Central Bank Digital Currency (CBDC) System Design: A Comprehensive Survey of Public Research (2019–2025)

MKitch3|Sept. 21, 2025

This is my white paper of the public research on CBDC system design across central banks, BIS/IMF handbooks and large technical pilots. This research is a year in the making and still has a long way to go. 

Executive summary

Public research converges on a few core CBDC design choices that determine performance, privacy, resilience and policy control. Across dozens of proofs-of-concept and pilots, three patterns recur: two-tier distribution with public–private roles; modular architectures that mix centralized and distributed components; and granular policy controls implemented via wallets and APIs rather than “programmable money” embedded in the ledger itself. Offline payments remain achievable but complex; privacy can be enhanced with selective disclosure or Chaum-style eCash techniques; and cross-border efficiency gains are real in wholesale settings, where PvP/DvP workflows and atomic settlement reduce settlement risk. 

1) Design goals and constraints

Policy objectives

Typical goals: maintain monetary sovereignty and singleness of money, improve payments resilience/competition, enhance financial inclusion and cross-border efficiency, and safeguard privacy proportional to AML/CFT obligations. Recent official surveys find 94% of central banks exploring CBDCs, with retail work most advanced and a sharp uptick in wholesale pilots. 

Non-functional requirements

CBDC systems target very high throughput and low latency, fault tolerance, cyber resilience, and robust governance. BIS emphasizes modular system design and the feasibility of combining centralized and decentralized components. 

2) Core architectural choices

2.1 Distribution model

  • Single-tier: central bank provides wallets and services directly. Simple but burdens private sector innovation and scale.
  • Two-tier (prevailing model): central bank runs the core infrastructure/ledger; intermediaries handle customer-facing services, onboarding, compliance and innovation. BIS Project Rosalind prototypes an API layer that exposes central bank ledger functions to private providers in a two-tier model.  

2.2 Ledger and processing

  • Centralized, sharded processors: Project Hamilton (MIT/Boston Fed) shows that a centrally managed, in-memory transaction processor can reach very high throughput while keeping the ledger technology agnostic; the codebase (OpenCBDC) demonstrates alternative data structures.  
  • DLT or hybrid: Many wholesale pilots (Helvetia, Cedar, Jura, mBridge, Dunbar) use permissioned DLT to enable atomic PvP/DvP across institutions and currencies, often with each currency on its own ledger bridged by orchestration.  

2.3 Token vs account abstractions

Designs vary between account-based models, UTXO-style tokens, or hybrids. BIS projects explore UTXO semantics for retail tokens (Rosalind glossary), while other work abstracts accounts at the API layer and treats “balance changes” as events. 

2.4 API-first architecture

Rosalind frames an extensible API layer to standardize integration, enable innovation, and enforce policy via access-controlled endpoints rather than custom ledger logic. 

3) Privacy, data minimization, and compliance

3.1 Spectrum of privacy

Central bank papers stress that CBDC privacy is not binary. Designers can hide data from some actors while revealing to others under due process, using architectural, cryptographic and governance controls. 

3.2 Techniques

  • Selective disclosure & PETs: Bank of Canada surveys PETs (ZK proofs, MPC, TEEs, differential privacy) for CBDC contexts, noting maturing but still limited production readiness.  
  • Chaumian eCash prototypes: BIS Project Tourbillon explores quantum-resistant eCash variants that offer payer anonymity while maintaining anti-counterfeiting controls and scalability.  
  • Policy direction in major jurisdictions: ECB’s preparation-phase reports emphasize “high privacy” for online and offline transactions, with holding limits and offline design under development. UK work considers privacy-enhancing approaches for a potential digital pound.  

3.3 AML/CFT and supervision

Policy levers tend to sit in wallet layers and onboarding processes; APIs can enforce tiered limits, KYC regimes, and transaction monitoring, preserving central bank separation from personal data where politically required. Rosalind explicitly targets compliance while retaining a two-tier model. 

4) Offline payments

Offline is defined as value transfer between devices without network connectivity. BIS Project Polaris provides the de facto handbook and a higher-level design guide, concluding there is no one-size-fits-all solution; solutions require secure hardware, tamper resistance, risk caps, lifecycles, and procedures for re-sync and double-spend handling. Most offerings are not yet live at scale. 

5) Resilience and security lessons from live deployments

  • DCash outage (ECCU): a region-wide interruption was traced to an expired certificate in the Hyperledger Fabric deployment, underlining certificate management and operational discipline as critical to CBDC availability.  
  • Sand Dollar (Bahamas): ongoing modernization aims to interoperate with a national fast payments platform; early research focused on inclusion outcomes and payment efficiency.  
  • eNaira (Nigeria): initial adoption and awareness challenges documented by IMF and CBN; architecture follows a two-tier DLT model with phased rollout.  
  • JAM-DEX (Jamaica): launch supported by onboarding incentives; adoption strategy research highlights the role of targeted bonuses.  

6) Cross-border and interoperability designs

6.1 Wholesale corridors

  • mBridge: multi-central-bank platform for instant cross-border settlement reached MVP in 2024; BIS subsequently stepped back, leaving central bank partners to continue development.  
  • Jura & Helvetia: SNB/Banque de France/BIS experiments proved PvP/DvP settlement with wCBDC integrated into banks’ core systems and legal frameworks.  
  • Cedar (NY Fed) & Cedar x Ubin+: FX spot settlement on DLT reduced settlement time to seconds in simulated environments, exploring multi-ledger atomicity.  
  • Dunbar: common multi-CBDC platform design and governance insights for cross-border payments across several central banks.  

