urban adults, based on typical institutional participation (workplace 50--500, congregation 100--500, school community 200--500, neighborhood 100--400, civic organizations 20--200, service venue regulars 50--200). Cumulative orbit over 10+ years of city residence: potentially 10,000--50,000+ unique individuals encountered on a recurring basis.

Appendix B: Documented Programs (Partial List)

_____________________________________

POST-9/11 DOMESTIC PROGRAMS WITH EVIDENCE OF COMMUNITY DISCOURSE-SHAPING FUNCTIONS
Program/OperationStatus & Documentation
FBI Domain Management / Operation FlexDOCUMENTED — Fazaga v. FBI, Supreme Court (2022); The Intercept reporting (2021)
NYPD Demographics UnitDOCUMENTED — AP Pulitzer investigation (2011); civil rights settlement (2018)
FBI CVE Shared Responsibility CommitteesDOCUMENTED — DHS/DOJ program documentation; academic reviews
DHS CVE Grant ProgramDOCUMENTED — DHS.gov; Congressional testimony; grant award records
Fusion Center Network (80 centers)DOCUMENTED — Senate Permanent Subcommittee on Investigations report (2012); ACLU reports
JTTF Community Outreach ProgramsDOCUMENTED — FBI program documentation; ACLU FOIA litigation
FBI "Black Identity Extremist" ProgramDOCUMENTED — Internal assessment leaked 2017; Congressional hearings
DHS Monitoring of BLM (2014--2020)DOCUMENTED — FOIA disclosures; Vice/Intercept/ACLU reporting
JTRIG (UK/Five Eyes)DOCUMENTED — Snowden archive; The Intercept (2014--2015); NSA sharing confirmed by classification markings
FBI Assessment Authority (Mukasey Guidelines)DOCUMENTED — Published DIOG; EFF FOIA disclosures; Congressional testimony
_____________________________________

Footnotes and Sources

1. COINTELPRO, Wikipedia (citing Church Committee Final Report, 1976); FBI memo, "COINTELPRO — New Left," 1968 (FBI FOIA Vault). Church Committee, "Final Report of the Select Committee to Study Government Operations with Respect to Intelligence Activities," U.S. Senate, 1976.

2. Church Committee Final Report (1976), cited in IRP/FAS Intelligence Budget Data; The Intercept, "How the FBI Recruits and Handles Its Army of Informants" (annotation set, citing FBI policy documents).

3. FAS/IRP, "U.S. Intelligence Budget Data," irp.fas.org; ODNI, "DNI Releases FY 2024 Budget Request Figure," Press Release No. 4-23; Breaking Defense, "ODNI, Pentagon reveal FY23 intelligence budget at nearly $100 billion" (Oct. 2023).

4. Congressional Research Service, "Intelligence Community Spending Trends," R44381 (updated Sept. 26, 2024); Congress.gov.

5. The Intercept, "How the FBI Recruits and Handles Its Army of Informants" (annotation set, citing FBI Confidential Human Source Policy Guide 1018PG, FBI FOIA Vault); Attorney General's Guidelines Regarding the Use of FBI Confidential Human Sources (2020), DOJ.

6. FBI Domestic Investigations and Operations Guide (DIOG), partially declassified, EFF FOIA disclosure; Brennan Center, "The FBI Targets a New Generation of Black Activists" (June 26, 2020).

7. Fusion Center, Wikipedia (citing DHS, Senate PSI report); ACLU, "ACLU Sues Federal Agencies for Information on Intelligence Hubs Used to Surveil Protestors and Communities of Color" (July 2024).

8. Senate Permanent Subcommittee on Investigations, "Federal Support for and Involvement in State and Local Fusion Centers" (Oct. 3, 2012); Fusion Center Wikipedia article, citing specific fusion center incidents.

9. White House, "Empowering Local Partners to Prevent Violent Extremism in the United States" (Aug. 2011); DHS CVE Strategy (Oct. 2016), dhs.gov; HSToday, "From 9/11 to Today: The Evolution of U.S. Terrorism Prevention."

10. DHS, "Announcing the CVE Grants Program," dhs.gov/archive/news/2016/07/06; DHS Written Testimony to House Homeland Security Subcommittee (Sept. 22, 2016), dhs.gov.

11. DHS, "DHS Countering Violent Extremism Grants," dhs.gov/cvegrants; Congressional appropriation record, FY16.

12. The Intercept, "FBI Informant's Role in Upcoming SCOTUS Case on Post-9/11 Surveillance of Muslims" (Sept. 12, 2021); ACLU, "How the FBI Spied on Orange County Muslims" (March 2024); NPR, "Supreme Court to hear arguments on FBI's surveillance of mosques" (Nov. 8, 2021).

