Espionage
Explore conspiracy theories related to espionage.
51 theories documented
The 764 Network
The 764 network targets children through Discord and Roblox, coercing them into self-harm and violence. The FBI calls it a tier-one threat. Most parents have never heard of it.
Cambridge Five — British Intelligence Penetrated by KGB
Five Cambridge University graduates recruited by Soviet intelligence infiltrated the highest levels of British intelligence (MI6, GCHQ) and the Foreign Office —
COINTELPRO — FBI Targeting of Civil Rights Leaders
Confirmed FBI counterintelligence program that surveilled, infiltrated, and disrupted civil rights, socialist, and anti-war organizations — including harassment
Cambridge Analytica — Facebook Data Weaponized for Elections
Cambridge Analytica harvested data from 87 million Facebook profiles without consent and used psychographic profiling to micro-target voters for Brexit and Trump — confirmed by whistleblower Christopher Wylie.
Five Eyes — Global Surveillance Alliance
The UKUSA intelligence-sharing agreement between US, UK, Canada, Australia, and New Zealand creates a global SIGINT network that enables each nation to spy on the others' citizens, circumventing domestic surveillance laws.
Havana Syndrome
Over 1,500 US diplomats and intelligence officers struck by mysterious neurological attacks across 100+ countries. Evidence points to pulsed microwave weapons.
Huawei 5G — Chinese Government Backdoor
Five Eyes nations have banned or restricted Huawei's 5G equipment amid intelligence assessments that Chinese law requires companies to cooperate with state intelligence.
Julian Assange — Political Persecution or Criminal Prosecution?
Julian Assange spent 7 years in an embassy, 5 years in a maximum-security prison, and faced 175 years under the Espionage Act. Was he a journalist being persecuted for publishing, or a reckless actor who endangered lives? The case that split the free press movement.
MKUltra — CIA Mind Control Program
Confirmed CIA program (1953-1973) conducting illegal human experiments with LSD, electroshock, and psychological torture on unwitting subjects at 80 institutions — revealed by 20,000 surviving documents.
Mossad Operations & Conspiracy Theories
From documented assassinations to alleged false flags — examining Mossad's confirmed covert operations and the conspiracy theories they've spawned.
NSA PRISM — Mass Surveillance of Internet Users
The confirmed NSA program revealed by Edward Snowden in 2013, collecting data from Google, Facebook, Apple, Microsoft, and other tech companies.
Operation Ajax — CIA-Backed Iran Coup (1953)
The CIA and MI6 orchestrated the overthrow of Iran's democratically elected Prime Minister Mosaddegh in 1953 to restore the Shah — admitted by the CIA in 2013 declassified documents.
Operation Condor — CIA-Backed South American Death Squads
A confirmed CIA-backed program coordinating South American military dictatorships to hunt, torture, and assassinate leftist political opponents across borders — killing an estimated 60,000+ people.
Operation Gladio — NATO Stay-Behind Networks in Europe
Operation Gladio was a confirmed NATO covert program maintaining secret stay-behind armies across Western Europe, linked to false flag terrorism in Italy.
Operation Cyclone — CIA Arms to Afghan Mujahideen / Al-Qaeda Blowback
Confirmed: The CIA's Operation Cyclone funneled $3 billion+ to Afghan mujahideen fighting Soviet occupation — including groups that later became Al-Qaeda — with Brzezinski admitting the program was designed to draw the Soviets into their own Vietnam.
CIA Overthrow of Allende — Chile 1973
Declassified documents confirm CIA and State Department under Kissinger worked to 'make the economy scream' and supported the 1973 military coup that killed democratically elected Salvador Allende.
Operation Northwoods
The declassified 1962 plan by the Joint Chiefs of Staff to stage fake terrorist attacks on U.S. soil to justify invading Cuba. Rejected by President Kennedy.
