The Kingpin Fallacy

How America Built a Fifty-Year Strategy Around Killing Leaders Who Are Designed to Be Replaced

On February 22, 2026, Mexican Special Forces killed Nemesio Oseguera Cervantes in the mountains of Tapalpa, Jalisco. They called him El Mencho. He ran the Jalisco New Generation Cartel, the most violent drug trafficking organization operating in Mexico. Twenty-five members of the National Guard died in the operation. Within hours, the cartel launched coordinated reprisals across twenty Mexican states, torching vehicles, blocking highways, attacking gas stations, and engaging security forces in armed confrontations. Guadalajara, Mexico’s second-largest city and a 2026 FIFA World Cup host venue, shut down. The U.S. Embassy issued shelter-in-place warnings across nine states.

Then something remarkable happened. The cartel did not fracture. As soon as El Mencho was buried, his California-born stepson, Juan Carlos Valencia González, began consolidating power. Two senior lieutenants agreed not to contest his claim. The succession was orderly, almost corporate. The organism absorbed the shock, regenerated its head, and kept moving. The billion-dollar supply chain of cocaine, methamphetamine, and fentanyl flowing into the United States did not pause for a funeral.

This is the Kingpin Fallacy: the belief that killing or capturing a cartel leader degrades the organization. It does not. It prunes it. For fifty years, the United States has poured billions of dollars into a strategy built on the assumption that criminal empires are held together by a single figure whose removal will cause collapse. The evidence says the opposite. Research published in the Journal of Conflict Resolution shows that homicides in municipalities where a kingpin is neutralized increase by more than thirty percent in the six months following the intervention. A study in the Journal of Politics found that leadership decapitation produces brief short-term reductions in violence followed by longer-term increases as organizations fragment and new groups emerge. The pattern is not ambiguous. It is a law of the system, as predictable as gravity, and the United States keeps jumping off the same building expecting a different result.

The Hydra Record

The record is not debatable. It is a graveyard of symbolic victories that produced operational disasters. When Miguel Ángel Félix Gallardo was arrested, Mexican cartels splintered from one cooperative network into the fragmented landscape that exists today. When the Milenio Cartel’s Óscar Orlando Nava Valencia was killed, two rival factions emerged and fought for control of Jalisco, birthing the very organization that would become the CJNG. When Arturo Beltrán Leyva was killed in 2009, his organization fractured into competing cells. When El Chapo was extradited in 2017, the Sinaloa Cartel did not collapse. It mutated. When El Mayo Zambada was captured in 2024, a brutal civil war erupted between Chapitos and Mayitos factions that elevated violence in Sinaloa to unprecedented levels.

The numbers tell the story without sentiment. Between 2009 and 2020, the number of armed criminal groups operating in Mexico more than doubled, from 76 to 205. In total, at least 543 armed outfits have operated in Mexico since the kingpin strategy was implemented. Mexico recorded over 29,000 homicides in both 2017 and 2018, the highest figures since records began in 1997. During the Peña Nieto administration, security forces captured or killed 110 of 122 targeted criminals. Violence increased. Drug trafficking increased. Fentanyl production, which did not exist at scale when the strategy began, now kills more than 70,000 Americans per year.

The strategy was imported from counterterrorism doctrine, where decapitation of ideologically driven organizations can degrade command coherence. But cartels are not ideologically driven. They are market-driven. The demand for drugs does not disappear when a leader dies. The economic incentives that sustain the organization do not evaporate with a bullet. A dead kingpin is the best thing that ever happened to the next man in line, because he inherits an intact business with one fewer competitor and a government that just expended its political capital on a press conference.

The Five Throats

The reason every strategy has failed is that every strategy has attacked one domain at a time. A cartel is not a person. It is a system with five interdependent domains that sustain each other. Kill the leader, and the other four domains absorb the shock and regenerate leadership. Seize a shipment, and the financial architecture funds replacement inventory within days. Arrest a corrupt official, and another steps forward because the corruption infrastructure is a market, not a conspiracy. The only way to overwhelm the system’s adaptive capacity is to degrade all five domains simultaneously. Not sequentially. Not in phases. Simultaneously.

Domain One: Leadership. This is what everyone targets and what always fails in isolation. El Mencho dies; Valencia González steps up. The organism heals because leadership is the most redundant of the five domains. Cartels are designed to survive decapitation. The CJNG operates through a franchise-based structure of semiautonomous regional cells that can function independently of central command. Targeting leadership without degrading the other four domains is gardening, not warfare.

Domain Two: Financial Architecture. Every dollar of cartel revenue must be laundered. This is the domain with the least redundancy and the least attention. Chinese money laundering networks have become the dominant financial infrastructure for Mexican cartels, leveraging China’s $50,000 annual currency exchange cap to create a symbiotic system: cartels need to clean cash, wealthy Chinese nationals need access to foreign currency, and Chinese brokers profit from both. FinCEN reported that U.S. financial institutions filed approximately $312 billion in potential CMLN-related suspicious activity between 2020 and 2024. In June 2025, Treasury designated three Mexican banks as primary money laundering concerns under the FEND Off Fentanyl Act, the first use of that authority, after finding that CIBanco, Intercam Banco, and Vector Casa de Bolsa had collectively facilitated millions in laundered cartel proceeds and precursor chemical payments. The financial domain is targetable because it requires institutional infrastructure that leaves traces. But it has never been attacked with the sustained intensity it deserves, because Treasury, FinCEN, and OFAC operate in separate bureaucratic universes from DEA and DoD.

Domain Three: Precursor Supply Chain. Fentanyl and methamphetamine are synthetic. Unlike cocaine or heroin, they do not require agricultural land. They require precursor chemicals sourced overwhelmingly from Chinese manufacturers. China is the primary source country for illicit fentanyl precursor chemicals and pill pressing equipment, according to the U.S. intelligence community’s 2025 Annual Threat Assessment. These companies openly advertise on e-commerce platforms, ship precursors through Pacific coast ports like Lázaro Cárdenas and Manzanillo, accept payment in cryptocurrency, and provide instructions on how to remove masking molecules designed to evade detection. DOJ has indicted dozens of Chinese companies and individuals for trafficking precursor chemicals, but the supply chain is finite and mappable. Unlike coca fields that can be planted anywhere, chemical manufacturing requires industrial capacity, precursor inputs, and export logistics that are vulnerable to interdiction if targeted with the same intensity currently reserved for leadership strikes.

Domain Four: Corruption Infrastructure. Cartels do not survive through firepower. They survive through purchased protection at municipal, state, and federal levels. This is the domain that makes all the others possible, and it is the one nobody wants to touch because it implicates sovereign governance. Mexico’s security analyst Eduardo Guerrero and journalist Deborah Bonello have both described the endemic corruption that provides cartels with operational cover, advance warning of law enforcement operations, and territorial impunity. When a CIBanco employee knowingly created an account to launder $10 million for a Gulf Cartel member, that was corruption infrastructure operating through the financial system. When Intercam executives met directly with suspected CJNG members to discuss laundering schemes, that was corruption infrastructure wearing a banker’s suit. The domain is invisible by design and politically untouchable by tradition. It is also the load-bearing wall. Remove it, and the other four domains lose their protective shield simultaneously.

Domain Five: Logistics and Communication Networks. Routes, tunnels, submarines, drone fleets, encrypted communications, fleet management, port access, the trucks fitted with .50-caliber guns that Audias “The Gardener” Flores uses to control western Jalisco. This is the circulatory system. The CJNG maintains primary distribution hubs in Los Angeles, New York, Chicago, Houston, and Atlanta, with a presence in at least 22 of Mexico’s 32 states and operations in over 40 countries. The logistics domain is the connective tissue between precursor procurement, production, distribution, and revenue collection. It is the domain most visible to traditional law enforcement and the one most frequently disrupted in isolation, producing tactical seizures that do not alter the system’s strategic capacity.

The Convergence Gap

The convergence gap is not that these five domains are unknown. Every analyst in Washington can draw the picture. The gap is that no institutional mechanism exists to attack all five simultaneously. DEA holds leadership intelligence and runs the kingpin targeting. Treasury and FinCEN hold the financial architecture and wield the laundering designation authorities. The State Department holds the diplomatic leverage on precursor supply and China cooperation. DoD has operational capacity through the Joint Interagency Task Force. CIA and DIA hold corruption mapping intelligence. DOJ has the RICO jurisdiction and the courtrooms. Five agencies, five domains, five separate budgets, five separate congressional oversight committees, and zero structural integration.

