White supremacist group inspired teen to kill parents and plot Trump assassination: filing

ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox.

Series: Inside Terrorgram:The Rise and Fall of an Online Hate Network

More in this series

A Wisconsin teenager accused of murdering two family members and plotting to assassinate President Donald Trump was inspired by Terrorgram, a white supremacist network that operated on the Telegram messaging and social media platform for half a decade, according to federal court records.

The Terrorgram community, which has been linked to around three dozen criminal cases around the globe, including at least three mass shootings, was profiled last month in stories and a documentary produced by ProPublica and FRONTLINE.

The court documents allege that Nikita Casap, a 17-year-old from Waukesha, Wisconsin, wrote a three-page manifesto calling for the assassination of Trump in order to “foment a political revolution in the United States and ‘save the white race’ from ‘Jewish controlled politicians.’”

In his manifesto, Casap allegedly encouraged people to read the writings of Juraj Krajčík, a longtime Terrogram figure who murdered two people in an attack on an LGBTQ+ bar in Bratislava, Slovakia, in 2022, according to the court records. Casap also allegedly recommended two publications produced by the Terrorgram Collective, a secretive group that produced alleged hit lists, videos and written publications — including instructions for building bombs and sabotaging critical infrastructure — and distributed them throughout the Terrorgram ecosystem.

Launched in 2019, Terrorgram was a constellation of scores of Telegram channels and chat groups focused on inciting acts of white supremacist terrorism and anti-government sabotage. At the network’s peak, some Terrorgram channels drew thousands of followers. Over the past six months, however, the network has been disrupted as authorities in Canada, the U.S. and Europe have arrested key Terrorgram influencers and community members.

But the violence hasn’t stopped.

Casap in February allegedly shot and killed his mother, Tatiana Casap, and stepfather, Donald Mayer; stole their property; and fled in their Volkswagen Atlas, Waukesha County prosecutors say. He was arrested in Kansas. Prosecutors have charged the teen with two counts of first-degree homicide, as well as identity theft and other theft charges. He is expected to be arraigned on May 7, according to court records.

A witness told local investigators that Casap “was in touch with a male in Russia through the Telegram app and they were planning to overthrow the U.S. government and assassinate President Trump,” according to charging documents in the Wisconsin case.

The newly unsealed federal court filings indicate that the FBI is investigating Casap in connection to the alleged assassination plot.

The bureau declined to comment on the matter.

Last fall, federal prosecutors accused two Americans of acting as leaders of the Terrorgram Collective and charged them with soliciting the murder of federal officials and a host of other terrorism-related offenses. The U.S. State Department has officially designated the Terrorgram Collective as a terrorist organization, as have officials in the United Kingdom and Australia. The two Americans have pleaded not guilty to the charges.

“Do absolutely anything you can that will lead to the collapse of America or any country you live in,” Casap allegedly wrote in his manifesto, according to an FBI affidavit. “This is the only way we can save the White race.”

The teen’s writings and online postings that are cited in the affidavit indicate that he is a believer in militant accelerationism, a concept that has become increasingly popular with neo-Nazis and other right-wing extremists over the past decade. Militant accelerationists aim to speed the collapse of modern society through acts of spectacular violence; from the ruins of today’s democracies, they aim to build all-white ethno-states organized on fascist principles.

Matthew Kriner, executive director of the Institute for Countering Digital Extremism, a nonprofit think tank, called the alleged Casap plot unique. “It’s the first time we’re explicitly seeing an individual tie an accelerationist act or plot with the president of the United States as a means of collapsing society,” Kriner said. “I think what we have here is a fairly clear-cut case of an individual who is being groomed to take drastic terrorist action in an accelerationist manner.”

Casap’s public defender could not be reached for comment.

A Telegram spokesperson said, “Telegram supports the peaceful exchange of ideas; however, calls for violence are strictly prohibited by our Terms of Service and are removed proactively as well as in response to user reports."

A ProPublica and FRONTLINE review shows that Casap was recently active in at least five extremist Telegram channels or chat groups, including a Russian-language neo-Nazi chat in which posters uploaded detailed instructions for crafting explosives, poisons and improvised firearms. He was also a member of a chat group with more than 4,300 participants run by the Misanthropic Division, a global neo-Nazi organization.

Casap, according to the federal documents, also sought out information online about the Order of Nine Angles, a cult that blends Satanic concepts and Nazi ideology and has increasingly turned to Telegram to recruit and proselytize.

“This is a clear example of how Terrorgram continues to influence murder,” said Jennefer Harper, a researcher who studies online extremism. “Nikita was influenced online by an assortment of ideologies and groups that intersect with the Terrorgram ecosphere.”

Neo-Nazi Telegram users panic amid arrest of alleged online extremist leaders

The recent crackdown on the social media platform Telegram has triggered waves of panic among the neo-Nazis who have made the app their headquarters for posting hate and planning violence.

“Shut It Down,” one person posted in a white supremacist chat on Tuesday, hours after Telegram founder Pavel Durov announced he would begin sharing some users’ identifying information with law enforcement.

With over 900 million users around the globe, Telegram has been both revered and reviled for its hands-off approach to moderating posted content. The platform made headlines this summer when French authorities arrested Durov, seeking to hold him responsible for illegal activity that has been conducted or facilitated on the platform — including organized drug trafficking, child pornography and fraud.

Durov has called the charges “misguided.” But he acknowledged that criminals have abused the platform and promised in a Telegram post to “significantly improve things in this regard.” Durov’s announcement marked a considerable policy shift: He said Telegram will now share the IP addresses and phone numbers of users who violate the platform’s rules with authorities “in response to valid legal requests.”

This was the second time in weeks that extremists had called on their brethren to abandon Telegram. The first flurry of panic followed indictments by the Justice Department of two alleged leaders of the Terrorgram Collective, a group of white supremacists accused of inciting others on the platform to commit racist killings.

“EVERYONE LEAVE CHAT,” posted the administrator of a group chat allied with the Terrorgram Collective the day the indictments were announced.

An analysis by ProPublica and FRONTLINE, however, shows that despite the wave of early panic, users didn’t initially leave the platform. Instead there was a surge in activity on Terrorgram-aligned channels and chats, as allies of the group tried to rally support for their comrades in custody, railed against the government’s actions and sought to oust users they believed to be federal agents.

Federal prosecutors in the U.S. have charged Dallas Humber and Matthew Allison, two alleged leaders of the Terrorgram Collective, with a slew of felonies including soliciting the murder of government officials on Telegram.