13. Associated Press, Adam Goldman and Matt Apuzzo, "With cameras and informants, NYPD eyed mosques" (Feb. 23, 2012) (Pulitzer Prize-winning series); Alimahomed-Wilson, "When the FBI Knocks: Racialized State Surveillance of Muslims," SAGE Journal (2018), Rutgers CSRR.

14. Brennan Center, "The Costs of 9/11's Suspicionless Surveillance" (Sept. 2021).

15. Rights and Dissent, "Recap: What We've Learned About Surveillance of Black Lives Matter" (March 7, 2016); The Intercept reporting (2015).

16. ACLU, "Is the FBI Setting the Stage for Increased Surveillance of Black Activists?" (Oct. 2017); Brennan Center, "The FBI Targets a New Generation of Black Activists" (June 2020).

17. UC Berkeley Library, "'Discredit, disrupt, and destroy': FBI records acquired by the Library reveal violent surveillance of Black leaders" (2020), citing leaked FBI IRON FIST documents via The Young Turks.

18. PBS NewsHour, "Intelligence fusion centers under scrutiny, accused of undermining civil rights" (Jan. 6, 2023); ACLU, "ACLU Urges Court to Order Government to Release Records on Fusion Center and JTTF Surveillance" (Feb. 3, 2025).

19. Defending Rights & Dissent, catalog of FBI political surveillance post-2010; Collin Poirot, "The Anatomy of a Federal Terrorism Prosecution," Columbia Human Rights Law Review (2020).

20. OutHistory, "FBI and Homosexuality: 1950--1959" (citing D'Emilio, Sexual Politics, Sexual Communities); Eric Cervini, Vice, "Spying Before Stonewall" (Aug. 9, 2024); Douglas M. Charles, Hoover's War on Gays (2015).

21. GLAD Law, "The Resistance Brief: Strategies Against Surveillance" (March 28, 2025); ACLU, "Abusive Surveillance Is an LGBTQ Rights Issue" (Feb. 27, 2023).

22. Bloomberg Law/Bloomberg Government News, "DHS Scraps Ban on Surveillance Based on Sexual Orientation" (Feb. 18, 2025); LGBTQ Nation, "Homeland Security can now spy on LGBTQ+ people & groups as a threat to U.S. safety" (Feb. 2025).

23. GLAD Law, ibid.; Moriba Jah, "The DHS Just Opened the Door to LGBTQ+ Surveillance," Medium (March 1, 2025).

24. DHS CVE Strategy (2016); DHS Written Testimony, "Academic Subcommittee on Countering Violent Extremism," June 5, 2017, dhs.gov.

25. DHS, "Academic Subcommittee on Countering Violent Extremism," Final Report, May 30, 2017, dhs.gov.

26. The Intercept, Glenn Greenwald, "How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations" (Feb. 24, 2014); NBC News, "Exclusive: Snowden Docs Show British Spies Used Sex and 'Dirty Tricks'" (Feb. 7, 2014).

27. JTRIG Wikipedia article; GCHQ internal GCWiki page on JTRIG tools (last edited July 2012), published by The Intercept; Snowden Doc Search, edwardsnowden.com.

28. Mandeep K. Dhami, Ph.D., "Behavioural Science Support for JTRIG's Effects and Online HUMINT Operations," GCHQ/Human Systems Group (March 10, 2011), published by The Intercept; The Intercept, "Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research" (June 22, 2015).

29. GCHQ/JTRIG, "The Art of Deception: Training for Online Covert Operations," classified SECRET//SI//REL TO USA, FVEY (2012), published by The Intercept (Feb. 24, 2014); "The Intelligence Playbook," alimcforever.substack.com (citing Snowden archive, March 2026).

30. Dhami, ibid.; Robert B. Cialdini, Influence: The Psychology of Persuasion (1984, rev. 2006); Cass R. Sunstein, Republic.com 2.0 (2007); Eli Pariser, The Filter Bubble (2011).

31. House Judiciary Committee, "Documents Reveal FBI Sought to Develop Sources in Local Catholic Churches," press release, April 10, 2023; House Judiciary Committee, "New Report Details the Extent of the FBI's Weaponization of Law Enforcement Against Traditional Catholics," September 2024; FBI response to congressional subpoena (18 pages, heavily redacted), March 23, 2023; Washington Times, "FBI interviewed priest, choir director in rogue probe of Catholic church's link to terrorism," December 4, 2023.