6.2 Retail corridors

  • Icebreaker: hub-and-spoke model connecting domestic retail CBDCs for cross-currency payments with FX competition at the hub.  

7) Retail platform and API design

  • Rosalind (BIS/BoE): demonstrates how an API layer can mediate wallet functions, consent, and policy rules while keeping the core ledger minimal; glossary covers UTXO, RTP/ARTP, verifiable credentials.  
  • Sela (HKMA/Bank of Israel/BIS): introduces an “access enabler” intermediary to widen competition while maintaining cybersecurity and cash-like properties; non-banks can connect directly to the central bank ledger under this model.  
  • Aurum (HKMA/BIS): two-tier system issuing both intermediated CBDC and a CBDC-backed stablecoin, informing Hong Kong’s e-HKD research.  

8) The digital euro, digital pound and US policy research

  • Digital euro: ECB is in a preparation phase focusing on high privacy, offline capability, and holding limits while EU legislation progresses. Recent communications press lawmakers to accelerate the legal framework.  
  • Digital pound: BoE/HM Treasury 2023 consultation and 2024 response outline a two-tier model and emphasize privacy by design; separate work with MIT DCI explores privacy-enhancing techniques.  
  • United States: Federal Reserve’s 2022 discussion paper and public comment summary frame benefits, risks and design considerations without endorsing issuance. Technical research at the New York Fed and Boston Fed continues via Cedar and Hamilton.  

9) Technology building blocks

  • Identity & credentials: tiered KYC with verifiable credentials; policy knobs (limits, age-restricted features) applied at wallet layer.  
  • Cryptography: ZK proofs, VOPRFs and blind signatures are under active evaluation; eCash variants show strong privacy for payer anonymity with anti-counterfeiting controls.  
  • Offline secure elements: secure enclaves/SE chips and tamper-resistant counters mitigate double-spend; reconciliation protocols cap offline risk exposure.  
  • Message and data standards: ISO 20022 alignment and standardized APIs are recurring themes in BIS/IMF materials; resilience requires disciplined key, cert and secrets management, per DCash lessons.  

10) Governance, risk and operational readiness

  • Cyber and operational resilience: IMF’s CBDC handbook chapters and notes focus on securing the ecosystem across central bank, intermediaries and vendors, including incident response, change control and supply-chain risks.  
  • Legal positioning: EU is actively legislating a digital euro; UK and US remain in consultation/research phases. Wholesale pilots often operate under existing legal frameworks with central bank oversight.  

11) Open design debates (2025)

  1. How much privacy is enough? Europe signals strong privacy commitments; technical PETs are improving but are not yet “turnkey” at national scale.  
  2. Retail vs wholesale first: Many jurisdictions prioritize wholesale CBDC to resolve settlement risk and cross-border frictions; retail remains politically sensitive.  
  3. Offline at scale: Feasible, but device security, risk caps, user UX and merchant hardware remain open challenges.  
  4. Interoperability: Competing architectures exist for cross-border flows (hub-and-spoke vs shared platforms vs interlinked ledgers); governance is as hard as the tech.  
  5. Role of central banks vs private sector: Sela and Rosalind show viable models for widening competition while preserving the central bank core.  

12) Comparative snapshot of flagship projects (non-exhaustive)

Project

Scope

Key ideas

Notable takeaways

Hamilton (US)

High-throughput retail core processor

Centralized, modular, code released as OpenCBDC

Ledger-agnostic engine can hit very high TPS; policy left to wallet/API layers. 

Rosalind (BIS/BoE)

Retail API layer

Two-tier, API-first, wallet functions and consent

Standardized APIs accelerate innovation while central bank stays minimal. 

Polaris (BIS)

Offline payments

Device security, counters, risk caps

No universal solution; operational design equals cryptographic design in importance. 

Sela (HK/IL)

Retail access model

“Access enabler” broadens intermediaries

Competition and security can coexist; non-banks may connect to core. 

Aurum (HK)

Retail prototype

Two token types incl. CBDC-backed stablecoin

Useful design space for rCBDC plus tokenized deposits. 

mBridge (HK/TH/CN/UAE …)

Multi-CBDC wholesale cross-border

Shared platform for instant settlement

Reached MVP; BIS exited oversight role as partners continue. 

Cedar (NY Fed)

Wholesale cross-border FX

Multi-ledger atomic settlement

FX PvP in seconds in a lab setting; complements global interlinking work. 

Jura & Helvetia (SNB/BdF/BIS)

Wholesale DvP/PvP

Integration with banks’ core systems

Feasible under Swiss law; legal and ops integration tractable. 

Icebreaker (Nordic/IL)

Retail cross-border

Hub-and-spoke FX with competition

Pathway for connecting domestic rCBDCs across borders. 

Digital euro (ECB)

Retail program

High privacy, offline, limits; legislation pending

Tech work advancing while EU law proceeds. 

13) Practical design checklist (what consistently works)

  1. Start two-tier with an API gateway between the core ledger and intermediaries; build policy in wallets and APIs.  
  2. Target ledger minimalism, keep programmability at the edges; use event-driven integration to existing RTGS and fast-payments systems.  
  3. Engineer privacy by design with selective disclosure and PETs; adopt jurisdiction-specific defaults and due-process access controls.  
  4. Treat offline as a separate subsystem with its own risk, device, and lifecycle model; cap value and frequency while offline.  
  5. Plan for cross-border early: decide whether to interlink domestic systems (Icebreaker), join shared platforms (mBridge/Dunbar), or pursue bilateral corridors (Jura/Helvetia).  
  6. Don’t neglect ops: certificates, keys, and change control can take you down faster than code bugs, as DCash showed.  

