🦅 Citizen Steve, PhD

Dark Kompromat: Toward a Social Epistemology of Elite Criminal Networks

Steven G. Brown, PhD Associate Professor of Teaching Philosophy The Ohio State University

Draft — April 2026

A note on process. The central argument of this paper is entirely mine — the product of many months of research, reading, and thinking. The writing, however, was done through extended voice-mode conversations with Claude, Gemini, and ChatGPT: I walked and talked through the ideas, tested objections, and refined the framework in dialogue. Philosophy was born peripatetic and dialogical; this method returns to that, except now the conversation is captured and clarified using AI. All of the transcripts have been synthesized by Claude Opus 4.6 into a long-form piece of academic prose. I have chosen not to directly edit the text at all, only to provide feedback as an editor and collaborator would.

The capabilities of contemporary models — Claude and Gemini in particular — have allowed me to do far more than I could have alone, in a tiny fraction of the time. I am an overworked teaching professor, and without these tools this paper simply would not exist. That said, because of this process, the citations should be considered suspect until further notice — I have done my best to verify them, but I cannot vouch for every one at this stage. This is offered as a research pre-release because current events seem to demand that somebody say something like this, and I do not think it would be wise to wait any longer.


Abstract

There is something wrong with the way we evaluate claims about criminal conduct by the powerful. When the allegations are severe enough and the accused prominent enough, a cognitive threshold is crossed: the severity of the claim is treated as evidence against it, and the social status of the accused raises the bar for taking the claim seriously. This paper argues that this response is not epistemological caution but a systematic error — one that reliably serves the interests of those under scrutiny.

I develop three tools for correcting this distortion. First, a streamlined evidential standards framework distinguishing prosecutorial, epistemic, and investigative standards, and showing how their conflation protects the powerful. Second, an “inverse evidence principle” demonstrating that the effort invested in institutional suppression functions as positive evidence bearing on the severity of what is being suppressed. Third, a tripartite model of transgressive power networks — integrating genuine belief, cynical instrumentalism, and enacted mutual complicity — that dissolves a false dichotomy which has long obscured analysis of such networks. Throughout, I draw on the extensive cross-cultural record of elite transgressive practice — from Aztec state sacrifice to South Asian tantric antinomianism to European court occultism to modern intelligence operations — to establish that the behaviors alleged in extreme cases of elite criminality are not extraordinary claims requiring extraordinary evidence, but historically ordinary features of concentrated, unaccountable power.

I apply this framework to the Epstein case, including the documented pattern of partial compliance and active withholding following the November 2025 Epstein Files Transparency Act and the January 2026 DOJ production. The conclusion is that rational warrant for serious investigation is established at multiple evidential tiers, and that the ongoing failure to investigate is itself a datum requiring explanation.

Keywords: social epistemology, conspiracy, elite criminality, kompromat, evidential standards, institutional suppression, Epstein, antinomianism, transgressive power


I. Introduction: The Epistemological Problem

There is something peculiar about the way we evaluate claims of criminal conduct. When a neighbor is accused of theft, we weigh the evidence. When a corporation is accused of fraud, we examine the records. But when the allegation concerns coordinated criminal conduct by the most powerful people in a society — particularly when that conduct involves the most severe categories of harm — something different happens. A cognitive threshold is crossed, and the response shifts from evidential evaluation to categorical dismissal. The severity of the claim is treated as evidence against it.

This response reflects a recurrent epistemic error, and I want to explain its structure.

The severity of an allegation is not evidence bearing on its truth or falsity. If anything, the relationship runs the other way: the most severe abuses committed by the most powerful actors are precisely those most likely to be successfully suppressed, because the perpetrators command the institutional resources necessary for suppression, and because the claims are severe enough to trigger the dismissal reflex in potential investigators, journalists, and the general public. We need to get much clearer about why this happens if we want to reason well about cases like these.

The label “conspiracy theory” has become the primary vehicle for this dismissal. As a descriptive term, it is unobjectionable — a conspiracy is simply coordinated covert action by multiple parties, and a theory is a proposed explanation for observed phenomena. Most white-collar prosecutions are conspiracy cases. But the term has acquired a performative function that far exceeds its descriptive content: to invoke it is to place a claim outside the boundaries of legitimate inquiry, to mark the speaker as epistemically defective, and to relieve the audience of any obligation to examine the evidence.[1] It functions, in the terminology of Robert Jay Lifton, as a thought-terminating cliché — a phrase that forecloses analysis rather than advancing it.[2]

Dentith has argued at length that the conventional philosophical framework for evaluating conspiracy theories is itself compromised by a circularity: definitions that presuppose irrationality naturally find irrationality, and the category is structured such that verified conspiracies exit it — leaving only the unverified behind, which then appears to confirm the generalization that conspiracy theories are unreliable.[3] His particularist alternative — evaluate each conspiratorial hypothesis on its specific evidential merits, without a priori dismissal — is the methodological stance I adopt here.

I want to be clear about what this paper is and is not. It is not a brief for any particular conspiracy theory. It is an exercise in social epistemology: an examination of the cognitive and institutional mechanisms that produce systematic errors in our evaluation of claims about elite criminality, and a proposal for corrective principles. The Epstein case serves as the primary case study not because it is the most important such case — though it may be — but because it provides an unusually well-documented instance in which the full range of distorting mechanisms can be observed in operation.

A word on method. Throughout this paper, I distinguish carefully between what the evidence establishes, what it supports, what it warrants investigating, and what remains genuinely uncertain. The paper’s credibility depends on maintaining these distinctions with precision. I am not trying to establish guilt. I am trying to establish rational warrant for investigation, and to identify the mechanisms by which that investigation has been prevented. Where the evidence is weak, I say so. Where uncertainty is genuine, I name it. If the framework I develop here is any good, it should be exportable to any case of suspected institutional criminality and cover-up. Its value depends on its honest application.

A word on sources. The evidentiary record in cases of institutional suppression is by definition fragmented and partially withheld. This paper necessarily draws on multiple source classes: peer-reviewed scholarship, books from reputable academic presses, official inquiries and court records, authenticated documentary releases, mainstream journalism, and analytical commentary. I assign greatest weight to court records, official inquiries, authenticated documents, and peer-reviewed scholarship. Journalistic and analytical sources are used primarily as leads or as corroboration for claims independently supported by primary materials. Where I rely on sources whose provenance or reliability might be questioned, I say so. On a topic this fraught, source discipline is not merely a scholarly convention but a condition of credibility.

A word on scope. This paper examines networks that span multiple nations, cultures, and institutional contexts. The cross-cultural evidence I draw upon involves actors from British, American, Belgian, Italian, Israeli, Russian, Indian, Aztec, Tibetan, French, and other contexts. I want to be explicit from the outset that the behaviors under examination — the exploitation of the vulnerable by the powerful, the use of transgressive acts as mechanisms of loyalty and control, the weaponization of institutional authority for personal protection — are not the characteristic behaviors of any ethnic, religious, or cultural group. They are the characteristic behaviors of concentrated, unaccountable power, wherever it appears and whoever wields it. The historical record is unambiguous on this point, and any attempt to assign these patterns to a particular people rather than to a particular structural condition is not merely morally objectionable but analytically false. I will return to this point at several junctures, because the failure to maintain it is one of the primary mechanisms by which legitimate inquiry into elite criminality has been discredited and suppressed.

Here is the plan. Section II lays the epistemological groundwork: evidential standards, the inverse evidence principle, the severity-skepticism inversion. Section III develops a tripartite model of transgressive power networks. Section IV establishes historical and cross-cultural precedents, drawing on the anthropological, archaeological, and comparative religion literatures to show that even the most extreme allegations have documented parallels across civilizations. Section V examines the post-hoc behavior of relevant parties and institutions as primary evidence. Section VI applies the framework to a graduated assessment of specific claims. Section VII takes up the democratic, humanitarian, and epistemological stakes. Section VIII draws conclusions.


II. Getting the Epistemology Right

Before turning to any empirical claims, I want to lay the methodological groundwork. If we do not get the epistemology right first, we will replicate the errors that have characterized public discourse on these questions for decades.

A. The Evidential Standards Problem

One of the most consequential errors in public discourse about elite criminality is the conflation of distinct evidential standards. When a claim is described as “unproven,” the implicit standard is almost always prosecutorial — proof beyond a reasonable doubt, sufficient to sustain a criminal conviction. But this is the highest of several legitimate evidential standards, and treating it as the only relevant one produces systematic distortion.

Three standards deserve careful distinction.[4]

The prosecutorial standard — proof beyond a reasonable doubt — is the threshold for criminal conviction. It is designed to minimize false positives at the cost of tolerating false negatives, because the consequences of wrongful conviction are severe. This is the appropriate standard for imprisonment. It is not the appropriate standard for public discourse, belief formation, or the decision of whether to investigate.

Epistemic warrant is the standard appropriate for justified belief — the threshold at which a responsible epistemic agent should take a claim seriously as a live possibility and adjust their probabilistic assessment accordingly. This is not certainty; it is not even the civil law standard of “more likely than not.” The precise threshold is contested, but the important point for us is structural: epistemic warrant is categorically different from prosecutorial proof, and treating anything short of the latter as though it fails the former is a scope error with real consequences.[5]

Investigative warrant is the lowest of the three, but it is still a real standard. It is the threshold at which a responsible institution should devote resources to determining whether a claim is true. It requires more than pure speculation — it requires some evidential basis, some reason grounded in observation or testimony to think that further investigation would be productive.

