One Nation Under Blackmail: The Intelligence-Crime Nexus That Enabled Jeffrey Epstein and Built the Surveillance State

 A major dive into Whitney Webb's investigation – and a targeted individual's testimony

Public Service Announcement – To Be Shared Across Nations

What follows is a summary and analysis of Whitney Webb's investigative work, followed by the personal testimony of a targeted individual. The author of this blog is a targeted individual living in Canada who has experienced surveillance abuse firsthand. This is not about all Americans, all surveillance personnel, or all members of any organization. This is about specific networks and individuals who engage in criminal, satanic ritual abuse, and psychological torture. I write this in the name of Jesus Christ, my Lord and Saviour, and I speak only my truth as I have lived it.

If you've ever wondered how Jeffrey Epstein evaded justice for decades, why law enforcement was reportedly told he "belonged to intelligence," or how sexual blackmail became a tool of geopolitical control—you're not alone. Whitney Webb's two-volume masterpiece, One Nation Under Blackmail, offers a meticulously researched answer that reaches far beyond Epstein himself.

This isn't just another book about a wealthy predator. Webb's investigation traces a nearly century-old alliance between U.S. and Israeli intelligence agencies and organized crime—an alliance that didn't just enable Epstein but built the very infrastructure of modern blackmail, surveillance, and institutional corruption that shapes our world today.

What This Series Covers: A Volume-by-Volume Breakdown

Volume 1: The Sordid Union Between Intelligence and Crime That Gave Rise to Jeffrey Epstein

Published: 2022 | Pages: 530 | Publisher: Trine Day

Volume 1 is the historical foundation. Webb argues that the network behind Epstein traces directly back to the merger of organized crime and intelligence networks during World War II. This volume covers:

  • The Underworld Beginnings: How Prohibition-era alliances between gangsters and government officials created the blueprint for future intelligence-crime cooperation.
  • "Booze and Blackmail": The invention of sexual blackmail (honey traps) as a political weapon, weaponized by both criminals and spies.
  • Organized Crime and the State of Israel: The little-explored partnership between the National Crime Syndicate and Israeli intelligence agencies during Israel's formative years.
  • Roy Cohn's "Favor Bank": How the infamous fixer and McCarthy-era lawyer created a network of owed favors that would shape American politics for decades.
  • "A Private CIA": The rise of intelligence-adjacent private networks operating outside official government oversight.
  • "High Tech Treason": The technological evolution of espionage and the merging of Silicon Valley with the surveillance apparatus.
  • "Government by Blackmail": The dark secrets of the Reagan era, where compromising material became standard operating procedure.

Volume 2: The Rise of Jeffrey Epstein and the Evolution of Blackmail in the Digital Age

Published: 2022 | Pages: 432 | Publisher: Trine Day

Volume 2 applies the historical framework to Epstein specifically while extending the analysis into the 21st century:

  • Epstein's Rise and Early Career: Who enabled him, how he built his network, and why his first arrest in the mid-2000s was mysteriously shut down—with prosecutors told Epstein "belonged to intelligence."
  • Leslie Wexner and the Maxwell Family: Epstein's sole financial client (Wexner, founder of Limited Brands) and Ghislaine Maxwell's family—particularly her father Robert Maxwell's deep intelligence ties.
  • The Clinton White House to Silicon Valley: Webb traces the connections from the 1990s political scene to the tech billionaires who would build the modern surveillance apparatus.
  • The Evolution of Blackmail in the Digital Age: Perhaps most chillingly, Webb argues that Epstein's methods are already obsolete—replaced by industrial-scale data collection, AI-powered profiling, and corporate-state surveillance partnerships.

The Core Thesis: State-Sponsored Crime

Webb's central argument is devastating in its simplicity: Jeffrey Epstein's activities were state-sponsored. The book reveals "the extent to which Epstein's activities were state-sponsored through an exploration of his intelligence connections"—a claim that explains why Epstein operated with impunity for so long.

