The Red Glow of Duty — soldiers during land navigation, Joint Base San Antonio, Jan 28 2026

Wartime Treasure:
A Criminal's Delight

The complete architecture of the perpetual war machine — how governments create enemies, become them, blame them, silence the witnesses, and take the spoils. Ten investigations. Every claim documented.

"The Red Glow of Duty" — A soldier participates in land navigation during a best medic competition at Joint Base San Antonio, Jan. 28, 2026. Credit: Army Sgt. Nathaniel W. Garrett / DoD. media.defense.gov
RECEIPTS JOURNALISM: Every statement sourced. Every claim documented. Inline citations link to primary sources — congressional records, declassified documents, court testimony, established investigative reporting. Full source list at bottom. Nothing here is speculation. Jump to sources ↓
◈ A note on who this investigation is — and is not — about
The Red Glow of Duty — soldiers during land navigation, Joint Base San Antonio
"The Red Glow of Duty" — A soldier participates in land navigation during a best medic competition at Joint Base San Antonio, Jan. 28, 2026. Credit: Army Sgt. Nathaniel W. Garrett / DoD

The men and women who serve do so for love of country and honor of duty. This series is for them — not about them. What follows investigates the system they are sent to serve: a privatized machinery extracting wealth and treasure from Americans themselves, automated and stripped of the humanity they enlisted to defend. We owe them the truth of what they've been asked to protect. They deserve to know what's above their clearance. This article demands those requiring American sacrifice are held to account even as they die on the battlefield of moral conscience.

There is a machine. It has been running for decades, across administrations, across borders, across classification levels. It creates enemies, fights them, becomes them, blames them, dismantles them, takes their spoils — and then needs a new enemy. Running alongside it, permanently: a parallel system that silences witnesses, cycles victims, blackmails conscience, and destroys anyone with the standing to demand accountability. This article is the blueprint.

How to read this series

This is the overview — the full architecture in one place. Each section below is a complete investigation in its own right. Start here to see the whole machine. Follow any thread to go deeper. Every article leads back to this page. Every claim is sourced.

The Machine: How It Runs

Before the evidence, the architecture. This cycle — documented across every major US-adjacent conflict since World War II — is the frame through which every section that follows should be read.

◈ The Perpetual War Machine — Primary Cycle
01 CREATE
THE ENEMY
Fund · Train · Arm
the proxy
02 FIGHT
THE ENEMY
Extract booty
under cover of war
03 BECOME
THE ENEMY
Mimic · absorb
the criminal network
04 BLAME &
DISMANTLE
Become the savior
Take the spoils
↺   repeat with new enemy   ↺
SILENCE
WITNESSES
Prosecution · Ruin
Espionage Act
CYCLE
VICTIMS
"Rescue" pipeline
back into system
BLACKMAIL
CONSCIENCE
Compromising material
Hoover → Epstein
DESTROY
INVESTIGATORS
Webb · Bolkovac
Hale · Assange
▲ parallel systems — running permanently, independent of the primary cycle

The Series

Nine investigations. One story.

I
A Presidential Warning
Eisenhower said it plainly in 1961. Here is what he was describing.
Published
II
Asymmetry
Selective enforcement. Selective silence. The network that accountability cannot touch.
Published
III
The Six Revenue Streams
Artifacts · Drugs · Weapons · Humans · Financial Infrastructure · Leverage.
Published
IV
Enemy Lines Blurred — The Purge Within
The FBI. The DOJ. DHS. CIA. DOD. Secret Service. Sorted.
Published
V
The Succession Economy
The dynasty is the system. The Board of Peace. Kim Ju Ae. The cabinet heirs.
Published
VI
The Conscience Tax
Ellsberg to Winner to Hale. The unbroken line. The bill always arrives.
Published
VII
The Silencing
Fired. Demoted. Prosecuted. Destroyed. The ones who spoke anyway — and what it cost them.
Published
VIII
The Algorithm Said So
From CALEA to Maven. The same architecture. Thirty years.
Published
IX
Unaccountable
Why no one goes to prison. The architecture of impunity. The board after the game.
Published
X
Real Time
The story is not over. This article updates as it continues.
● Live

The Documented Timeline — Corroboration Backbone

What follows is the verifiable public record. Every entry is drawn from congressional testimony, declassified documents, court records, or established investigative reporting. This is not the full picture — it is the floor.