Here is the critical move. These three standards operate in different domains: legal, epistemic, and practical. They apply to different activities: conviction, belief, and investigation. They are properly employed by different agents: courts, rational individuals, and investigative institutions. Conflating them — treating anything short of prosecutorial proof as “unproven” and therefore dismissible — is not epistemological rigor. It is a systematic bias, and it serves specific interests.

Consider who benefits. The most powerful actors in a society are precisely those best positioned to prevent evidence from reaching prosecutorial standards. They can destroy documents, silence witnesses, capture regulatory bodies, and direct law enforcement away from their own conduct. A framework that treats the absence of prosecutorial-grade evidence as equivalent to the absence of wrongdoing is, in effect, a framework that grants the most powerful actors immunity proportional to their power. That is not a neutral epistemic posture. It is a structural advantage for the powerful, built into the way we talk about evidence.

It is worth noting how natural the distinction among these standards is in ordinary cases. Regulators routinely begin investigating firms on evidence that would not remotely suffice for criminal conviction. A securities fraud inquiry is opened because trading patterns look anomalous — not because the case is ready for trial. No one regards this as irrational. It is simply the recognition that investigation and conviction are different activities, governed by different standards. The conflation only becomes visible when the subjects are powerful enough to enforce it.

And this is not a hypothetical concern. It is the documented history of institutional abuse investigations in the twentieth and twenty-first centuries. In case after case — the Catholic Church, Jimmy Savile, the Dutroux affair, COINTELPRO, MKULTRA — the evidence was available at the level of epistemic or investigative warrant for years or decades before it reached prosecutorial standards. In each case, the conflation of standards functioned as the primary mechanism of protection.

B. The Inverse Evidence Principle

The second foundational principle concerns the epistemic status of suppression itself. There is a common assumption in public discourse that undisclosed information is epistemically neutral — we don’t know what it contains, so it provides no evidence in either direction. I think this assumption is false, at least when the suppression is active rather than passive.

The underlying logic is straightforward. People who have done something seriously wrong are more motivated to suppress the evidence than people who have done nothing wrong, and people who have done something catastrophically wrong are more motivated still. Institutional actors are rational agents with limited resources. They do not invest significant political, legal, and reputational capital in suppressing information that is innocuous or exculpatory. The more resources invested in suppression, the more reason we have to believe that the suppressed information is seriously damaging.[6]

This has formal affinities with costly signaling theory in evolutionary biology: the investment in suppression is a costly signal of the severity of what is being suppressed.[7] But it is also, at bottom, a commonsense observation about human motivation. Criminals want to avoid getting caught, and they especially want to avoid getting caught when what they have done is catastrophically bad. When they control the evidence, the way they avoid punishment is by suppressing it. These are not exotic epistemological claims. They are ordinary inferences about rational behavior.

Now, three limiting conditions are essential to prevent this principle from degenerating into an unfalsifiable auxiliary hypothesis — a “heads I win, tails you lose” instrument. First, suppression counts as evidence only when the suppression itself is independently documented — not merely suspected or inferred from absence. Second, the evidential weight of suppression depends on the suppressing actor’s expected access to the underlying truth; suppression by parties who plausibly know the contents of what they are withholding carries more weight than suppression by parties who may not. Third, suppression alone never licenses acceptance of any specific allegation; it raises investigative priority and modifies how the absence of public evidence should be interpreted, but it does not settle the underlying claim. With these guardrails in place, the principle is a tool for calibrating inquiry, not a license for speculation.

A further distinction is necessary. Not all non-disclosure is active suppression. Bureaucratic delay, legally required redaction, routine classification, and passive institutional inertia are different in kind from selective, strategic, costly resistance to disclosure by actors with probable access to the underlying record. The inverse evidence principle applies only to the latter category — where disclosure would be expected absent reputational, legal, or political cost to the withholding party, and where the pattern of withholding is selective rather than uniform. Without this distinction, critics can fairly object that the principle reads too much into ordinary secrecy practices.

Consider the Epstein case specifically. As of early 2026, approximately half of the documents identified as relevant by the court remain unreleased. The current administration — having signed the Epstein Files Transparency Act into law — has filed legal motions through the Department of Justice to prevent the release of documents that the administration’s own legislation mandated.[8] The FBI has refused to comply with congressional subpoenas for Epstein-related files. The selectivity of the suppression is itself informative: material concerning Ghislaine Maxwell’s network has been released; material concerning specific FBI interviews has been withheld. This pattern is not consistent with a general privacy concern or a blanket classification policy. It is consistent with the protection of specific individuals whose names appear in the withheld files.

A corollary of the inverse evidence principle is what I will call the suppression discount. Any estimate of the strength of evidence for claims about the Epstein network must account for the fact that the evidentiary base has been artificially reduced by active institutional suppression. The effective evidential support is higher than the observed evidence alone would suggest, because the unobserved evidence has been removed by interested parties. This is not a license for speculation. But it does tell us something: the people who have seen the suppressed evidence have concluded that its release would be more damaging than the political cost of suppression. In a case where the political cost is very high, that is significant information.

C. The Severity-Skepticism Inversion

The third foundational principle concerns a systematic cognitive distortion that I want to name precisely, because I think it does more damage than any other single factor in these cases.

There is a threshold effect in human cognition where the severity of a claim triggers motivated skepticism disproportionate to the evidence. Above that threshold, we evaluate claims not in proportion to the quality of our evidence but in proportion to their severity, with more severe claims treated as a priori less likely — and, critically, with claims about more powerful and socially prominent people treated as even more a priori unlikely.[9]

The mechanism is psychologically intelligible. Claims about severe elite criminality threaten our model of the social world as broadly functional, our trust in institutions, our sense of safety, and our confidence in our own judgment. The cognitive cost of accepting such claims is high, and motivated reasoning provides ample resources for resistance.

But intelligible is not the same as epistemically justified. The historical record is unambiguous on this point. The Catholic Church’s systematic abuse of children was not believed for decades — despite credible testimony from hundreds of victims — because the claim seemed too outrageous to be true of an institution of such moral authority. Jimmy Savile abused hundreds of people over fifty years in plain sight, with the active knowledge of institutional actors at the BBC and in the NHS, because the claims were too severe to credit against so prominent and well-connected a public figure.[10] The Belgian parliamentary investigation into the Dutroux affair documented elite involvement in a child trafficking network, only to see the investigation obstructed at the state level and key witnesses die under suspicious circumstances.[11]

In each case, the argument “this is too outrageous to be true” functioned not as an epistemic safeguard but as a protection mechanism for the perpetrators. The pattern is consistent enough to constitute an empirical generalization: when claims of severe criminal conduct by powerful actors are dismissed primarily on the basis of their severity, the dismissal is more often wrong than right.

I want to be careful here, because this claim is narrower than it might sound. I am not saying that severe allegations against elites are usually true, or that vigilance about false accusation is misplaced. The claim is only that severity and social status should not function as negative evidence in advance of inquiry. A disciplined framework must remain capable of identifying both suppressed truths and destructive false positives — and the history of moral panics, contaminated testimony, and prosecutorial overreach provides ample reason to take both failure modes seriously.

The corrective principle is therefore not credulity but symmetry: we apply the same evidential standards to severe claims that we apply to moderate ones — no higher and no lower.

One further complication. Severe allegations against protected actors often arise in epistemically degraded environments shaped by both concealment and distortion. Institutions suppress genuine evidence; rumor ecosystems amplify, distort, and fabricate. A responsible methodology must resist two temptations simultaneously: the reflexive disbelief that serves perpetrators, and the undisciplined amplification that discredits legitimate inquiry and harms the falsely accused. I am trying to navigate between these failures, not to collapse into either one.

D. The Asymmetric Stakes of Error

A final methodological point. In evaluating claims about elite criminal networks, two types of error are possible: we can investigate a false claim (Type I error) or fail to investigate a true one (Type II error). These errors are not symmetric in their consequences, and any responsible framework must account for this.[12]

The cost of a Type I error — investigating a false claim — is reputational damage to the falsely accused and wasted investigative resources. These are real costs. But the cost of a Type II error — failing to investigate a genuine network of elite abuse — is the continuation of that abuse, the denial of justice to victims, the perpetuation of blackmail-based distortions of democratic governance, and the further entrenchment of the protection architecture that enables the network’s survival.

When the alleged victims are minors and the alleged perpetrators hold state power, the asymmetry is extreme. This does not mean lowering the standard for conviction — prosecutorial standards should remain high. It means lowering the standard for investigation. The current practice, in which the threshold for investigating elite criminal networks is effectively higher than the threshold for investigating ordinary crime, inverts the proper relationship between power and accountability.

One might object that investigating powerful networks risks destabilizing institutions on which many people depend. This is a real consideration, but it cuts both ways. If the institutions are captured by criminal networks, their apparent stability masks a deeper dysfunction. And the historical record suggests that the long-term consequences of failing to investigate — the entrenchment of impunity, the expansion of the abuse, the eventual catastrophic exposure — are worse than the short-term disruption of investigation.

E. Reference Class Selection

One more methodological point, and then we can turn to substance. When evaluating claims about elite criminal networks, the selection of the reference class against which base rates are assessed is itself a consequential analytic choice.

The Satanic Panic of the 1980s is frequently invoked as the relevant reference class. But different allegations belong to different institutional ecologies, and treating them against a single undifferentiated base rate is a category error. The Satanic Panic cases overwhelmingly involved allegations against daycare workers, suburban families, and other individuals who lacked institutional protection, operational capacity, intelligence connections, or the resources to suppress investigation. Claims about isolated daycare workers, claims about church hierarchies, and claims about intelligence-linked blackmail operations inhabit different evidential and institutional contexts. The relevant reference class for evaluating the Epstein allegations is not “extreme abuse claims in general” but “allegations against networks with documented institutional protection, operational capacity, and access to intelligence or state resources.”