Humber has pleaded not guilty. She made a brief appearance in federal court in Sacramento, California, on Sept. 13, during which she was denied bail. Humber, shackled and clad in orange-and-white jail garb, said nothing. Allison, who has not yet entered a plea, was arrested in Idaho but will face trial in California.

Attorneys for Humber and Allison did not respond to separate requests for comment.

The two are alleged Accelerationists, a subset of white supremacists intent on accelerating the collapse of today’s liberal democracies and replacing them with all-white ethno-states, according to the indictment.

Through a constellation of linked Telegram channels, the collective distributes books, audio recordings, videos, posters and calendars celebrating white supremacist mass murderers, such as Brenton Tarrant, who in early 2019 stormed two mosques in New Zealand and shot to death 51 Muslim worshippers.

The group explicitly aims to inspire similar attacks, offering would-be terrorists tips and tools for carrying out spectacular acts of violence and sabotage. A now-defunct channel allegedly run by Humber, for example, featured instructions on how to make a vast array of potent explosives. After their arrests, channels allegedly run by Humber and Allison went silent.

But within days of the indictments, an anonymous Telegram user had set up a new channel “dedicated to updates about their situation.”

“I understand that some people may not like these two, however, their arrests and possible prosecution affects all of us,” the user wrote. The criminal case, they argued, “shows us that Telegram is under attack globally.”

The channel referred to Humber and Allison by their alleged Telegram usernames, Ryder_Returns and Btc.

A long-running neo-Nazi channel with more than 13,000 subscribers posted a lengthy screed. “We are very sad to hear of the egregious overreach of government powers with these arrests,” stated the poster, who used coded language to suggest that white supremacists should forcefully overthrow the U.S. government.

One group closely aligned with the Terrorgram Collective warned like-minded followers that federal agents could be lurking. In a post, it said that it had been in contact with Humber since her arrest, and that she gave them information about an undercover FBI agent who had infiltrated the Accelerationist scene.

“If this person is in your chats, remove them,” said one post, referring to the supposed agent. “Don’t threaten them. Don’t say anything to them. Just remove them from contacts and chats.”

Matthew Kriner, managing director of the Accelerationism Research Consortium, said the Terrorgram Collective had already been badly weakened by a string of arrests in the U.S., Europe and Canada over the past two years. “Overall, the arrests of Humber and Allison are likely the final blow to the Terrorgram Collective,” Kriner said.

In the U.S., federal agents this year have arrested at least two individuals who were allegedly inspired by the group. The first was Alexander Lightner, a 26-year-old construction worker who was apprehended in January during a raid on his Florida home. In a series of Telegram posts, Lightner said he planned to commit a racially or ethnically motivated mass killing, according to prosecutors. Court records show that agents found a manual produced by the Terrorgram Collective and a copy of “Mein Kampf” in Lightner’s home.

Lightner has pleaded not guilty to charges of making online threats and possessing an illegal handgun silencer. His attorney declined to comment.

This summer, prosecutors charged Andrew Takhistov of New Jersey with soliciting an individual to destroy a power plant. Takhistov allegedly shared a PDF copy of a different Terrorgram publication with an undercover agent. The 261-page manual includes detailed instructions for building explosives and encourages readers to destabilize society through murder and industrial sabotage. Takhistov has not yet entered a plea. His attorney did not respond to a request for comment.

Durov’s August arrest also sent a spasm of fear through the extremist scene. “It’s over,” one user of a white supremacist chat group declared.

“Does this mean I have to Nuke my Telegram account?” asked another member of the group. “I just got on.”

Their concerns grew when Telegram removed language from its FAQ page stating that the company would not comply with law enforcement requests regarding users in private Telegram chats.

Alarmed, Accelerationists on Telegram discussed the feasibility of finding another online sanctuary. Some considered the messaging service Signal, but others warned it was likely controlled by U.S. intelligence agencies. One post suggested users migrate to more obscure encrypted messaging apps like Briar and Session.

In extremist circles, there was more discussion about fleeing Telegram after Durov’s announcement this week. “Time is running out on this sinking ship,” wrote one user. “So we’re ditching Telegram?” asked another.

“Every time we have a success against one of them, they learn, they adapt, they modify,” said Don Robinson, who as an FBI agent conducted infiltration operations against white supremacists. “Extremists can simply pick up and move to a new platform once they are de-platformed for content abuses. This leaves law enforcement and intelligence agencies playing an endless game of Whac-a-Mole to identify where the next threat may be coming from.”

Neo-Nazi Telegram users panic amid arrest of alleged leaders of online extremist group

ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox.

The recent crackdown on the social media platform Telegram has triggered waves of panic among the neo-Nazis who have made the app their headquarters for posting hate and planning violence.

“Shut It Down,” one person posted in a white supremacist chat on Tuesday, hours after Telegram founder Pavel Durov announced he would begin sharing some users’ identifying information with law enforcement.

With over 900 million users around the globe, Telegram has been both revered and reviled for its hands-off approach to moderating posted content. The platform made headlines this summer when French authorities arrested Durov, seeking to hold him responsible for illegal activity that has been conducted or facilitated on the platform — including organized drug trafficking, child pornography and fraud.

Durov has called the charges “misguided.” But he acknowledged that criminals have abused the platform and promised in a Telegram post to “significantly improve things in this regard.” Durov’s announcement marked a considerable policy shift: He said Telegram will now share the IP addresses and phone numbers of users who violate the platform’s rules with authorities “in response to valid legal requests.”

This was the second time in weeks that extremists had called on their brethren to abandon Telegram. The first flurry of panic followed indictments by the Justice Department of two alleged leaders of the Terrorgram Collective, a group of white supremacists accused of inciting others on the platform to commit racist killings.

“EVERYONE LEAVE CHAT,” posted the administrator of a group chat allied with the Terrorgram Collective the day the indictments were announced.

An analysis by ProPublica and FRONTLINE, however, shows that despite the wave of early panic, users didn’t initially leave the platform. Instead there was a surge in activity on Terrorgram-aligned channels and chats, as allies of the group tried to rally support for their comrades in custody, railed against the government’s actions and sought to oust users they believed to be federal agents.

Federal prosecutors in the U.S. have charged Dallas Humber and Matthew Allison, two alleged leaders of the Terrorgram Collective, with a slew of felonies including soliciting the murder of government officials on Telegram.

Humber has pleaded not guilty. She made a brief appearance in federal court in Sacramento, California, on Sept. 13, during which she was denied bail. Humber, shackled and clad in orange-and-white jail garb, said nothing. Allison, who has not yet entered a plea, was arrested in Idaho but will face trial in California.

Attorneys for Humber and Allison did not respond to separate requests for comment.