14) Annotated bibliography (selected, by theme)

System architecture and APIs

• BIS: CBDCs – System design (2024). Modular, mix-and-match components; privacy as a key design axis. 

• BIS/BoE: Project Rosalind report (2023). API prototypes and wallet functionality. 

• MIT/Boston Fed: Project Hamilton / OpenCBDC (2022). High-performance retail core. 

Offline payments

• BIS Polaris: Handbook (May 2023) and High-level design guide (Oct 2023). Canonical offline design references. 

Privacy

• Bank of Canada: Privacy in CBDC technology (2020) and Privacy-Enhancing Technologies for CBDC (2025). 

• BIS: Project Tourbillon (2023). eCash with privacy/security/scalability. 

Wholesale cross-border

• NY Fed: Project Cedar (2022–23). FX PvP on DLT, multi-ledger atomicity. 

• BIS/partners: Project Dunbar (2022), mBridge (2022–24), Jura (2021), Helvetia (2022). 

Retail cross-border

• BIS: Project Icebreaker (2023). Hub-and-spoke rCBDC corridor with competitive FX. 

Regional deployments

• Bahamas: Sand Dollar modernization (2025) and inclusion studies. 

• Nigeria: eNaira design paper (2021) and IMF one-year review (2023). 

• Jamaica: adoption and incentive design. 

• ECCU: DCash outage post-mortems. 

Jurisdictional programs and law

• ECB digital euro prep-phase updates and legal track. 

• BoE/HMT digital pound consultation and responses. 

• Federal Reserve: Money and Payments (2022) + public comments summary (2023). 

15) Minimum viable blueprint for a retail CBDC (synthesized)

  1. Core: centralized, scalable transaction processor with append-only log and deterministic state machine; HSM-backed keying and continuous audit. Hamilton-style throughput targets.  
  2. Interfaces: Rosalind-style API gateway enforcing rate limits, consent, limits, tiered KYC and programmability via rules engines.  
  3. Distribution: two-tier intermediaries (banks and non-banks; Sela access-enabler option) for onboarding, AML, customer support.  
  4. Wallets: reference mobile wallet and SDK with PETs for selective disclosure and offline risk caps per Polaris.  
  5. Resilience: multi-region active-active, cert automation, staged rollouts, chaos testing; explicit incident runbooks learned from DCash.  
  6. Cross-border: interlinking strategy evaluated early (Icebreaker hub vs mBridge/shared corridors vs bilateral PvP/DvP like Jura).  

16) Appendix: quick pointers to primary sources

  • BIS “CBDCs – System design” PDF (2024).  
  • BIS Project Rosalind report (2023).  
  • BIS Project Polaris handbook + design guide (2023).  
  • MIT/Boston Fed Project Hamilton + OpenCBDC.  
  • NY Fed Project Cedar Phase I and technical appendix.  
  • BIS Projects mBridge, Dunbar, Jura, Helvetia; updates and PDFs.  
  • ECB digital euro preparation-phase updates (2024).  
  • BoE/HMT digital pound consultation (2023) and site (2025).  
  • IMF CBDC Virtual Handbook: cybersecurity and design notes (2023–24).  
  • Live deployments: Sand Dollar (Bahamas), eNaira (Nigeria), JAM-DEX (Jamaica), DCash (ECCU).  

Bottom line

If you distill the public research, the safest, most future-proof pattern is a two-tier, API-first system with a minimal core, PET-hardened wallets, explicit offline subsystem, and an early cross-border strategy. The rest is governance, ops and politics, which, as DCash and EU legislative delays remind everyone, can make or break the tech. 



CBDCs: The Blueprint for the Next Monetary Operating System

MKitch3|Sept. 21,2025

You can’t open a financial journal or scroll a central banker’s LinkedIn feed without stumbling on four letters: CBDC. Central Bank Digital Currency.

Depending on who you ask, it’s either the evolution of money, or the most polite dystopia since QR codes on restaurant menus. But strip away the hype, and what you find is a mountain of research papers, pilots, and stress-tested prototypes. Taken together, they form a rough blueprint of what a CBDC system will actually look like if and when the switch gets flipped.

This piece digs into that blueprint—the tradeoffs, the pilots, and the recurring design patterns that matter.

Why are central banks obsessed with this?

At a high level, the goals are surprisingly sober:

• Keep control of monetary sovereignty as cash usage declines.

• Boost payment resilience in case commercial systems collapse.

• Nudge competition in retail payments where a handful of private players dominate.

• Explore inclusion and cheap cross-border rails that don’t take three days and a kidney to settle.

As of 2025, 94% of central banks are officially “exploring” a CBDC. Translation: everyone’s tinkering, but only a handful are in live production.

Core design choices

The research converges on a few forks in the road:

1. Distribution model: The overwhelming favorite is “two-tier.” The central bank runs the core ledger, while private banks and fintechs handle onboarding, compliance, and wallet innovation. BIS’s Project Rosalind is the poster child here, sketching out an API layer that lets intermediaries plug in without the central bank becoming a retail help desk.

2. Ledger structure: Some experiments lean into distributed ledgers (think wholesale corridors like Project Jura or mBridge), while retail pilots often look suspiciously like a high-performance centralized database (see Project Hamilton’s blazing throughput demo).