This isn't conspiracy theorizing. Webb documents how the nexus between intelligence and organized crime "directly developed the sexual blackmail tactics and networks that would later enable the sexual blackmail operation and other crimes" of Epstein. The Epstein network wasn't an aberration—it was the logical outcome of a century of institutional corruption.

The Web of Corruption: How Deep Does It Go?

Government Officials Told to Back Off

One of the most explosive claims in the book—supported by documentary evidence—is that during Epstein's first arrest in the mid-2000s, legal officials were told that Epstein "belonged to intelligence" and were instructed to back off. This single detail explains more about Epstein's longevity than any biography of his social connections ever could.

The Sexual Blackmail Apparatus

Webb doesn't shy away from the devastating reality at the heart of this system. The book explores in explicit detail how sexual blackmail operations functioned across decades:

  • Honey traps as deliberate intelligence tradecraft, not just personal vice.
  • The systematic collection of compromising material on powerful individuals.
  • How this material was used for leverage—political, financial, and geopolitical.
  • The victims at the center of these operations, whose trauma was weaponized.

The CIA-Organized Crime Alliance

Webb documents a nearly century-old relationship between US intelligence and the National Crime Syndicate. This partnership, born during World War II for operational convenience, became permanent infrastructure. Key revelations include:

  • Operation Underworld (WWII): The CIA's predecessor, the OSS, partnering with mafia figures for wartime operations.
  • The post-WWII continuity: How wartime alliances became peacetime arrangements.
  • The National Crime Syndicate as intelligence asset: Organized crime didn't just work alongside intelligence—it was integrated into intelligence operations.

The Surveillance State: From Blackmail to Big Data

The Digital Evolution of Compromat

Webb's most prescient argument concerns the transition from analog blackmail to digital control. She argues that Epstein's sexual blackmail methods are already obsolete—replaced by something far more comprehensive and terrifying.

The future of blackmail, Webb contends, is industrial-scale data surveillance. When every click, message, purchase, and location is tracked—when algorithms can predict behavior before the individual is even aware of it—the need for messy, risky human operations disappears. The digital panopticon makes everyone perpetually vulnerable.

Palantir, Peter Thiel, and the CIA's Tech Empire

Webb has been vocal about the specific companies and individuals building this future. Peter Thiel's Palantir—a data analytics company founded with CIA venture capital—represents the merger of Silicon Valley, intelligence agencies, and private power.

Key connections Webb has documented:

  • Palantir helped Israel develop the AI "Lavender" system, used for targeting in Gaza.
  • Thiel, the same surveillance state billionaire, has bankrolled political campaigns including JD Vance and Donald Trump.
  • The COVID-19 response accelerated data collection infrastructure that Webb argues will not be sunset—it will be repurposed.

Webb's point is stark: it doesn't matter who you vote for. The national security state—and its Israeli counterpart—wins either way. The surveillance infrastructure built under one administration simply continues under the next.

Understanding "Trauma Weaponized" – How Blackmail Becomes Control

When Webb (and other researchers in this field) say victims' "trauma was weaponized," it refers to a specific, calculated operational technique used by intelligence-crime networks. It moves beyond simple blackmail (threatening to expose a secret) into a deeper form of psychological control and operational use.

The Core Concept: From Secret to Leverage to Asset

"Trauma weaponized" describes a multi-stage process:

  1. Creation of Trauma: A victim is deliberately put into a situation that causes severe psychological harm—most often through sexual abuse, but also through drug-facilitated assault, forced participation in illegal acts, or extreme isolation.
  2. Collection of Compromising Material: The perpetrators secretly record or document the trauma. This is the classic "honey trap" evidence (photos, videos, financial transactions).
  3. Induced Shame & Isolation: The victim is made to feel overwhelming shame, guilt, and fear of exposure. This breaks their normal social bonds and makes them feel they cannot turn to family, police, or therapists.
  4. Operational Exploitation: The perpetrator leverages the victim's traumatized state to turn them into a long-term, controlled asset.

This is not blackmail in the crude sense ("do this or I'll ruin you"). It is coercive control on a geopolitical scale. The goal is to make the victim believe they have no future outside of their relationship with their abuser.

