THE J6 MATRIX: THE FEDERAL OPERATION
The Complete Timeline of How January 6th Was Staged to Kill Constitutional Process
They weren’t there to watch. They were there to direct.
While America watched what appeared to be spontaneous chaos at the Capitol on January 6th, 2021, a massive federal apparatus was executing a precision operation with a single objective: prevent three minutes of constitutional process that would have forced the Supreme Court to review the 2020 election.
The confirmed presence of 274 FBI agents is merely the visible tip of the operational iceberg. When you add CIA, DHS, military intelligence, contractors, and assets from agencies we’re not supposed to know exist, the federal footprint becomes staggering. This wasn’t infiltration—it was production. When the government supplies the directors, the stagehands, and the script, it isn’t monitoring an event. It’s manufacturing one.
At 1:00 PM on January 6th, Representative Paul Gosar rose to object to Arizona’s electoral votes—a constitutional motion that would have created Supreme Court standing.
At 1:03 PM, before he could speak, Congress was suspended for an “emergency.”
Those three minutes are why January 6th happened. Not to stop certification. That was never in danger. But to prevent the one constitutional process that would have forced judicial review.
This forensic reconstruction reveals how elements within the United States government produced a national tragedy to prevent a constitutional remedy. And in doing so, accidentally exposed the entire machinery.
Part I: The Script
The Twenty-Year Rehearsal
The scaffolding of January 6th wasn’t erected that morning. It was federal architecture built across decades, tested in foreign capitals, and finally deployed at home.
The prototype was domestic. In November 2000, Roger Stone executed the “Brooks Brothers Riot,” a manufactured storming of the Miami-Dade recount center. Well-dressed Republican operatives created chaos, banging on doors and stopping the count. Stone published the hotel room numbers of vote counters, ensuring targeted harassment. The formula crystallized: create chaos, film it professionally, use media amplification to legitimize the illegitimate.
Stone exported this formula internationally. Serbia 2000, Ukraine 2004, Ukraine 2014—each iteration was a dress rehearsal. The Serbian slogan “He’s finished” became Ukraine’s “It’s time,” which became America’s “Stop the Steal.” The psychology remained identical. The training videos from Serbia’s Otpor revolution explicitly stated that “security forces [were] assured to step aside.” Watch what happened at the Capitol when barriers were removed and magnetic doors mysteriously opened.
The pattern doesn’t vary because the pattern works.
By 2016, Trump recognized the liability Stone represented. His FEC filing formally disavowing Stone’s “Committee to Restore America’s Greatness” wasn’t a rejection of methods but legal insulation. The disavowal created plausible deniability for operations everyone understood would continue in shadow form.
When Stone resurrected “Stop the Steal” for 2020, he couldn’t be the public face. Under indictment, under surveillance, he needed a frontman. Enter Ali Akbar: federal convict (2007 felony theft, 2008 credit card fraud) turned political operative with sudden, unlimited funding and protection. The pattern mirrors classic intelligence asset creation: criminal conviction creates leverage, leverage enables control, control produces operations. Akbar admitted he was “borrowing the brand” from Stone. This wasn’t temporary transfer but permanent installation of a controlled asset running Stone’s operation while Stone maintained legal distance.
The Federal Rehearsals
Throughout December 2020, federal employees conducted operational rehearsals. The Sunrise Movement’s government infiltrators met on Zoom, coordinating sick days, discussing building access, preparing for “protesters who will want to enter.” The phrase that haunts isn’t speculative but declarative: “We’ll let them.” The invitation was planned before the guests arrived.
Maria J. Stefan’s involvement elevates this beyond conspiracy to systematic methodology. Former State Department architect of nonviolent regime change, author of operational manuals for government overthrow, trainer of color revolution personnel—now teaching federal employees how to create revolutionary conditions within their own government. Her handbook, distributed among federal workers, outlined a ninety-day timeline for governmental collapse through coordinated civil service disruption. January 6th fell precisely within her operational window.
Seventeen different federal agencies knew potential for violence existed, yet none acted to prevent it. This wasn’t intelligence failure but intelligence design. When seventeen agencies simultaneously fail to act on identical intelligence, they’re following orders to fail, creating coordinated strategic absence that invites predetermined action.