3. Token vs. account: Do you want each digital “note” to exist like a token (UTXO style), or do you just update account balances? Answer: both, depending on who’s running the pilot.

4. Programmability: Everyone likes to whisper about “programmable money.” In reality, most designs punt policy enforcement to the wallet and API layer—transaction limits, KYC rules, consent frameworks—not hard-coded into the core ledger.

The privacy dilemma

This is where the politics crash into the math. CBDCs force societies to pick a point on the spectrum between cash-like anonymity and panopticon-level traceability.

Options on the table:

• Selective disclosure: Share data only with regulators when due process demands it.

• Privacy-enhancing tech: Zero-knowledge proofs, blind signatures, multiparty computation—the usual cryptography suspects, though still not plug-and-play at national scale.

• Chaumian eCash 2.0: BIS’s Tourbillon prototype tested anonymous, quantum-resistant tokens that can still be audited for counterfeits.

Europe is pushing hardest on “high privacy.” The US prefers to mumble vaguely about “balancing innovation and compliance.”

Offline payments: the holy grail nobody has solved

Everyone wants cash-like resilience—value that changes hands without network coverage. The BIS Polaris handbook lays out the requirements: tamper-resistant hardware, risk caps, reconciliation protocols, and a tolerance for lost devices. But no one has rolled out a national-scale solution yet. Offline CBDC remains the most technically gnarly corner of the map.

Field lessons: what went wrong and right

• DCash (Eastern Caribbean): The network went dark because someone forgot to renew a security certificate. Let that sink in: a digital currency taken down by the IT equivalent of an overdue library book.

• Sand Dollar (Bahamas): First-mover advantage, but still struggling with adoption. The tech works, the people are ambivalent.

• eNaira (Nigeria): Same story—big launch, lukewarm uptake. Reminds us that you can build the rails, but you can’t force the train to run.

• JAM-DEX (Jamaica): Got attention by literally paying people to sign up. Adoption through incentives—go figure.

The cross-border obsession

Domestic CBDCs are one thing. The real prize is cross-border payments: instant, cheap settlement without correspondent banks clipping the ticket.

• mBridge (China, UAE, Thailand, Hong Kong): Live MVP for wholesale settlement across currencies.

• Project Cedar (NY Fed): Demonstrated atomic FX settlement in seconds.

• Project Jura & Helvetia (Europe/Switzerland): Proved delivery-versus-payment on tokenized assets with wholesale CBDC.

• Icebreaker (Nordics + Israel): Hub-and-spoke model for retail CBDCs exchanging across borders.

The tech works. The sticking point is governance—who runs the hub, who enforces rules, and who eats the cost of failure.

So what’s the “safe” design?

If you distill hundreds of pages of public research, you get a recipe:

• Two-tier distribution with a central bank core and intermediaries at the edge.

• API-first architecture so wallets and fintechs can innovate without destabilizing the base.

• Minimal core ledger, leaving programmability and policy knobs to the wallet/API layer.

• Privacy-enhancing features baked in early, with selective disclosure as the default.

• Dedicated offline subsystem with risk caps and secure hardware.

• Interoperability plan from day one, whether through shared platforms (mBridge), interlinked ledgers (Jura), or hub-and-spoke models (Icebreaker).

And above all: operational discipline. The DCash outage taught everyone that grand designs crumble if you forget to renew a certificate.

The open debates

• How much privacy is enough?

• Should retail or wholesale CBDC come first?

• Can offline ever really be secure?

• Do central banks risk crowding out private innovation?

• Who actually governs cross-border corridors?

None of these questions have neat answers, which is why CBDC papers read like Choose-Your-Own-Adventure novels.

Final thought

CBDCs aren’t just a monetary experiment. They’re a stress test of how much trust people are willing to hand back to central banks in a digital age. The architecture is emerging—two-tier, API-driven, privacy-tempered—but the politics will decide if anyone actually uses the thing.

Money is already mostly digital. The real question is whether the next upgrade to the operating system comes from the public sector, the private sector, or some uneasy hybrid.

Israeli Spying on America: The Cases Washington Can’t Erase

Allies spy on allies. Everyone in intelligence knows it, but the public hates to admit it. When it comes to Israel and the United States, the espionage trail isn’t rumor—it’s court records, DOJ press releases, and declassified intelligence assessments. For decades, Israel has run some of the most aggressive collection efforts inside America, and Washington has responded with a mix of prosecutions, cover-ups, and shrugs.

Cognitive Dissonance


Here’s some of the documented history, stripped of spin.

The Pollard Affair

The name Jonathan Jay Pollard still echoes in counterintelligence circles. Pollard was a Navy intelligence analyst who, between 1984 and 1985, passed highly classified documents to Israel’s LAKAM unit. In 1986 he pled guilty to conspiracy to deliver national defense information to a foreign government.

In 1987 he was sentenced to life in prison, one of the stiffest sentences ever handed to an American spying for an ally (D.C. Circuit opinion). His Israeli handler Aviem Sella was indicted but never extradited. The mastermind, Rafi Eitan, headed LAKAM, which was disbanded in the scandal’s aftermath.

Pollard spent three decades in prison, paroled in 2015, and had his restrictions lifted in 2020. Israel later embraced him as a hero, granting him citizenship.

Ben-Ami Kadish: The Quiet Sequel

In 2008, the FBI arrested Ben-Ami Kadish, a retired mechanical engineer who worked at a U.S. Army research center in New Jersey. Between 1980 and 1985, Kadish had passed classified documents on missile systems and nuclear weapons to—astonishingly—the same Israeli official tied to Pollard: Yossi Yagur.