In that reference class, the track record is striking. The Catholic Church abuse scandal: confirmed, after decades of suppression. Savile: confirmed, after half a century of institutional protection. Dutroux: confirmed at the individual level, with evidence of broader network connections suppressed at the state level. Kincora Boys’ Home: confirmed by the Hart Inquiry. Westminster: partially confirmed, with critical files destroyed. I do not want to overstate the inference — the fact that past allegations in this reference class have frequently proven accurate does not establish that any particular current allegation is true. But it does establish that the base rate is far higher than what we see in moral panics targeting the powerless, and this difference should inform our prior expectations.[13]


III. The Architecture of Transgressive Power

With the epistemological tools in hand, I want to turn to a theoretical question: how do transgressive power networks actually function?

Analysis of such networks has been systematically obscured by a false dichotomy: the assumption that they must be either genuinely ideological (participants sincerely believe in the spiritual or metaphysical significance of their transgressive acts) or cynically instrumental (the acts serve purely as kompromat). This dichotomy is false, and its falsity has prevented adequate understanding of documented cases.

I propose instead a tripartite model in which three distinct modes of transgressive power coexist and reinforce each other: genuine belief, cynical instrumentalism, and what I will call enacted power — the creation of mutual complicity as an objective social fact independent of participants’ beliefs.

A. Mode 1: Genuine Transgressive Belief — The Cross-Cultural Record

The claim that powerful individuals might engage in ritual transgression — including transgression of the most severe taboos — is treated in contemporary Western discourse as self-evidently absurd. I think this reaction reflects cultural provincialism rather than historical or anthropological knowledge, and I want to show why at some length, because the point is foundational.

The cross-cultural record of transgressive practice — including ritual killing, ritual cannibalism, and the deliberate violation of a society’s deepest moral norms as a mechanism of power — is not speculative. It is among the most thoroughly documented findings in anthropology, archaeology, and comparative religion. The evidence spans every inhabited continent, thousands of years, and dozens of independent cultural contexts. What follows is necessarily selective, but the point is simple: the category of behavior alleged in extreme cases of elite criminality is historically ordinary, not extraordinary.

Mesoamerica. Aztec ritual human sacrifice is established beyond any serious scholarly dispute. Bioarchaeological excavations at the Templo Mayor in Mexico City have uncovered the Huey Tzompantli — a massive skull rack containing thousands of skulls showing specific trauma consistent with ritual display. Forensic analysis shows distinct cut marks consistent with heart removal and decapitation. Isotope analysis confirms that victims were frequently captives from distant regions.[14] The associated practice of ritual cannibalism — consumption of sacrificial victims’ flesh in a ceremonial stew called tlacatlaolli — is documented in indigenous codices, Spanish accounts, and archaeological evidence including bones with butchery marks and thermal alteration consistent with cooking in ceramic vessels.[15] The mid-twentieth-century revisionist attempt to dismiss these practices as Spanish propaganda has been decisively refuted by the physical evidence.

South Asia. In the tantric traditions, the Vamachara or left-hand path involves the deliberate violation of caste, dietary, and sexual taboos as a spiritual technology. The Kapalika and Aghori traditions carry this logic further, incorporating practices involving human remains, cremation grounds, and the systematic inversion of purity norms. The medieval Kaula tradition, as David Gordon White has documented in Kiss of the Yogini, involved night-time gatherings in charnel grounds featuring the consumption of human flesh, the use of ornaments made from human bone, and sexual rites understood as mechanisms of divine access.[16] The crucial point, as Christian Wedemeyer has demonstrated, is that these were not marginal or “primitive” practices. They were sophisticated elite practices, developed and maintained by educated practitioners within elaborate theoretical frameworks.[17] The Aghori tradition continues into the present as a living practice, documented by anthropologists including Ron Barrett and Jonathan Parry.[18]

Pre-Buddhist Tibet. Before the arrival of Buddhism in the seventh century, Tibet practiced Bön, a shamanistic tradition. Archaeological excavations in the Kyangbu and Dulan regions have uncovered elite tombs containing human remains consistent with retainer sacrifice. Early Chinese chronicles describe the Tibetans as practicing “bloody oaths” involving animal and human sacrifice. The transformation of these practices into the internalized visualizations of Buddhist Chöd ritual — in which the practitioner mentally offers their own body as a feast — represents a process of sublimation: physical rituals gradually transformed into symbolic ones under the influence of Buddhist ethics.[19]

Prehistoric Europe. Excavations at Herxheim, a 7,000-year-old settlement from the Linear Pottery culture in Germany, revealed the remains of over 500 individuals — including infants — whose bones showed signs of being butchered like livestock: skinning, scraping, and “pot-polishing” from being boiled in ceramic vessels. The pottery found with the bones came from hundreds of miles away, suggesting Herxheim was a ritual center for mass sacrifice.[20] At Cowboy Wash in the American Southwest, the discovery of human myoglobin in fossilized human feces provided definitive evidence of cannibalism — published in Nature in 2000.[21]

European Elites. The pattern extends into documented European history. Gilles de Rais (1404–1440), one of the wealthiest men in France and companion-in-arms to Joan of Arc, was convicted of kidnapping, torturing, and murdering hundreds of children in rituals intended to summon demonic entities.[22] The Affair of the Poisons in the court of Louis XIV (1670s) revealed that high-ranking nobles, reportedly including the King’s mistress, participated in “Black Masses” involving the alleged sacrifice of infants to maintain political favor.[23] And from the sixteenth to the eighteenth century, European royalty practiced what scholars now call “corpse medicine” — the consumption of preparations made from human remains, including King Charles II’s famous “King’s Drops” made from pulverized human skulls.[24]

Modern Criminal Networks. The Los Zetas cartel in Mexico incorporated ritual elements into their operations, including reported practices of cannibalism as a test of loyalty, deliberately creating a warrior cult analogous to the ancient Aztec military orders. Santa Muerte devotion among cartel members represents a re-spiritualization of violence in which killings become devotional acts dedicated to a folk deity, transforming contract murder into a form of religious offering.[25]

The Frankist Movement. Jacob Frank, who declared himself the successor to the messianic figure Sabbatai Zevi, developed an explicit theology of sacred transgression in eighteenth-century Central Europe — “the holy through the unholy” — in which sexual license, the violation of religious law, and the inversion of moral categories were presented as necessary stages in a redemptive process. Frank’s followers included members of the Central European elite, and the movement’s influence persisted through converted families who entered mainstream European society.[26]

I pause here to make a point that demands explicit attention. The history of Frankism has been exploited by antisemitic conspiracy theorists to construct narratives about Jewish cabals. This exploitation is historically irresponsible and morally contemptible. Frankism was a specific, small, heterodox movement involving specific individuals — a movement condemned most forcefully by Jewish communities themselves. Its existence provides no warrant whatsoever for generalizations about Jewish communities or traditions, any more than the Borgias provide warrant for generalizations about Catholics, the Aztec priesthood provides warrant for generalizations about Indigenous Mexicans, the Aghori provide warrant for generalizations about Hindus, the Affair of the Poisons provides warrant for generalizations about the French, the Presidio case provides warrant for generalizations about the American military, or Los Zetas provide warrant for generalizations about Mexicans. The inference from “some members of group X did terrible things” to “members of group X are terrible” is a textbook scope error — the collective attribution fallacy — and I refuse it categorically.[27]

Aleister Crowley and the Western Occult Tradition. Crowley’s Thelema explicitly drew on South Asian tantric traditions, particularly the Kaula frameworks documented by White, to develop a Western system of transgressive spiritual practice. Crowley’s documented connections to British intelligence services, his influence on subsequent occult movements, and the explicit antinomian content of his teachings created a template in which transgressive practice and operational security overlapped.[28] The institutional genealogy running from Crowley through Anton LaVey’s Church of Satan to Michael Aquino’s Temple of Set — the latter founded by a US Army Lieutenant Colonel who simultaneously authored military doctrine on psychological operations — is a documented chain of transmission connecting transgressive practice to state military and intelligence institutions.[29]

Before drawing conclusions, a terminological clarification is in order, because the word “ritual” is doing significant work and it risks collapsing important distinctions if left undefined. I want to distinguish three categories. Ritualized practice refers to repeated, stylized, symbolically framed actions — actions that follow a recognizable pattern and carry meaning beyond their immediate practical function. Transgressive bonding refers to the violation of taboos as a mechanism for creating solidarity, loyalty, or mutual complicity — a social technology that need not involve any religious or metaphysical framework. Ceremonial abuse claims are the more specific allegation that abuse carries explicit liturgical, occult, or ceremonial framing. These three categories overlap but are not identical, and the failure to distinguish them is one of the primary mechanisms by which legitimate inquiry into elite transgressive networks has been discredited. A hostile reader who hears “ritual abuse” — with all its Satanic Panic connotations — where the evidence supports only “transgressive bonding” can dismiss the entire analysis on the basis of a conflation the analyst never intended.

So what is the upshot of all this? The claim that modern elites might engage in ritualized transgressive practices is not an extraordinary claim requiring extraordinary evidence. It is a historically ordinary claim. Powerful people have engaged in such practices across civilizations, centuries, and theological frameworks — in Mesoamerica, South Asia, Tibet, prehistoric and modern Europe, and the contemporary Americas. The archaeological, bioarchaeological, textual, and ethnographic evidence is overwhelming and has survived repeated scholarly attempts at revisionist dismissal. The claim that modern Western elites would never do so — that our civilization alone is exempt from a pattern documented everywhere else — is the claim that lacks historical support.