The cartel, by contrast, integrates all five domains under a single command authority. El Mencho controlled leadership, oversaw financial operations through Los Cuinis, managed precursor procurement relationships with Chinese suppliers, maintained a corruption network across dozens of states, and directed logistics through the Grupo Elite. He was a unified command fighting a fragmented alliance. When one U.S. agency achieves a tactical success in its domain, the cartel shifts weight to the other four. When DEA targets leadership, the financial architecture sustains operations while a new leader emerges. When Treasury designates a bank, the cartel routes money through cryptocurrency and informal value transfer systems. When DOJ indicts Chinese companies, the precursor supply adapts by masking molecules and routing through intermediary jurisdictions.

This is the institutional architecture problem that every post-decapitation analysis identifies in its final paragraph and then abandons. The Lawfare analysis concludes that outcomes can be meaningfully different when leadership removal is embedded in a broader strategy combining intelligence-driven operations, institutional reform, judicial accountability, and sustained international cooperation. The Atlantic Council argues that strikes should be combined with efforts to disrupt supply and reduce demand. Everyone diagnoses the disease. Nobody prescribes the treatment, because the treatment requires something the U.S. government is structurally incapable of producing: simultaneous, coordinated pressure across all five domains, sustained over years, managed by a single authority with the budget and mandate to compel interagency cooperation.

The American Citizen Problem

The succession of Valencia González introduces a variable that no prior cartel transition has presented. He was born in Santa Ana, California, on September 12, 1984. He holds dual Mexican and American citizenship. He is the son of Armando Valencia Cornelio, who founded the Milenio Cartel, and Rosalinda González Valencia, who married El Mencho and built a criminal reputation through the cartel’s financial wing. He carries a $5 million U.S. bounty and a 2020 federal indictment in Washington, D.C. for conspiracy and distribution of controlled substances. His stepbrother, Rubén Oseguera González, also California-born, was sentenced in March 2025 by U.S. District Judge Beryl Howell to life plus thirty years in federal prison and ordered to forfeit six billion dollars. Menchito, as they called him, ordered the killing of at least one hundred people, personally butchered five bound men with a half-moon knife, and directed the 2015 shootdown of a Mexican military helicopter that killed nine. He pioneered fentanyl manufacturing for the CJNG. Two kingpins down. Zero operational degradation. The cartel did not pause.

Valencia González’s citizenship creates a paradox. On one hand, it complicates surveillance: U.S. intelligence agencies face legal restrictions on monitoring American citizens that do not apply to foreign nationals. The tools that helped locate El Mencho may not be available against his successor. On the other hand, his citizenship creates extraterritorial jurisdiction that bypasses the sovereignty problem entirely. RICO, the Kingpin Act, the FEND Off Fentanyl Act, money laundering statutes, and the FTO designation all apply to U.S. citizens regardless of where they operate. His indictment is already filed. His citizenship means the United States does not need Mexico’s permission to prosecute him. It needs Mexico’s cooperation to locate him, but the legal authority is American, not diplomatic.

This is a pivot point. The FTO designation of February 2025 gave the U.S. government expanded authorities against the CJNG as a terrorist organization. The WMD designation of fentanyl precursors in December 2025 elevated the chemical supply chain from a narcotics matter to a national security threat. Valencia González’s American citizenship makes him subject to the full weight of U.S. criminal and counterterrorism law. The question is whether the government will use these converging authorities as an integrated instrument or continue to wield them in separate bureaucratic stovepipes.

The Five-Domain Doctrine

The doctrine writes itself once the fallacy is named. If single-domain attack fails because the other four domains compensate, then all five must be degraded below their recovery threshold at the same time. This is not counterinsurgency. It is not law enforcement. It is systems warfare applied to a transnational criminal enterprise.

Pillar One: Financial Strangulation. Expand the Treasury designations beyond three Mexican banks to the full correspondent banking network that facilitates CMLN transactions. The $312 billion in suspicious activity filings represents the intelligence map. Use the FEND Off Fentanyl Act and the Fentanyl Sanctions Act authorities to designate not just banks but the cryptocurrency wallets, the trade-based laundering front companies, and the Chinese underground banking nodes that provide settlement services. The objective is not seizure. It is systemic degradation of the laundering infrastructure’s throughput capacity, forcing the cartel to hold cash it cannot clean, which imposes operational friction across every other domain.

Pillar Two: Precursor Interdiction at Source. The Chinese chemical supply chain is the synthetic chokepoint. It is finite. It is mappable. It is increasingly digitized through e-commerce platforms and cryptocurrency payment rails. The DOJ indictments of Chinese companies are the right tool at insufficient scale. Pair criminal indictments with OFAC sanctions on the companies, their banking relationships, and their shipping logistics. Coordinate with the PRC’s November 2025 export controls on thirteen precursor chemicals by providing intelligence that enables enforcement. Where PRC cooperation fails, target the intermediary jurisdictions through which masked precursors transit. The objective is not to stop every gram of precursor. It is to raise the cost and complexity of procurement to the point where production capacity degrades faster than the cartel can adapt.

Pillar Three: Corruption Exposure. This is the domain that nobody wants to attack because it implicates sovereign institutions. Attack it anyway. Use the Global Magnitsky Act to designate corrupt Mexican officials who provide cartel protection. Publish the intelligence. Make the corruption visible. The United States already possesses significant intelligence on cartel-government relationships. The policy choice to withhold it is a diplomatic courtesy that costs American lives. When Intercam executives sat down with CJNG members to discuss laundering schemes, someone authorized that meeting. Name them. Sanction them. Make the cost of corruption personal and public.

Pillar Four: Targeted Leadership Disruption. Not decapitation. Disruption. Instead of killing or capturing the top leader, use intelligence operations and defection incentives to accelerate internal paranoia and succession competition in a channeled direction. Offer golden bridges to mid-level operators: plea deals, witness protection, asset retention agreements for those who defect with actionable intelligence. The objective is not to smash the organization. It is to incentivize it to consume itself from within while the other four pillars drain its oxygen. Leadership disruption without financial strangulation, precursor interdiction, corruption exposure, and logistics degradation is the kingpin strategy under a different name. With those four pillars operating simultaneously, leadership disruption becomes the catalyst for collapse rather than the catalyst for regeneration.

Pillar Five: Logistics Degradation. The CJNG’s physical infrastructure is the most visible domain and the one most susceptible to sustained pressure. Port access at Lázaro Cárdenas and Manzanillo, cross-border tunnel networks, distribution hub operations in five major American cities, encrypted communication networks, and the armed convoys that enforce territorial control. Target these not for tactical seizures but for systemic degradation: disrupt the communications, interdict the supply routes at multiple points simultaneously, and impose the operational friction that makes logistics slow, expensive, and unreliable. When combined with financial strangulation and precursor interdiction, logistics degradation compounds the pressure across the entire system.

Cui Bono

A reasonable person might ask why a strategy with a fifty-year failure record persists. The academic literature has documented the failure since at least 2015. West Point published the data. Lawfare published the analysis. RUSI published the history. The Journal of Conflict Resolution quantified the violence increase. No serious analyst in Washington defends the kingpin strategy as sufficient. Yet it continues. The question is not whether it works. The question is who benefits from its continuation.

The DEA exists to fight drug trafficking organizations. Its budget, headcount, career advancement structure, and institutional identity depend on the continued existence of those organizations. Every kingpin arrest generates headlines, congressional testimony, budget justification, and promotions. A dead cartel leader is a performance metric. The kingpin strategy is the DEA’s production line. It manufactures symbolic victories that sustain institutional funding while the underlying market grows. In fiscal year 2024, the DEA’s budget exceeded three billion dollars. That budget does not survive the elimination of the threat it exists to fight.

The parallel to the military-industrial complex is not metaphorical. It is structural. Eisenhower warned in 1961 that the defense establishment and the arms industry would develop a shared interest in the perpetuation of threat. The war on drugs has produced its own version: a narco-industrial complex in which law enforcement agencies, defense contractors, border security firms, private prison operators, and surveillance technology companies all derive revenue from a war that never ends because ending it would eliminate the revenue stream. Customs and Border Protection operates a $19 billion annual budget. The Department of Defense deploys assets along the border under counternarcotics authorities. Surveillance companies sell sensor systems, drone platforms, and biometric tools. Private prison corporations house federal drug offenders. Each of these entities has a structural incentive to manage the problem, not solve it.