Kadish pled guilty to conspiracy to act as an unregistered agent of Israel. He was fined $50,000 and received no prison time, largely because of his age. It was a quiet echo of Pollard, but it confirmed a pattern: this wasn’t a one-off operation.

Franklin and the AIPAC Collapse

The 2000s brought the Lawrence Franklin case, where a Pentagon analyst leaked classified information on Iran to two senior AIPAC officials—Steven Rosen and Keith Weissman—and to an Israeli diplomat.

Franklin pled guilty in 2005 under the Espionage Act and was sentenced to over 12 years (later reduced). Rosen and Weissman, however, became the center of a sensational trial. The DOJ tried to prosecute them under the Espionage Act—an extraordinary move against lobbyists—but in 2009, prosecutors dropped all charges.

The collapse of the AIPAC case stands as one of the most glaring examples of politics derailing espionage prosecutions.

The Nozette Sting

In 2009, the FBI launched an undercover sting against Stewart Nozette, a scientist with deep ties to U.S. nuclear and space programs. Agents posed as Mossad operatives. Nozette quickly agreed to sell classified secrets for cash.

In 2011 he pled guilty to attempted espionage and was sentenced to 13 years in prison (DOJ press release).

Israel wasn’t actually involved—the “handlers” were FBI agents—but the fact the FBI used Mossad as bait says a lot about credibility.

Procurement and Nuclear Secrets

Espionage isn’t always cloak-and-dagger. Sometimes it’s paperwork and exports.

  • Richard Kelly Smyth, head of a California company, illegally exported krytrons—nuclear triggers—to Israel in the 1980s. He fled, was arrested in 2001, and pled guilty to export violations (Los Angeles Times coverage).
  • Hollywood producer Arnon Milchan later admitted he had been part of Israel’s clandestine procurement network, helping funnel sensitive U.S. technology into Israeli weapons programs.

And before that, in the 1960s, there was NUMEC—a Pennsylvania plant where highly enriched uranium went missing. CIA and Atomic Energy Commission officials long suspected it ended up in Israel. The case was never prosecuted, but declassified memos show the suspicions.

What U.S. Intelligence Really Thinks

For anyone tempted to dismiss these as relics of the Cold War, the U.S. intelligence community has said otherwise.

  • A 2008 NSA memo, revealed by Edward Snowden and published by The Guardian, described Israel as a “good SIGINT partner” but admitted: “they target us to learn our positions” on Middle East issues.
  • A National Intelligence Estimate ranked Israel as the third most aggressive intelligence service against the United States, behind only China and Russia.

This is not internet rumor—it’s the official assessment of American intelligence agencies.

Spyware: The 21st Century Front

Today’s espionage is digital, and Israel’s role continues.

  • In 2021, the U.S. Commerce Department blacklisted NSO Group and Candiru, citing their role in surveillance of U.S. persons (Federal Register notice).
  • In 2024, the Treasury Department sanctioned Intellexa, another Israeli-linked spyware consortium, for targeting Americans, including U.S. officials.

The message was clear: Israeli-linked surveillance firms aren’t just shady—they’re national security threats.

Allegations That Didn’t Stick

Some claims remain “officially” unproven.

  • The “Israeli art students” of 2001: DEA documented suspicious door-to-door visits near federal offices. DOJ said there was no substantiated espionage (DEA memo coverage).
  • Alleged Israeli telecom backdoors (Amdocs, Comverse): heavily reported post-9/11, but no charges or official findings ever confirmed them (Fox News archive).

The Pattern

Put all this together, and the picture is plain:

  • Classic espionage: Pollard, Kadish, Franklin, Nozette.
  • Illegal procurement: Smyth, Milchan, possibly NUMEC.
  • Intelligence assessments: Israel ranked as one of the top collectors against the U.S.
  • Modern cyber: NSO, Candiru, Intellexa sanctioned for targeting Americans.

The U.S. has prosecuted when it could, quietly dropped cases when it couldn’t, and buried scandals when politics demanded it.

Conclusion

Allies spy on allies. That’s the way of the world. But the United States has spent decades pretending Israel doesn’t spy on it. That’s the lie.

From stolen nuclear secrets to aggressive lobbying pipelines, from FBI stings to modern spyware hacks, the history is public and undeniable. Court dockets, declassified documents, and sanctions lists tell the story.

The real scandal isn’t that Israel spies—it’s that the American public is told it doesn’t happen.

The Partisan Road to Tyranny: George Washington’s Fatal Prediction

MKitch3|Sept 20,2025

This post continues the thread I began in an earlier article, Principles of Tyranny. Part of the inspiration for this addition comes from the Tenth Amendment Center. I’m going to keep hammering on the theme of tyranny, because it’s not a subject that can be brushed off in a single essay. Future posts will dig even deeper, each one adding more detail and context.

It’s an essential topic—one that every American should be well-versed in and ready to call out wherever it rears its head.

The Partisan Road to Tyranny: George Washington’s Fatal Prediction

George Washington’s Fatal Warning and Prediction

“A frightful despotism.”

George Washington knew what was coming. His Farewell Address, published on September 19, 1796 in the American Daily Advertiser, wasn’t just a retirement notice. It was a dire warning against things like skyrocketing debt and entangling foreign alliances.