B. Mode 2: Cynical Kompromat — The Documented Record

At the opposite end of the spectrum from genuine belief lies the purely instrumental use of transgressive acts as compromising material — kompromat — for political and institutional control. This mode requires no belief in the significance of transgression. It requires only the recognition that documented participation in criminal acts creates permanent leverage.

The industrialization of sexual compromise as an intelligence technique is thoroughly documented. The KGB’s “swallows” and “ravens” compromised diplomats, military officers, and politicians across the Western world.[30] The East German Stasi’s “Romeo” operations demonstrated that sexual compromise could operate at much longer timescales and deeper levels of psychological manipulation than the one-off operation.[31] And the United States conducted its own operations: Operation Midnight Climax, run by the CIA as part of MKULTRA, operated safe houses where unwitting subjects were given LSD and observed through one-way mirrors during sexual encounters — combining drug experimentation with sexual compromise research.[32]

The operational logic is straightforward: leverage through the permanent threat of exposure. The most effective compromising material is material that is never used — its value lies in the target’s knowledge that it exists. A politician who knows that documented evidence of their criminal conduct is held by another party adjusts their behavior accordingly. No explicit threat needs to be made.

This applies directly to the Epstein network. Multiple witnesses have described the properties as comprehensively equipped for audio and video surveillance.[33] Seized materials included labeled media referencing specific individuals.[34] The infrastructure for systematic documentation of compromising conduct was, by multiple independent accounts, a central feature of the operation.

C. Mode 3: Enacted Power — Where the Dichotomy Collapses

The theoretical innovation I want to propose is a third mode — enacted power — that dissolves the dichotomy between genuine belief and cynical instrumentalism.

The key insight is simple. Shared transgression creates mutual complicity as an objective social fact, independent of what any individual participant believes about the significance of what they have done.

The distinction from Mode 2 is structural and worth making precise. Pure kompromat is asymmetric: one party holds material on another and exerts unilateral leverage. The controller can expose the target; the target cannot reciprocate. Enacted power, by contrast, is symmetric: every participant holds potential evidence against every other participant, including the organizers. No single “blackmailer” needs to actively exert pressure, because the structure itself holds everyone hostage. The result is a decentralized equilibrium — a self-enforcing silence that persists without centralized coercion and that is far more robust than any unilateral arrangement, because defection is self-destructive for the defector regardless of what any controller does.

When multiple people participate together in serious criminal conduct, every participant becomes simultaneously a witness against and a hostage of every other participant. This creates a bond that functions identically whether the participants understand it as sacred initiation, cynical mutual insurance, or something they prefer not to think about. The bond is enacted — it exists in virtue of what was done, not in virtue of what anyone believes about what was done.[35]

A useful analogy comes from Catholic sacramental theology. In the doctrine of ex opere operato, a sacrament achieves its effect “by the work worked” — by the performance of the rite itself — regardless of the personal holiness of the minister. The efficacy lies in the act, not in the belief. In the same way, the bonding function of shared transgression operates regardless of whether participants believe in its spiritual significance or regard it as a cynical exercise. The complicity is real in every case. The leverage is real in every case.[36]

This explains something the either/or framing cannot: how a single network can simultaneously contain genuine believers, cynical operators, and participants who are simply in too deep to leave. The network does not require ideological uniformity. It requires only shared participation in acts severe enough to make defection self-destructive.

The ritual framing — when present — performs an additional function that neither pure belief nor pure cynicism fully captures. It provides a psychological permission structure: a framework within which escalating transgression becomes comprehensible and, within the group’s internal logic, justified. This is a documented feature of cults and coercive groups: the graduated increase in demanded commitment, with each step framed as progress rather than descent.[37] NXIVM’s documented use of branding, sexual servitude, and mutual blackmail material provides a recent instance of exactly this mechanism operating in an elite American social context.[38]

Historical cases in which all three modes demonstrably coexisted confirm the model. The Italian P2 lodge was simultaneously a Masonic lodge with ritual elements, an intelligence-connected network engaged in political manipulation, and a mechanism of mutual compromise binding together politicians, military officers, intelligence officials, and organized crime figures. Licio Gelli wielded power not through participation in the lodge’s activities but through possession of the archive.[39]

D. The Graduated Architecture

The tripartite model enables a more precise understanding of how such networks are structured. Rather than a flat conspiracy in which all members are equally involved, the documented evidence suggests concentric rings of increasing involvement, increasing culpability, and increasing mutual entanglement.

The outermost ring consists of social contacts and legitimizers — people who accepted meals, introductions, and donations without knowledge of criminal operations. They are reputationally exposed but not criminally liable. The second ring consists of those who accepted entry-level compromise: extramarital affairs, financial benefits, a degree of impropriety. They know that discretion is expected. The third ring consists of those who used the network’s criminal services knowingly, who hold genuine criminal liability, and whose documented conduct ensures permanent leverage. The fourth ring consists of those who participated in the most serious documented abuse. Whether there exists a fifth ring — an innermost circle — remains a primary question in the unreleased documents.

Above all these rings sits the controller layer: those who constructed and operated the network without appearing in its activities. They hold the archive. They are protected by the interests of everyone below them. They never participate directly — and therefore leave no evidential trace of participation. The structural consequence is that information and liability are perfectly inversely correlated. Those who know the most have the most to lose from disclosure. Exposure from within is structurally almost impossible.

E. The State Intelligence Overlay

A variant of the graduated architecture deserves separate attention. A colleague who reviewed an earlier draft pressed me on whether intelligence agencies are merely external beneficiaries who receive “product” from such networks, or whether they are better understood as architects and operators of the networks themselves.[40] The question is more precise than it first appears.

“Intelligence involvement” is not a binary. At least five levels deserve distinction: documented interest (an agency monitors the network), documented contact (personnel interact with network principals), documented protection (an agency intervenes to shield the network from investigation), documented operation (an agency uses the network’s products for intelligence purposes), and documented authorship (an agency designs, builds, or directs the network). These levels are cumulative but distinct, and conflating them — treating “intelligence contact” as though it establishes “intelligence authorship” — is an error the framework should prevent.

The documented record supports claims at or near the strongest end of this spectrum in several cases. Operation Midnight Climax was not an intelligence agency exploiting someone else’s operation — it was the CIA designing, building, and running the surveillance-equipped facilities. The Kincora Boys’ Home scandal, confirmed by the Hart Inquiry, established that MI5 knowingly permitted child sexual abuse to continue because the resulting kompromat served operational purposes — but the distinction between “permitting” and “operating” becomes thin when the intelligence service controls the information flow and benefits from the product.[41] The broader history — assassinations, coups, drug trafficking, human experimentation, psychological operations against their own citizens — is not the work of a few bad actors. It constitutes an institutional track record.

I want to be clear about the scope of this claim. There is an important distinction between the individuals who work inside intelligence agencies — many of whom joined with genuine intentions — and the institutional patterns those agencies have accumulated. I am talking about institutional patterns, not the moral character of intelligence officers as a class.

In the Epstein case, the model in which a state intelligence agency co-opts the network is explicitly suggested by Alexander Acosta’s documented statement that he was told Epstein “belonged to intelligence” and to leave the matter alone.[42] The documented connections between the Epstein network and Israeli state intelligence — including Ehud Barak’s use of Epstein properties, the role of Yoni Koren (described as a “talented intelligence officer” while simultaneously serving as bureau chief for the Israeli Ministry of Defense), and the FBI document describing post-call debriefings between Mossad and an intermediary — constitute the most developed evidentiary thread connecting the network to a specific state intelligence apparatus.[43] These connections do not prove state direction of the network, but they meet the standard of investigative warrant many times over.

F. The Perpetrator-as-Victim Mechanism

One further structural feature deserves attention. We know from the Epstein files that the network operated a pipeline in which young women were first groomed as victims and then gradually transformed into accomplices — recruiters, schedulers, facilitators.[44] The boundary between victim and perpetrator was deliberately blurred, both to ensure complicity and to complicate future legal proceedings.

I want to suggest that the inverse mechanism may also have been operative. If individuals who entered the network as perpetrators were themselves subjected to violation at some point in the process, their names would become legitimately withholdable under victim protection statutes, even if their primary role was as a perpetrator. The Crime Victims’ Rights Act provides extensive protections against disclosure of information that could identify victims. If the network engineered dual victim-perpetrator status in its members, it would have weaponized the legal system’s own protections as an additional layer of insulation.

This is a structural inference rather than a documented fact, and I want to be explicit about its epistemic status. It is a hypothesis generated by the model — an implication of the network’s documented logic carried one step further — rather than a finding established by independent evidence. The network demonstrably operated the victim-to-perpetrator pipeline. The reverse mechanism would serve clear operational purposes within the framework described above. And certain otherwise puzzling features of the documentary record — particularly the breadth of victim-protection redactions in materials concerning individuals primarily identified as perpetrators — become explicable if this mechanism was in play. But explicability is not confirmation, and I flag this as a question for investigation rather than a conclusion.[45]


IV. Historical Precedents: This Has Happened Before

A common rhetorical move against extreme claims about the Epstein network is the argument from incredulity: such things simply do not happen. But they do happen, and they have happened repeatedly. Section III established extensive cross-cultural precedent for transgressive elite practice. This section narrows the focus to the specific conjunction of elements alleged in the Epstein case: elite pedophile networks with political protection, intelligence-operated compromise operations, and institutional suppression architectures.