The two are alleged Accelerationists, a subset of white supremacists intent on accelerating the collapse of today’s liberal democracies and replacing them with all-white ethno-states, according to the indictment.

Through a constellation of linked Telegram channels, the collective distributes books, audio recordings, videos, posters and calendars celebrating white supremacist mass murderers, such as Brenton Tarrant, who in early 2019 stormed two mosques in New Zealand and shot to death 51 Muslim worshippers.

The group explicitly aims to inspire similar attacks, offering would-be terrorists tips and tools for carrying out spectacular acts of violence and sabotage. A now-defunct channel allegedly run by Humber, for example, featured instructions on how to make a vast array of potent explosives. After their arrests, channels allegedly run by Humber and Allison went silent.

But within days of the indictments, an anonymous Telegram user had set up a new channel “dedicated to updates about their situation.”

“I understand that some people may not like these two, however, their arrests and possible prosecution affects all of us,” the user wrote. The criminal case, they argued, “shows us that Telegram is under attack globally.”

The channel referred to Humber and Allison by their alleged Telegram usernames, Ryder_Returns and Btc.

A long-running neo-Nazi channel with more than 13,000 subscribers posted a lengthy screed. “We are very sad to hear of the egregious overreach of government powers with these arrests,” stated the poster, who used coded language to suggest that white supremacists should forcefully overthrow the U.S. government.

One group closely aligned with the Terrorgram Collective warned like-minded followers that federal agents could be lurking. In a post, it said that it had been in contact with Humber since her arrest, and that she gave them information about an undercover FBI agent who had infiltrated the Accelerationist scene.

“If this person is in your chats, remove them,” said one post, referring to the supposed agent. “Don’t threaten them. Don’t say anything to them. Just remove them from contacts and chats.”

Matthew Kriner, managing director of the Accelerationism Research Consortium, said the Terrorgram Collective had already been badly weakened by a string of arrests in the U.S., Europe and Canada over the past two years. “Overall, the arrests of Humber and Allison are likely the final blow to the Terrorgram Collective,” Kriner said.

In the U.S., federal agents this year have arrested at least two individuals who were allegedly inspired by the group. The first was Alexander Lightner, a 26-year-old construction worker who was apprehended in January during a raid on his Florida home. In a series of Telegram posts, Lightner said he planned to commit a racially or ethnically motivated mass killing, according to prosecutors. Court records show that agents found a manual produced by the Terrorgram Collective and a copy of “Mein Kampf” in Lightner’s home.

Lightner has pleaded not guilty to charges of making online threats and possessing an illegal handgun silencer. His attorney declined to comment.

This summer, prosecutors charged Andrew Takhistov of New Jersey with soliciting an individual to destroy a power plant. Takhistov allegedly shared a PDF copy of a different Terrorgram publication with an undercover agent. The 261-page manual includes detailed instructions for building explosives and encourages readers to destabilize society through murder and industrial sabotage. Takhistov has not yet entered a plea. His attorney did not respond to a request for comment.

Durov’s August arrest also sent a spasm of fear through the extremist scene. “It’s over,” one user of a white supremacist chat group declared.

“Does this mean I have to Nuke my Telegram account?” asked another member of the group. “I just got on.”

Their concerns grew when Telegram removed language from its FAQ page stating that the company would not comply with law enforcement requests regarding users in private Telegram chats.

Alarmed, Accelerationists on Telegram discussed the feasibility of finding another online sanctuary. Some considered the messaging service Signal, but others warned it was likely controlled by U.S. intelligence agencies. One post suggested users migrate to more obscure encrypted messaging apps like Briar and Session.

In extremist circles, there was more discussion about fleeing Telegram after Durov’s announcement this week. “Time is running out on this sinking ship,” wrote one user. “So we’re ditching Telegram?” asked another.

“Every time we have a success against one of them, they learn, they adapt, they modify,” said Don Robinson, who as an FBI agent conducted infiltration operations against white supremacists. “Extremists can simply pick up and move to a new platform once they are de-platformed for content abuses. This leaves law enforcement and intelligence agencies playing an endless game of Whac-a-Mole to identify where the next threat may be coming from.”

How Telegram became the 'center of gravity' for a new breed of domestic terrorists

ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox.

In late December, a 26-year-old construction worker in Sarasota County, Florida, used his phone to send a flurry of ominous online posts.

Alexander Lightner, tapping away on his Samsung Galaxy, announced his intention to commit mass murder, according to federal court records. He used the coded language of a new breed of neo-Nazis who call themselves Accelerationists. Lightner wrote that he planned to become a “saint” — the term followers use for someone who advances their racist cause through lethal acts of terror — and to set a new “Highscore,” or death toll.

Lightner launched what federal prosecutors allege were threats on Telegram, the sprawling, no-holds-barred platform that has become a hive for the movement. Accelerationists aim to speed the collapse of modern civilization and create a white ethno-state from the ashes of today’s democracies. Deep in the chatter of the platform’s roughly 900 million users, these extremists have created a constellation of Telegram channels where they encourage followers like Lightner to assassinate political leaders, sabotage power stations and railways, and commit mass murder.

A week after firing off his alleged threats on Telegram, Lightner woke up from a nap at his home to his father’s shouts: “Whoa, whoa, whoa. What’s this? Are these people here for us?”

Lightner threw an illegal, homemade silencer into a laundry basket, according to a summary of his interview with federal agents. Then he stepped into the sunlight. In his front yard, agents in camouflage and body armor pointed rifles at him. An armored vehicle faced his family home, its massive battering ram aimed at the front door.

An FBI agent asked Lightner if he knew why federal agents were at his door.

Lightner answered simply: “Telegram,” according to court records.

Late last month, Telegram burst into the news with another arrest related to alleged criminal activity on the giant messaging and social media platform. This time, the man in police custody was the company’s founder, Pavel Durov. French authorities detained the Russian-born billionaire after his plane touched down at an airport a few miles north of Paris.

French prosecutors issued preliminary charges against Durov last Wednesday related to alleged criminal activity on his platform. The allegations include organized fraud, drug trafficking and possession of pornographic images of minors, as well as refusal to cooperate with authorities, according to a press release by the Paris public prosecutor.

David-Olivier Kaminski, a lawyer for Durov, could not be reached for comment. French news reports quoted him saying that it was “totally absurd to think that the person in charge of a social network could be implicated in criminal acts that don’t concern him, directly or indirectly.”

The platform Durov created has long been both applauded and derided for its extreme commitment to free speech and for rebuffing inquiries from both U.S. and foreign law enforcement agencies, which have sought to gather information about alleged criminal activity on the platform.