The Asset Architecture
The asset roster reads like an intelligence operation’s casting call. Ray Epps: former Marine, Oath Keeper chapter president, suddenly the most visible provocateur urging Capitol breach. His FBI lawyer from Phoenix office, the same office involved in Khobar Towers, same office running Fast and Furious, indicates career intelligence connections. His text to his nephew admitting “I orchestrated it” should have guaranteed prosecution. Instead, media ran protection campaigns, DOJ refused charges, and Epps became the only January 6th participant media defended rather than demonized.
The Sullivan brothers’ operation proves the bipartisan theater. John Sullivan running “Insurgence USA” as radical leftist, filming from inside the Capitol. James Sullivan running “Civilized Awakening” as Trump supporter, organizing from outside. Two brothers, opposite sides, both present, both filming, both protected. CNN’s pre-negotiated $35,000 payment to John for footage he couldn’t have known he’d capture unless the capture was scripted reveals advance knowledge of specific events at specific locations.
Nick Fuentes’ funding exposes international architecture. The $250,000 Bitcoin transfer from French programmer who subsequently died before testimony, the building of Cozy.tv with infrastructure money, the perfectly timed Hitler praise to discredit populist movements—all indicating handled asset playing assigned role. The groyper army wasn’t organic youth movement but orchestrated controlled opposition, creating extremist caricature to discredit legitimate dissent.
Part II: The Stagecraft
Setting the Stage
Before dawn on January 6th, while Washington slept, the stage was being dressed. At 7:45 AM, an individual in black began systematically removing barriers around the Capitol perimeter. Not random vandalism but professional dismantling by someone who knew exactly which barriers created critical choke points, which removals would create the appearance of invitation while maintaining camera angles.
Metropolitan Police Undercover Officer Roe was caught on bodycam at 8:15 AM saying “appreciate it, brother” to individuals removing barriers. This footage was later classified “sensitive.” The individual who removed critical barriers was never pursued, never identified, never charged. You don’t arrest the stage crew.
Simultaneously, “construction workers” climbed the Capitol scaffolding despite no construction being scheduled. These weren’t workers but camera operators establishing platforms. Every major photograph defining January 6th was taken from these pre-positioned, elevated angles.
The Permit Heist
Women for America First held nine legitimate permits for peaceful demonstration. On December 30th, Cindy Chafin arrived with last-minute modifications—changing locations, shifting times, redirecting crowds. The authentic organizers found their events hijacked, their attendees redirected toward predetermined breach points.
Caroline Wren’s financial intervention exposed deeper architecture. Her donor, Publix heiress Julie Fancelli, demanded Alex Jones receive speaking privileges for $650,000. Jones already had his own permitted area. The demand wasn’t about platform but positioning. They told Jones that Trump personally requested he lead the march, that the President would meet him at the Capitol. These lies positioned Jones as Pied Piper, leading crowds away from Trump’s speech toward the production zone.
The website takeover completed the identity theft. StopTheSteal.org suddenly redirected to new controllers. Every email, phone number, physical address of authentic protesters harvested. The database of American patriots transformed into targeting list for federal prosecution.
The Presidential Alibi
Trump’s speech pattern that day broke from usual rhythm. Starting late, speaking longer, adding extensions that kept him at podium. Someone in Trump’s orbit understood the timeline.
Every minute Trump spoke kept his genuine supporters at the Ellipse while the operation proceeded at the Capitol.
When Trump announced he would march with the crowd, Secret Service immediately vetoed. Trump at the Capitol would have prevented the breach, calmed the crowd, destroyed the narrative.
He could not be allowed to arrive.
The Three-Minute Window
At 12:30 PM, Ray Epps positioned himself at the first barrier. “We need to go into the Capitol! That’s where our problems are!” His whisper to Ryan Samsel at 12:50 PM preceded the first breach by exactly three minutes. Samsel received one of the longest sentences. Epps was never charged.
The crowd’s resistance reveals the forensic distinction between orchestrated event and organic participants. Multiple videos show Trump supporters restraining others, shouting “Fed! Fed! Fed!” at Epps. With hundreds of embedded operatives, you don’t need crowd consent, only strategic positioning at crucial moments.
