In 1954, a federal narcotics agent named George Hunter White rented an apartment at 81 Bedford Street in Greenwich Village. He told the neighbors his name was Morgan Hall. He said he was an artist.
He wasn’t an artist.
White spent $4,000 of CIA money outfitting the apartment, nearly $48,000 in today’s dollars. He hung Henri de Toulouse-Lautrec prints on the walls. He mounted provocative posters. He installed one-way mirrors, the kind that look like normal glass from one side and a window into someone’s soul from the other. He wired microphones into the electrical outlets. And then he started inviting people over.
The women were sex workers. Recruited by White, paid $100 a night by the CIA, and guaranteed protection from police harassment. Their job: pick up men at bars in Greenwich Village and bring them back to the apartment. The men thought they’d gotten lucky, bought a night of pleasure with a woman they’d met over drinks. They had no idea about the LSD slipped into their cocktails, the cameras behind the mirrors, or the federal agents taking notes on the other side of the wall.
From behind the one-way glass, White watched. He sat on a portable toilet he’d installed in the observation room so he’d never have to leave, sipping from a pitcher of martinis, scribbling notes for the CIA as men’s perceptions dissolved during what they thought were private encounters.
This was Operation Midnight Climax. A subproject of the CIA’s MKULTRA program. Designed by a CIA chemist named Sidney Gottlieb and run by White for nearly a decade.
The women were trained in post-coital questioning, how to extract information from a man in his most vulnerable state. CIA documents later revealed the agency was testing whether these women could function as field operatives, deployed for sexual entrapment worldwide. They were building a playbook.
Hundreds of American citizens passed through these rooms. None were informed. None consented. When CIA biological warfare specialist Frank Olson wound up dead after falling from the thirteenth floor of the Statler Hotel, nine days after being dosed with LSD, police found White’s initials and the safehouse address in the pocket of the CIA chemist sharing Olson’s room. Decades later, a private autopsy found head trauma consistent with a blow before the fall. The New York district attorney reopened the case and changed the cause of death to “unknown.”
In 1973, before anyone could investigate further, CIA leadership ordered the program’s paperwork destroyed. Most of the records were gone. But not all of them. George Hunter White kept a diary. And in a letter to Gottlieb unearthed decades later by journalist John Marks, White wrote the only epitaph the operation would ever get:
“I was a very minor missionary, actually a heretic, but I toiled wholeheartedly in the vineyards because it was fun, fun, fun. Where else could a red-blooded American boy lie, kill, cheat, steal, rape, and pillage with the sanction and blessing of the All-Highest?”
Neither White nor Gottlieb ever faced charges. The Church Committee confirmed the basics: the CIA had run drug and sex experiments on American citizens without consent, on American soil, in direct violation of the law. But the methods didn’t die with the program. They were refined. Shared between agencies. And there is nothing in the record to suggest they ever stopped.
Now hold that image: the one-way mirrors, the wired electrical outlets, the women briefed before the men arrived, the filing systems, the destroyed records.
And fast forward forty years to a man named Jeffrey Epstein.
The Debate Is Over
On January 30th, the Department of Justice released 3.5 million pages of documents related to Jeffrey Epstein. The FBI’s own files, released by the DOJ itself, contain an informant telling the bureau that Epstein “belonged to both U.S. and allied intelligence services,” that he was “close to the former Prime Minister of Israel, Ehud Barak and trained as a spy under him,” and that the bureau’s own summary of the source’s reporting reads: “Foreign influence on U.S. officials by Israel, Russia, and UAE.”
So if Epstein was in fact intelligence, and the documented record increasingly makes that hard to dispute, then what you’re looking at isn’t a sex trafficking scandal. It’s an operation. One with a methodology, a chain of command, institutional backing, and a sixty-year precedent in declassified files.
The Declassified Playbook
Before we get to Epstein, you need to understand what the documented playbook actually looks like. Not the conspiracy theory version. The version that intelligence historians pulled from agency archives and published in books.
Israel’s Mossad: Standard Operating Procedure
Ian Black and Benny Morris spent years inside Israeli intelligence archives for Israel’s Secret Wars. Ronen Bergman did the same for Rise and Kill First, drawing from additional declassified Mossad files and on-the-record interviews with intelligence officials. Working independently, using different source materials, they found the same thing: sexual entrapment was standard operating procedure, authorized at the highest levels of Israeli intelligence. The method is consistent. Recruit women as intelligence assets. Engineer compromising situations with high-value targets, whether politicians, military officers, scientists, or anyone with access to secrets or policy influence. Photograph everything. Catalog the material for leverage that lasts a lifetime.
The CIA: A Parallel Architecture
David Talbot’s The Devil’s Chessboard reveals that CIA Director Allen Dulles personally approved the use of private residences owned by wealthy CIA-connected individuals as operational sites, and the sharing of blackmail material between CIA and allied intelligence services, including Mossad. The files weren’t siloed inside one agency. They circulated.
And it wasn’t just the CIA. Whitney Webb documents in One Nation Under Blackmail how attorney Roy Cohn, a figure with deep organized crime connections, ran his own sexual blackmail operations and held compromising material on FBI Director J. Edgar Hoover himself. Hoover, in turn, made sexual surveillance an institutional FBI tool. The methods didn’t stay inside any one agency. They moved between intelligence services, law enforcement, and private operators who understood their value.
An Exact Match
When you lay the declassified playbook next to what we know about the Epstein operation, the match is exact.
