THE J6 MATRIX: THE FEDERAL OPERATION
EKO
October 06, 2025
The Complete Timeline of How January 6th Was Staged to Kill Constitutional Process
While America watched what appeared to be spontaneous chaos at the Capitol on January 6th, 2021, a massive federal apparatus was executing a precision operation with a single objective: prevent three minutes of constitutional process that would have forced the Supreme Court to review the 2020 election.

The confirmed presence of 274 FBI agents is merely the visible tip of the operational iceberg. When you add CIA, DHS, military intelligence, contractors, and assets from agencies weโre not supposed to know exist, the federal footprint becomes staggering. This wasnโt infiltrationโit was production. When the government supplies the directors, the stagehands, and the script, it isnโt monitoring an event. Itโs manufacturing one.
At 1:00 PM on January 6th, Representative Paul Gosar rose to object to Arizonaโs electoral votesโa constitutional motion that would have created Supreme Court standing.
At 1:03 PM, before he could speak, Congress was suspended for an โemergency.โ
Those three minutes are why January 6th happened. Not to stop certification. That was never in danger. But to prevent the one constitutional process that would have forced judicial review.
This forensic reconstruction reveals how elements within the United States government produced a national tragedy to prevent a constitutional remedy. And in doing so, accidentally exposed the entire machinery.
Part I: The Script
The Twenty-Year Rehearsal
The scaffolding of January 6th wasnโt erected that morning. It was federal architecture built across decades, tested in foreign capitals, and finally deployed at home.
The prototype was domestic. In November 2000, Roger Stone executed the โBrooks Brothers Riot,โ a manufactured storming of the Miami-Dade recount center. Well-dressed Republican operatives created chaos, banging on doors and stopping the count. Stone published the hotel room numbers of vote counters, ensuring targeted harassment. The formula crystallized: create chaos, film it professionally, use media amplification to legitimize the illegitimate.
Stone exported this formula internationally. Serbia 2000, Ukraine 2004, Ukraine 2014โeach iteration was a dress rehearsal. The Serbian slogan โHeโs finishedโ became Ukraineโs โItโs time,โ which became Americaโs โStop the Steal.โ The psychology remained identical. The training videos from Serbiaโs Otpor revolution explicitly stated that โsecurity forces [were] assured to step aside.โ Watch what happened at the Capitol when barriers were removed and magnetic doors mysteriously opened.
The pattern doesnโt vary because the pattern works.
By 2016, Trump recognized the liability Stone represented. His FEC filing formally disavowing Stoneโs โCommittee to Restore Americaโs Greatnessโ wasnโt a rejection of methods but legal insulation. The disavowal created plausible deniability for operations everyone understood would continue in shadow form.
When Stone resurrected โStop the Stealโ for 2020, he couldnโt be the public face. Under indictment, under surveillance, he needed a frontman. Enter Ali Akbar: federal convict (2007 felony theft, 2008 credit card fraud) turned political operative with sudden, unlimited funding and protection. The pattern mirrors classic intelligence asset creation: criminal conviction creates leverage, leverage enables control, control produces operations. Akbar admitted he was โborrowing the brandโ from Stone. This wasnโt temporary transfer but permanent installation of a controlled asset running Stoneโs operation while Stone maintained legal distance.
The Federal Rehearsals
Throughout December 2020, federal employees conducted operational rehearsals. The Sunrise Movementโs government infiltrators met on Zoom, coordinating sick days, discussing building access, preparing for โprotesters who will want to enter.โ The phrase that haunts isnโt speculative but declarative: โWeโll let them.โ The invitation was planned before the guests arrived.
Maria J. Stefanโs involvement elevates this beyond conspiracy to systematic methodology. Former State Department architect of nonviolent regime change, author of operational manuals for government overthrow, trainer of color revolution personnelโnow teaching federal employees how to create revolutionary conditions within their own government. Her handbook, distributed among federal workers, outlined a ninety-day timeline for governmental collapse through coordinated civil service disruption. January 6th fell precisely within her operational window.