The Five-Domain Doctrine threatens this architecture. If simultaneous degradation actually collapsed a cartel’s operating capacity, if the financial strangulation choked the money, if the precursor interdiction starved the labs, if the corruption exposure stripped the shield, if the logistics degradation severed the routes, the result would not just be a defeated cartel. It would be a reduced justification for every agency, contractor, and budget line that depends on the war’s continuation. The kingpin strategy persists not despite its failure but because of it. A strategy that produces an endless supply of new targets, new headlines, and new budget requests while never reducing the threat is not a failure from the perspective of the institutions that execute it. It is a business model.

This is the hardest convergence gap to name, because it implicates the people reading the paper. The institutional blind is not ignorance. It is incentive. The same agencies that would need to coordinate the Five-Domain Doctrine are the agencies whose institutional survival depends on the doctrine never being implemented. The cartel is not the only organism that regenerates when you cut off its head. The bureaucracy that fights it does too.

The World Cup Test

Guadalajara will host FIFA World Cup matches this summer. It is the capital of Jalisco, the state where the CJNG holds monopoly control. The juxtaposition is not accidental. It is a binary test of sovereignty. Either Mexico demonstrates control over the host city or it demonstrates to a global audience that a cartel designated as a foreign terrorist organization operates with impunity in a venue where hundreds of thousands of international visitors will gather. That is not a security problem. It is a legitimacy crisis. And legitimacy crises create political windows for institutional action that normal diplomatic pressure never opens.

The Sheinbaum government has stated that there is no turning back. Mexican officials have described the post-El Mencho period as a point of no return. The question is whether the United States treats this moment as a window for the Five-Domain Doctrine or reverts to the next targeting cycle. The academic literature, the operational history, and the blood count of fifty years all point the same direction. The kingpin is dead. The fallacy should die with him.

Resonance

Atlantic Council. (2026). “Decapitation Strikes Are Not Enough to Take on Mexico’s Cartels. Here’s What Else the US Should Do.” Atlantic Council Dispatches. https://www.atlanticcouncil.org/dispatches/decapitation-strikes-are-not-enough-to-take-on-mexicos-cartels-heres-what-else-the-us-should-do/Summary: Argues that narco-terrorist organizations differ from ideological terrorist groups, and that policy responses transposing counterterrorism frameworks onto narco-terrorism neglect market pressures that influence cartel behavior.

Congressional Research Service. (2026). “Chinese Money Laundering Networks.” CRS Report R48786. https://www.congress.gov/crs-product/R48786Summary: Documents the role of Chinese money laundering networks in servicing Mexican cartels, including $312 billion in suspicious activity filings over five years and the symbiotic relationship between cartel cash and Chinese capital flight demand.

Congressional Research Service. (2026). “Illicit Fentanyl and China’s Role.” CRS In Focus IF10890. https://www.congress.gov/crs-product/IF10890Summary: Reports that China is the primary source country for illicit fentanyl precursor chemicals and pill pressing equipment, with the Trump administration designating fentanyl precursors as Weapons of Mass Destruction in December 2025.

Drug Enforcement Administration. (2024). “China-Based Chemical Manufacturing Companies and Employees Indicted for Alleged Fentanyl Manufacturing and Distribution.” DEA Press Release. https://www.dea.gov/press-releases/2024/10/24/china-based-chemical-manufacturing-companies-and-employees-indictedSummary: Details indictments against eight Chinese chemical companies and employees for trafficking precursor chemicals to cartels, including companies that openly advertised on the internet and shipped over 500 kilograms of precursors to the United States.

Drug Enforcement Administration. (2026). “Cartels.” DEA.gov. https://www.dea.gov/cartelsSummary: Official DEA profile of CJNG as a key fentanyl supplier with distribution hubs in Los Angeles, New York, Chicago, Houston, and Atlanta, operating across 22 Mexican states and over 40 countries.

García-Ponce, Omar. (2026). “El Mencho’s Death and the Kingpin Strategy Paradox.” Lawfare.https://www.lawfaremedia.org/article/el-mencho-s-death-and-the-kingpin-strategy-paradoxSummary: Reviews the academic literature on kingpin strategy consequences, finding that homicides increase more than thirty percent in municipalities where a kingpin is neutralized and that CJNG’s decentralized franchise structure could paradoxically stabilize a post-El Mencho transition.

Jones, Nathan P., and others. (2022). “Why Mexico’s Kingpin Strategy Failed: Targeting Leaders Led to More Criminal Groups and More Violence.” Modern War Institute at West Point. https://mwi.westpoint.edu/why-mexicos-kingpin-strategy-failed-targeting-leaders-led-to-more-criminal-groups-and-more-violence/Summary: Documents that armed criminal groups in Mexico more than doubled from 76 to 205 between 2009 and 2020, with at least 543 armed outfits operating during the war on drugs, directly linked to the fragmenting effects of the kingpin strategy.

Latin Times. (2026). “American Citizen Reportedly Takes Over Jalisco Cartel; Could Complicate U.S. Efforts to Target Him.” Latin Times. https://www.latintimes.com/american-citizen-reportedly-takes-over-jalisco-cartel-could-complicate-us-efforts-target-him-595828Summary: Reports that Valencia González’s U.S. citizenship creates legal constraints on surveillance while simultaneously establishing extraterritorial criminal jurisdiction, with the State Department offering up to $5 million for information leading to his capture.

PBS NewsHour. (2026). “Killing of Cartel Leader Sparks Retaliatory Violence in Parts of Mexico.” PBS. https://www.pbs.org/newshour/show/killing-of-cartel-leader-sparks-retaliatory-violence-in-parts-of-mexicoSummary: Documents the immediate aftermath of El Mencho’s killing, including over seventy deaths, twenty-five National Guard casualties, and more than 250 cartel roadblocks across twenty states.

Royal United Services Institute. (2026). “The Kingpin Strategy: More Violence, No Peace.” RUSI SHOC Network Informer. https://www.rusi.org/networks/shoc/informer/kingpin-strategy-more-violence-no-peaceSummary: Traces the fragmenting history of Mexican cartels from Félix Gallardo’s arrest through El Mencho’s death, demonstrating that the kingpin strategy has produced more organizations, more violence, and more drug trafficking at every historical inflection point.

U.S. Department of State. (2021). “Juan Carlos Valencia González: Narcotics Rewards Program.” State.gov. https://www.state.gov/juan-carlos-valencia-gonzalezSummary: Official reward posting confirming Valencia González’s birth in Santa Ana, California, dual citizenship, role as alleged CJNG leader, and $5 million bounty for information leading to his arrest or conviction.

U.S. Department of the Treasury. (2025). “Treasury Issues Historic Orders Under Powerful New Authority to Counter Fentanyl.” Treasury Press Release. https://home.treasury.gov/news/press-releases/sb0179Summary: Announces the first-ever use of the FEND Off Fentanyl Act and Fentanyl Sanctions Act authorities to designate CIBanco, Intercam Banco, and Vector Casa de Bolsa as primary money laundering concerns, documenting their facilitation of cartel laundering and precursor chemical procurement from China.

The Pentagon + Hollywood + China = Quiet Manipulation of Americans

Three architectures of narrative control operate simultaneously on the dominant cultural channels. No institution tracks all three. The doctrine cannot be challenged where the culture actually lives.

The Fallacy

The prevailing assumption is that American entertainment operates independently of state doctrine, that market forces produce content freely, and that cultural production is not a domain of warfare. This assumption is false on all three counts. The Pentagon maintains a formal script-approval architecture governing access to military equipment and personnel for film and television productions. The People’s Republic of China exercises editorial leverage over Hollywood through market-access control. And the American music industry demonstrated, in a single week in March 2003, that it possesses the infrastructure to destroy any artist who challenges the prevailing doctrine. Three mechanisms, one effect: the stories the culture tells about the doctrine are stories the doctrine has approved.

The Pentagon Liaison: 2,500 Productions and Counting

The Department of Defense operates entertainment liaison offices in Los Angeles for the express purpose of reviewing scripts submitted by film and television producers seeking military cooperation. The governing policy, DoD Instruction 5410.16, establishes Production Assistance Agreements that grant filmmakers access to military installations, personnel, aircraft, and warships in exchange for script oversight, pre-release screening, and demonstrated alignment with recruiting objectives. The U.S. Army’s own published guidance states that approved productions must “help Armed Forces recruiting and retention programs.” The arrangement is voluntary in the narrowest legal sense: no filmmaker is compelled to participate. But the economic incentive is overwhelming. A carrier battle group cannot be rented on the open market. Fighter aircraft operating costs run tens of thousands of dollars per hour. The Pentagon’s cooperation saves productions millions in equipment costs, and the Pentagon’s refusal can kill a project outright.