“They are exceedingly unhelpful,” said Rebecca Weiner, the New York Police Department’s deputy commissioner of intelligence and counterterrorism. Weiner, who oversees one of the world’s largest metropolitan counterterrorism units, said the platform was notable for “being a center of gravity for a wide range of extremist content” and for its “unwillingness to work with law enforcement.”

Telegram’s ease of use, its huge public channels and the ability to encrypt private conversations have helped fuel its global appeal. Ukrainian President Volodymyr Zelensky used the app to rally his compatriots to repel the Russian invasion. Activists in Hong Kong turned to Telegram to organize demonstrations against a repressive law. In Belarus, pro-democracy forces used the platform to fight back against election fraud.

But the platform has also served as the online home of the Russian mercenary company Wagner Group, which has posted gruesome videos of extrajudicial killings. In April, the British government targeted the Terrorgram Collective, a subset of Telegram users who promote racially and ethnically motivated terrorism to people like Lightner, making it a crime to support or belong to the group. And more recently, the service played a key role in fomenting the anti-immigrant riots that swept across the United Kingdom.

ProPublica and FRONTLINE have been investigating Telegram’s role in a string of recent alleged far-right acts of sabotage and murder, and how the company’s inaction allowed extremists to plan and even advertise their crimes. Researchers have long warned that Telegram routinely allows extremists to share propaganda aimed at inciting violence, noting that the Islamic State group and al-Qaida were able to use the service for years with little interference.

“Telegram plays a key role in the perpetuation of militant accelerationism,” said Michael Loadenthal, a research professor at the University of Cincinnati and director of the Prosecution Project, which tracks felony cases involving political violence in the U.S. The company, he said, “has shown that deplatforming violent and hateful content is not its priority.”

Before Durov’s arrest, a Telegram spokesperson responded to questions from ProPublica and FRONTLINE in messages on the platform. The spokesperson said that the company bars users from calling for acts of violence, adding that moderators remove millions of pieces of harmful content from the platform every day. “As Telegram grows, it will continue to solve potential moderation problems with efficiency, innovation and respect for privacy and free speech,” the spokesperson, who used the name Remi Vaughn, said in the messages.

Yet ProPublica and FRONTLINE found that Telegram today is the main nexus of far-right Accelerationist crime. Law enforcement agencies on both sides of the Atlantic have interrupted a series of criminal schemes, including:

  • In July, a Georgian man accused of leading an Accelerationist terror group was arrested in Europe for allegedly soliciting people to carry out murders and bombings in the U.S. Michail Chkhikvishvili allegedly used Telegram to communicate and distribute his group’s propaganda and is facing charges in New York. He is being held in Moldova pending extradition, according to Wired. ProPublica and FRONTLINE could not locate counsel for him.
  • The same month, federal prosecutors charged an Accelerationist named Andrew Takhistov with plotting to destroy an energy facility in New Jersey. They allege he used Telegram to incite racial violence and share a how-to guide for white supremacist terrorism that included instructions on the use of Mylar balloons and Molotov cocktails to damage power substations. An attorney for Takhistov did not respond to a request for comment.
  • In June, Manhattan prosecutors announced charges against Hayden Espinosa, accusing the Texas man of selling illegal guns and firearm components through a Telegram channel aimed at white supremacists and Accelerationists. Espinosa allegedly used a contraband phone to sell weapons and gun parts while incarcerated in federal prison. He has pleaded not guilty.
  • A judge in England recently sentenced a British man to eight years in prison for plotting to carry out a suicide bombing at a synagogue. According to the Crown Prosecution Service, 19-year-old Mason Reynolds was “the administrator of a Telegram channel which shared far right extremist, antisemitic and racist views, as well as manuals on bomb building and how to 3D print firearms.”
  • Brandon Russell, a former leader of the Atomwaffen Division, a now-defunct neo-Nazi group tied to five murders, was charged last year with planning an attack aimed at disabling the power system in Baltimore. Russell and a co-defendant, Sarah Beth Clendaniel, used Telegram to organize the sabotage scheme, according to prosecutors. Clendaniel has pleaded guilty; Russell faces trial later this year. Attorneys for the duo declined to comment.

And then there is Lightner. U.S. prosecutors say in court filings that Lightner went to Telegram to discuss his plans to use a .308-caliber rifle to kill as many people as possible. He remains in jail awaiting trial on federal charges of making threats online and possessing an illegal silencer. He has pleaded not guilty. His attorney declined to comment.

Before Lightner’s arrest, he told an agent from the Bureau of Alcohol, Tobacco, Firearms and Explosives that he was “blackout drunk” at the time of the posts, distraught over a bad breakup. “I was broken and really upset. And I went drinking, and then I did some stupid thing online,” he said, according to a recording of the conversation. He told other agents that he was not planning an act of violence but just wanted someone to notice him and care.

Lightner told federal agents that he started using Telegram in 2015, about two years after the platform launched. The online service grew steadily over the next few years, with the majority of users coming from outside the U.S. Then in 2021, Telegram’s growth exploded after its rival WhatsApp announced a new privacy policy. Some users feared WhatsApp was poised to begin sharing their confidential messages with parent company Facebook, now called Meta. In a Telegram post, Durov boasted that his platform was experiencing “the largest digital migration in human history,” claiming that 25 million new users joined Telegram in 72 hours.

That same month, in the U.S., Telegram got a bump in users when major social media platforms including Facebook and Twitter ousted former President Donald Trump and many of his most ardent supporters in the aftermath of the Jan. 6 insurrection. Today, Telegram is heavily favored by right-wing extremists, including QAnon followers, Proud Boys, militia members, and white supremacist groups like Patriot Front and the Active Clubs.

Axel Neff, who helped start Telegram, said the company’s core team of about 60 employees, 30 of whom are engineers, is too small to monitor the platform for criminal conduct. “Think about the size of Telegram. There are about a billion users on Telegram every month. A billion!” he said. “Telegram is a massive, massive community. … They are not staffed — and they do not have the capacity — to monitor everything that goes on there.”

Neff said it would be “professional suicide” for Telegram, which has marketed itself as a bastion of unfettered speech, to make a serious effort to moderate content. “I don’t think it is something [Durov] will ever do.”

The company’s privacy policy puts strict parameters around cooperation with law enforcement: “If Telegram receives a court order that confirms you’re a terror suspect, we may disclose your IP address and phone number to the relevant authorities. So far, this has never happened.”

Telegram ignores requests for information from government agencies that aren’t “in line with our values of freedom of speech and protecting people’s private correspondence,” Durov told Tucker Carlson in an interview with the former Fox News host earlier this year. Durov noted that Telegram refused to cooperate with the U.S. congressional committee probing the events of Jan. 6, 2021.