Ghislaine Maxwell personally recruited, trained, and managed dozens of young women. This was talent acquisition that mirrored the exact operational structure Mossad ran for decades. The network operated from multiple wired properties across jurisdictions, all equipped with surveillance. Federal investigators seized CDs labeled with names, filing systems for photographs and videos, extensive record-keeping. The same filing cabinets, updated for the digital age. The targets weren’t random rich people. They were presidents, princes, prime ministers, scientists with access to sensitive technology, CEOs with government contracts. People with access.
And Epstein’s protection: the 2008 plea deal that violated federal law. Prosecutors who never notified victims as legally required. A man who, when re-arrested in 2019, wound up dead in a federal facility where the cameras stopped working and the guards stopped watching.
The Maxwell Line
Robert Maxwell, Ghislaine’s father, was a confirmed intelligence asset with documented connections to Mossad, MI6, and other services. Israeli intelligence historians have verified his role in weapons deals, technology transfers, and intelligence gathering. His media empire, which included the Daily Mirror, Macmillan Publishing, and a joint venture with McGraw Hill, doubled as infrastructure for propaganda and influence operations. He helped install the PROMIS software, loaded with intelligence backdoors, in governments and corporations worldwide, giving Mossad surveillance access across borders. When Maxwell died under suspicious circumstances in 1991, Israel gave him a state funeral with a eulogy from the Prime Minister. An honor reserved for intelligence heroes.
Ghislaine met Jeffrey Epstein shortly after. Multiple witnesses describe her as the network’s operational leader, the person who recruited, trained, and managed the young women.
And here’s the detail that should stop you cold: Robert Maxwell didn’t just run intelligence operations. He spent $2.6 billion to acquire one of America’s largest textbook publishers, then formed a joint venture with McGraw Hill, a name you’ll recognize from every classroom you ever sat in, to become the second-largest textbook publisher in the country. A confirmed intelligence asset was buying his way into the system that educates American children.
What Comes Next
The official story is that Epstein is dead. Maybe he is. Maybe he was murdered. Maybe he was moved. What we know for certain is that a man with blackmail material on some of the most powerful people on earth wound up unrecoverable from a federal facility where the cameras stopped working and the guards stopped watching. And we’re expected to close the book.
Maxwell is in prison. But the blackmail material wasn’t destroyed with either of them. The client list exists somewhere. The compromised officials are still in power. Whoever controls those files controls those people.
Next week, we widen the frame. Robert Maxwell didn’t just run blackmail operations. He spent billions acquiring American publishers and forming joint ventures with companies like McGraw Hill. He controlled media empires that shaped what news audiences saw on television and what scientists read in academic journals. A confirmed intelligence asset was buying his way into the systems that shape what people believe.
So what did they teach you? How much of what you learned was chosen, not for accuracy, but for control? How much does media dictate what we think without us ever noticing? When you start pulling that thread, it doesn’t stop at textbooks. It makes you question everything.
That’s next week.
Forward this to someone who’s still trying to make sense of how someone like Epstein operated for decades with obvious protection, and why the truth keeps getting buried.
HOW WE VERIFIED THIS
These aren’t internet theories. They’re documented through multiple independent research paths:
Historical tradecraft (Operation Midnight Climax): George Hunter White’s diary and personal papers (reported by The Washington Post, September 5, 1977); White’s letter to Gottlieb unearthed by journalist John Marks in The Search for the “Manchurian Candidate” (1979); Church Committee Reports (1975); CIA FOIA document releases; Rockefeller Commission Report; declassified CIA Inspector General reports.
Israeli intelligence operations: Black, Ian & Morris, Benny, Israel’s Secret Wars: A History of Israel’s Intelligence Services (1991), working from Mossad’s declassified archives; Bergman, Ronen, Rise and Kill First: The Secret History of Israel’s Targeted Assassinations (2018), drawing from additional declassified Mossad files and on-the-record interviews.
CIA parallel programs: Weiner, Tim, Legacy of Ashes: The History of the CIA (2007), using declassified CIA files and Church Committee materials; Talbot, David, The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government (2015), based on declassified operational files and hundreds of interviews.
The Epstein network: Webb, Whitney, One Nation Under Blackmail, Volumes 1 & 2 (2022), tracing financial records, legal documents, corporate filings, and intelligence connections across multiple countries.
FBI CHS reporting document: FD-1023, Source ID S-00099701, dated 10/19/2020, FBI Los Angeles Field Office, Squad I-01, case file 804I-LA-3315657-INTELPRODS. Released by the U.S. Department of Justice as part of the Epstein document disclosure, January 30, 2025. Document reference: EFTA00090314.
Note on the FBI document: The FD-1023 records allegations from a confidential human source, not verified FBI conclusions. PRCDNT presents it as what it is, an informant’s account documented in a federal investigative file, and contextualizes it against independently verified historical tradecraft. Inclusion in the DOJ release does not constitute proof of the claims made within.
Note on the Cold Open: All sensory and atmospheric details about Operation Midnight Climax, including the Toulouse-Lautrec prints, the portable toilet, the pitcher of martinis, the safehouse addresses, and George Hunter White’s letter, are drawn directly from documented sources: White’s own papers, declassified CIA files, witness accounts, and investigative journalism. No details have been invented.
THE PRCDNT BRIEF investigates the three-layer system of control: Operations (blackmail, trafficking, financial crimes), Control Systems (media, education, psychological manipulation), and Institutions (intelligence agencies, elite networks, corporate empires). Every Tuesday, one verified investigation showing how the layers connect.
All claims sourced from declassified documents, on-the-record intelligence histories, and investigative journalism. No speculation. No anonymous sources. Just the documented record.
Want the full picture? Subscribe at lp.prcdnt.app