But his sharpest, most prophetic warnings were about political parties and the constant fight for power they would unleash, a fight that could only end in total tyranny

A WARNING FOR THE AGES

Washington saw political parties as such a great threat because they were the most dangerous expression of a deeper poison: the mindset of putting party loyalty above all else.

“Let me now take a more comprehensive view, & warn you in the most solemn manner against the baneful effects of the Spirit of Party, generally.”

He argued this partisan instinct, while a universal human trait, gets supercharged in a republic where it grows to its most extreme and destructive form.

“This spirit, unfortunately, is inseperable from our nature, having its root in the strongest passions of the human Mind. It exists under different shapes in all Governments, more or less stifled, controuled, or repressed; but in those of the popular form it is seen in its greatest rankness and is truly their worst enemy.”

This mentality inevitably turns politics into an endless cycle of weaponized power and revenge that creates a “frightful despotism.”

“The alternate domination of one faction over another, sharpened by the spirit of revenge natural to party dissention, which in different ages & countries has perpetrated the most horrid enormities, is itself a frightful despotism.”

This chaotic warfare between factions is just a temporary phase, a prelude to something far worse: a stable and permanent tyranny.

“But this leads at length to a more formal and permanent despotism.”

Washington saw the endgame clearly: a population suffering from constant strife will see a dictator not as a threat, but as a welcome relief.

“The disorders & miseries, which result, gradually incline the minds of men to seek security & repose in the absolute power of an Individual: and sooner or later the chief of some prevailing faction more able or more fortunate than his competitors, turns this disposition to the purposes of his own elevation, on the ruins of Public Liberty.”

THE DAILY DAMAGE

Washington saw two threats: immediate and long-term. Permanent despotism lay far ahead in the future. But the daily rot of partisanship was the immediate disease paving the road to get there.

“Without looking forward to an extremity of this kind (which nevertheless ought not to be entirely out of sight) the common & continual mischiefs of the spirit of Party are sufficient to make it the interest and the duty of a wise People to discourage and restrain it.”

He laid out the specific consequences: a government that can’t function (don’t threaten us with a good time!), a public poisoned by paranoia, and mobs in the streets.

“It serves always to distract the Public Councils and enfeeble the Public Administration. It agitates the Community with ill founded jealousies and false alarms, kindles the animosity of one part against another, foments occasionally riot & insurrection.”

Worse, he warned that these internal divisions act as an open invitation for foreign enemies to corrupt the entire system.

“It opens the door to foreign influence & corruption, which find a facilitated access to the government itself through the channels of party passions. Thus the policy and the will of one country, are subjected to the policy and will of another.”

FUEL FOR THE FIRE

Washington conceded a critical point: under a king, political factions can act as a useful check on absolute power.

“There is an opinion that parties in free countries are useful checks upon the Administration of the Government and serve to keep alive the spirit of Liberty. This within certain limits is probably true—and in Governments of a Monarchical cast Patriotism may look with endulgence, if not with favour, upon the spirit of party.”

But in a republic, he argued, that same spirit is not a check on power; it’s gasoline poured on a fire.

“But in those of the popular character, in Governments purely elective, it is a spirit not to be encouraged. From their natural tendency, it is certain there will always be enough of that spirit for every salutary purpose. And there being constant danger of excess, the effort ought to be, by force of public opinion, to mitigate & assuage it. A fire not to be quenched; it demands a uniform vigilance to prevent its bursting into a flame, lest instead of warming it should consume.”

He then connected the dots. The partisan firefight inevitably tempts the winners to ignore the Constitution and consolidate power.

“It is important, likewise, that the habits of thinking in a free Country should inspire caution, in those entrusted with its administration, to confine themselves within their respective Constitutional spheres, avoiding in the exercise of the Powers of one department to encroach upon another. The spirit of encroachment tends to consolidate the powers of all the departments in one, and thus to create whatever the form of government, a real despotism.”

WEAPON AGAINST FREEDOM

Washington built his case for the Constitution’s design on a brutally honest assessment of human nature: people are addicted to power and gladly abuse it.

“A just estimate of that love of power, and proneness to abuse it, which predominates in the human heart is sufficient to satisfy us of the truth of this position.”

Because of this, he argued that guarding these boundaries is just as important as drawing them.

“The necessity of reciprocal checks in the exercise of political power; by dividing and distributing it into different depositories, & constituting each the Guardian of the Public Weal against invasions by the others, has been evinced by experiments ancient & modern; some of them in our country & under our own eyes. To preserve them must be as necessary as to institute them.”

Washington pointed to the amendment process as the legal way to change things. Don’t like how power is divided? Use the process. It’s also a reminder that the people are in charge, not the government.

“If in the opinion of the People, the distribution or modification of the Constitutional powers be in any particular wrong, let it be corrected by an amendment in the way which the Constitution designates.”

But he warned that ignoring the rules to achieve a short-term goal – no matter how noble it seems – is the classic tool of tyrants: a weapon to destroy freedom.

“But let there be no change by usurpation; for though this, in one instance, may be the instrument of good, it is the customary weapon by which free governments are destroyed.”

THE BRUTAL TRUTH

The largest government in the history of the world loves it when the people fight among themselves.

This creates a vicious feedback loop. The bigger the power in government, the more vicious the fight to control it. And the more vicious the fight, the more power people demand the government take to restore order.

It’s the exact cycle Washington warned would produce a “frightful” and “permanent despotism.”

The end result? “The ruins of public liberty.”

These are George Washington’s farewell warnings that almost everyone ignores today – and if we don’t heed them, the worst is yet to come.