1945–55
Europe
Nazi Ratlines — The First Template

US intelligence, the Vatican, and the Red Cross operate escape networks for Nazi war criminals in exchange for intelligence assets. Klaus Barbie — the "Butcher of Lyon" — is recruited by US Army Counterintelligence and works for them for years after the war. The precedent established: criminal actors are assets when useful. The crime is the credential.

1956–90
Europe-wide
Operation Gladio — NATO's Criminal Infrastructure

NATO's classified stay-behind networks across Western Europe are linked by parliamentary investigations in Italy, Belgium, and Switzerland to domestic terrorism, political assassinations, and coordination with organized crime. Designed to be unaccountable — deniable, classified, outside democratic oversight. Never fully dismantled.

1961
USA
Eisenhower's Farewell — The Warning

Outgoing President Eisenhower warns of the "military-industrial complex" — not merely as a lobbying problem, but as a parallel financial state. The speech is celebrated, framed, and ignored. The complex he described has since expanded by several orders of magnitude.

1965–75
Southeast Asia
Air America — The CIA Airline and the Golden Triangle

The CIA's proprietary airline is credibly linked by the Church Committee and subsequent investigations to heroin transport from the Golden Triangle. The infrastructure of covert war and the infrastructure of drug trafficking run on the same planes, under the same classified authority.

1975
USA
Church Committee — What Congress Actually Found

The Senate Select Committee documents CIA assassination plots, domestic surveillance programs, covert foreign interventions, and coordination with organized crime. The full picture remains partially classified fifty years later. The committee's findings are available in public record and almost never cited in mainstream coverage of current events.

1979–89
Afghanistan
Operation Cyclone — Building the Enemy

CIA funds and arms the Mujahideen. The same networks, weapons caches, and relationships become the infrastructure of Al-Qaeda. The pipeline from US proxy to global terrorist organization is documented in Senate testimony and declassified cables. Phases 01 and 03 of the cycle — create, then become — executed simultaneously.

1986–87
USA / Nicaragua / Iran
Iran-Contra — The Template Proven Durable

Classified arms deals, drug money, and offshore financial structures fund Nicaraguan Contras in direct violation of US law. Architects are pardoned or promoted. Oliver North is convicted, appeals on a technicality, later hosts a television program. The template — crime, classification, pardon, rehabilitation — survives completely intact.

1989
Nicaragua / USA
Kerry Committee — Contra Cocaine on the Congressional Record

The Senate Subcommittee formally documents Contra cocaine trafficking with US government knowledge. Gary Webb's 1996 Dark Alliance extends this to the crack epidemic in American cities. Webb is professionally destroyed by coordinated press campaign. Found dead in 2004 — two gunshot wounds to the head, ruled suicide. Posthumously vindicated by the CIA's own inspector general report in 1998.

1991
Global
BCCI — The Criminal Bank Everyone Shared

The Bank of Credit and Commerce International collapses, revealing that the CIA, Saudi intelligence, Pakistani ISI, and international arms dealers have been sharing the same criminal financial infrastructure simultaneously. The Senate investigation produces an 800-page report. Key operators receive light sentences. The successor structures are never fully mapped.

1998–
Kosovo
KLA — Terror List to NATO Asset to Indicted War Criminal

The Kosovo Liberation Army is listed as a terrorist and criminal organization before NATO backs them in 1999. Post-war, senior KLA figures are linked to heroin trafficking and organ harvesting. In 2020, former KLA commander and Kosovo Prime Minister Hashim Thaçi is indicted by the Kosovo Specialist Chambers for war crimes and crimes against humanity. He resigns to face trial at The Hague.