Freedom of Information requests filed by investigative journalist Tom Secker and academic Matthew Alford, documented through the Age of Transformation archive, revealed that the Pentagon and CIA have exercised direct editorial control over more than 2,500 films and television shows. Professor Roger Stahl, who has led FOIA-based research on the military-entertainment complex for twenty years, explained in a 2025 Index on Censorship interviewthat the Entertainment Liaison Office has been “extremely guarded about the details” of this collaboration. He called the arrangement “one of the biggest peacetime propaganda operations in our nation’s history.” The Costs of War project at Brown University confirmed these findings, documenting how the Pentagon shaped over 2,500 war-themed productions by embedding pro-military narratives into popular culture.

The pattern is consistent and architecturally predictable. Productions that portray the military favorably receive cooperation. Productions that depict war crimes, friendly fire, nuclear weapons mishandling, or institutional incompetence are denied support. Platoon was refused cooperation for being too critical of Vietnam. Independence Daylost its Pentagon agreement after the director refused to remove references to Area 51. The 1993 Mogadishu debacle made the DoD acutely sensitive to portrayals of military failure: Pentagon officials refused to cooperate with any production that might make the military “look ridiculous” in similar scenarios. Phil Strub, who ran the DoD’s Film Liaison Unit for twenty-nine years until 2018, built a database called “Dara” tracking every entertainment production that had approached the department for assistance. The result is not censorship in the formal legal sense. It is selection pressure operating across thousands of productions over decades, shaping the narrative environment as surely as natural selection shapes a species, by controlling which stories survive.

The Billion-Dollar Cultural Integration Budget

The economic integration runs deeper than script approval. A 2015 Senate oversight report by Senators John McCain and Jeff Flake, covered by NPR, found that the Pentagon had signed 72 contracts with professional sports teams across the NFL, MLB, NHL, NBA, MLS, and NASCAR for “paid patriotism” events, spending $6.8 million on military displays presented to audiences as authentic voluntary tributes. Total DoD sports marketing spending exceeded $53 million between 2012 and 2015. The senators discovered that the Pentagon could not fully account for its own expenditures and had “materially misrepresented” facts in some official responses. NFL teams received the largest share: the Atlanta Falcons collected $879,000, the New England Patriots $700,000, the Buffalo Bills $650,000. The NFL eventually reimbursed $724,000 in what it acknowledged were inappropriate payments for patriotic ceremonies.

The scale has grown since. The Defense Department spent $1.14 billion on advertising in 2023, according to federal procurement records analyzed by Rebuild Local News, with the Army alone accounting for nearly $640 million, more than double the federal total from 2018. The Army’s FY2025 marketing and advertising budget request reached $1.1 billion, a ten percent increase, with an additional $675 million in enlistment incentives. A GAO report documented that by 2007 the four military services were spending over $600 million annually on recruiting advertising alone, a 150 percent increase since 1999. These are not incidental expenses. They are the cultural integration line item in the defense budget, purchasing narrative influence across film, television, sports, and digital media simultaneously, with no unified accounting that would allow Congress or the public to see the total investment.

The China Veto: Self-Censorship for Market Access

The second architecture operates through market dependency rather than script approval. PEN America’s 94-page report “Made in Hollywood, Censored by Beijing”, published in 2020, documents how Hollywood studios increasingly make decisions about content, casting, plot, dialogue, and settings based on anticipating what Beijing’s censors will permit. The mechanism is financial: China represents the world’s second-largest box office market, with American films earning $2.6 billion there in 2019 alone. Access requires approval from Chinese regulators who enforce the Communist Party’s content restrictions. Studios that offend Beijing lose market access. Studios that accommodate Beijing’s preferences receive favorable release dates, advertising arrangements, and investment relationships. PEN America found through dozens of interviews with anonymous industry insiders that “self-censorship concerning China is increasingly the new normal for Hollywood professionals.”

The documented examples form a pattern. Marvel’s Doctor Strange changed a Tibetan character to a Celtic one to avoid Chinese objections, drawing criticism for whitewashing while satisfying Beijing. The 2012 remake of Red Dawndigitally replaced Chinese invaders with North Koreans in post-production after a Chinese state newspaper accused Hollywood of “demonizing China.” DreamWorks Animation’s 2019 Abominable included a map reinforcing Beijing’s territorial claims in the South China Sea. Studios invited Chinese government regulators onto film sets to advise on avoiding censorship triggers, including during Marvel’s Iron Man 3. Paramount’s Top Gun: Maverick initially removed the Taiwanese flag from Maverick’s iconic flight jacket, as NBC News reported, restoring it only after Tencent withdrew its investment, an event the CNA analyzed as representative of a broader influence campaign. PEN America noted that 1997, when Seven Years in Tibet and Scorsese’s Kundun were released, was the last year Hollywood directly confronted China’s human rights record on screen.

The convergence between the Pentagon liaison and the China veto is the critical finding. The Pentagon rewards productions that glorify American military capability. Beijing punishes productions that acknowledge inconvenient geopolitical realities, from Tibetan independence to Taiwanese sovereignty to Uyghur persecution. The filmmaker navigating both systems simultaneously produces content that celebrates American military power while erasing the political contexts in which that power is deployed. This is not conspiracy. It is architecture, and it operates with mechanical predictability.

The Music Industry: Economic Destruction as Doctrine Enforcement

The third architecture operates through demonstrated willingness to destroy dissenters. On March 10, 2003, Natalie Maines of the Dixie Chicks told a London audience she was ashamed that President Bush was from Texas. Within days, the industry response was total. Billboard’s 2022 oral history documents the mechanics from industry executives who were present: Cumulus Media banned the Chicks from its 270 radio stations. Clear Channel organized pro-war rallies. In Colorado, two DJs were suspended for defying the ban at a station near five military bases. The Senate Commerce Committee held hearings where Senator John McCain questioned Cumulus CEO Lewis Dickey about whether media consolidation had enabled the coordinated suppression of a single artist.

The operational term is “Dixie-Chicked.” Leslie Fram, then Senior Vice President at CMT, confirmed to The 19th in a 2023 retrospective that the term became industry standard for silencing dissent, particularly among female artists. The effect persisted for a decade: ten years of political silence in country music, enforced not by government censorship but by the demonstrated consequences of challenging the doctrine during wartime. The infrastructure that destroyed the Chicks’ career in 72 hours, consolidated radio networks capable of erasing an artist from the dominant distribution channel overnight, remains intact and has grown more powerful through digital consolidation.

The Adversary-Controlled Distribution Channel

The music industry’s distribution architecture has shifted since 2003, but not in a direction that reduces the convergence gap. TikTok, owned by Beijing-based ByteDance, now functions as the dominant music discovery platform globally. Research data indicates that 84 percent of songs appearing on Billboard’s Global 200 in 2024 first gained popularity on TikTok. Record labels pressure artists to create “TikTok-ready” content, and on-demand streaming increases by eleven percent in the three days following a peak in TikTok views. The platform’s algorithm, not radio programmers, now determines which artists are heard and which are invisible.

The U.S. government has recognized TikTok as a national security threat through escalating action: the Army banned it from government devices in December 2019, the Pentagon formalized the ban across all DoD-connected devices including contractor systems in June 2023, and the Supreme Court unanimously upheld the Protecting Americans from Foreign Adversary Controlled Applications Act in January 2025. FBI Director Christopher Wray testified in 2023 that the Chinese government has the potential to control TikTok’s algorithm, “which allows them to manipulate content and, if they want to, to use it for influence operations.” The Network Contagion Research Institute’s analysis found that TikTok’s search results for sensitive topics like “Uyghur” and “Tibet” showed a near-total absence of anti-China content compared to other platforms, with only 2.3 percent anti-China content for “Uyghur” searches versus 21.7 percent on YouTube.