White Paper: Constitutional Supremacy vs. Judicial Supremacy in the United States

MKitch3|Sept 19, 2025


Executive Summary

The Constitution of the United States explicitly declares itself—and laws made in pursuance thereof—as the supreme law of the land (Article VI, Clause 2). Nowhere does it elevate the Supreme Court to that status. Yet over time, through practice and precedent, the Court has come to be treated as the final arbiter of constitutional meaning. This paper examines the historical roots of this transformation, the warnings issued by presidents and founders against judicial supremacy, the legal and political events that entrenched it, and the implications for American constitutional government today.

I. Constitutional Text: What the Founders Wrote

Article VI, Clause 2 (Supremacy Clause):

“This Constitution, and the Laws of the United States which shall be made in Pursuance thereof; and all Treaties made, or which shall be made, under the Authority of the United States, shall be the supreme Law of the Land; and the Judges in every State shall be bound thereby, any Thing in the Constitution or Laws of any State to the Contrary notwithstanding.”

Key features:

  • The Constitution itself is supreme.
  • Laws made pursuant to it are supreme.
  • Judges (state and federal) are bound by it.
  • Nowhere does it say “the Supreme Court’s interpretations are the supreme law.”

The judiciary is established in Article III, with jurisdiction defined, but there is no explicit claim of “judicial supremacy.” The very idea of the Court being the “final word” was created later, politically and culturally.

II. The Birth of Judicial Review

Marbury v. Madison (1803):

Chief Justice John Marshall declared it the duty of the judiciary “to say what the law is.” This was the first assertion of judicial review: the idea that courts could strike down laws inconsistent with the Constitution.

Marshall: “It is emphatically the province and duty of the judicial department to say what the law is.”

The Constitution never states this directly. Judicial review was widely accepted as reasonable, but the claim that the Court’s interpretations are binding on everyone—forever—was a leap.

III. Early Resistance to Judicial Supremacy

Jefferson’s Warnings

Thomas Jefferson fiercely opposed judicial supremacy:

  • 1820 Letter to William Jarvis:
    You seem to consider the judges as the ultimate arbiters of all constitutional questions; a very dangerous doctrine indeed, and one which would place us under the despotism of an oligarchy.”
  • He argued that each branch had the equal right to interpret the Constitution:
    The Constitution, on this hypothesis, is a mere thing of wax in the hands of the judiciary, which they may twist and shape into any form they please.”

Jefferson’s philosophy: every branch has the duty to uphold the Constitution, not defer to judges.

Jackson’s Defiance

President Andrew Jackson rejected judicial supremacy during the Worcester v. Georgia controversy (1832). While the quote “John Marshall has made his decision; now let him enforce it” is apocryphal, Jackson did ignore the Court’s decision, demonstrating his belief that the judiciary did not rule over the executive branch.

IV. Lincoln and the Civil War Context

Abraham Lincoln, confronting the Dred Scott v. Sandford (1857) decision, argued that while Court decisions bind the parties to a case, they do not dictate national policy:

  • First Inaugural Address (1861):
    “The candid citizen must confess that if the policy of the government upon vital questions affecting the whole people is to be irrevocably fixed by decisions of the Supreme Court… the people will have ceased to be their own rulers, having to that extent resigned their government into the hands of that eminent tribunal.”

Lincoln respected Court rulings in limited scope but denied the notion that Dred Scott defined the Constitution forever.

V. The 20th Century Rise of Judicial Supremacy

Post–Civil War Developments

  • The Court began asserting broader constitutional interpretations in commerce and civil rights cases.
  • Precedent hardened around the idea that the Court’s rulings were binding on all levels of government.

Civil Rights Era

  • Brown v. Board of Education (1954) held racial segregation unconstitutional. Its moral force and federal enforcement cemented the Court as the “final word.”
  • President Eisenhower used troops to enforce Brown in Little Rock (1957), showing executive backing.

This set a new standard: Court rulings would be treated as binding constitutional commands, not mere interpretations.

VI. Modern Expansion of Judicial Supremacy

Key examples of the Court reshaping law and policy:

  • Roe v. Wade (1973): Created a national right to abortion.
  • Obergefell v. Hodges (2015): Legalized same-sex marriage nationwide.
  • Citizens United v. FEC (2010): Redefined campaign finance as protected speech.
  • Dobbs v. Jackson (2022): Overturned Roe.

Each of these cases demonstrates the Court effectively setting national policy—without legislation. Critics argue this elevates nine unelected justices above Congress, the President, and the people.

VII. Departmentalism vs. Judicial Supremacy

  • Judicial Supremacy: The Court is the final interpreter; its rulings bind all.
  • Departmentalism (Jefferson, Jackson, Lincoln): Each branch has equal right and duty to interpret the Constitution.

Departmentalism maintains balance but risks chaos if branches openly defy one another. Judicial supremacy provides stability but risks oligarchy.

VIII. Modern Critiques

  • Left-leaning critiques: Court is captured by conservative ideology and unresponsive to democratic will.
  • Right-leaning critiques: Court has usurped lawmaking powers and imposed liberal social policies.
  • Populist critique (both sides): Nine unelected justices should not decide issues that Congress avoids.

Public trust in the Court has fallen sharply in the 21st century, with polling showing historically low approval after Dobbs (2022).

IX. Rebalancing Options

  1. Constitutional Amendment: Clarify limits on judicial review.
  2. Jurisdiction Stripping: Congress can limit the Court’s jurisdiction under Article III.
  3. Term Limits for Justices: Reduce lifetime judicial entrenchment.
  4. Revive Departmentalism: Presidents and Congress openly interpret the Constitution independently.