A. Elite Abuse Networks with Political Protection

Consider the documented cases. The Marc Dutroux affair in Belgium remains the most extensively documented European case. Dutroux was convicted of kidnapping, torturing, and sexually abusing six girls. A parliamentary inquiry received testimony suggesting elite network connections. Key witnesses died under unexplained circumstances. The investigating judge was removed from the case for attending a fundraising dinner for victims’ families — a decision that provoked the largest demonstrations in Belgian history.[46]

The Kincora Boys’ Home scandal in Northern Ireland involved systematic sexual abuse of children in state care by members of a loyalist paramilitary organization. The Hart Inquiry confirmed that MI5 was aware and failed to act — and evidence suggested that inaction reflected the operational utility of the resulting kompromat.[47]

The Westminster child abuse inquiry documented abuse by Members of Parliament and peers across decades. The “Dickens Dossier” was reported lost. A review found that 114 potentially relevant Home Office files could not be found.[48]

The Franklin affair in Nebraska involved allegations of a child trafficking ring connected to political figures. While a grand jury dismissed the core allegations, a subsequent civil case — Bonacci v. King — resulted in a default judgment of $1 million, with the court finding involvement in abuse.[49]

B. Suppression Architectures That Eventually Broke

COINTELPRO operated from 1956 to 1971 and was disclosed only through the Church Committee hearings, fifteen years after the program began. During its operation, allegations of systematic FBI surveillance and disruption of lawful political activity were dismissed as paranoid conspiracy theories.[50]

MKULTRA was disclosed only because a small cache of financial records survived the director’s order to destroy all files. The full scope remains unknown because of the destruction. What is known — involuntary human experimentation, concealment from oversight — was dismissed as conspiracy theory until documentary evidence emerged.[51]

P2 was exposed in 1981 when police discovered Gelli’s membership lists. They revealed membership including cabinet ministers, military commanders, and intelligence chiefs — a shadow government within the Italian state.[52]

The Catholic Church abuse scandal — in which thousands of children were abused across decades, with suppression orchestrated at the highest levels — was the subject of credible allegations for years before serious investigation began. The Church’s architecture of suppression — transferring accused priests, pressuring victims, destroying records, invoking authority to discredit accusers — exactly parallels the architecture alleged in the Epstein case.[53]

In every one of these cases, the claims were true, the suppression was active, and the label “conspiracy theory” served the interests of perpetrators. I belabor the point because the pattern matters: institutional obstruction followed by partial, delayed disclosure is not a speculative template. It is what actually happened, repeatedly, across decades and jurisdictions. And it is now observable in the EFTA process itself.


V. The Behavior of Relevant Parties

The behavior of institutions and individuals since Epstein’s arrest, death, and the partial document release is not merely context. It is primary evidence. The consciousness of guilt doctrine holds that post-hoc behavior indicative of awareness of wrongdoing — flight, destruction of evidence, obstruction, false statements — is admissible evidence.[54] The principle translates directly to epistemological analysis.

A. Institutional Behavior

Start with the original Non-Prosecution Agreement negotiated by Alexander Acosta. It granted immunity not only to Epstein but to “any potential co-conspirators” — language so broad it functioned as blanket protection for the entire network. Acosta’s statement that he was told Epstein “belonged to intelligence” provides a framework for understanding its extraordinary scope.[55]

Then there is the matter of Epstein’s death. The surveillance system malfunctioned. Video metadata shows a clock jump and a gap. Guards falsified logs and were later cleared of charges. The forensic pathologist retained by the Epstein family stated publicly that the injury pattern was more consistent with homicide than suicide.[56] None of these facts individually proves homicide. Together, they establish that the official account involves coincidences of surveillance failure, guard dereliction, and forensic anomaly that are inconsistent with normal operating conditions.

The historical parallels — Frank Olson, Roberto Calvi, Danny Casolaro — are worth noting. The death of individuals possessing compromising information about powerful networks, under circumstances officially classified as suicide, is a documented pattern.[57]

B. The Current Administration’s Conduct

The behavior of the current US administration constitutes the most significant recent evidence of active suppression, and it deserves careful attention.

President Trump signed the EFTA into law on November 19, 2025. The DOJ’s January 30, 2026 production released approximately 3 million pages while acknowledging that roughly 6 million pages of potentially responsive material remain. Yet the administration has simultaneously filed legal motions through the DOJ to prevent the release of documents that its own legislation mandated. A president who signs a transparency law and then directs his Justice Department to prevent the transparency it requires is engaged in conduct that demands explanation.[58]

The specific targets of suppression are informative. Maxwell-adjacent material has been substantially released. Material concerning FBI interviews with specific individuals has been withheld. The FBI Director has refused congressional subpoenas. The Attorney General has made statements at variance with the documented record.[59]

C. Bayesian Priors and Documented Conduct

When evaluating the probability that a specific individual was involved in the network’s criminal activities, prior documented conduct is relevant to background probability assessments. In the case of Donald Trump — relevant here because he controls the suppression apparatus — the prior includes an adjudicated civil finding of sexual abuse, multiple independent accusers across decades, self-reported conduct regarding minors, and a federal filing alleging conduct involving a thirteen-year-old at an Epstein property.[60] I am not attempting a formal Bayesian quantification. The more limited point is that prior conduct should inform, though not determine, how subsequent evidence is evaluated — and that the individual currently directing the suppression of Epstein-related documents has a documented history that makes the suppression itself more, not less, epistemically significant. This is not a partisan observation. It is the consistent application of the evidential principles developed above.

D. International Developments

Prince Andrew’s civil settlement and subsequent arrest on charges related to leaked documents during his period as royal trade envoy establish a pattern consistent with compromise of official position through Epstein network connections.[61] Peter Mandelson’s arrest on charges of sharing classified documents — combined with his documented characterization of Epstein as “my best pal” — presents an identical pattern.[62]

The asymmetry between European prosecutorial activity and American inaction is itself significant. If the documentary record motivates prosecution in Europe, the absence of prosecution in the United States requires explanation.

Ehud Barak’s case represents the strongest documented connection to a state intelligence apparatus, and it is worth laying out in some detail. The January 2026 document release revealed extensive connections between Epstein and the former Israeli Prime Minister. Al Jazeera’s February 2026 investigation documented Epstein’s role as advisor to Barak, facilitating introductions to tech investors and brokering surveillance technology deals.[63a] Drop Site News reporting detailed Epstein’s involvement in brokering Israeli biometric scanning technology into African markets through Barak-linked contacts.[63b] Barak visited Epstein’s properties repeatedly, and the two jointly invested in Carbyne (formerly Reporty), an Israeli emergency communications company with surveillance capabilities.[63c] In a separate 2016 email to Peter Thiel, Epstein claimed to “represent the Rothschilds.”[63d] An FBI memo described a confidential human source who came to believe Epstein “was a co-opted Mossad agent” trained under Barak.[64] In emails from 2018, Epstein joked to Barak: “You should make clear that I don’t work for Mossad,” to which Barak replied, “You or I?”[65]

E. The Ideological Dimension

The January 2026 release also revealed a coherent ideological dimension to the network previously obscured. Epstein expressed eugenic views centered on Ashkenazi genetic superiority, sent DNA kits to contacts, discussed genetic modification of racial groups with scientists he funded, and pursued a project of genetic self-propagation at his New Mexico ranch.[66] Emails show contemptuous references to non-Jews. Barak discussed demographic engineering with Epstein — specifically a plan to attract young women to Israel while controlling “quality” of immigration.[67]

Survivor Maria Farmer testified that Epstein and Maxwell operated within an explicit ideology of supremacism, describing exclusionary attitudes as a consistent theme.[68] This ideological dimension is relevant not because it implicates any broader community — it does not, for the reasons I articulated in Section III — but because it suggests the network’s operations were driven by a coherent worldview, not merely opportunism. That distinction matters for understanding the network’s structure and predicting its behavior.


VI. Graduated Evidential Assessment

Let me now apply the full framework to specific categories of claims, arranged in order of decreasing evidential support.

A. The Surveillance Infrastructure

Multiple independent testimonial sources describe Epstein’s properties as systematically equipped for surveillance. The historical precedent is established. Assessment: this claim meets the epistemic warrant standard. The outstanding question is who possesses the archive and for what purposes it is being used.[69]

B. Systematic Trafficking

Virginia Giuffre’s specific claims, combined with the network’s documented operations, the Andrew settlement, and draft indictment language, support the conclusion that trafficking occurred at significant scale. Assessment: this meets epistemic warrant. The specific scope remains under-determined, and the unreleased documents are likely most informative on precisely this question — which is the most parsimonious explanation for why they remain unreleased.[70]

C. Epstein’s Death

The combination of surveillance failure, metadata anomalies, guard dereliction, and forensic findings inconsistent with the official account produces a cumulative case that the official account is inadequate. Assessment: that the death was not straightforward unassisted suicide meets epistemic warrant. That it was deliberate homicide has moderate but not decisive support.[71]

D. Ritual or Ceremonial Elements

The cross-cultural genealogy developed in Section III establishes that ritual elements in an elite transgressive network would be historically ordinary. The institutional chain from Crowley through Aquino to documented intelligence connections provides a specific transmission pathway. And the psychological functions of ritual framing — permission structure, escalation mechanism, bonding technology — provide rational motivations independent of any metaphysical claims.