Telegram stores “very limited data” on its users, the Telegram spokesperson told ProPublica and FRONTLINE. “In most cases it is impossible for Telegram to access this data in order to provide it for the authorities,” the spokesperson said. “Police, governments and users are able to report content to Telegram they believe is illegal. Telegram processes these reports according to its terms of service.”

ProPublica and FRONTLINE found that much of the most disturbing content is posted in channels maintained by violent, right-wing Accelerationists, whose ideas have attracted neo-Nazis, Charles Manson admirers and anti-government revolutionaries.

The Terrorgram Collective, the group of Telegram users targeted by the British government’s crackdown, is an alliance of Accelerationists who use an ever-evolving array of Telegram channels to promote terrorism. The group has produced at least three e-books, including a manual celebrating white supremacist mass killers that court documents show was found at Lightner’s home in Florida.

David Skiffington, a former British counterterrorism specialist for London’s Metropolitan Police, said the “proliferation of extremist content” on Telegram “cannot be overstated.”

Other social media platforms such as Steam, Discord and Gab also host extremist-related content, Skiffington said. “But Telegram is by far the most widely used and accessible.”

Skiffington, who now runs the counterterrorism consulting firm DBA Insights, has been monitoring the Terrorgram Collective for years. He said the group’s influencers encourage “angry, white, lonely vulnerable individuals … to commit real-world acts of violence.”

It’s unclear how many people are part of the collective, though law enforcement has arrested individuals in Slovakia, Canada and the U.S. who are allegedly linked to the group.

In Florida, Lightner — or someone using his username, “Death.” — participated in at least 17 extremist Telegram channels, according to an analysis by Miro Dittrich, a co-founder of the Center for Monitoring, Analysis and Strategy, a German organization that studies online disinformation and extremism. Three of the channels were part of the Terrorgram network.

On the day of his arrest, Lightner was asked by a federal agent to explain his most explosive Telegram postings. At first, Lightner said he did not remember the online threats. But when a federal agent read the words back to him, Lightner said he had never seriously considered an act of violence. But he added that he knew that in making the Telegram postings, he was “playing with fire.”

Doris Burke of ProPublica and Tom Jennings and Annie Wong of FRONTLINE contributed reporting.

Inside Google's quest to digitize troops' tissue samples

ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox.

In early February 2016, the security gate at a U.S. military base near Washington, D.C., swung open to admit a Navy doctor accompanying a pair of surprising visitors: two artificial intelligence scientists from Google.

In a cavernous, temperature-controlled warehouse at the Joint Pathology Center, they stood amid stacks holding the crown jewels of the center’s collection: tens of millions of pathology slides containing slivers of skin, tumor biopsies and slices of organs from armed service members and veterans.

Standing with their Navy sponsor behind them, the Google scientists posed for a photograph, beaming.

Mostly unknown to the public, the trove and the staff who study it have long been regarded in pathology circles as vital national resources: Scientists used a dead soldier’s specimen that was archived here to perform the first genetic sequencing of the 1918 Flu.

Google had a confidential plan to turn the collection of slides into an immense archive that — with the help of the company’s burgeoning, and potentially profitable, AI business — could help create tools to aid the diagnosis and treatment of cancer and other diseases. And it would seek first, exclusive dibs to do so.

“The chief concern,” Google’s liaison in the military warned the leaders of the repository, “is keeping this out of the press.”

More than six years later, Google is still laboring to turn this vast collection of human specimens into digital gold.

At least a dozen Defense Department staff members have raised ethical or legal concerns about Google’s quest for service members’ medical data and about the behavior of its military supporters, records reviewed by ProPublica show. Underlying their complaints are concerns about privacy, favoritism and the private use of a sensitive government resource in a time when AI in health care shows both great promise and risk. And some of them worried that Google was upending the center’s own pilot project to digitize its collection for future AI use.

Pathology experts familiar with the collection say the center’s leaders have good reason to be cautious about partnerships with AI companies. “Well designed, correctly validated and ethically implemented [health algorithms] could be game-changing things,” said Dr. Monica E de Baca, chair of the College of American Pathologists’ Council on Informatics and Pathology Innovation. “But until we figure out how to do that well, I’m worried that –knowingly or unknowingly –there will be an awful lot of snake oil sold.”

When it wasn’t chosen to take part in JPC’s pilot project, Google pulled levers in the upper reaches of the Pentagon and in Congress. This year, after lobbying by Google, staff on the House Armed Services Committee quietly inserted language into a report accompanying the Defense Authorization Act that raises doubts about the pathology center’s modernization efforts while providing a path for the tech giant to land future AI work with the center.

Pathology experts call the JPC collection a national treasure, unique in its age, size and breadth. The archive holds more than 31 million blocks of human tissue and 55 million slides. More recent specimens are linked with detailed patient information, including pathologist annotations and case histories. And the repository holds many examples of “edge cases” — diseases so vanishingly rare that many pathologists never see them.

Google sought to gather so many identifying details about the specimens and patients that the repository’s leaders feared it would compromise patients’ anonymity. Discussions became so contentious in 2017 that the leaders of the JPC broke them off.

In an interview with ProPublica, retired Col. Clayton Simon, the former director of the JPC, said Google wanted more than the pathology center felt it could provide. “Ultimately, even through negotiations, we were unable to find a pathway that we legally could do and ethically should do,” Simon said. “And the partnership dissolved.”

But Google didn’t give up. Last year, the center’s current director, Col. Joel Moncur, in response to questions from DOD lawyers, warned that the actions of Google’s chief research partner in the military “could cause a breach of patient privacy and could lead to a scandal that adversely affects the military.”

Google has told the military that the JPC collection holds the “raw materials” for the most significant biotechnology breakthroughs of this decade — “on par with the Human Genome Project in its potential for strategic, clinical, and economic impact.”

All of that made the cache an alluring target for any company hoping to develop health care algorithms. Enormous quantities of medical data are needed to design algorithmic models that can identify patterns a pathologist might miss — and Google and other companies are in a race to gather them. Only a handful of tech companies have the scale to scan, store and analyze a collection of this magnitude on their own. Companies that have submitted plans to compete for aspects of the center’s modernization project include Amazon Web Services, Cerner Corp. and a host of small AI companies.

But no company has been as aggressive as Google, whose parent company, Alphabet, has previously drawn fire for its efforts to gather and crunch medical data. In the United Kingdom, regulators reprimanded a hospital in 2017 for providing data on more than 1.6 million patients, without their understanding, to Alphabet’s AI unit, DeepMind. In 2019, The Wall Street Journal reported that Google had a secret deal, dubbed “Project Nightingale,” with a Catholic health care system that gave it access to data on millions of patients in 21 states, also without the knowledge of patients or doctors. Google responded to the Journal story in a blog post that stated that patient data “cannot and will not be combined with any Google consumer data.”