2000–01
Bosnia
Dyncorp — US Contractor, Underage Sex Trafficking, Retained Contracts

Kathryn Bolkovac, a DynCorp employee and UN International Police Force monitor, documents US contractor involvement in the purchase and trafficking of underage girls in Bosnia. She is fired. She wins her wrongful dismissal case in a British employment tribunal. DynCorp retains its US government contracts. Her story becomes the film The Whistleblower (2010).

2001–21
Afghanistan
Afghan Opium — The Largest Drug Production Expansion in Recorded History

Opium production at invasion: ~185 metric tons. By 2017, under continuous Western military presence: 9,000+ metric tons. The UNODC documents this annually. No formal investigation into facilitation or beneficiaries has ever been conducted by any US government body.

2003
Iraq
Baghdad Museum — Protect the Oil Ministry, Lose the History

The Iraq Museum is looted in the days following the US invasion. Over 15,000 artifacts taken; thousands remain unrecovered. Items surface in Western auction houses. US military is ordered not to protect the museum. They protect the Oil Ministry. The Hague Convention has existed since 1954 precisely because this pattern has always repeated.

2011
Libya → Syria
Libya — Gold, Antiquities, Then the Rat Line East

Following NATO intervention, Gaddafi's gold reserves, oil infrastructure, and antiquities disappear into the post-war chaos. Simultaneously, a documented weapons pipeline moves Libyan arms stockpiles through Turkey into Syrian rebel groups under US diplomatic cover. The Benghazi consulate's operational function in this transfer remains classified. What is not classified: the weapons moved, and many ended up with groups the US later designated as adversaries.

2016
Europe
Europol — 10,000 Refugee Children Vanish into Criminal Networks

Europol reports that at least 10,000 unaccompanied child refugees who entered Europe have disappeared — many believed trafficked. The "rescue" infrastructure — refugee processing centers, transit NGO care — is documented in multiple cases as a pipeline back into exploitation networks. The rescue is the intake mechanism.

2024
Gaza
Lavender & Gospel — AI Nominates 37,000 Human Targets

+972 Magazine and Local Call report that Israeli military AI systems generate lists of approximately 37,000 individuals as potential targets based on pattern-of-life analysis. Human review time per nomination reportedly as low as 20 seconds. The AI accountability gap is now operational: no legal framework, dissolved responsibility, unchallengeable authority — and the system is classified.

◈ Sources & Receipts

  1. Kerry, John. Drugs, Law Enforcement and Foreign Policy. Senate Committee on Foreign Relations, Subcommittee on Terrorism, Narcotics and International Operations. December 1988.
  2. National Security Archive. Operation Gladio and the Strategy of Tension. George Washington University. nsarchive.gwu.edu
  3. US Senate. The BCCI Affair: A Report to the Committee on Foreign Relations. Senators John Kerry and Hank Brown. December 1992. govinfo.gov
  4. UNODC. Afghanistan Opium Survey — Annual Series 2001–2021. United Nations Office on Drugs and Crime. unodc.org
  5. Bolkovac, Kathryn and Cari Lynn. The Whistleblower: Sex Trafficking, Military Contractors, and One Woman's Fight for Justice. Palgrave Macmillan, 2011. See also: UK Employment Tribunal ruling, Bolkovac v. DynCorp, 2002.
  6. Europol. Situation Report: Trafficking in Human Beings in the EU. February 2016. europol.europa.eu
  7. Kosovo Specialist Chambers. Indictment: Hashim Thaçi et al. The Hague, June 2020. scp-ks.org
  8. Abraham, Yuval, et al. "Lavender: The AI machine directing Israel's bombing spree in Gaza." +972 Magazine / Local Call. April 3, 2024. 972mag.com
  9. Eisenhower, Dwight D. Farewell Address. January 17, 1961. eisenhowerlibrary.gov
  10. Senate Select Committee to Study Governmental Operations (Church Committee). Final Report. 1976. intelligence.senate.gov

◈ Sources list is live and growing. Additional receipts added section by section as body text is written and corroborated.

📡 Kaleido Military Hub Radio
Firsthand accounts, primary sources, voices from the record
🎙 Listen — Lt. Col. Hamilton, Vietnam 1972 — Kaleido Military Hub →

Kaleido Investigates — Hidden in plain sight.