The Operation
In early March 2026, NPR reported that multiple federal workers and contractors had lost their jobs following undercover stings run by political provocateur James O'Keefe. The series, which O'Keefe titles "Dating the Deep State," deploys young women on dating applications to identify and approach government employees. The operatives establish rapport, arrange in-person meetings at locations they select, and record the conversations without consent. The footage is then published to O'Keefe's social channels, shared with employers and sympathetic media, and used as grounds for termination or investigation.
The subjects are not caught committing crimes. They are caught expressing private political opinions during what they believed to be personal conversations. That distinction is load-bearing for understanding what the operation actually does.
The Mechanism: Six Steps
Step 1: Platform Selection
Dating applications are chosen over cold contact for a specific reason: users on these platforms arrive in a psychologically primed state. They are seeking connection, are inclined toward self-disclosure, and have already made a decision to lower the defenses they maintain in professional contexts. The platform itself does some of the operative's work before the first message is sent.
Step 2: Target Identification
Government employees in Washington are not difficult to identify. Profiles commonly list agencies, titles, or general professional roles. An operative can filter for targets with institutional access and probable political attitudes before initiating contact. This is not random. It is a targeted search using public self-disclosure as the selection database.
Step 3: Rapport Construction
The early phase of contact is not political. Common interests are established, conversation flows naturally, and the target builds a sense of mutual familiarity. This phase serves two functions: it extends the target's comfort window and it generates the cognitive consistency that makes the next phase effective. A person who has spent two weeks building a connection with someone does not abruptly shift into threat-assessment mode when that person asks a casual question about their job.
Step 4: Environment Control
The operative selects the meeting location. This controls recording angles, ambient sound, sight lines, and exit options. The target interprets this as a normal social preference. It is a tactical decision about production quality.
Step 5: Covert Recording and Steering
Once the social bond is established and the physical environment is controlled, the operative repositions a phone camera and begins steering conversation toward politically sensitive material. The key word is steering, not ambushing. The target is not surprised with a confrontational question. They are walked gradually from safe social territory into private political opinion, still believing they are in a candid personal exchange.
Step 6: Publication as Weapon
The footage is not primarily evidence. It is a distribution asset. Publishing to social media with 2.5 million views serves multiple simultaneous functions: it removes the target's plausible deniability, it creates a record that employers cannot ignore without institutional risk, and it functions as a signal to every other potential target that this environment is compromised. The video does not need to prove wrongdoing. It needs to make continued employment politically untenable for the target's supervisors.
"The honeypot is not primarily an information-gathering tool. It is a leverage-generation tool. The goal is not to learn what the target thinks. The goal is to produce a record that converts private thought into public consequence."
What the Brandon Wright Case Reveals
Brandon Wright, a career IT professional at the Department of Homeland Security with eight years of service across administrations of both parties, was matched with an operative using the name Heidi on a dating application. The approach followed the playbook precisely: video verification call to build credibility, multiple contacts to establish familiarity, a restaurant meeting at a location Heidi selected.
Wright later described the moment he noticed the phone camera being repositioned. His body, he said, registered that something was wrong. That somatic signal arrived too late. The recording captured Wright stating that the then-nominee to lead DHS was not a smart person, and that Cabinet heads set priorities without directing career staff personally. Neither statement is classified. Neither constitutes misconduct. Both were made in what Wright understood to be a private conversation.
His employer placed him on administrative leave and terminated him. Within days, Wright received texts containing geolocation data for his ex-wife's home, where his children spend part of their time. The threat was explicit. The operational sequence had extended from extraction to intimidation, transforming a media operation into a personal pressure campaign.
Wright is now suing DHS for First Amendment violations. His attorney argues that government employees retain the right to private political opinions. The legal outcome is secondary to the operational lesson: the extraction mechanism worked exactly as designed, and the institutional lever it created was pulled without hesitation.
Why Targets Keep Getting Caught
This technique is not new. Intelligence services have used romantic approach vectors to extract information from targets for over a century. The question worth asking is why it continues to work against subjects who, in the current political environment, have ample reason to be cautious.
The answer is that the romantic context specifically degrades the cognitive systems that would otherwise generate caution. Attachment-seeking behavior activates reward circuitry that competes with threat-assessment circuitry. People in early romantic connection are not stupid. They are operating under a neurochemical condition that deprioritizes suspicion in favor of bonding. The operative exploits a biological feature, not a character flaw.
There is also the normalization factor. In Washington, political conversation on a date is not anomalous. It is routine. A target who says "talking politics is called a date in D.C." is accurately describing the social environment. The operative weaponizes normalcy: the conversation that would raise no flags in any other context raises none here either, until the camera is already running.
Markers of this tactic
- Contact initiated through a platform where psychological defenses are structurally lower
- Rapport-building phase that establishes common ground before any sensitive topic is raised
- Operative controls the physical meeting environment, location, seating, and positioning
- Conversation steers gradually toward institutional or political disclosure rather than opening with it
- Recording is covert and begins after trust is established, not at the start of contact
- Publication is timed to maximize institutional pressure on employers or supervisors
- Post-publication intimidation extends operational consequences beyond the immediate target
The Takeaway
The "Dating the Deep State" operation represents a domestication of classic intelligence tradecraft. The honeypot technique has been used by state actors against foreign officials for generations. Its current application targets career civil servants, using the same psychological architecture but deploying it through consumer applications rather than embassy functions.
What makes the 2026 version particularly efficient is the institutional amplification layer. Intelligence honeypots historically required the operating agency to act on extracted material directly. This version requires nothing from the operator after publication. The employer, the media, and the social environment do the enforcement work. The operator simply produces the footage and distributes it. The institutional response is automatic.
The counter-posture is not paranoia about dating applications. It is recognition that any environment where psychological defenses are structurally reduced, romantic, social, recreational, is a viable extraction environment for a sufficiently motivated operator. The private conversation does not exist in a social climate where recording is cheap, distribution is instantaneous, and institutional actors have incentive to respond to manufactured evidence of disloyalty. The only operational protection is the assumption that no context is fully private and adjusting disclosure behavior accordingly.
That is a bleak conclusion. It is also the accurate one.