Pegasus Spyware — NSO Group State Surveillance Tool
NSO Group's Pegasus spyware — sold only to governments — was confirmed by Amnesty International and Citizen Lab to have targeted journalists, activists, and politicians in 50+ countries.
Project Monarch — MKUltra Trauma-Based Mind Control
Alleged CIA program using severe childhood trauma to create dissociative identity disorder — turning victims into controllable couriers, sex slaves, or assassins. Described by 'survivors' but not confirmed by documents.
WikiLeaks — Conspiracy Theory or Conspiracy Fact?
WikiLeaks published millions of classified documents exposing war crimes, diplomatic duplicity, CIA hacking, and political manipulation. Was Julian Assange a transparency hero or a foreign intelligence asset? The answer depends on which leak you're talking about.
Aldrich Ames — CIA's Deadliest Mole
CIA officer Aldrich Ames worked for the KGB from 1985 to 1994, compromising over 100 CIA operations and leading to the execution of at least 10 CIA assets
Anna Chapman — Russian Sleeper Agent Network in the US
In 2010, the FBI arrested 10 Russian SVR agents living as ordinary Americans — the largest spy ring bust since the Cold War, ending in a dramatic spy swap
Bay of Pigs — CIA Betrayal of Kennedy
The theory that the CIA deliberately set up the Bay of Pigs invasion to fail, sabotaging President Kennedy to force his hand on a full military intervention in Cuba — confirmed by declassified documents showing the agency withheld critical intelligence.
Chelsea Manning — The Whistleblower Who Changed Everything
Chelsea Manning was a 22-year-old Army intelligence analyst who leaked 750,000 classified documents to WikiLeaks, including the Collateral Murder video and diplomatic cables. She served 7 years of a 35-year sentence before Obama commuted it.
CIA 638+ Assassination Attempts on Castro
Church Committee confirmed the CIA planned and attempted multiple assassination plots against Castro -- including poison cigars, exploding seashells, and Mafia collaboration -- over more than a decade.
CIA / Private Sector Revolving Door
Over 70% of the U.S. intelligence budget goes to private contractors. How the line between spy agency and private company disappeared, and why it matters.
ECHELON — Cold War Global Intercept Network
ECHELON was a Cold War-era signals intelligence network operated by the Five Eyes alliance. Confirmed by the European Parliament in 2001 to intercept global communications.
Frank Olson — CIA Scientist Murdered to Prevent Disclosure
CIA biochemist Frank Olson fell from a 13th-floor window in 1953, nine days after being secretly dosed with LSD. Was it suicide, an accident, or murder? Explore the evidence.
GCHQ Tempora — UK Taps All Undersea Internet Cables
Snowden documents revealed GCHQ's Tempora program tapped fiber-optic cables carrying internet traffic through the UK, storing content for 3 days and metadata for 30 days.
Economic Espionage — US Spying on Allies for Corporations
European Parliament investigations confirmed that the NSA's ECHELON surveillance network was used for economic espionage — giving Boeing inside intelligence on Airbus bids. This isn't a theory. It's confirmed.
Kim Philby -- Head of MI6 Counterintelligence for KGB
Kim Philby rose to head MI6's anti-Soviet section while secretly working for the KGB -- the most damaging penetration of Western intelligence during the Cold War, and a confirmed conspiracy that reads like fiction.
Kryptos: The CIA's Unsolved Sculpture
A copper sculpture at CIA headquarters has contained an unsolved code since 1990. Three of its four sections have been cracked. The final 97 characters remain one of the world's greatest cryptographic mysteries.
Patrice Lumumba — CIA/Belgian Assassination
In 1961, the CIA and Belgian intelligence orchestrated the assassination of Patrice Lumumba, Congo's first democratically elected prime minister. They installed a dictator who ruled for 32 years. This is confirmed history.
NSA Backdoors in Encryption Standards (Dual EC DRBG)
How the NSA secretly weakened encryption standards and paid RSA Security $10 million to use a compromised random number generator. The confirmed story of Dual EC DRBG.