The convergence is precise. The same government that maintains editorial control over 2,500 film and television productions through the Pentagon liaison has banned the dominant music distribution platform from its own devices because of Chinese government influence over its algorithm. An adversary-controlled platform now gatekeeps the discovery channel that consolidated radio networks used to control, and it does so with algorithmic precision that Cumulus Media’s 270-station ban could never match. The music industry, which demonstrated in 2003 that it could erase a dissenting voice in 72 hours, now depends for artist discovery on a platform whose recommendation engine is owned by the same foreign government that exercises editorial veto over Hollywood films.

The Convergence Gap

No institution sees all five domains simultaneously. The Pentagon’s Entertainment Liaison Office tracks its own script-approval agreements but has no mandate to assess how Chinese market censorship interacts with its editorial influence. The State Department monitors PRC influence operations but does not connect them to domestic cultural production dynamics. The FCC regulates broadcast consolidation but does not assess how consolidated media networks function as doctrine-enforcement mechanisms. Congressional committees investigating TikTok focus on data security and algorithm manipulation but do not connect TikTok’s dominance in music distribution to the broader architecture of narrative control. The defense budget line items for entertainment spending, recruitment advertising, and sports marketing are scattered across service branches with no unified accounting.

This is the Narrative Garrison: the architectural enclosure of cultural production within boundaries set by institutional doctrine, adversary leverage, and economic incentive, maintained not by censorship but by access control, market dependency, and the demonstrated willingness to destroy dissenters. A garrison is not a wall. It is a permanent military installation that controls the terrain around it through presence and capability, not through constant active engagement. The Narrative Garrison does not censor every story. It controls the conditions under which stories are told, and it does so through three architectures that no single institution is designed to see as a unified system.

The Five Pillars

Pillar One: Pentagon Liaison Transparency Mandate. Require the DoD Entertainment Liaison Office to publish an annual report listing all Production Assistance Agreements, all script changes requested, and all productions denied cooperation with the specific reasons for denial. This does not restrict the Pentagon’s authority to grant or deny cooperation. It makes the editorial influence visible. Roger Stahl’s FOIA research took years to partially illuminate what a mandatory disclosure would reveal in full.

Pillar Two: Algorithmic Audit Requirements for Foreign-Owned Platforms. Mandate independent algorithmic audits for any content distribution platform owned or controlled by a foreign adversary state, with specific attention to suppression or amplification of content relating to that state’s geopolitical interests. The TikTok divestiture debate focused on data security. The cognitive warfare dimension, algorithmic control over what 170 million American users see and hear, demands equal scrutiny through systematic, repeatable audit methodology.

Pillar Three: Economic Protection for Cultural Dissent. Establish legal protections against coordinated economic retaliation by consolidated media companies against artists who express political dissent. The Chicks case demonstrated that a handful of corporations controlling hundreds of radio stations could erase an artist from the dominant distribution channel within days. Media consolidation has increased since 2003. The mechanism that silenced one of the best-selling female groups in American music history remains available for the next artist who challenges the prevailing doctrine.

Pillar Four: Mandatory Disclosure of DoD Entertainment Spending as Recruitment Line Item. Require unified accounting of all DoD spending on entertainment partnerships, sports marketing, recruitment advertising, and cultural integration across all service branches, reported as a single line item with measurable recruitment outcomes. The current fragmentation, with the Army reporting its billion-dollar marketing budget separately from Navy sports contracts and Air Force NASCAR sponsorships, prevents Congress and the public from seeing the total investment in narrative control.

Pillar Five: Cross-Domain Intelligence Requirement. Establish a standing analytical requirement connecting cultural production, trade policy, and cognitive warfare as a unified domain. The convergence between Pentagon editorial influence, Chinese market censorship, adversary-controlled distribution platforms, and domestic economic enforcement of narrative conformity is not visible to any existing analytical institution. The gap exists because the silos exist. Breaking the silos is the first step toward seeing the garrison.

Resonance

Billboard. (2022). “Chicks Radio Banned: George Bush Oral History.” Billboard.https://www.billboard.com/music/country/chicks-radio-banned-george-bush-oral-history-1235087442/Summary: Oral history from industry executives documenting the mechanics of Cumulus Media’s ban of the Dixie Chicks from 270 radio stations, the coining of “Dixie-Chicked” as an industry verb, and the decade of political silence that followed in country music.

CNA. (2022). “Combatting Beijing’s Influence: Lessons from Top Gun: Maverick.” CNA Analysis. https://www.cna.org/our-media/indepth/2022/06/combatting-beijings-influence-lessons-from-top-gun-maverick.Summary: Analysis of PRC influence campaign through Hollywood investment and withdrawal patterns, using Tencent’s relationship with Top Gun: Maverick as case study for the broader pattern of market-access leverage.

DefenseScoop. (2023). “Pentagon Issues Rule to Ban TikTok on All DoD-Connected Devices.” DefenseScoop. https://defensescoop.com/2023/06/02/pentagon-proposes-rule-to-ban-tiktok-on-all-dod-connected-devices-including-for-contractors/Summary: Reporting on the formal FAR amendment banning TikTok from all DoD-connected devices, extending the prohibition to contractor-owned systems used in performance of government contracts.

Index on Censorship. (2025). “Hollywood: The Pentagon’s Secret Weapon.” Index on Censorship. https://www.indexoncensorship.org/2025/03/hollywood-pentagons-secret-weapon/Summary: Interview with Roger Stahl on two decades of FOIA research revealing Pentagon editorial control over 2,500+ productions, which he characterized as one of the largest peacetime propaganda operations in American history.

McCain, John, and Jeff Flake. (2015). “Tackling Paid Patriotism.” United States Senate. Reported by NPR. https://www.npr.org/sections/thetwo-way/2015/11/05/454834662/pentagon-paid-sports-teams-millions-for-paid-patriotism-eventsSummary: Senate oversight report documenting 72 Pentagon contracts with professional sports teams for paid patriotism, $6.8 million in taxpayer-funded military tributes presented as authentic, and $53 million in total DoD sports marketing from 2012 to 2015.

NBC News. (2022). “Taiwan Cheers as Top Gun: Maverick Defies Chinese Censors.” NBC News. https://www.nbcnews.com/news/world/taiwan-cheers-top-gun-maverick-defying-chinese-censors-rcna31571.Summary: Reporting on the restoration of Taiwan’s flag in Top Gun: Maverick after Tencent withdrew from the production, illustrating how Chinese investment creates and releases editorial pressure on American cultural products.

NPR. (2003). “Senate Examines Radio Station Blackout of Dixie Chicks.” NPR. https://www.npr.org/2003/07/08/1323685/senate-examines-radio-station-blackout-of-dixie-chicksSummary:Coverage of Senate Commerce Committee hearings on Cumulus Media’s coordinated ban and the role of media consolidation in enabling political suppression of dissenting artists.

PEN America. (2020). “Made in Hollywood, Censored by Beijing.” PEN America. https://pen.org/report/made-in-hollywood-censored-by-beijing/Summary: 94-page investigation documenting systemic self-censorship in Hollywood driven by Beijing’s market-access leverage, with anonymous testimony from industry professionals confirming that accommodating Chinese censorship has become a standard business practice.

Rebuild Local News. (2024). “Federal Government Advertising Spending Has Doubled to $1.8 Billion Since 2018.” Rebuild Local News. https://www.rebuildlocalnews.org/federal-government-advertising-spending-has-doubled-to-1-8-billion-since-2018/Summary: Federal procurement analysis showing DoD spent $1.14 billion on advertising in 2023, with the Army at $640 million, representing a doubling of federal advertising spending since 2018.

Secker, Tom, and Matthew Alford. (2022). “Exclusive Documents Expose How Hollywood Promotes War.” Age of Transformation. https://ageoftransformation.org/exclusive-documents-expose-how-hollywood-promotes-war-on-behalf-of-the-pentagon-cia-and-nsa/Summary: FOIA-based documentation of Pentagon and CIA editorial control over 2,500+ film and television productions, with specific script changes, denial records, and the internal database tracking every entertainment production that approached the department.

The 19th. (2023). “The Chicks Were Silenced 20 Years Ago.” The 19thhttps://19thnews.org/2023/03/the-chicks-silenced-politics-20-years-influence-country-music/Summary: Twenty-year retrospective with CMT SVP Leslie Fram confirming “Dixie-Chicked” became the industry standard term for silencing dissent, documenting the chilling effect on political expression, particularly among female artists in country music.

U.S. Department of Defense. (2015). “DoD Instruction 5410.16.” DoD Issuances. https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/541016p.pdfSummary: Primary government source establishing the formal policy for Pentagon Production Assistance Agreements, including script oversight, screening provisions, and the requirement that supported productions align with recruiting objectives.