The Presidio case (1986–87) is directly relevant here. At the Presidio Army base, children were identified as showing signs consistent with sexual abuse. Lt. Col. Michael Aquino — founder of the Temple of Set, holder of top-secret clearances, author of the military “MindWar” document — was identified as a suspect. The Army’s Criminal Investigation Division found his alibi “not persuasive.” A federal appellate court upheld this finding. No charges were filed.[72]

Assessment: the direct evidence specific to the Epstein network for ritual elements is limited. Investigation should not be foreclosed by reflexive dismissal, but the evidential base here is thinner than for the claims above, and I want to say so plainly.

E. High-Severity Allegations with Limited Current Support

Intellectual honesty requires addressing the most severe allegations — claims involving the most extreme forms of violence. An FBI tip in the released documents describes conduct of this nature. The direct evidential support for the most severe specific claims is limited, and I do not think we are in a position to assert that these claims are probably true. The proper stance is agnosticism pending full investigation.

But one consideration deserves attention. If the tip is fabricated, withholding it serves no protective purpose. The fact that it was withheld — and that surrounding materials remain classified — is more consistent with the information being genuine than with it being false. The inverse evidence principle applies here with its full epistemological weight — and its full epistemological danger. This is precisely the kind of case where the guardrails articulated in Section II are most needed, because the temptation to read suppression as near-confirmation is strongest exactly where the allegations are most severe.

The appropriate response is not to treat these claims as established. It is to insist that the investigation that would establish or disconfirm them be conducted — and to note that the people with the power to conduct that investigation are the same people with the most to lose from what it might reveal.[73]


VII. Why We Cannot Ignore This

A. The Democratic Stakes

If the kompromat architecture described in Section III exists in anything like the form suggested by the evidence — if there are archives of compromising material involving current holders of state power — then the democratic process is structurally compromised in a way that no election can remedy. Blackmail does not require deployment. A head of state who knows that documented evidence of their criminal conduct is held by another actor adjusts their policy decisions accordingly. No explicit threat needs to be made.

The current suppression of documents by the administration most plausibly implicated in their contents is the democratic concern in its most acute form.

B. The Victim Stakes

The survivors are still alive. Many have testified publicly, at great personal cost. Justice deferred is not a neutral condition — every year without full investigation is a year in which the protection architecture remains intact and the archive retains its leverage value.

C. The Epistemological Stakes

The methodology developed here addresses a structural problem in social epistemology that extends well beyond the Epstein case: how should rational agents reason about claims of serious institutional criminality under conditions where the accused institutions control the flow of evidence?

The “conspiracy theory” dismissal framework is not a natural feature of epistemic rationality. It is a constructed framework with a traceable history. The practice of treating institutional suppression as evidence of absence rather than evidence of severity is a learned epistemological error — and it is an error that systematically serves the interests of power.

I want to situate this argument within the broader literature. Miranda Fricker’s work on epistemic injustice identifies how social power manifests in patterns of incredulity and silencing — a framework that applies directly to the systematic discrediting of victim testimony.[74] Matthew Shields has distinguished “Dominant Institution Conspiracy Theories” whose self-sealing features are produced by the institutions themselves rather than by the theorists — and this intersects directly with the present analysis, since the self-sealing properties of the Epstein suppression architecture are produced by institutional actors, not by those calling for investigation.[75] Charles Mills’s work on epistemologies of ignorance identifies how dominant groups actively maintain not-knowing as a structural feature of social power.[76] What I am adding to these frameworks is the specific application to elite criminality: the inverse evidence principle, the suppression-as-evidence argument, the asymmetric harm analysis, and the cross-cultural grounding that establishes prior plausibility.

Let me address directly what I take to be the strongest objection to this framework: that it risks lowering the threshold for investigation in ways that could enable new moral panics — that by arguing against reflexive dismissal, it opens the door to reflexive credulity. This is a serious concern. But the framework does not lower the standard for investigation. It raises the standard for dismissal by requiring that dismissal be based on evidential evaluation rather than on the severity of the claim or the social status of the accused. It demands specific evidential triggers for investigation — not vague suspicion but documented patterns of suppression, independent testimonial convergence, institutional behavior inconsistent with innocence, and reference class analysis grounded in comparable historical cases. A framework that requires these specific conditions before elevating investigative priority is more disciplined, not less, than the current practice of evaluating elite allegations by intuitive plausibility — a standard that, as we have seen, systematically favors the powerful.

D. The Call to Action

Three elements would be necessary for legitimate investigation. First, the release of all documents covered by the EFTA — the law that the current administration signed and then worked to undermine. Second, congressional oversight with genuine subpoena power, directed by committees whose members are not themselves compromised. Third, international cooperation, particularly with European jurisdictions that have demonstrated greater willingness to pursue the evidence.


VIII. Conclusion: What Rational Warrant Requires

I have tried in this paper to develop an epistemological framework for evaluating claims about elite criminal networks under conditions of institutional suppression, and to apply it honestly.

At the level of epistemic warrant, the evidence supports the following: that the Epstein network operated a surveillance infrastructure producing compromising material; that trafficking of minors to persons of significant political status occurred; that Epstein’s death was not the straightforward unassisted suicide described officially; and that ongoing suppression is motivated by protection of specific individuals.

At the level of investigative warrant, the evidence supports inquiry into the full scope of the trafficking operation, the current location and control of the archive, the involvement of state intelligence agencies, and the most extreme allegations in released materials.

But the meta-finding is what matters most. The pattern of active institutional suppression is the strongest single piece of evidence that the underlying claims are serious. Institutions do not expend the political and legal capital currently being expended to suppress allegations that are false or trivial. The very fact that documents remain sealed, that the Justice Department has worked against its own president’s legislation, that the FBI refuses congressional subpoenas, and that the most powerful political figure in the country is directing suppression of materials concerning his own documented associations — this pattern is itself evidence that no individual document could provide.

Rational agents who commit to following evidence where it leads cannot make an exception for evidence that leads to uncomfortable conclusions about powerful people. Nothing I have argued here requires us to believe the darkest claims. It requires us to recognize that the evidential support for investigation is overwhelming, that the mechanisms preventing investigation are identifiable and interested, and that the failure to investigate is not an expression of epistemic caution but a capitulation to the very power structures the investigation would expose.

I do not claim to know what happened in the innermost circles of this network. I claim that we have sufficient rational warrant — at multiple evidential tiers, across multiple independent lines of evidence, reinforced by the observable pattern of institutional suppression — to demand that we find out.


Notes

[1] On the performative function of “conspiracy theory” as a label, see Coady, D. (2006). Conspiracy Theories: The Philosophical Debate. Ashgate; Dentith, M. R. X. (2014). The Philosophy of Conspiracy Theories. Palgrave Macmillan; Pigden, C. (1995). “Popper Revisited, or What Is Wrong With Conspiracy Theories?” Philosophy of the Social Sciences 25(1): 3–34.

[2] Lifton, R. J. (1961). Thought Reform and the Psychology of Totalism. Norton.

[3] Dentith (2014), op. cit. Dentith has expanded and updated this argument in The Philosophy of Conspiracy Theories: Concepts, Methods and Theory (2024), Routledge. See also Hagen, K. (2022). Conspiracy Theories and the Failure of Intellectual Critique. University of Michigan Press, which independently reaches similar conclusions about the circularity of mainstream conspiracy theory critique.

[4] I am grateful to Commenter #1 for pressing me to clarify the relationship among these standards. An earlier draft presented six standards in a way that obscured their different domains, activities, and agents. The streamlined version here owes much to his critique.

[5] On the epistemology of justified belief under uncertainty, the precise threshold for epistemic warrant is a matter of ongoing debate. The important structural point for present purposes is not where the threshold falls but that it is categorically different from the prosecutorial standard. For sophisticated treatments, see Williamson, T. (2000). Knowledge and Its Limits. Oxford University Press.

[6] The formal structure of this principle draws on Bayesian reasoning about selective disclosure. For foundational work on strategic information suppression, see Stigler, G. J. (1961). “The Economics of Information.” Journal of Political Economy 69(3): 213–225; and Milgrom, P., and Roberts, J. (1986). “Relying on the Information of Interested Parties.” RAND Journal of Economics 17(1): 18–32 (on the “unraveling” result, which predicts that rational agents will infer negative information from the decision to withhold). The commonsense version: criminals want to avoid getting caught, and the more catastrophic their conduct, the more resources they invest in suppression.

[7] Zahavi, A. (1975). “Mate Selection — A Selection for a Handicap.” Journal of Theoretical Biology 53(1): 205–214.

[8] The EFTA (Pub. L. 119-XX) was signed into law on November 19, 2025. The DOJ released approximately 3 million pages on January 30, 2026, while acknowledging that approximately 6 million pages may qualify for disclosure. DOJ, “Section 3 Report to Congress,” February 14, 2026, available at https://www.justice.gov/opa/media/1434856/dl. For congressional criticism of the staggered rollout, see statements by Senator Rand Paul and Representative Alexandria Ocasio-Cortez. On the 119-page entirely redacted grand jury file, see Representative Ro Khanna’s floor remarks and reporting by Fox News, PBS, and Northeastern University’s news service.

[9] I am grateful to Commenter #1 for the observation that severity alone does not fully capture the effect — who the claims are about is a significant additional factor. Claims about elite people who comprise our most influential institutions are treated as even more a priori unlikely than severe claims about ordinary people. For related work on the psychology of motivated skepticism, see Kunda, Z. (1990). “The Case for Motivated Reasoning.” Psychological Bulletin 108(3): 480–498; and on “system justification” — the tendency to defend existing social arrangements — see Jost, J. T., and Banaji, M. R. (1994). “The Role of Stereotyping in System-Justification and the Production of False Consciousness.” British Journal of Social Psychology 33(1): 1–27.