Seventeen different federal agencies knew potential for violence existed, yet none acted to prevent it. This wasnโt intelligence failure but intelligence design. When seventeen agencies simultaneously fail to act on identical intelligence, theyโre following orders to fail, creating coordinated strategic absence that invites predetermined action.
The Asset Architecture
The asset roster reads like an intelligence operationโs casting call. Ray Epps: former Marine, Oath Keeper chapter president, suddenly the most visible provocateur urging Capitol breach. His FBI lawyer from Phoenix office, the same office involved in Khobar Towers, same office running Fast and Furious, indicates career intelligence connections. His text to his nephew admitting โI orchestrated itโ should have guaranteed prosecution. Instead, media ran protection campaigns, DOJ refused charges, and Epps became the only January 6th participant media defended rather than demonized.
The Sullivan brothersโ operation proves the bipartisan theater. John Sullivan running โInsurgence USAโ as radical leftist, filming from inside the Capitol. James Sullivan running โCivilized Awakeningโ as Trump supporter, organizing from outside. Two brothers, opposite sides, both present, both filming, both protected. CNNโs pre-negotiated $35,000 payment to John for footage he couldnโt have known heโd capture unless the capture was scripted reveals advance knowledge of specific events at specific locations.
Nick Fuentesโ funding exposes international architecture. The $250,000 Bitcoin transfer from French programmer who subsequently died before testimony, the building of Cozy.tv with infrastructure money, the perfectly timed Hitler praise to discredit populist movementsโall indicating handled asset playing assigned role. The groyper army wasnโt organic youth movement but orchestrated controlled opposition, creating extremist caricature to discredit legitimate dissent.
Part II: The Stagecraft
Setting the Stage
Before dawn on January 6th, while Washington slept, the stage was being dressed. At 7:45 AM, an individual in black began systematically removing barriers around the Capitol perimeter. Not random vandalism but professional dismantling by someone who knew exactly which barriers created critical choke points, which removals would create the appearance of invitation while maintaining camera angles.
Metropolitan Police Undercover Officer Roe was caught on bodycam at 8:15 AM saying โappreciate it, brotherโ to individuals removing barriers. This footage was later classified โsensitive.โ The individual who removed critical barriers was never pursued, never identified, never charged. You donโt arrest the stage crew.
Simultaneously, โconstruction workersโ climbed the Capitol scaffolding despite no construction being scheduled. These werenโt workers but camera operators establishing platforms. Every major photograph defining January 6th was taken from these pre-positioned, elevated angles.
The Permit Heist
Women for America First held nine legitimate permits for peaceful demonstration. On December 30th, Cindy Chafin arrived with last-minute modificationsโchanging locations, shifting times, redirecting crowds. The authentic organizers found their events hijacked, their attendees redirected toward predetermined breach points.
Caroline Wrenโs financial intervention exposed deeper architecture. Her donor, Publix heiress Julie Fancelli, demanded Alex Jones receive speaking privileges for $650,000. Jones already had his own permitted area. The demand wasnโt about platform but positioning. They told Jones that Trump personally requested he lead the march, that the President would meet him at the Capitol. These lies positioned Jones as Pied Piper, leading crowds away from Trumpโs speech toward the production zone.
The website takeover completed the identity theft. StopTheSteal.org suddenly redirected to new controllers. Every email, phone number, physical address of authentic protesters harvested. The database of American patriots transformed into targeting list for federal prosecution.
The Presidential Alibi
Trumpโs speech pattern that day broke from usual rhythm. Starting late, speaking longer, adding extensions that kept him at podium. Someone in Trumpโs orbit understood the timeline.
Every minute Trump spoke kept his genuine supporters at the Ellipse while the operation proceeded at the Capitol.