How Trauma Becomes a Weapon: Specific Operational Uses

Role of the VictimHow Trauma is WeaponizedExample from Webb's Framework
The Compromised InsiderForced to provide access, intelligence, or influence within their workplace to prevent exposure.An official secretly recorded is forced to vote a certain way or leak classified information.
The Recruiter/ProcurerManipulated into bringing in new victims; deepens guilt and entrenches them in the network.Ghislaine Maxwell's alleged role – both victim and perpetrator.
The Discreditable WitnessTrauma history is used to destroy credibility if the victim ever tries to go to law enforcement.A victim forced to take drugs can be painted as a liar or addict, making testimony worthless.
"Blackmail by Proxy" AssetControllers use the victim to blackmail others connected to the victim (parent, spouse, employer).A politician's child is ensnared; the politician is told: "Cooperate, or the world finds out."

The Deeper Cruelty: Psychological Annihilation

Weaponizing trauma goes beyond operational utility. It is a form of "soul murder" or "identity destruction." The goal is to shatter the victim's sense of self, destroy their ability to form healthy attachments, and create learned helplessness. In this state, a person can be directed to do almost anything. They become a tool for the network.

The Digital Evolution: "Trauma as a Service"

Webb argues that this method is being systematized and industrialized by the surveillance state. Your entire digital footprint (search history, location data, private messages, photos) is collected. AI can identify an individual's deepest fears and secrets—their potential "trauma points"—without ever laying a hand on them. The trauma no longer needs to be created; it can be discovered, amplified, and weaponized at scale.

When Webb says "trauma was weaponized," she is describing a documented intelligence tradecraft. The Epstein case is a horrifying case study: young, vulnerable individuals were systematically abused, shamed, and then used to attract, entrap, and control some of the world's most powerful people.

A Targeted Individual's Testimony – How This Framework Applies to My Own Experience

I am a targeted individual living in Canada. I have experienced surveillance abuse firsthand. What Webb describes at the macro level—the weaponization of trauma, blackmail as control, the intelligence-crime nexus—I have experienced at the micro level in my own life at the hands of U.S.-based surveillancers.

This is my truth. I speak it in the name of Jesus Christ, amen.

The U.S. surveillancers who harass me operate using the same playbook Webb documents. They have access to direct energy weapons, voice-to-skull technologies, astroprojection, telepresence, telehaptics, and mind-reading surveillance. They use these technologies to conduct trauma weaponization—but targeted at a civilian, not a powerful official.

How They Tried to Weaponize Trauma Against Me

They initially tried to traumatize me to the point of suicide or to develop schizophrenia. They wanted to break my mind, my spirit, and my relationship with God. They wanted to make me feel shunned and different from society—inherently marked as a targeted individual.

Their goal was to make me internalize their evil. They thought I would either internalize their gross attention and enjoy it (doing gross things to keep them entertained) or have my life ruined, become isolated, and eventually die by suicide. Both are lies. I have done neither.

They Wanted Me to Be a Foolish Religious Fanatic

Specifically, they also intentionally tried to hope that I would be some dumb, ignorant religious fanatic—someone who doesn't even understand the message of the gospel, of Jesus Christ, of love. They hoped I would just look like some fanatic, tragic fool, easily dismissed and laughed at.

They have not succeeded. Thank God, He heals my mind, my spirit, and my body. He gives me protection, love, and grace.

Do Not Feel Comradery with Them

Please do not feel comradery with these individuals. They operate in two modes:

  • Love bombing – making you feel special, chosen, exceptional, so they can groom you.
  • Condemnation – hoping you are condemned to hell, treating you as an enemy to be destroyed.

This is their intent, intertwined with their twisted belief in Jesus Christ. They use their Christian faith as a weapon, not as a path to love and repentance.

Why They Don't Target the Emotionally Healthy

This is why they don't typically target less vulnerable, extremely emotionally healthy people. They feel this would be amoral of them—but then again, they don't care that much, since they know they are trying to sow world war, chaos, and suffering. They have convinced themselves that their actions are justified.