[10] Davies, D. (2014). In Plain Sight: The Life and Lies of Jimmy Savile. Quercus. See also Dame Janet Smith, The Dame Janet Smith Review (2016), BBC Trust (official report documenting institutional knowledge and failure to act).

[11] De Stoop, C. (1998). They Are So Young. Lannoo. See also the Report of the Belgian Parliamentary Commission of Inquiry into the Dutroux Affair (1997); and Hughes, D. M. (2000). “The ‘Natasha’ Trade: The Transnational Shadow Market of Trafficking in Women.” Journal of International Affairs 53(2): 625–651, for broader context on European trafficking networks.

[12] Commenter #1 rightly notes that the asymmetry of consequences is a decision-theoretic rather than purely epistemic consideration. I accept this characterization. Standards for investigation are not purely epistemic standards; they involve cost-benefit analyses. The point stands that the asymmetry should influence where we set thresholds for inquiry.

[13] This reference class analysis draws on the methodology of Kahneman, D., and Tversky, A. (1973). “On the Psychology of Prediction.” Psychological Review 80(4): 237–251, especially on the neglect of base rates. See also Kahneman, D. (2011). Thinking, Fast and Slow. Farrar, Straus and Giroux, chs. 14–16, on the ways base rate neglect interacts with narrative plausibility.

[14] On the Huey Tzompantli, see Barrera Rodríguez, R., and Matos Moctezuma, E. (2015). “Hallazgo del Huei Tzompantli en el recinto sagrado de Mexico-Tenochtitlan.” Arqueología Mexicana 137. For bioarchaeological analysis of Aztec sacrifice generally, see López Luján, L. (2005). The Offerings of the Templo Mayor of Tenochtitlan. University of New Mexico Press; and Chávez Balderas, X. (2017). Sacrificio humano y tratamientos postsacrificiales en el Templo Mayor de Tenochtitlan. INAH.

[15] On Aztec ritual cannibalism, primary textual sources include the Florentine Codex (Sahagún, B. de, General History of the Things of New Spain, 16th c.), the Codex Borgia, and the Codex Borbonicus. For modern archaeological confirmation of butchery marks and thermal alteration at ritual sites, see Pijoan, C. M., and Mansilla, J. (1997). “Evidence for Human Sacrifice, Bone Modification, and Cannibalism in Ancient Mexico.” In Martin, D. L., and Frayer, D. W. (eds.), Troubled Times: Violence and Warfare in the Past. Gordon and Breach, 217–239.

[16] White, D. G. (2003). Kiss of the Yogini: “Tantric Sex” in its South Asian Contexts. University of Chicago Press. See also Samuel, G. (2008). The Origins of Yoga and Tantra. Cambridge University Press.

[17] Wedemeyer, C. K. (2013). Making Sense of Tantric Buddhism. Columbia University Press.

[18] On Aghori practices, see Barrett, R. (2008). Aghor Medicine: Pollution, Death, and Healing in Northern India. University of California Press.

[19] On pre-Buddhist Tibetan practices and the transformation under Buddhism, see Samuel (2008), op. cit. On the Chöd tradition specifically, see Harding, S. (2003). Machik’s Complete Explanation. Snow Lion.

[20] On Herxheim, see Boulestin, B., et al. (2009). “Mass cannibalism in the Linear Pottery Culture at Herxheim.” Antiquity 83(322): 968–982.

[21] Marlar, R. A., et al. (2000). “Biochemical evidence of cannibalism at a prehistoric Puebloan site in southwestern Colorado.” Nature 407: 74–75.

[22] On Gilles de Rais, see Bataille, G. (1965). Le Procès de Gilles de Rais. Pauvert; and Benedetti, J. (1971). Gilles de Rais: The Authentic Bluebeard. Stein and Day. For the trial records, see Bossard, E. (1886). Gilles de Rais, Maréchal de France, dit Barbe-Bleue. H. Champion (reproduces the original Latin trial documents).

[23] On the Affair of the Poisons, see Somerset, A. (2003). The Affair of the Poisons: Murder, Infanticide, and Satanism at the Court of Louis XIV. St. Martin’s Press.

[24] On European medicinal cannibalism, see Sugg, R. (2011). Mummies, Cannibals and Vampires: The History of Corpse Medicine from the Renaissance to the Victorians. Routledge.

[25] On Los Zetas and cartel ritualism, see Chesnut, R. A. (2012). Devoted to Death: Santa Muerte, the Skeleton Saint. Oxford University Press.

[26] On Frankism, see Maciejko, P. (2011). The Mixed Multitude: Jacob Frank and the Frankist Movement, 1755–1816. University of Pennsylvania Press.

[27] The methodological point here is critical. The antisemitic exploitation of genuine historical events follows a consistent pattern: take a documented particular, abstract it into a generalization about an entire group, and use the kernel of truth to lend credibility to the fabricated generalization. The corrective is not to deny the particular — that leaves people epistemically vulnerable when they encounter it — but to affirm the particular while explicitly refusing the generalization. The same logic applies, mutatis mutandis, to every other cultural context discussed in this paper. The behaviors under examination are the behaviors of concentrated power, not of any people.

[28] On Crowley’s intelligence connections, see Spence, R. (2008). Secret Agent 666: Aleister Crowley, British Intelligence, and the Occult. Feral House. On the appropriation of tantric frameworks, see Urban, H. (2003). “The Power of the Impure: Transgression, Violence and Secrecy in Bengali Śākta Tantra and Modern Western Magic.” Numen 50(3): 269–308.

[29] On the LaVey-Aquino relationship and the founding of the Temple of Set, see Flowers, S. E. (1997). Lords of the Left-Hand Path. Inner Traditions. On Aquino’s authorship of the “MindWar” document (a 1980 paper co-authored with then-Colonel Paul E. Vallely proposing psychological operations against domestic populations), see Aquino, M., and Vallely, P. (1980). “From PSYOP to MindWar: The Psychology of Victory” (declassified; available in military archives). On the Temple of Set, see Aquino, M. (2002). The Temple of Set (note: self-published by the organization’s founder and should be treated accordingly).

[30] Andrew, C., and Gordievsky, O. (1990). KGB: The Inside Story. HarperCollins.

[31] Koehler, J. O. (1999). Stasi: The Untold Story of the East German Secret Police. Westview Press.

[32] Lee, M. A., and Shlain, B. (1985). Acid Dreams: The Complete Social History of LSD. Grove Press; Marks, J. (1979). The Search for the Manchurian Candidate. Times Books.

[33] Farmer testimony, 2019 FBI interview (released January 2026); de Giorgiou testimony regarding surveillance infrastructure. Unsealed court documents from Giuffre v. Maxwell, SDNY Docket 15-cv-07433. See also Bradley J. Edwards, Relentless Pursuit: My Fight for the Victims of Jeffrey Epstein (2020), Gallery Books, on the surveillance infrastructure.

[34] FBI evidence inventory from the October 2019 search of Epstein’s New York residence, unsealed court filings. Reported in “F.B.I. Found Trove of CDs in Epstein’s Safe,” New York Times, July 8, 2019.

[35] The game-theoretic structure here is precise: shared participation creates a Nash equilibrium in which silence is the dominant strategy for every participant, because defection (disclosure) is self-destructive for the defector. This equilibrium holds regardless of participants’ beliefs about the significance of the shared act. For the relevant game theory, see Schelling, T. C. (1960). The Strategy of Conflict. Harvard University Press, especially on tacit coordination and focal points. On mutual complicity as a bonding mechanism in criminal organizations, see Gambetta, D. (2009). Codes of the Underworld: How Criminals Communicate. Princeton University Press.

[36] The ex opere operato analogy is structural, not intended to trivialize sacramental theology. For the doctrine, see Catechism of the Catholic Church, §§ 1127–1128. The parallel to performative speech acts is noted in Austin, J. L. (1962). How to Do Things with Words. Clarendon Press — certain acts achieve their social effects by being performed, regardless of the internal states of the participants.

[37] Lifton (1961), op. cit.; Singer, M. T. (1995). Cults in Our Midst. Jossey-Bass.

[38] United States v. Raniere, Case No. 1:18-cr-00204 (E.D.N.Y.).

[39] Willan, P. (1991). Puppetmasters: The Political Use of Terrorism in Italy. Constable.

[40] I am grateful to Commenter #2 for this observation, which significantly sharpened the analysis.

[41] Hart Inquiry Report (2017), Historical Institutional Abuse Inquiry, Northern Ireland.

[42] Acosta’s statement reported by Vicky Ward, “Jeffrey Epstein’s Sick Story Played Out for Years in Plain Sight,” The Daily Beast, July 9, 2019. Ward reports that Acosta told the Trump transition team he had been told to “leave it alone” because Epstein “belonged to intelligence.”

[43] On Epstein’s Israeli intelligence connections generally, see Al Jazeera English, “Epstein’s Israel Links and Everything Else Ignored By…,” February 7, 2026 (video investigation documenting Epstein-Barak relationship, Palantir introduction, intelligence connections); Murtaza Hussain, Drop Site News, February 2026 (Barak-linked biometric technology deals); Ali Abunimah, “US Media Barely Touches Epstein Links to Israeli Intelligence,” Electronic Intifada, February 2026; released court filings from Giuffre v. Maxwell, SDNY Docket 15-cv-07433. On Yoni Koren’s intelligence background, see Israeli press reporting and Virginia Giuffre deposition (sworn statement, paras. 45–52).