When Trump announced he would march with the crowd, Secret Service immediately vetoed. Trump at the Capitol would have prevented the breach, calmed the crowd, destroyed the narrative.
He could not be allowed to arrive.
The Three-Minute Window
At 12:30 PM, Ray Epps positioned himself at the first barrier. โWe need to go into the Capitol! Thatโs where our problems are!โ His whisper to Ryan Samsel at 12:50 PM preceded the first breach by exactly three minutes. Samsel received one of the longest sentences. Epps was never charged.
The crowdโs resistance reveals the forensic distinction between orchestrated event and organic participants. Multiple videos show Trump supporters restraining others, shouting โFed! Fed! Fed!โ at Epps. With hundreds of embedded operatives, you donโt need crowd consent, only strategic positioning at crucial moments.
At 12:53 PM, while Trump still spoke, the first barriers fell. Not pushed in rage but lifted and walked backward by coordinated groups. At 1:00 PM, the Columbus Doorsโ magnetic locks opened. These require specific Capitol Police badges. They werenโt broken or forced. They were opened.
The breach notification reached Congress at precisely 1:03 PM. Not when barriers fell. Not when situation was containable. But at 1:03 PM. The exact moment needed to prevent the motions from being entered. The constitutional kill switch was thrown.
Part III: The Performance
Manufacturing the Narrative
With constitutional process prevented, the production shifted to manufacturing โinsurrection.โ
Inside, most crowd behavior defied violent mob assumptions. Grandmothers taking selfies. Protesters replacing fallen velvet ropes. Tourist behavior, not insurrection, because most were unwitting extras in a production selling them as terrorists.
The destruction pattern reveals professional targeting. Specific offices ransacked, others untouched. Pelosiโs laptop conveniently left open, logged in, taken by someone who knew exactly where to find it. Most revealing: systematic destruction of servers containing Ukrainian financial records, biolab documentation. Not random rage but surgical elimination of evidence that electoral challenges would have exposed.
The Documentary Complex
HBOโs multi-million dollar crew. Pelosiโs daughter Alexandra. Discovery Channel. National Geographic. Not journalists with phones but Canon XA40 professional camcorders, RED cinema cameras, Steadicams in positions requiring foreknowledge of crowd flows. Boom operators capturing clear dialogue in chaos that should have made recording impossible.
John Sullivan captured the โmoney shotโ at 2:30 PM. Tactical officers inexplicably withdrew from Speakerโs Lobby, creating clear field of fire. Sullivan arrived precisely as withdrawal completed. His reaction on camera: โI have the shot!โ Not horror but satisfaction. His footage, sold to CNN for $35,000 in a pre-negotiated deal, became the defining image.
The Vanishing Act
At 2:35 PM, provocateurs vanished as if responding to invisible signal. Most violent actors disappeared within minutes. Security footage shows them changing clothes, exiting through predetermined routes, meeting handlers at extraction points.
FBI arrived at locations before 911 calls, positioned at exits before breaches. Not responding to crime but managing productionโensuring authentic protesters arrested while federal assets escaped.
By 3:00 PM, before Capitol cleared, media deployed synchronized language: โinsurrection,โ โdeadly assault,โ โdemocracy under attack.โ Identical phrases across competing networks. Congress reconvened at 8:00 PM with polished speeches about โdemocracy surviving darkest day.โ You donโt process trauma and immediately produce eloquent oratory. You deliver rehearsed lines.
Part IV: The Constitutional Crime
The Prevented Process
When a stateโs electoral votes are challenged during joint session of Congress, the challenge must be in writing, signed by at least one Representative and one Senator. Once properly presented, the Constitution requires both chambers to withdraw and debate separately for up to two hours. This debate, regardless of outcome, creates standing for judicial review.
Standing is the key that unlocks the courthouse door. Without it, no federal courtโincluding the Supreme Courtโcan hear a case. With it, the highest court must consider the constitutional questions raised. The Founders designed this safeguard for precisely such moments, when the integrity of a federal election is disputed by states themselves.