X. Conclusion

The U.S. Constitution is the supreme law of the land. The idea that Supreme Court opinions hold that title is a political invention, not a constitutional command. From Jefferson’s denunciations to Lincoln’s resistance, history is filled with leaders who saw the danger of judicial supremacy.

Today, with polarization and declining trust in institutions, America faces the same question Jefferson posed two centuries ago: Do we live under a Constitution, or under the rulings of nine judges? The answer determines whether sovereignty lies with the people and their representatives, or with an unelected judicial elite.

Appendix: Key Quotes

  • Jefferson (1820): “The Constitution… is a mere thing of wax in the hands of the judiciary.”
  • Jackson (1832): “The opinion of the judges has no more authority over Congress than the opinion of Congress has over the judges.”
  • Lincoln (1861): “The people will have ceased to be their own rulers… resigned their government into the hands of that eminent tribunal.”

Appendix: Timeline of Major Cases and Events Shaping Judicial Supremacy

Early Republic and Foundations

1787 – U.S. Constitution Ratified

  • Article VI establishes the Constitution (and laws made in pursuance thereof) as the supreme law of the land.
  • No explicit mention of judicial supremacy.

1791 – First Bank of the United States

  • Early dispute over implied powers. Hamilton (pro) vs. Jefferson (anti). Congress charters the Bank anyway.

1803 – Marbury v. Madison

  • Chief Justice John Marshall establishes judicial review.
  • Quote: “It is emphatically the province and duty of the judicial department to say what the law is.”
  • This creates the precedent that courts may strike down unconstitutional laws.

Expansion of Federal Power

1819 – McCulloch v. Maryland

  • Court upholds Congress’s power to create the Second Bank.
  • Marshall: the Necessary and Proper Clause allows implied powers.
  • Significance: Strengthened national supremacy, widened scope of implied powers, and bolstered judicial authority.

1824 – Gibbons v. Ogden

  • Court broadly interprets the Commerce Clause, expanding federal power.

1832 – Worcester v. Georgia

  • Court rules that Georgia laws had no authority in Cherokee territory.
  • President Jackson refuses to enforce it, exposing limits of judicial authority when the executive resists.

Antebellum Crisis

1857 – Dred Scott v. Sandford

  • Court rules that African Americans cannot be citizens and Congress cannot ban slavery in the territories.
  • Seen as judicial overreach; inflames sectional tensions.
  • Lincoln later rejects the decision’s authority beyond the specific case.

1861 – Lincoln’s First Inaugural Address

  • Rejects judicial supremacy:
    “The candid citizen must confess that if the policy of the government… is to be irrevocably fixed by decisions of the Supreme Court… the people will have ceased to be their own rulers.”

Reconstruction and Early 20th Century

1869 – Texas v. White

  • Court rules secession unconstitutional, bolstering the authority of federal institutions after the Civil War.

1896 – Plessy v. Ferguson

  • Court upholds racial segregation under “separate but equal.”
  • Judicial supremacy entrenches systemic racism for decades.

1913 – Federal Reserve Act

  • Congress creates the Federal Reserve under implied constitutional powers. Judicial precedent (McCulloch) provides cover.

1935 – Gold Clause Cases (Norman v. Baltimore & Ohio Railroad, Perry v. United States)

  • Court upholds Congress’s sweeping power to regulate monetary policy, even voiding private contracts.
  • Judicial blessing of federal financial authority.

Civil Rights and the High Tide of Judicial Supremacy

1954 – Brown v. Board of Education

  • Overturns Plessy, declaring school segregation unconstitutional.
  • Becomes a defining moment for judicial supremacy as national policy-setter.

1957 – Little Rock Crisis

  • President Eisenhower sends troops to enforce Brown.
  • Shows judicial decisions backed by executive force become national law in practice.

1973 – Roe v. Wade

  • Court creates nationwide abortion rights framework.
  • Seen by critics as judicial lawmaking beyond constitutional text.

Late 20th Century – Judicial Policymaking

2000 – Bush v. Gore

  • Court halts Florida recount, effectively deciding the presidential election.
  • Cemented public view of the Court as political actor.

2010 – Citizens United v. FEC

  • Court rules that corporate spending on elections is protected speech.
  • Expands First Amendment interpretations, reshaping campaign finance.

21st Century Polarization

2015 – Obergefell v. Hodges

  • Court legalizes same-sex marriage nationwide.
  • Hailed as a landmark for equality, criticized as judicial overreach bypassing legislatures.

2022 – Dobbs v. Jackson Women’s Health Organization

  • Court overturns Roe v. Wade.
  • Returns abortion regulation to states, sparking fierce debates over judicial power and legitimacy.

Modern Critiques and Challenges

  • Audit the Fed Movement (2000s–present): Efforts to rein in Federal Reserve independence highlight blurred lines between constitutional authority and judicial-accepted precedent.
  • Public Trust Decline (2020s): Polling shows trust in the Supreme Court at record lows, suggesting the doctrine of judicial supremacy is being questioned by both left and right.

Concluding Note on the Timeline

From Marbury to Dobbs, the Court has shaped policy more than any other branch by claiming the power to decide constitutional meaning. But moments like Jackson’s defiance, Lincoln’s resistance, and modern political backlash remind us: the Constitution is supreme law. The Court’s supremacy exists only because other branches and the people consent to it.