At 12:53 PM, while Trump still spoke, the first barriers fell. Not pushed in rage but lifted and walked backward by coordinated groups. At 1:00 PM, the Columbus Doors’ magnetic locks opened. These require specific Capitol Police badges. They weren’t broken or forced. They were opened.
The breach notification reached Congress at precisely 1:03 PM. Not when barriers fell. Not when situation was containable. But at 1:03 PM. The exact moment needed to prevent the motions from being entered. The constitutional kill switch was thrown.
Part III: The Performance
Manufacturing the Narrative
With constitutional process prevented, the production shifted to manufacturing “insurrection.”
Inside, most crowd behavior defied violent mob assumptions. Grandmothers taking selfies. Protesters replacing fallen velvet ropes. Tourist behavior, not insurrection, because most were unwitting extras in a production selling them as terrorists.
The destruction pattern reveals professional targeting. Specific offices ransacked, others untouched. Pelosi’s laptop conveniently left open, logged in, taken by someone who knew exactly where to find it. Most revealing: systematic destruction of servers containing Ukrainian financial records, biolab documentation. Not random rage but surgical elimination of evidence that electoral challenges would have exposed.
The Documentary Complex
HBO’s multi-million dollar crew. Pelosi’s daughter Alexandra. Discovery Channel. National Geographic. Not journalists with phones but Canon XA40 professional camcorders, RED cinema cameras, Steadicams in positions requiring foreknowledge of crowd flows. Boom operators capturing clear dialogue in chaos that should have made recording impossible.
John Sullivan captured the “money shot” at 2:30 PM. Tactical officers inexplicably withdrew from Speaker’s Lobby, creating clear field of fire. Sullivan arrived precisely as withdrawal completed. His reaction on camera: “I have the shot!” Not horror but satisfaction. His footage, sold to CNN for $35,000 in a pre-negotiated deal, became the defining image.
The Vanishing Act
At 2:35 PM, provocateurs vanished as if responding to invisible signal. Most violent actors disappeared within minutes. Security footage shows them changing clothes, exiting through predetermined routes, meeting handlers at extraction points.
FBI arrived at locations before 911 calls, positioned at exits before breaches. Not responding to crime but managing production—ensuring authentic protesters arrested while federal assets escaped.
By 3:00 PM, before Capitol cleared, media deployed synchronized language: “insurrection,” “deadly assault,” “democracy under attack.” Identical phrases across competing networks. Congress reconvened at 8:00 PM with polished speeches about “democracy surviving darkest day.” You don’t process trauma and immediately produce eloquent oratory. You deliver rehearsed lines.
Part IV: The Constitutional Crime
The Prevented Process
When a state’s electoral votes are challenged during joint session of Congress, the challenge must be in writing, signed by at least one Representative and one Senator. Once properly presented, the Constitution requires both chambers to withdraw and debate separately for up to two hours. This debate, regardless of outcome, creates standing for judicial review.
Standing is the key that unlocks the courthouse door. Without it, no federal court—including the Supreme Court—can hear a case. With it, the highest court must consider the constitutional questions raised. The Founders designed this safeguard for precisely such moments, when the integrity of a federal election is disputed by states themselves.
Gosar and Biggs weren’t proposing to overturn the election. They were creating a constitutional record that would force judicial review. Even if their objections were voted down, the mere fact of their presentation, debate, and vote would have established standing for Supreme Court challenge.
The same Supreme Court that had rejected all previous 2020 challenges for “lack of standing” would have been forced to hear a case with proper congressional standing.
This is what those three minutes prevented. Not certification. That was never in danger. But the creation of a constitutional record that would have compelled Supreme Court review.
The Emergency Coup
When Congress reconvened at 8:00 PM, everything had changed. Normal parliamentary procedures were suspended. Emergency rules eliminated all motions except certification. No debate permitted. No objections allowed. Proxy voting enabled members to vote without being present.
McConnell had warned Republicans on December 31st to abandon objection plans. His January 6th floor speech calling certification “the most consequential vote” of his career takes new meaning.
He knew what would be prevented.
Pence claims he lacked authority to pause certification. Technically true. Because the emergency session eliminated the motions that would have granted that authority. The circular logic protected everyone: no motions meant no authority to pause meant no Supreme Court review.