WSWS. (2003). “Colorado DJs Suspended for Defying Chicks Ban.” World Socialist Web Site. https://www.wsws.org/en/articles/2003/05/dixi-m09.htmlSummary: Reporting on the suspension of two Colorado DJs who defied the Cumulus Media ban at a station near five military bases, and Clear Channel’s parallel organization of pro-war rallies using consolidated broadcast infrastructure.

The Information Inversion

When Open-Source Synthesis Outperforms Classified Intelligence at the Tactical Level

The Fallacy

The classification system rests on a premise so deeply embedded in American defense culture that questioning it feels like questioning gravity: classified information is more valuable than unclassified information, and the architecture that protects secrets simultaneously protects the people who hold them. This is The Classification Fallacy. It confuses the protection of sources and methods—a legitimate and necessary function—with the protection of the force. These are not the same thing. They have never been the same thing. And on the seventh day of Operation Epic Fury, with six American soldiers dead in Kuwait and Iranian command-and-control fragmenting into uncoordinated retaliation, the distance between those two functions is measured in body bags.

The fallacy operates through a simple inversion. The system classifies information to keep it away from adversaries. But the architecture required to enforce that classification—compartmentation, need-to-know restrictions, echelon-based dissemination, and the sheer friction of moving cleared material through secure channels—simultaneously keeps information away from the very people the system was built to protect.

A specialist at Camp Arifjan knows what her battalion S-2 briefed twelve hours ago, filtered through classification restrictions, command messaging priorities, and whatever her commander decided was relevant to her lane. She does not know that Iran’s own Foreign Ministry admitted on March 3 that its military has lost control of several units operating on prior general instructions. She does not know that Iranian ballistic missile attacks have dropped ninety percent while drone hit rates have quadrupled—a shift that fundamentally changes her threat model. She does not know that the Strait of Hormuz is functionally closed, that CSIS estimates the first hundred hours of this operation cost $3.7 billion, or that the President of the United States demanded unconditional surrender from a decapitated regime whose surviving commanders cannot coordinate their own forces. All of this is open-source. None of it is classified. And she almost certainly does not have it.

This is not a new failure. It is the oldest failure in American intelligence, wearing new clothes. The Department of Defense Committee on Classified Information warned in 1956 that overclassification had reached “serious proportions.” A joint CIA-Department of Defense commission found in 1994 that the classification system had “grown out of control.” The 9/11 Commission concluded in 2004 that compartmentation contributed directly to the failure to detect the September 11 plot. The Reducing Over-Classification Act became law in 2010. And here we are in 2026, with the same architecture, the same culture, and six dead Americans in Kuwait who might have been better served by a twenty-three-year-old with a laptop and an Al Jazeera feed than by the most expensive intelligence apparatus in human history.

The Center of Gravity

The center of gravity is not the classification of any individual document. It is the synthesis architecture—or rather, the absence of one. The intelligence community generates enormous volumes of both classified and open-source material, but no echelon below combatant command is chartered, staffed, or equipped to fuse open-source streams across domains into real-time tactical intelligence products. The problem is not that the pieces do not exist. It is that the institutions holding the pieces are architecturally prevented from assembling them.

Government officials have conceded for decades that between fifty and ninety percent of classified documents could safely be released, a finding documented by the Brennan Center for Justice and confirmed by officials ranging from former Defense Secretary Donald Rumsfeld to former CIA Director Porter Goss, who told Congress that the intelligence community “overclassifies very badly.” The Reducing Over-Classification Act of 2010 codified what Congress had known since at least 2004: that the 9/11 Commission found “security requirements nurture over-classification and excessive compartmentation of information among agencies.” Sixteen years after that law, with fifty million classification decisions made annually, the architecture remains fundamentally unchanged. The ODNI’s own 2024 strategy document acknowledged that the office is “driving classification reform,” a phrase that would be encouraging if it had not been the same phrase used by every DNI since the position was created.

Meanwhile, former CIA officer Arthur Hulnick estimated that as much as eighty percent of the intelligence database is derived from open-source material, a figure cited by the Australian Army’s analysis of tactical OSINT application. The Defense Intelligence Agency published its 2024–2028 OSINT Strategy, and the ODNI’s own 2024–2026 OSINT Strategy stated that “the ability to extract actionable insights from vast amounts of open source data will only increase in importance.” The intelligence community knows the value of open-source material. It simply cannot deliver it to the echelon that needs it most.

The scale of the failure is staggering when measured against the resources deployed. Approximately 4.2 million Americans hold security clearances—nearly one in every fifty adults. The government spends billions annually on personnel security, classification management, and the physical infrastructure of secrecy: SCIFs, secure communications, cleared courier networks, and the bureaucratic apparatus required to process, store, protect, and eventually declassify the material it stamps SECRET. Yet the Deputy Secretary of Defense for Counterintelligence and Security conceded under congressional questioning that approximately fifty percent of those classification decisions are overclassifications. Half of an architecture designed to protect the force is protecting nothing—and the friction it generates slows the delivery of everything, including the material that genuinely matters.

The result is an intelligence assembly line that produces enormous volume at enormous cost while failing to deliver synthesis to the people who need it fastest. The problem is not collection. The IC collects more information than any organization in history. The problem is not analysis—brilliant analysts populate every agency. The problem is plumbing. The architecture was designed to move classified material upward through echelons, with synthesis happening at progressively higher levels of command. But in a conflict like Operation Epic Fury, where the threat environment changes hourly across seven domains simultaneously, the people at the bottom of that pyramid need the synthesized picture before the people at the top have finished reading the cable traffic. The architecture delivers too late what it delivers at all.

The Second Track: The Kuwait Proof

Operation Epic Fury provides the real-time proof of concept—not as a hypothetical but as a live demonstration of the information inversion in action. On February 28, 2026, the United States and Israel launched coordinated strikes across Iran under Operations Epic Fury and Roaring Lion. Within forty-eight hours, any analyst with access to open-source reporting—no clearance required, no SCIF needed—could assemble a comprehensive operational picture fusing seven distinct intelligence domains:

Military operations from CENTCOM press releases, IDF statements, and JINSA’s operational updatesNuclear safeguards from IAEA Director General Grossi’s statement to the Board of Governors on March 2 and subsequent satellite imagery assessments confirming damage at Natanz. Maritime disruption from Kpler’s real-time analysisshowing Strait of Hormuz transits collapsing from twenty-four vessels per day to near zero. Energy markets from Bloomberg, Reuters, and Investing.com, tracking Brent crude surging past ninety dollars per barrel. Diplomatic channels from Reuters, AP, and Al Jazeera, capturing Iran’s Foreign Minister stating there is no reason to negotiate. Cost analysis from CSIS’s estimate that the first hundred hours cost $3.7 billion, roughly $891 million per day, with $3.5 billion unbudgeted. Iranian internal dynamics from Iran International, Fars News Agency, and state media, documenting the Interim Leadership Council, the succession debate, and the Foreign Ministry’s admission that military units have fractured from central control.

No single intelligence directorate within the Department of Defense is chartered to fuse all seven of these streams into a single analytical product and push it to the tactical level in real time. The J-2 handles military intelligence. The J-5 handles policy and strategy. Energy and maritime analysis sits in different shops. IAEA reporting flows through State Department channels. The economic analysis comes from Treasury or specialized commands. Each silo holds genuine expertise. None is chartered to assemble the picture. The result is that a twenty-two-year-old specialist standing post in Kuwait at three in the morning operates on a threat model built from whichever slice of this picture her command decided to brief—while the complete picture is available to anyone with a browser and the training to synthesize it.

Consider what that specialist would know if she had access to the synthesized product. She would know that Iranian retaliatory capability is degrading rapidly in one dimension—ballistic missiles—while increasing in lethality in another—drones. She would know that the Strait of Hormuz closure means the regional economic infrastructure she is stationed to protect is under simultaneous military and economic siege. She would know that Hezbollah has opened a second front in Lebanon, that the IDF has issued evacuation orders covering half a million people in southern Beirut, and that a ground invasion of Lebanon could redirect Israeli military assets away from the Iranian theater.