In a statement, Ted Ladd, a Google spokesperson, attributed the ethics complaints associated with its efforts to work with the repository to an “inter-agency issue” and a “personnel dispute.”

“We had hoped to enable the JPC to digitize its data and, with its permission, develop computer models that would enable researchers and clinicians to improve diagnosis for cancers and other illnesses,” Ladd said, noting that all of Google’s health care partnerships involve “the strictest controls” over data. “Our customers own and manage their data, and we cannot — and do not — use it for any purpose other than explicitly agreed upon by the customer,” Ladd said.

In response to questions from ProPublica, the JPC said none of its de-identified data would be shared during its modernization process unless it met the ethical, regulatory, and legal approvals needed to ensure it was done in the right way.

“The highest priority of the JPC’s digital transformation is to ensure that any de-identified digital slides are used ethically and in a manner that protects patient privacy and military security,” the JPC said.

But some fear that even these safeguards might not be enough. Steven French, a DOD cloud computing engineer assigned to the project, said he was dismayed by the relentlessness of Google’s advocates in the department. Lost in all their discussions about the speed, scale and cost-saving benefits associated with working with Google seemed to be concerns for the interests of the service members whose tissue was the subject of all this maneuvering, French told ProPublica.

“It felt really bad to me,” French said. “Like a slow crush towards the inevitability of some big tech company monetizing it.”

The JPC certainly does need help from tech companies. Underfunded by Congress and long neglected by the Pentagon, it is vulnerable to offers from well-funded rescuers. In spite of its leaders’ pleas, funding for a full-scale modernization project has never materialized. The pathology center’s aging warehouses have been afflicted with water leaks and unwelcome intruders: a marauding family of raccoons.

The story of the pathology center’s long, contentious battle with Google has never been told before. ProPublica’s account is based on internal emails, presentations and memos, as well as interviews with current and former DOD officials, some of whom asked not to be identified because they were not authorized to discuss the matter or for fear of retribution.

Google’s Private Tour

In December 2015, Google began its courtship of the JPC with a bold, unsolicited proposal. The messenger was a junior naval officer, Lt. Cmdr. Niels Olson.

“I’m working with Google on a project to apply machine learning to medical imaging,” Olson wrote to the leaders of the repository. “And it seems like we are at the stage where we need to figure exactly what JPC has.”

A United States Naval Academy physics major and Tulane medical school graduate, Olson worked as a clinical and anatomical pathology resident at the Naval Medical Center in San Diego.

With digitized specimen slides holding massive amounts of data, pathology seemed ripe for the coming AI revolution in medicine, he believed. Olson’s own urgency was heightened in 2014 when his father was diagnosed with prostate cancer.

That year, Olson teamed up with scientists at Google to train software to recognize suspected cancer cells. Google supplied expertise including AI scientists and high-speed, high-resolution scanners. The endeavor had cleared all privacy and review board hurdles. They were scanning Navy patients’ pathology slides at a furious clip, but they needed a larger data set to validate their findings.

Enter the JPC’s archive. Olson learned about the center in medical school. In his email to its leaders in December 2015, Olson attached Google’s eight-page proposal.

Google offered to start the operation by training algorithms with already digitized data in the repository. And it would do this early work “with no exchange of funds.” These types of partnerships free the private parties from having to undergo a competitive bidding process.

Google promised to do the work in a manner that balanced “privacy and ethical considerations.” The government, under the proposal, would own and control the slides and data.

Olson typed a warning: “This is under a non-disclosure agreement with Google, so I need to ask you, do please handle this information appropriately. The chief concern is keeping this out of the press.”

Senior military and civilian staff at the pathology center reacted with alarm. Dr. Francisco Rentas, the head of the archive’s tissue operations, pushed back against the notion of sharing the data with Google.

“As you know, we have the largest pathology repository in the world and a lot of entities will love to get their hands on it, including Google competitors. How do we overcome that?” Rentas asked in an email.

Other leaders had similar reactions. “My concerns are raised when I’m advised to not disclose what seems to be a contractual relationship to the press,” one of the top managers at the pathology center, Col. Edward Stevens, told Olson. Stevens told Olson that giving Google access to this information without a competitive bid could result in litigation from the company’s competitors. Stevens asked: “Does this need to go through an open-source bid?”

But even with these concerns, Simon, the pathology center’s director, was intrigued enough to continue discussions. He invited Olson and Google to inspect the facility.

The warehouse Olson and the Google scientists entered could have served as a set for the final scene of “Raiders of Lost Ark.”

Pathology slides were stacked in aisle canyons, some towering two stories. The slides were arranged in metal trays and cardboard boxes. To access tissue samples, the repository used a retrieval system similar to those found in dry cleaners. The pathology center had just a handful of working scanners. At the pace they were going, it would take centuries to digitize the entire collection.

One person familiar with the repository likened it to the Library of Alexandria, which held the largest archive of knowledge in the ancient world. Myth held that the library was destroyed in a cataclysmic fire lit by Roman invaders, but historians believe the real killer was gradual decay and neglect over centuries.

The military’s tissue library had already played an important role in the advancement of medical knowledge. Its birth in 1862 as the Army Medical Museum was grisly. In a blandly written order in the midst of the Civil War, the Army surgeon general instructed surgeons “diligently to collect and preserve” all specimens of “morbid anatomy, surgical or medical, which may be regarded as valuable.”

Soon the museum’s curator was digging through battlefield trenches to find “many a putrid heap” of hands, feet and other body parts ravaged by disease and war. He and other doctors shipped the remains to Washington in whiskey-filled casks.

Over the next 160 years, the tissue collection outgrew several headquarters, including Washington’s Ford Theater and a nuclear-bomb-proof building near the White House. But the main mission — identifying, studying and reducing the calamitous impact of illnesses and injuries afflicting service members — has remained unchanged in times of war and peace. Each time a military or veterans’ hospital pathologist sent a tissue sample to the pathology center for a second opinion, it was filed away in the repository.

As the archive expanded, the repository’s prestige grew. Its scientists spurred advances in microscopy, cancer and tropical disease research. An institute pathologist named Walter Reed proved that mosquitoes transmit yellow fever, an important discovery in the history of medicine.

For much of its modern history, in addition to serving military and veterans hospitals, the center also provided civilian consultations. The work with elite teaching hospitals gave the center a luster that helped it attract and retain top pathologists.