32. House Judiciary Committee, "Judiciary Committee: FBI spied on Catholic priest for not divulging info on parishioner," July 22, 2025; Catholic News Agency reporting on same; FBI Richmond Catholic memo Wikipedia, citing House Judiciary Committee interim report.

33. FBI Richmond Catholic memo Wikipedia; Catholic Herald, "Biden-era FBI misled Congress over Catholic surveillance, documents reveal," June 9, 2025; Senate Judiciary Committee, Senator Grassley correspondence to FBI Director Patel, June 2025; DOJ OIG, report on Richmond memo, April 18, 2024.

34. Newsweek, "Terror Watch: FBI Agents Infiltrate Muslim Groups" (March 14, 2010), citing Toledo terrorism prosecution court records and FBI Cleveland Special Agent in Charge Frank Figliuzzi; Human Rights Watch, "Illusion of Justice: Human Rights Abuses in US Terrorism Prosecutions" (July 2014).

35. The Intercept, "FBI Informant's Role in Upcoming SCOTUS Case on Post-9/11 Surveillance of Muslims" (Sept. 12, 2021); ACLU, "How the FBI Spied on Orange County Muslims and Attempted to Get Away with It" (March 2024); The New Republic, "The Case of the Fitness Instructor Who Spied on California Muslims" (Nov. 28, 2023); Fazaga v. FBI, ACLU SoCal case page; Time, "FBI Claims Secret Evidence Trumps Religious Discrimination" (June 8, 2023).

36. ACLU SoCal, Fazaga v. FBI case summary; Middle East Eye, "How an FBI informant destroyed the fabric of an entire community" (Nov. 10, 2021); NPR, "Supreme Court to hear arguments on FBI's surveillance of mosques" (Nov. 8, 2021); This American Life, "The Convert" (March 2022, updated from 2012 episode).

37. ACLU, ibid.; NPR, ibid.; Charity & Security Network, "Lawsuit Alleges FBI Informant Used Indiscriminate Surveillance at California Mosques" (citing Monteilh sworn statements and FBI court filings).

38. City Pages (Minneapolis), "Who was Karen Sullivan? Minnesota activists remember the undercover government agent" (Jan. 20, 2011); City Pages, "Secret government informer 'Karen Sullivan' infiltrated Minnesota activist groups" (Jan. 12, 2011); Defending Rights & Dissent, "Ten Years Later: FBI's Politically Motivated Sting Operation" (Sept. 24, 2020); Charity & Security Network, "FBI Infiltrator of Anti-War Group Exposed" (Jan. 2011).

39. Jess Sundin (Anti-War Committee founding member) press conference statement, Jan. 12, 2011, cited in City Pages, ibid.; World Socialist Web Site, "FBI infiltrator prepared government raid on antiwar groups in Minneapolis and Chicago" (Jan. 26, 2011); Rochester Indymedia, "FBI Infiltration of Anti-War Movement in Minneapolis" (Jan. 2011).

40. City Pages, "Who was Karen Sullivan?," ibid. (the unanswered text exchange is quoted in full in the City Pages account; the activist is identified as Katrina Plotz); FBI warrant affidavit unsealed Feb. 2014, cited in Defending Rights & Dissent, ibid.

41. Brandon Darby Wikipedia article (citing court records, Austin Informant Working Group documents, Democracy Now! reporting); Texas Tribune, "Radical, FBI Informant, Conservative Hero: the Lives of Brandon Darby" (April 7, 2011); Democracy Now!, "Prominent Austin Activist Admits He Infiltrated RNC Protest Groups as FBI Informant" (Jan. 6, 2009); Political Research Associates, "From Movements to Mosques, Informants Endanger Democracy" (Aug. 1, 2009).

42. The Intercept, "An FBI Informant Seduced Eric McDavid Into a Bomb Plot. Then the Government Lied About It." (Nov. 19, 2015); Vice, "How an FBI Informant Sent a Radical Environmentalist to Prison, and How He Got Out Again" (July 28, 2024).

43. The Intercept, ibid.; Vice, ibid. The government's statement "categorically untrue" regarding the romantic relationship is cited in both; the 2,500 pages of hidden documents are described in both; McDavid's release with time served is confirmed in both sources.

44. Washington Post, "Memphis police used fake Facebook account to monitor Black Lives Matter, trial reveals" (Aug. 23, 2018); The Appeal, "Meet 'Bob Smith,' The Fake Facebook Profile Memphis Police Allegedly Used to Spy on Black Activists" (Aug. 2018); NBC News, "'Bob Smith' was a Black Lives Matter sympathizer with lots of Facebook friends. It turned out he was a white undercover cop." (Oct. 5, 2018).