Gosar and Biggs werenโt proposing to overturn the election. They were creating a constitutional record that would force judicial review. Even if their objections were voted down, the mere fact of their presentation, debate, and vote would have established standing for Supreme Court challenge.
The same Supreme Court that had rejected all previous 2020 challenges for โlack of standingโ would have been forced to hear a case with proper congressional standing.
This is what those three minutes prevented. Not certification. That was never in danger. But the creation of a constitutional record that would have compelled Supreme Court review.
The Emergency Coup
When Congress reconvened at 8:00 PM, everything had changed. Normal parliamentary procedures were suspended. Emergency rules eliminated all motions except certification. No debate permitted. No objections allowed. Proxy voting enabled members to vote without being present.
McConnell had warned Republicans on December 31st to abandon objection plans. His January 6th floor speech calling certification โthe most consequential voteโ of his career takes new meaning.
He knew what would be prevented.
Pence claims he lacked authority to pause certification. Technically true. Because the emergency session eliminated the motions that would have granted that authority. The circular logic protected everyone: no motions meant no authority to pause meant no Supreme Court review.
Part V: The Aftermath
The Money Machine
Within weeks, $113 billion flowed to Ukraine through emergency authorizations bypassing congressional oversight. Defense contractor stocks, Raytheon, Lockheed Martin, Palantir, soared 30% or more. Congressional trading records show massive defense stock purchases in early January, before the โinsurrectionโ but after the plan was set. Foreknowledge, not prediction.
The Prosecution Architecture
Over 1,000 Americans arrested. Grandmothers in solitary confinement. Veterans denied medication. Families bankrupted. Meanwhile, Ray Epps orchestrating breach on videoโno charges. John Sullivan filming insideโpaid by CNN. The pipe bomber on hundreds of camerasโnever identified. The message: question elections, lose everything.
The Global Template
The model exported instantly. Canadaโs Emergency Act crushing peaceful truckers. Brazil imprisoning election questioners. Europe mandating censorship. Same facial recognition, same database architecture, same language: โthreat to democracy.โ January 6th became the global template for dismantling dissent.
The Committee Cover-Up
The January 6th Committee spent eighteen months investigating everything except what mattered. They never asked why constitutional motions were prevented at that precise moment. Never examined the three-minute timing. They investigated the breach to protect what the breach prevented.
The Fatal Recognition
The federal footprint was too large to hide. The timeline too precise to be coincidental. The motive too obvious once exposed.
You donโt need hundreds of operatives to monitor a protest. You need them to produce one. You donโt produce one unless preventing something else. You donโt prevent constitutional process unless that process threatens everything built on unconstitutional foundations.
The Constitution doesnโt recognize their emergency. The prevented process isnโt goneโitโs pending. Every January 6th defendant has standing not as protester but as citizen denied constitutional process. Every American prevented from petitioning Congress through representatives has grounds for relief. The Supreme Court review they feared remains possible, now with evidence of why they feared it.
The three minutes they stole created constitutional debt that compounds daily. When government commits crimes to prevent constitutional process, the prevention itself becomes the ultimate crime. January 6th wasnโt insurrection. It was constitutional assassination, executed in three minutes, exposed by federal overreach.
The Reckoning
The production is over. The curtain has fallen. The audience sees the stagehands, scripts, directors, the entire machinery.
They filmed a movie and called it news. They performed a play and called it an insurrection. They executed a constitutional kill switch and called it saving democracy.
Weโre not watching anymore. The crime is documented. The pattern is revealed. The truth maintains itself.
The Constitution remembers. And what the Constitution remembers, it eventually rectifies.
The debt isnโt metaphorical.
Itโs procedural.
And it must be settled.
Discover more from MOVCAC.com
Subscribe to get the latest posts sent to your email.