NSA Warrantless Wiretapping — Pre-Snowden Surveillance
The NSA's warrantless domestic surveillance program, revealed by the New York Times in 2005, tapped phone and internet communications of Americans without court approval. The confirmed history.
NSA XKeyscore — Search Engine for Global Internet
NSA's XKeyscore lets analysts search through emails, chats, browsing history, and social media of nearly any internet user worldwide. Confirmed by Snowden documents.
Number Stations
For decades, anonymous shortwave radio stations have broadcast streams of numbers into the void. Some have been confirmed as spy communications. Many remain completely unexplained.
Operation CHAOS — CIA Domestic Surveillance
A confirmed illegal CIA program that collected files on 7,200 Americans and indexed 300,000 names — all because the Johnson and Nixon administrations refused to believe the antiwar movement wasn't run by Moscow.
Project ARTICHOKE -- CIA Behavior Modification Precursor
Confirmed CIA program (1951-1953) that investigated hypnosis, drugs, and forced morphine addiction for creating involuntary agents and extracting information from captives during the Cold War.
Project BLUEBIRD -- First CIA Mind Control Program
Project BLUEBIRD (1950-1951) was the CIA's first formal mind control program, established during the Korean War to counter enemy brainwashing and investigate methods of interrogation and agent control.
Robert Hanssen -- FBI Agent Spying for KGB/SVR
FBI counterintelligence agent Robert Hanssen sold intelligence to Soviet/Russian intelligence for 22 years, described as possibly the worst intelligence disaster in US history.
Stratfor — The Shadow CIA Exposed by WikiLeaks
In 2012, WikiLeaks published 5 million internal Stratfor emails revealing the private intelligence firm spying on activists for Dow Chemical, maintaining paid informant networks, and operating as a corporate shadow CIA.
Total Information Awareness — DARPA Mass Surveillance Program
How John Poindexter's Total Information Awareness program was publicly defunded by Congress in 2003 but reportedly continued under classified programs. Confirmed history examined.
NSA Utah Data Center — Capturing All Communications
The NSA's massive Utah Data Center in Bluffdale stores unprecedented volumes of intercepted communications. Confirmed by Snowden documents and official admissions.
Cablegate — WikiLeaks' Diplomatic Cables Release
In November 2010, WikiLeaks began publishing a quarter-million classified U.S. diplomatic cables, exposing what American diplomats really thought about world leaders, secret deals, and the gap between public diplomacy and private reality.
Collateral Murder — WikiLeaks' Iraq War Video
In April 2010, WikiLeaks released classified footage of a U.S. Apache helicopter crew killing Iraqi civilians and Reuters journalists in Baghdad. The military had denied the footage existed. WikiLeaks published it for the world to see.
Vault 7 — CIA Hacking Tools Exposed by WikiLeaks
In 2017, WikiLeaks published 8,761 CIA documents revealing the agency's arsenal of hacking tools — capable of penetrating iPhones, Android phones, Samsung TVs, Windows PCs, and vehicle computer systems. It was the largest CIA leak in history.
MKSEARCH — CIA Post-MKUltra Drug Research
MKSEARCH was MKUltra's official successor (1965-1973), continuing research into behavior-modifying drugs and biological agents after congressional pressure prompted formal termination of MKUltra.
Operation TIPS — Government Civilian Informant Network
The Bush administration's 2002 plan to recruit 1 million American workers (cable installers, postal workers, utility employees) as government informants — cancelled by Congress after public outcry.
MKNAOMI — CIA Biological/Chemical Weapons Program
Confirmed CIA program maintaining a stockpile of biological and chemical agents at Fort Detrick — including exotic toxins, disease agents, and incapacitants — f
Project OFTEN -- CIA Occult / Supernatural Research
A reportedly CIA-funded project investigating black magic, demonology, astrology, and other occult practices for intelligence applications, run alongside MKUltra with documents largely still classified.