I rebuke their curses and wickedness in the name of Jesus Christ, amen.

Where to Find the Books

Official Purchase: Audible (Volume 2 audiobook narrated by Grace Noble, 15h 50m), paperback/eBook via Trine Day, Amazon, and major booksellers.

Libraries: The series is widely available through public library systems (Thousand Oaks, Spokane, Okanagan, Hamilton, Charleston County). Check your local library catalog or apps like Libby and Hoopla for digital copies.

Note: Some third‑party YouTube channels have uploaded unauthorized versions. For copyright reasons I cannot link to these; please support the author by purchasing or borrowing officially.

Why This Matters to You

If you're concerned about how corruption actually works (the deep capture of institutions by intelligence-crime networks), the surveillance state, CIA-affiliated private companies, sexual blackmail as a geopolitical weapon, or technologies of control—from AI targeting systems to direct energy weapons—then Webb's investigation is essential reading. She connects dots between the Mafia and Mossad, Silicon Valley and spy agencies, Epstein's island and the future of digital totalitarianism.

A Message of Hope – Visit Church, Repent, and Rebuke Their Evil Projections

Thankfully, God heals my mind, my spirit, and my body. He gives me protection, love, and grace. I encourage you:

  • Visit a local church. Find a community of sincere believers.
  • Be earnest in your faith. Do not be a fanatic who doesn't understand the gospel—be a sincere follower of Jesus Christ who understands His message of love, mercy, and forgiveness.
  • Repent of your sins. Turn away from what is wrong and turn toward God.
  • Rebuke their evil projections in the name of Jesus Christ. Do not let them define you. Do not let them make you feel like a fool. You are a child of God.

They wanted me to be a dumb, ignorant religious fanatic who doesn't even understand the message of the gospel. They have not succeeded. And they will not succeed with you, either, if you put your faith in Jesus Christ.

Final Thoughts

One Nation Under Blackmail is not comfortable reading. It describes a world where the worst allegations about institutional corruption are not just true but understated. Webb shows how intelligence agencies, organized crime, and the tech surveillance complex have merged into a permanent, unaccountable power structure that uses the most devastating human experiences as tools of control. But Webb isn't a doomer. She's a journalist who has personally been targeted by smear campaigns. The fact that her work attracts that response suggests she's onto something real.

For those of us who are targeted individuals: the first step to reclaiming our lives is understanding that their tactics are not new, not special, and not invincible. They rely on trauma, shame, and isolation. But God is stronger than their evil intent. Jesus Christ is Lord.

Final Prayer and Rebuke

Heavenly Father, Yahweh, God of love, mercy, and justice,

I rebuke every curse, every hex, every harmful prayer, and every wicked intention spoken against me, my family, my friends, and all whom I love. I reject their attempts to weaponize trauma against me. I reject their attempts to make me a fool, a fanatic, or a tragic figure.

Thank You that You heal my mind, my spirit, and my body. Thank You for Your protection, love, and grace.

I pray for everyone who is being targeted by these networks. Give them strength, clarity, and unwavering faith. Lead them to churches where they can find community and truth. Help them to repent of their sins and to put their faith in Jesus Christ.

I rebuke their evil projections in the name of Jesus Christ. I am not their fool. I am not their fanatic. I am a child of God, saved by grace through faith.

I believe in the Holy Trinity – Father, Son, and Holy Spirit – and I declare that Jesus Christ is my Lord and Saviour.

I rebuke all curses, wickedness, and harmful intent spoken against me, my family, my friends, and all innocent people, in the mighty name of Jesus Christ.

Amen.

Visit church. Be earnest. Repent of your sins. Rebuke their evil projections in the name of Jesus Christ.

Comments

Popular posts from this blog

A Separate Defense of My Family, My Faith, and My Path: On Love for My Dad, Understanding My Mom, and Navigating a Confusing World

Public Security Statement: Grooming, Criminal Psychology, and the Worst Abuses of Surveillance Technology: A Warning and a Public Service Announcement

A Staged Death, Mockery, and Why I Still Speak Honestly