She would know that Amazon Web Services data centers in Bahrain and the UAE have been knocked offline by drone strikes—meaning the digital infrastructure her unit may rely on for communications and logistics is degraded. She would know that her own government’s stated war aims shifted in the past twenty-four hours from “destroy nuclear capability” to “unconditional surrender”—a shift that changes the timeline, the escalation trajectory, and the likelihood that the conflict she is in will end in weeks rather than months. Every one of these facts shapes her tactical reality. None of them is classified. None of them was in her S-2 brief.

The irony runs deeper. The generation now filling the enlisted ranks grew up synthesizing information across dozens of simultaneous feeds. They are the most information-fluent cohort in military history. The institution responds by handing them a straw and positioning them next to a fire hose—then wondering why the force is surprised when the threat pattern shifts overnight.

The Convergence Gap

The convergence gap is structural, not technological. The technology to fuse open-source streams in real time exists. Commercial platforms do it daily for hedge funds, shipping companies, and news organizations. The gap exists because the defense intelligence architecture was designed during the Cold War to protect against a single monolithic adversary through compartmentation, and it has never been redesigned for an operating environment in which the adversary is a fragmenting regime launching uncoordinated drone swarms across six countries simultaneously.

The 9/11 Commission identified this gap in 2004 when it found that the failure to share information contributed to intelligence gaps before September 11, 2001, and that “the U.S. government did not find a way of pooling intelligence and using it to guide the planning and assignment of responsibilities.” The Commission recommended transforming the intelligence community from a “need to know” system to a “need to share” system. Twenty-two years later, the culture of hoarding has outlived every reform effort. As a Brookings Institution analysis noted, the entire intelligence community was built to follow the Soviet monolith, and the cultural transformation required to address networked, asymmetric threats has been partial at best.

The gap is compounded by what the Brennan Center has called the skewed incentive structure of classification: failure to protect information can end a career, while no one has ever been sanctioned for classifying information unnecessarily. The system defaults to secrecy not because secrecy serves the mission but because secrecy is the path of least personal risk for the classifier. As Supreme Court Justice Potter Stewart wrote in the Pentagon Papers case: “When everything is classified, then nothing is classified, and the system becomes one to be disregarded by the cynical or the careless.” The institution’s own internal culture thus produces the very vulnerability it was designed to prevent.

The Ukraine conflict demonstrated what happens when this gap is partially closed. Open-source analysts tracking Russian force movements, logistics, and casualties through social media, satellite imagery, and electronic intercepts produced strategic-level assessments that rivaled or exceeded classified estimates of Russian defense industrial production. Researchers at the European Journal of International Security found that OSINT-derived models revealed large discrepancies between official Russian claims and actual output—discrepancies that classified channels took months longer to confirm. The lesson was not that OSINT replaces classified intelligence. The lesson was that OSINT synthesis, conducted in real time without compartment walls, consistently delivered faster and often more accurate operational pictures than the stovepiped architecture it was never designed to challenge.

The current conflict makes the Ukraine lesson acute. Iran’s Foreign Ministry admitted on March 3 that its military has lost control of several units operating on prior general instructions. This is not a minor data point. It is a fundamental shift in the threat model for every American soldier in the Persian Gulf. An adversary with centralized command-and-control produces predictable threat patterns. An adversary with fractured command-and-control produces unpredictable, locally initiated actions by units following outdated orders with no oversight. The threat becomes more dangerous precisely because it becomes less coordinated. Any competent tactical analyst given that single piece of information—which was published by Reuters, cited by multiple outlets, and available to anyone with an internet connection—would immediately recognize that the defensive posture briefed forty-eight hours earlier required revision. But the architecture that carries this information to tactical units is not designed for speed. It is designed for control. And control, in this context, is the enemy of survival.

Naming the Weapon

The weapon is The Information Inversion: the structural condition in which the defense classification architecture produces a tactical intelligence environment inferior to what is freely available through open-source synthesis. It is not a bug. It is the predictable output of a system designed to protect secrets from adversaries that simultaneously prevents synthesis across domains, restricts dissemination to echelons that need it most, and incentivizes overclassification at every decision point. The weapon is not wielded by an adversary. It is wielded by the architecture itself. And the people it strikes are not in Washington. They are in Kuwait, at three in the morning, with a threat model that expired six hours ago.

The inversion is most dangerous precisely when it is most invisible. A soldier receiving a classified threat brief has no way of knowing that the brief omits seven-eighths of the operational picture—the maritime disruption data, the energy market signals, the nuclear safeguard status, the diplomatic channel closure, the adversary’s internal fragmentation—because those streams were never fused into the product she received. She cannot miss what she was never shown. The system’s failure is undetectable to the people it fails. They discover the gap only when the threat arrives in a form their brief did not predict—and by then, the discovery is measured in casualties.

The Doctrine

Pillar One: Tactical Fusion Cells. Stand up dedicated open-source fusion cells at the brigade and battalion level, staffed by trained OSINT analysts with the explicit charter to synthesize across military, diplomatic, economic, maritime, and nuclear domains. These cells operate on unclassified systems, produce unclassified products, and push those products to every echelon below them without the friction of classification review. The model exists in embryonic form in the intelligence community’s existing OSINT enterprise. Extend it to the tactical edge where it is needed most.

Pillar Two: The Synthesis Standard. Establish a doctrinal requirement that every threat assessment delivered to forces in contact must include an open-source annex fusing relevant reporting across all available domains—not just the classified take from the unit’s organic intelligence section. The annex is not a supplement. It is a co-equal component of the assessment, produced by the fusion cell, and delivered alongside the classified brief. If the open-source picture contradicts the classified picture, that discrepancy is flagged, not suppressed.

Pillar Three: Classification Accountability. Implement the Brennan Center’s long-standing recommendation for spot audits of classifiers with escalating consequences for serial overclassification. When fifty to ninety percent of classified material does not merit its designation, the system is not protecting the force—it is blinding it. Make the cost of unnecessary classification equal to the cost of unauthorized disclosure. Rebalance the incentive structure so that officers think twice before stamping SECRET on material that belongs on the unclassified net where it can save lives.

Pillar Four: Digital Native Recruitment. Recruit and retain the generation that grew up synthesizing information across simultaneous feeds. Build career tracks that reward OSINT tradecraft, multi-domain synthesis, and real-time analytical production. The twenty-two-year-old specialist who can fuse seven open-source streams into a coherent operational picture in forty minutes is not a liability to be managed. She is the most valuable intelligence asset in the theater. Train her. Equip her. Promote her. Do not bury her behind a system designed for an adversary that dissolved in 1991.

Pillar Five: The Convergence Intelligence Directorate. Establish a permanent Convergence Intelligence Directorate within CENTCOM and each Geographic Combatant Command, chartered specifically to fuse open-source streams across the domains that stovepiped intelligence architectures cannot bridge: military operations, nuclear safeguards, maritime disruption, energy markets, diplomatic signaling, and adversary internal dynamics. This is not a new bureaucracy. It is the institutional recognition that the domains which determine whether soldiers live or die do not respect the organizational chart of the intelligence community—and the force should not have to die while the institution catches up.

The directorate would produce a daily convergence product—modeled on the structure of a comprehensive operational situation report—that fuses all available open-source streams into a single, unclassified analytical document and pushes it to every echelon from combatant command to squad. The product exists to close the gap between what the institution knows and what the force receives. If the concept sounds radical, consider that it is exactly what commercial intelligence firms already do for shipping companies, hedge funds, and insurance underwriters. The defense establishment is the only institution in the world that spends a hundred billion dollars a year on intelligence and cannot deliver a fused operational picture to a specialist standing post.

The Walk

She is twenty-three years old and standing post at Camp Arifjan at 0300. She has been in the Army for fourteen months. She processed more information before breakfast this morning than the entire intelligence staff of a World War II division processed in a week. She does not know that the enemy’s command-and-control architecture fractured overnight, that drone hit rates have quadrupled while missile launches have cratered, or that the threat model she was briefed on twelve hours ago no longer matches the threat she faces tonight. She does not know these things because the classification architecture—built to protect her—has prevented the synthesis that would save her.

Six Americans died in Kuwait in the opening hours of this war. The intelligence existed to understand the threat they faced. The architecture to deliver it to them did not. The information was not hidden by the enemy. It was hidden by the system—buried under fifty million annual classification decisions, half of which the system’s own custodians admit are unnecessary. Chief Warrant Officer 3 Robert M. Marzan, fifty-four, of Sacramento, California. Major Jeffrey R. O’Brien, forty-five, of Indianola, Iowa. Four others whose families were still being notified when their names should have been the last argument anyone needed for tearing down the architecture that failed them.

