Michael Hollister

Michael Hollister

Sudan – The Forgotten Massacre

El-Fasher, October 2025: more than 6,000 people killed in 72 hours. The UN calls it genocide. The world looks away - not out of ignorance, but out of calculation. Who supplies the weapons? Who buys the gold? Who sits at the table as a "peacemaker" while its cargo flights deliver ammunition? Michael Hollister follows the interests - and finds an architecture of silence that is not a failure. It is the system.

Israel – Agronomic Warfare

On February 1, 2026, Israeli forces instructed UN peacekeepers to take cover - then military aircraft spent nine hours spraying glyphosate at 20 to 30 times normal agricultural concentrations over civilian farmland in southern Lebanon. The same pattern, the same aircraft, the same substances: documented in Syria, Lebanon, and Gaza over more than a decade. What bombs begin, herbicides complete. No ceasefire detoxifies a field.

Iran: The Camel Hacks Back – Part 2

The West taught Iran cyberwarfare. Not intentionally - but systematically. When the NSA and Israeli intelligence launched the Stuxnet worm into Iranian nuclear facilities in 2010, they believed they were targeting a technologically inferior adversary. They were targeting a civilization more than three thousand years old, with millions of highly trained engineers - and they handed it the most effective blueprint for modern cyber weapons ever involuntarily shared. What followed was no accident: Shamoon in 2012, the Sands Casino attack in 2014, Handala in 2026. Each step a direct response to a Western provocation. Each step more precise than the last. Build Stuxnet, and you get Handala. That's not punishment. That's physics.

GAZA-Made in the USA – Part 2 – The End of Accountability

Part two shifts the focus from the rubble in Gaza to the centers of power in Washington and Berlin. It shows that the central question is not only which weapons were delivered, but why the political and legal mechanisms of control failed - or were deliberately dismantled. From National Security Memorandum 20 to the Leahy Law and the Arms Export Control Act, a picture emerges of a system in which the relevant rules do exist, yet are not enforced when it matters most. The removal of reporting obligations, the bypassing of congressional scrutiny, and the institutional silence of the responsible agencies do not merely suggest bureaucratic failure, but a possible transition into a new phase: the end of accountability.

Iran: The Camel Hacks Back – Part 1

The most dangerous cyberattack is not the one that cannot be stopped - but the one nobody took seriously. While US authorities dismiss the leaks as “historical data,” the attacks on Stryker, Lockheed Martin, and the FBI director reveal something far more troubling: not technical superiority, but systemic failure at the highest level. Stolen credentials, ignored warnings, exposed systems - and an adversary that knows exactly how to exploit them.
Iran’s cyber strategy is as simple as it is effective: not technological dominance, but the precise exploitation of human negligence. Part 1 of this analysis shows how open doors become strategic weapons - and why the West is not failing because of enemy strength, but because of its own carelessness. The camel hacks back. Not because it is stronger - but because no one locked the door.

Follow the Oil -Part 3- The Gulf States Between the Fronts

For decades, hosting US military bases was considered an ironclad guarantee of security in the Gulf. Iran has shattered that assumption since February 28, 2026 - methodically, deliberately, at enormous cost to itself. When Washington achieves its objectives and leaves, what remains? A weakened but undefeated Iran. A fractured security architecture. And a bill that no one in Washington intends to pay.

Follow the Oil -Part 2- Europe Without Oil

Europe didn’t suddenly stumble into an energy crisis - it sidelined itself step by step. With the destruction of Nord Stream, the political decoupling from Russia, and the simultaneous escalation in the Middle East, two of its key energy lifelines collapsed at once: East and South. What remains is a continent stripped of strategic agency - militarily unable to secure resources, economically dependent on costly imports, and politically trapped in contradictions it can no longer reconcile.
As Hormuz is blocked, Bab al-Mandab comes under pressure, and the United States openly states that Europe should “secure its own oil,” a new reality is emerging: energy is no longer just an economic factor, but a geopolitical weapon. Part 2 of this series examines how Europe has drifted into structural dependency - and why other actors are capitalizing on it.

Iran Insight: “Rescue Mission”

Was the celebrated U.S. “rescue mission” in Iran in fact a failed covert nuclear recovery operation? Michael Hollister reconstructs the inconsistencies, military patterns, and operational clues surrounding the downing of an F-15E, the destruction of special operations aircraft near Isfahan, and the trail of 200 kilograms of missing highly enriched uranium. The article challenges Washington’s official hero narrative and points toward a far more consequential mission that may never have been about rescuing a stranded colonel at all.

GAZA-Made in the USA – Part 1

American bombs in Gaza are not an abstract accusation, not an indirect implication, and not merely a political narrative - they are identifiable, traceable, and documented in the rubble itself. A forensic investigation of 79 geolocated strikes reveals which US-made weapon systems were used, where they hit, which civilian sites they struck, and how many people were killed. Schools, homes, medical facilities, mosques: this text reconstructs the material chain of evidence behind a war reality that is often politically softened but becomes increasingly difficult to deny on a technical level. What emerges is not the full picture of the war, but the verifiable lower bound of what can be publicly proven - and that is precisely what makes it explosive.

The UN’s Double-Entry Bookkeeping

The United Nations documented torture, sexual violence, and systematic killings by Syrian intelligence - while simultaneously transferring millions of dollars into that very system. Over more than a decade, at least $11 million flowed to a security company that internal documents link directly to the General Intelligence Directorate. A company hidden behind an unmarked office - but backed by UN contracts.
The Shorouk case is not an isolated failure, but a documented contradiction: humanitarian aid moving through the very structures it is meant to bypass. This analysis exposes not only financial links, but a system of surveillance, deception, and institutional blind spots. The question is no longer whether the UN knew - but why it chose not to act.