Congress and DOD leaders questioned why the military should fund civilian work that could be done elsewhere. In 2005, under the congressionally mandated base closure act, the Pentagon ordered the organization running the repository to shut down. The organization reopened with a different overseer, tasked with a narrower, military-focused mission. Uncertainty about the organization’s future caused many top pathologists to leave.

In its first pitch to the repository’s leaders, Google pointedly mentioned a book-length Institute of Medicine report on the repository that stated that “wide access” to the archive’s materials would promote the “public good.” The biorepository wasn’t living up to its potential, Google said, noting that “no major efforts have been underway to fix the problem.”

Following the tour, a Google scientist prepared a list of clinical, demographic and patient information it sought from the repository. The list included “must haves” — case diagnoses; pathology and radiology images; information on gender and ethnicity; and birth and death dates — as well as “high-value” patient information, including comorbidities, subsequent hospitalizations and cause of death.

This troubled the JPC’s director. “We felt very, very concerned about giving too much data to them,” Simon told ProPublica, “because too much data could identify the patient.”

There were other aspects about Google’s offer that made it “very unfavorable to the federal government,” Simon later told his successor, according to an email reviewed by ProPublica.

In exchange for scanning and digitizing the slide collection at its own expense, Google sought “exclusive access” to the data for at least four years.

The other deal-breaker was Google’s requirement that it be able to charge the government to store and access the digitized information, a huge financial commitment. Simon did not have the authority to commit the government to future payments to a company without authorization from Congress.

Today, Ladd, the Google spokesperson, disputes the claim that its proposal would have been unfavorable to the government. “Our goal was to help the government digitize the data before it physically deteriorates.”

Ladd said Google sought exclusive access to the data during the early stages of the project, so that it could scan the de-identified samples and perform quality-control measures on the data prior to handing it back to the JPC.

Niels Olson, who spearheaded the project for the Navy in 2016, declined requests for interviews with ProPublica. But Jackson Stephens, a friend and lawyer who is representing Olson, said Olson had always followed the Institutional Review Board process and worked to anonymize patient medical data before it was used in research or shared with a third party.

“Niels takes his oath to the Constitution and his Hippocratic oath very seriously,” Stephens said. “He loves science, but his first duty of care is to his patients.”

Google’s relentlessness in 2017, too, spooked the repository’s leaders, according to an email reviewed by ProPublica. Google’s lawyer put “pressure” on the head of tissue operations to sign the agreement, which he declined to do. Leaders of the center became “uncomfortable” and discontinued discussions, according to the DOD email.

Though he banged on doors in the Pentagon and Congress, Simon was not able to convince the Obama administration to include the JPC in then-Vice President Joe Biden’s Cancer Moonshot. Simon left the JPC in 2018, his hopes for a modernization of the library dashed. But then a Pentagon advisory board got wind of the JPC collection, and everything changed.

“The Smartest People on Earth”

In March of 2020, the Defense Innovation Board announced a series of recommendations to digitize the JPC collection. The board called for a pilot project to scan a large initial batch of slides — at least 1 million in the first year — as a prelude to the massive undertaking of digitizing all 55 million slides.

“My worldview was that this should be one of the highest priorities of the Defense Department,” William Bushman, then acting deputy undersecretary of personnel and readiness, told ProPublica. “It has the potential to save more lives than anything else being done in the department.”

As the pathology center prepared to launch its pilot, the staff talked about a scandal that occurred just 40 miles north.

Henrietta Lacks was a Black woman who died of cancer in 1951 while being treated at Baltimore’s Johns Hopkins Hospital. Without her or her family’s knowledge or consent, and without compensation, her cells were replicated and commercialized, leading to groundbreaking advances in medicine but also federal reforms on the use of patient cells for research.

Like Lacks’ cancer cells, every specimen in the archive, the JPC team knew, represented its own story of human mortality and vulnerability. The tissue came from veterans and current service members willing to put their lives on the line for their country. Most of the samples came from patients whose doctors discovered ominous signs from biopsies and then sent the specimens to the center for second opinions. Few signed consent forms agreeing to have their samples used in medical research.

The pathology center hired two experts in AI ethics to develop ethical, legal and regulatory guidelines. Meanwhile, the pressure to cooperate with Google hadn’t gone away.

In the summer of 2020, as COVID-19 surged across the country, Olson was stationed at a naval lab in Guam, working on an AI project to detect the coronavirus. That project was managed by a military group based out of Silicon Valley known as the Defense Innovation Unit, a separate effort to speed the military’s development and adoption of cutting-edge technology. Though the group worked with many tech companies, it had gained a reputation for being cozy with Google. The DIU’s headquarters in Mountain View, California, sat just across the street from the Googleplex, the tech giant’s headquarters. Olson joined the group officially that August.

Olson’s COVID-19 work earned him Navy Times’ coveted Sailor of the Year award as well as the attention of a man who would become a powerful ally in the DOD, Thomas “Pat” Flanders.

Flanders was the chief information officer of the sprawling Defense Health Agency, which oversaw the military’s medical services, including hospitals and clinics. A garrulous Army veteran, Flanders questioned the wisdom of running the pilot project without first getting funding to scan all of the 55 million slides. He wanted the pathology staff to hear about the work Olson and Google had done scanning pathology slides in San Diego and see if a similar public-private partnership could be forged with the JPC.

Over the objections of Moncur, the JPC’s director, Flanders insisted on having Olson attend all the pathology center’s meetings to discuss the pilot, according to internal emails.

In August 2020, the JPC published a request for information from vendors interested in taking part in the pilot project. The terms of that request specified that no feedback would be given to companies about their submissions and that telephone inquiries would not be accepted or acknowledged. Such conversations could be seen as favoritism and could lead to a protest by competitors who did not get this privilege.

But Flanders insisted that meeting Google was appropriate, according to Moncur’s statements to DOD lawyers.

In a video conference call, Flanders told the Google representatives they were “the smartest people on earth” and said he couldn’t believe he was “getting to meet them for free,” according to written accounts of the meeting provided to DOD lawyers.

Flanders asked Google to explain its business model, saying he wanted to see how both the government and company might profit from the center’s data so that he could influence the requirements on the government side — a remark that left even the Google representatives “speechless,” according to a compilation of concerns raised by DOD staffers.

To Moncur and others in attendance, Flanders was actively negotiating with Google, according to Moncur’s statement to DOD lawyers.

To the astonishment of the center staff, Flanders asked for a second meeting between Google and the JPC team.