The intelligence community will respond to this argument with the claim that open-source synthesis cannot replace classified intelligence. That is true. Nobody is claiming otherwise. But the question is not whether OSINT replaces classified material. The question is whether the classification architecture’s inability to deliver synthesized intelligence to the tactical level faster than open-source channels can deliver it represents a structural vulnerability that gets soldiers killed. The answer, measured in the six names from Kuwait, is yes. The architecture that was built to protect the force is blinding it. The information inversion is real, it is measurable, and it is lethal.

The young inherit what the old build. If the architecture blinds the force, the architecture must change. The alternative is to keep handing straws to people standing next to fire hoses and calling it security. The intelligence already exists. The synthesis is possible. The only thing missing is the institutional will to deliver it to the people who need it most—before the next specialist at the next post in the next war becomes the next name on a casualty notification.
The information inversion is the convergence gap. Close it, or count the dead.

RESONANCE

Brennan Center for Justice (2011). Reducing Overclassification Through Accountability. Goitein E, Shapiro DM. https://www.brennancenter.org/our-work/research-reports/reducing-overclassification-through-accountability. Summary: Documents that government officials estimate fifty to ninety percent of classified material does not merit its designation, and proposes accountability mechanisms including spot audits with escalating consequences for serial overclassifiers.

Brennan Center for Justice (2023). The Original Sin Is We Classify Too Much. Goitein E. https://www.brennancenter.org/our-work/analysis-opinion/original-sin-we-classify-too-much. Summary: Argues that the classification system’s skewed incentives—penalties for under-protecting, no penalties for overclassifying—guarantee that busy officials default to secrecy regardless of national security merit. Cites fifty million classification decisions annually.

Center for Public Integrity (2015). Agencies Failed to Share Intelligence on 9/11 Terrorists. https://publicintegrity.org/politics/agencies-failed-to-share-intelligence-on-9-11-terrorists/. Summary: Documents specific instances where FBI, CIA, and other agencies possessed complementary pieces of the 9/11 plot but classification barriers and compartmentation prevented synthesis.

Center for Strategic and International Studies (2026, March 6). Operation Epic Fury Cost Estimate. Cited in Al Jazeera reporting. https://www.aljazeera.com/news/2026/3/6/iran-war-what-is-happening-on-day-seven-of-us-israel-attacks. Summary: Estimates the first one hundred hours of Operation Epic Fury cost $3.7 billion, approximately $891 million per day, with $3.5 billion unbudgeted.

Elwell J, Morrow T (2021). Event Barraging and the Death of Tactical Level Open-Source Intelligence. Military Review, Army University Press. https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2021/Rasak-Open-Source-Intelligence/. Summary: Warns that adversaries will exploit tactical OSINT through “event barraging”—digital inundation with fabricated events—while acknowledging that OSINT at the tactical level provides faster situational awareness than deploying collection assets.

European Journal of International Security (2025). Open Source Intelligence (OSINT) and the Fog of War at the Strategic Level: Defence Industrial Production in Russia. Cambridge University Press. https://doi.org/10.1017/eis.2025.6. Summary: Demonstrates that OSINT-derived models of Russian defense industrial production revealed discrepancies that classified channels took months longer to confirm, establishing OSINT as a viable complement to traditional intelligence at the strategic level.

Hulnick AS (2010). The Dilemma of Open Source Intelligence. In Johnson LK (ed.), The Oxford Handbook of National Security Intelligence. Cited in The Cove, Australian Army. https://cove.army.gov.au/article/tactical-application-open-source-intelligence-osint. Summary: Estimates that eighty percent of the intelligence database is derived from open-source material, establishing OSINT as the foundational layer upon which classified intelligence is built.

International Atomic Energy Agency (2026, March 2). Director General’s Introductory Statement to the Special Session of the Board of Governors. IAEA. https://www.iaea.org/newscenter/statements/iaea-director-generals-introductory-statement-to-the-board-of-governors-2-march-2026. Summary: Grossi reports no radiation elevation above background in bordering countries, confirms IAEA communication with Iran is limited, and warns that a radiological release cannot be ruled out given operational reactors across the region.

JINSA (2026, March 3). Operations Epic Fury and Roaring Lion: Update 1. Jewish Institute for National Security of America. https://jinsa.org/wp-content/uploads/2026/03/Operations-Epic-Fury-and-Roaring-Lion-03-03.pdf. Summary: Documents that Iranian missile campaign rate of fire dropped ninety-five percent while drone hit rate increased from four to twenty-four percent—a shift indicating tactical adaptation that changes the threat model for ground forces.

Kaplan F (2016). Dark Territory: The Secret History of Cyber War. Simon & Schuster. Summary: Documents the intelligence community’s structural inability to share information across agency boundaries, tracing the cultural roots to Cold War compartmentation practices that persist decades after the Soviet threat dissolved.

Kpler (2026, March 1). US-Iran Conflict: Strait of Hormuz Crisis Reshapes Global Oil Markets. https://www.kpler.com/blog/us-iran-conflict-strait-of-hormuz-crisis-reshapes-global-oil-markets. Summary: Reports that the Strait of Hormuz is effectively closed for commercial shipping through insurance withdrawal rather than physical blockade, with limited traffic restricted to Iranian and Chinese-flagged vessels.

Leidos (2025). From Open Source to Operational Insight: How OSINT Is Shaping Modern Intelligence. https://www.leidos.com/insights/open-source-operational-insight-how-osint-shaping-modern-intelligence. Summary: Cites the DIA 2024–2028 OSINT Strategy and the ODNI 2024–2026 OSINT Strategy, both acknowledging that open-source intelligence is now incorporated in nearly all finished intelligence products and that extracting actionable insights from open-source data will only increase in importance.

National Commission on Terrorist Attacks Upon the United States (2004). The 9/11 Commission Report. W.W. Norton. https://www.govinfo.gov/content/pkg/GPO-911REPORT/pdf/GPO-911REPORT.pdf. Summary: Found that “current security requirements nurture overclassification and excessive compartmentation of information among agencies” and recommended transforming the intelligence community from a “need to know” to a “need to share” culture.

NBC News (2023, January 25). America’s System for Handling Classified Documents Is Broken, Say Lawmakers and Former Officials. https://www.nbcnews.com/politics/national-security/americas-system-classified-documents-broken-rcna66106. Summary: Brennan Center expert Elizabeth Goitein states that fifty million classification decisions are made annually, ninety percent of which are probably unnecessary, creating a system impossible to comply with consistently.

Office of the Director of National Intelligence (2024). ODNI Strategy. https://www.govinfo.gov/content/pkg/GOVPUB-PREX28-PURL-gpo234155/pdf/GOVPUB-PREX28-PURL-gpo234155.pdf. Summary: Acknowledges that ODNI is “driving classification reform” while simultaneously noting that the intelligence community must develop structures and mechanisms to promote collaboration across agencies.

Peretti A (2025). The Prometheus Option. CRUCIBEL. Summary: Argues that talent mobility constitutes an asymmetric defense asset and that institutional architecture’s inability to deploy expertise across organizational boundaries represents a strategic vulnerability.

Reducing Over-Classification Act (2010). Public Law 111-258. https://intelligence.senate.gov/laws/reducing-over-classification-act-2010. Summary: Codified the 9/11 Commission’s finding that overclassification and excessive compartmentation nurture intelligence failures, requiring the Secretary of Homeland Security to develop a strategy to prevent overclassification and promote information sharing.

Stremitzer C (2026, February 28). Houthis Signal Renewed Red Sea Shipping Attacks After U.S.–Israeli Strikes on Iran. gCaptain. https://gcaptain.com/houthis-signal-renewed-red-sea-shipping-attacks-after-u-s-israeli-strikes-on-iran/. Summary: Documents that Houthi-controlled Yemen threatened to resume Red Sea attacks following the start of Operation Epic Fury, with BIMCO warning of sharp war risk premium increases if attacks materialize.

U.S. House of Representatives (2007). Hearing on Classification of National Security Information. Committee on the Judiciary. https://www.govinfo.gov/content/pkg/CHRG-110hhrg38190/html/CHRG-110hhrg38190.htm. Summary: Deputy Secretary of Defense Carol A. Haave conceded under questioning that approximately fifty percent of classification decisions are overclassifications. Multiple witnesses testified that Cold War compartmentation culture persists despite the transformation of the threat environment.