45. The Root, "How Memphis Police Created an Undercover Operation to Spy on Black Lives Matter" (Aug. 11, 2018); Courthouse News Service, "Judge Finds Memphis Illegally Spied on Activists" (Oct. 29, 2018); ThinkProgress, "Memphis police used fake Facebook account to monitor Black Lives Matter" (Aug. 2018, citing ACLU Tennessee deposition records).

46. EFF, "Facebook Warns Memphis Police: No More Fake 'Bob Smith' Accounts" (Sept. 2018); Courthouse News, ibid.; Officer Timothy Reynolds deposition testimony, August 2018, ACLU Tennessee v. City of Memphis.

47. PBS NewsHour, "Post-9/11 surveillance has left a generation of Muslim Americans in a shadow of distrust and fear" (Sept. 16, 2021, citing the rafting trip case from Raza v. City of New York); Alimahomed-Wilson, "When the FBI Knocks: Racialized State Surveillance of Muslims," SAGE Journal (2018), Rutgers CSRR (citing AP Pulitzer investigation on NYPD Demographics Unit and Lt. Paul Galati's sworn testimony that the unit produced zero criminal leads in six years).

48. FBI Section 702 Query Violations, Wikipedia (citing FISC April 2022 Opinion, declassified May 2023); The Register, "FBI abused surveillance law to snoop on protesters, donors" (May 22, 2023); Brennan Center, Section 702 Resource Pages (2023--2026); State of Surveillance, "Section 702: The Law That Lets Feds Search Your Messages Without a Warrant" (Jan. 2026). The 3.4 million queries figure is from FBI testimony and congressional reporting cited across these sources.

49. FISC, April 2022 Opinion (declassified May 2023), cited in Brennan Center, "Congress Should Not Reauthorize Warrantless Surveillance of Americans" (2023); The Nation, "The FBI Is Back to Its Old Habits: Illegally Spying on Protesters" (June 12, 2023); ACLU, "Government Releases New Court Opinions Highlighting Further Abuse of Warrantless FISA Surveillance" (July 2023). The 133 racial justice protesters, 19,000 donors, state judge, and "Middle Eastern descent" query are all documented in these declassified opinions and summarized in the Brennan Center and ACLU materials cited.

50. Jake Laperruque, Center for Democracy and Technology, quoted in The Register (May 22, 2023), ibid. The FISA Court's "persistent and widespread" language is from the April 2022 FISC opinion. The DOJ concession that the searches were unlikely to return authorized intelligence or evidence of crime is reported in The Nation, ibid.

51. Criminal Legal News, "FBI Visit to Oklahoma Woman in Response to Social Media Post Sparks Debate on Free Speech" (May 15, 2024); Washington Post, "How the FBI's visit to a Muslim woman became a right-wing rallying cry" (April 1, 2024); OKC Fox / KFOR, "'Intimidation': FBI visits Stillwater woman's home over social media posts, attorney says" (April 3, 2024); Washington Times (March 30, 2024). The "every day, all day long" statement is on video, confirmed by multiple outlets. Attorney Hassan Shibly's "fishing expedition" characterization appears in the Washington Post and Washington Times accounts. Local police confirmed the visitors were FBI agents.

52. Palestine Legal, "Advisory on FBI Visits to Palestine Activists (Updated)," palestinelegal.org (updated 2021); Middle East Monitor, "Rights group report spike in FBI interrogation of pro-Palestine activists" (Jan. 25, 2024); Palestine Legal, "Reverberations of October 7" annual report (2023). The printed-screenshots detail, Canary Mission printout case, and privacy-filtered account monitoring are all documented in Palestine Legal's advisory. The American-Arab Anti-Discrimination Committee's "state intimidation tactics" characterization is quoted in the Middle East Monitor piece.

53. The Intercept, "FBI Counterterrorism Agents Spent Weeks Seeking a Climate Activist — Then Showed Up at His Door" (Feb. 12, 2026); Deadline, "Climate Activist Group That Disrupted Jeremy Strong-Michael Imperioli Broadway Play Says It's Under Escalating Trump FBI Watch" (Feb. 20, 2026); Truthout / Inside Climate News, "Environmental Activists Say the FBI May Be Investigating Them" (March 2026). Attorney Ronald L. Kuby's "they are digging" statement is quoted in The Intercept and Deadline. The Boston visits (March 6, 2025) and Nathan Phillips' FOIA response are from the Truthout / Inside Climate News piece. Extinction Rebellion Global's "not an isolated situation" statement is quoted in Deadline, ibid.

This report was prepared for public education purposes. It may be freely shared, cited, and reproduced with attribution. The authors encourage independent verification of all factual claims. Comments or corrections may be submitted to the editorial contact.