Concern about Flanders’ conduct echoed in other parts of the DOD. A lawyer for Defense Digital Service, a team of software engineers, data scientists and product managers assigned to assist on the project, wrote that Flanders ignored legal warnings. He described Flanders as a “cowboy” who in spite of warnings about his behavior was not likely “to fall out of love with Google.”

In an interview with ProPublica, Flanders disputed claims that he was biased toward Google. Flanders said his focus has always been on scanning and storing the slides as quickly and economically as possible. As for his lavish praise of Google, Flanders said he was merely trying to be “kind” to the company’s representatives.

“People took offense to that,” Flanders said. “It’s just really pettiness on the part of people who couldn’t get along, honestly.”

A spokesperson for the Defense Health Agency said it was “totally appropriate” for Flanders to ask Google about its business model. “This is part of market research,” the spokesperson wrote, adding that no negotiation occurred at the meeting and that all government stakeholders had been invited to attend.

Moncur referred calls to a JPC spokesperson. A spokesperson for the JPC said in a statement that “Moncur was concerned about meeting with vendors during the RFI period.”

“An Arm of Google”

In late 2020, the modernization team received more troubling news. In a slide presentation for the JPC describing other AI work with Google and the military, Olson disclosed that the company had “made offers of employment, which I have declined.” But then he suggested the offer might be revived in the future, writing, “we mutually agreed to table the matter.” He said he had “no other conflicts of interest to declare.” Google told ProPublica it had never directly made Olson a job offer, though a temp agency it used did.

More facts surfaced. Olson also had a Google corporate email address. And he had access to Google corporate files, according to internal communications from concerned DOD staff members. Google said it is common for its research partners in the government to have these privileges.

“I am more worried than ever that DIU’s influence will destroy this acquisition,” a DOD lawyer wrote, referring to efforts to find vendors for the pilot project. He called DIU “essentially an arm of Google.”

At the time, a DIU lawyer defended Olson. The lawyer said Olson had “no further conflict of interest issues” and had done nothing improper because the job offer had been made three years earlier, in 2017. An ethics officer at the DOD Standards of Conduct Office agreed.

Today, a spokesperson in the Office of the Secretary of Defense told ProPublica the department was committed to modernizing the repository “while carefully observing all applicable legal and ethical rules.”

Olson’s friend and lawyer, Stephens, said Olson had been upfront, disclosing the job offer to the innovation unit’s lawyer as well as in the conflict-of-interest section of his slide presentation. He said Olson had declined the offer, which was withdrawn. “He’s not some kind of Google secret agent.”

Stephens said the JPC would have been much further down the road had it cooperated with Olson. Stephens said it became apparent to Olson that Moncur was “essentially ignoring” a “gold mine that could help a lot of people.”

“Niels is the tenacious doctor who is just trying to do the science and build a coalition of partners to get this thing done,” Stephens said. “I think he’s the hero of this story.”

Google Turns to Congress

In 2021, the pathology center selected one of the most prestigious medical institutions in the world, Johns Hopkins — which plans to erect a building honoring Henrietta Lacks — to assist it in scanning slides. It picked two small technology companies to start building tools to let pathologists search the archive.

Google wanted to be selected, and in a confidential proposal, it offered to help the repository build up its own slide-scanning capabilities.

When Google was not selected for the pilot project, the company went above the JPC leaders’ heads. Google claimed in a letter to Pentagon leaders that the company had been unfairly excluded from “full and open competition.” In that August 2021 letter, Google argued that the nation’s security was at stake. It asked the DOD to “consider allowing Google Cloud” and other providers to compete to ensure the “nation’s ability to compete with China in biotechnology.”

Time was of the essence, Google warned. “The physical slides at the JPC are degrading rapidly each day. … Without further action, the slides will continue to degrade and some may ultimately be damaged beyond repair.”

Google stepped up its advocacy campaign. The company deployed a lobbying firm, the Roosevelt Group — which boasts of its ability to “leverage” its connections to secure federal business opportunities to its clients — to raise doubts about the JPC’s pilot project. Their efforts worked. In little-noticed language in a report written to accompany the 2023 Defense Authorization Act, the House Armed Services Committee expressed its concern about the speed of the scanning process and the choice of technology, which the committee claimed would not allow the “swift digitization of these deteriorating slides.”

The committee had its own ideas of how the pathology center’s work should be carried out, suggesting that the center work in tandem with the DIU, using an augmented reality microscope whose software was engineered by Google.

In a statement, the Roosevelt Group told ProPublica it was “proud” of its work for Google. The firm said it helped the company “educate professional staff of the House and Senate Armed Services Committees over concerns about the lack of an open procurement process for digitization of slides.” The group chided DOD officials for being “unwilling to provide answers to Congress around the lack of progress on the JPC digitization effort.”

The pathology center staff was dismayed by the committee’s recommendations that it work with Olson’s group.

In a video conference meeting late last summer with Armed Services Committee staff, the leaders of the pathology center attempted to rebut the House committee report. The JPC’s work was going as planned, they said, noting that a million slides had been scanned. And the pathology center was collaborating with the National Institutes of Health to develop AI tools to help predict prognoses for cancer treatments.

The House Armed Services Committee ordered Pentagon leaders to “conduct a comprehensive assessment” on the digitization effort and to provide a briefing to the committee on its findings by April 1, 2023.

In a statement in response to ProPublica’s questions about the bill, Ladd, the Google spokesperson, acknowledged the company’s influence efforts on Capitol Hill. “We frequently provide information to congressional staff on issues of national importance,” Ladd said. The statement confirmed that the company suggested “language be inserted” into the 2023 Defense Authorization Act calling for a “comprehensive assessment” of the digitization effort.

“Despite efforts from Google and many at the Department of Defense, our work with JPC unfortunately never got off the ground, and the physical repository of pathology slides continues to deteriorate,” Ladd said. “We remain optimistic that if the repository could be properly digitized, it would save many American lives, including those of our service members.”

On this last point, even Google’s critics are in accord. A properly funded project would cost taxpayers a few hundred million dollars — a minuscule portion of the $858 billion defense budget and a small price if the lifesaving potential of the collection is realized.

Last year, as tensions grew with Google, the modernization team at the repository launched a publicity campaign to call attention to the project and the high ethical stakes.

An entire panel discussion was devoted to the JPC effort at the 2021 South by Southwest conference. “This is a once in a lifetime opportunity, and I want to make sure we do it right, we do it responsibly and we do it ethically,” said Steven French, the DOD cloud computing engineer assigned to assist the repository.

Then without mentioning Google’s name, he added a Shakespearean barb. “There’s plenty of vendors, plenty of companies, plenty of people,” French said, “who are more than willing to do this and extract a pound of flesh from us in the process.”