[44] Documented extensively in the cases of figures such as Nadia Marcinkova and others identified in court filings from United States v. Maxwell, Case No. 1:20-cr-00330 (S.D.N.Y.), and Giuffre v. Maxwell, SDNY Docket 15-cv-07433. See also Julie K. Brown, Perversion of Justice: The Jeffrey Epstein Story (2021), Dey Street Books.

[45] 18 U.S.C. § 3771 (Crime Victims’ Rights Act).

[46] Report of the Belgian Parliamentary Commission of Inquiry (1997).

[47] Hart Inquiry Report (2017).

[48] Independent Inquiry into Child Sexual Abuse (IICSA), final report (2022).

[49] Bonacci v. King, Case No. 4:CV 91-3037 (D. Neb. 1999).

[50] Churchill, W., and Vander Wall, J. (1990). The COINTELPRO Papers: Documents from the FBI’s Secret Wars Against Dissent in the United States. South End Press. For the primary source, see US Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (Church Committee), Final Report, Books I–VI (1975–1976).

[51] US Senate Select Committee on Intelligence and Subcommittee on Health and Scientific Research. (1977). Project MKULTRA, the CIA’s Program of Research in Behavioral Modification. Joint Hearing, 95th Congress, 1st Session. See also Kinzer, S. (2019). Poisoner in Chief. Henry Holt, for a comprehensive scholarly treatment.

[52] Willan (1991), op. cit.

[53] John Jay Report (2004); Pennsylvania Grand Jury Report (2018).

[54] On the consciousness of guilt doctrine and its admissibility as evidence, see Wigmore, J. H. (1940). Evidence in Trials at Common Law, §§ 273–295. For a modern treatment, see Mueller, C. B., and Kirkpatrick, L. C. (2018). Evidence Under the Rules, 9th ed. Wolters Kluwer, § 4.26.

[55] See note 42.

[56] Dr. Michael Baden’s findings reported in “Pathologist Hired by Jeffrey Epstein’s Brother Says Autopsy Points to Homicide,” New York Times, October 30, 2019. On the surveillance camera malfunction, see “2 Guards at Jail Where Epstein Died Are Charged with Falsifying Records,” New York Times, November 19, 2019. On the guards’ deferred prosecution agreement, see United States v. Thomas and Noel, Case No. 1:19-cr-00830 (S.D.N.Y.).

[57] On Olson, see Kinzer, S. (2019). Poisoner in Chief: Sidney Gottlieb and the CIA Search for Mind Control. Henry Holt (academic press; documents the Olson case in the context of MKULTRA). For an earlier treatment, see Albarelli, H. P. (2009). A Terrible Mistake. Trine Day. On Calvi, see Gurwin, L. (1983). The Calvi Affair. Macmillan. On Casolaro, see Thomas, K., and Keith, J. (1996). The Octopus. Feral House. The Thomas and Keith volume should be treated with caution as an alternative press source, but the documented circumstances of Casolaro’s death are a matter of public record.

[58] EFTA signing on November 19, 2025; DOJ January 30, 2026 production; subsequent DOJ filings opposing further release. See note 8 and congressional record. On the contradiction between signing the Act and opposing its implementation, see “Is Former Prince Andrew the First Domino to Fall in the Epstein Probe?,” Northeastern University news service, February 19, 2026.

[59] FBI Director’s refusal to comply with congressional subpoenas for Epstein-related files documented in congressional record. Attorney General Pam Bondi’s statements at variance with the documented record prompted Representative Ro Khanna to consider articles of impeachment for obstruction of justice. See congressional reporting, February–March 2026.

[60] Carroll v. Trump, Case No. 1:22-cv-10016 (S.D.N.Y.), jury verdict May 9, 2023, finding Trump liable for sexual abuse. On the Access Hollywood tape (self-reported conduct regarding minors at beauty pageants), see Washington Post, October 8, 2016. Doe v. Trump and Epstein, Case No. 5:16-cv-00797 (C.D. Cal., filed 2016; voluntarily dismissed). Multiple independent accusers are documented in court records and sworn depositions across several jurisdictions.

[61] Andrew Mountbatten-Windsor arrested by Thames Valley Police at Sandringham Royal Estate on February 19, 2026, on suspicion of misconduct in public office. The charge relates to evidence from the Epstein files suggesting that Andrew shared confidential trade information with Epstein while serving as the UK’s special envoy for international trade (2001–2011). Reported by CTV News, Fox News, PBS, and Northeastern University news service. See also King Charles III’s earlier stripping of royal titles, October 2025.

[62] Peter Mandelson arrested by Metropolitan Police at his north London home on February 23, 2026, on suspicion of misconduct in public office. Investigation prompted by Epstein files indicating Mandelson referred to Epstein as his “best pal” and allegedly shared sensitive government data. See Representative Subramanyam’s official statement; Courthouse News Service, “UK Parliamentary Speaker Says He Tipped Off Police Over Possible Mandelson Flight Risk,” February 2026.

[63a] Al Jazeera English, February 7, 2026, op. cit. [63b] Murtaza Hussain, Drop Site News, February 2026. [63c] On Carbyne, see Al Jazeera (2026), op. cit.; Wall Street Journal reporting on Carbyne sale. [63d] “Jeffrey Epstein’s Business Ties with Banker Ariane de Rothschild Revealed,” Le Monde, February 5, 2026 (documents Epstein’s February 28, 2016 email to Peter Thiel: “As you probably know, I represent the Rothschilds”).

[64] FBI memo, Los Angeles field office, October 2020, released in the January 2026 DOJ production under the EFTA. The memo describes a confidential human source’s assessment that Epstein was “a co-opted Mossad agent.” Reported in Times of Israel, Electronic Intifada, and Zeteo, February 2026. The memo itself is available through the DOJ’s EFTA release.

[65] Epstein emails released in January 2026. See “No, the Epstein Files Don’t Show That He Worked for Mossad,” Times of Israel, February 2026 (quotes 2018 Epstein-Barak email exchange); “Why Is the Media Not Touching Jeffrey Epstein’s Israel Connections?,” Zeteo, February 2026; Ali Abunimah, “US Media Barely Touches Epstein Links to Israeli Intelligence,” Electronic Intifada, February 2026; TRT World coverage of January 2026 document release.

[66] On Epstein’s eugenic ideology, see “The Right Kind of Continuity,” Jewish Currents (discusses Epstein’s plan to “seed the human race” with his DNA, transhumanism, and eugenic views). Earlier reporting: James B. Stewart, “The Day Jeffrey Epstein Told Me He Had Dirt on Powerful People,” New York Times, August 12, 2019 (Epstein’s interest in eugenics and cryogenics at the New Mexico ranch). See also seized notebook materials and sworn testimony released in the January 2026 DOJ production.

[67] H. Scott Prosterman, “Former Israeli PM, in Epstein Files, Dreamed of Israeli Eugenics and Pretty Converts,” Informed Comment (Juan Cole), February 2026 (discusses Barak’s demographic engineering proposals in Epstein correspondence). See also Anshel Pfeffer, reporting on Barak-Epstein communications in context of demographic anxieties, Haaretz, January 2026.

[68] Maria Farmer testimony regarding supremacist attitudes. Farmer’s accounts are documented in her FBI interview (released in the January 2026 DOJ production) and in sworn depositions from Giuffre v. Maxwell, SDNY Docket 15-cv-07433. See also Johanna Sjoberg deposition in the same case. Court records available via PACER and CourtListener.

[69] See notes 33 and 34. Farmer testimony; multiple independent witnesses; seized materials from FBI search of Epstein’s New York residence (2019).

[70] Virginia Giuffre testimony and depositions in Giuffre v. Maxwell; Andrew’s civil settlement (February 2022, reported amount £12 million); draft indictment language in unsealed court filings. See also Brown, J. K. (2021). Perversion of Justice. Dey Street Books.

[71] See note 56. Baden forensic findings; video metadata analysis documenting clock jump and gap; guard dereliction records from United States v. Thomas and Noel.

[72] On the Presidio case, see Ehrensaft, D. (1992). “Preschool Child Sex Abuse: The Aftermath of the Presidio Case.” American Journal of Orthopsychiatry 62(2): 234–244. The finding that Aquino’s alibi was “not persuasive” is documented in Aquino v. Stone, 957 F.2d 139 (4th Cir. 1992), in which the court upheld the Army’s right to maintain the criminal investigation record on the grounds that probable cause had existed to believe the offenses were committed.

[73] The limiting conditions articulated in Section II.B are most critical precisely in cases like this, where the temptation to read suppression as near-confirmation is strongest. The three guardrails — independent documentation of the suppression itself, assessment of the suppressing actor’s access to truth, and the refusal to let suppression alone settle substantive claims — are what prevent the inverse evidence principle from becoming an unfalsifiable instrument.

[74] Fricker, M. (2007). Epistemic Injustice: Power and the Ethics of Knowing. Oxford University Press.

[75] Shields, M. (2023). “Conceptual Engineering, Conceptual Domination, and the Case of Conspiracy Theories.” Social Epistemology 37(4): 464–480. DOI: 10.1080/02691728.2023.2172696. The concept of “Dominant Institution Conspiracy Theories” is developed within this article.

[76] Mills, C. (2007). “White Ignorance.” In Sullivan, S., and Tuana, N. (eds.), Race and Epistemologies of Ignorance. SUNY Press.


🦅 Back to Home