Part V: The Aftermath
The Money Machine
Within weeks, $113 billion flowed to Ukraine through emergency authorizations bypassing congressional oversight. Defense contractor stocks, Raytheon, Lockheed Martin, Palantir, soared 30% or more. Congressional trading records show massive defense stock purchases in early January, before the “insurrection” but after the plan was set. Foreknowledge, not prediction.
The Prosecution Architecture
Over 1,000 Americans arrested. Grandmothers in solitary confinement. Veterans denied medication. Families bankrupted. Meanwhile, Ray Epps orchestrating breach on video—no charges. John Sullivan filming inside—paid by CNN. The pipe bomber on hundreds of cameras—never identified. The message: question elections, lose everything.
The Global Template
The model exported instantly. Canada’s Emergency Act crushing peaceful truckers. Brazil imprisoning election questioners. Europe mandating censorship. Same facial recognition, same database architecture, same language: “threat to democracy.” January 6th became the global template for dismantling dissent.
The Committee Cover-Up
The January 6th Committee spent eighteen months investigating everything except what mattered. They never asked why constitutional motions were prevented at that precise moment. Never examined the three-minute timing. They investigated the breach to protect what the breach prevented.
The Fatal Recognition
The federal footprint was too large to hide. The timeline too precise to be coincidental. The motive too obvious once exposed.
You don’t need hundreds of operatives to monitor a protest. You need them to produce one. You don’t produce one unless preventing something else. You don’t prevent constitutional process unless that process threatens everything built on unconstitutional foundations.
The Constitution doesn’t recognize their emergency. The prevented process isn’t gone—it’s pending. Every January 6th defendant has standing not as protester but as citizen denied constitutional process. Every American prevented from petitioning Congress through representatives has grounds for relief. The Supreme Court review they feared remains possible, now with evidence of why they feared it.
The three minutes they stole created constitutional debt that compounds daily. When government commits crimes to prevent constitutional process, the prevention itself becomes the ultimate crime. January 6th wasn’t insurrection. It was constitutional assassination, executed in three minutes, exposed by federal overreach.
The Reckoning
The production is over. The curtain has fallen. The audience sees the stagehands, scripts, directors, the entire machinery.
They filmed a movie and called it news. They performed a play and called it insurrection. They executed a constitutional kill switch and called it saving democracy.
We’re not watching anymore. The crime is documented. The pattern is revealed. The truth maintains itself.
The Constitution remembers. And what the Constitution remembers, it eventually rectifies.
The debt isn’t metaphorical.
It’s procedural.
And it must be settled.
<3EKO
Thank you for reading + sharing
This report combines last week’s three-part series into one complete forensic reconstruction, formatted for easy saving, sharing, and spreading.
Includes more than a dozen new illustrations. It’s completely free to download, or you may pay what you believe truth is worth.
Thank you for recognizing the pattern(s).
I love you.








Thank you EKO. No one lays out the truth quite like you do. This reminds me of an interview that aired on "60 Minutes" in the U.S. Sunday, June 8th, 2025 ("The Pager Plot" Series 57 Episode 40). On the show, Leslie Stahl interviewed a retired Mossad Agent (identity hidden and voice altered) and this is what he/she/it said: "We create a pretend world. We are a global production company. we write the screenplay, we're the directors, we are the producers, we're the main actors and the world is our stage." (GLOBAL production company). Stahl said the motto of Mossad is: Wage war with lies and deception. She interviewed TWO retired Mossad agents. They dubbed the first one (quoted above) Michael, and the second one "Gabriel" (named after Archangels Michael and Gabriel? Interesting).
Wow EKO!!! You just keep the information coming. Awesome job!!
I used to be of the mind that it took two parties to keep our Country on track. I always said an eagle can’t fly with just one wing. It takes a left wing and a right wing.
But now I feel very different. The left has been exposed,,,, and now they accidentally fly their true colors,,,and I have not one ounce of trust for them, let alone their party tactics.
Outrageous lies and cover ups.
Plato said that the real test of a man is what he (or she) does with power. My paraphrase of course.
I see not one glimmer of ethics or morality in their actions.
Everybody can think what they want,,,, but I wouldn’t cross the street to p*** on them if there were on fire.
Rant over .
Keep up the great works EKO