He called them liars, called them bad cops, evil, corrupt. Those were some of the words that he used. He even used some curse words during that speech.

Nearly one week after a raid at the state capitol, federal authorities returned to Sacramento. The FBI raided a legislative office building.

Mike Lurri is there live with what we know so far.

“Leticia, yes, I can tell you that the FBI action took place around 7:30 this morning right here inside this building. It’s the legislative office building that you see over my shoulder, and it is directly across the street from the state capitol. Now, KCRA 3 has learned that today’s raid by the FBI is directly related to the ongoing investigation.”

“So whoever it is, we think we’ll be able to find out because we’re going to go to the media company that released it and we’re going to say national security—give it up or go to jail. And we know who, and you know who we’re talking about, because some things you just can’t do.”

Then everything changed.

Breaking tonight, FBI and DEA agents launched a stunning internal raid, exposing one of their own in a deadly betrayal.

It started at 4:22 a.m.

That was the first moment the porch light came on at the federal townhouse near the edge of the city. The street outside was still silent. No commuters, no school traffic, no barking dogs. Just that cold stillness before dawn, when neighborhoods feel sealed off from the rest of the world and every sound carries farther than it should.

Then the convoy turned the corner.

Three black SUVs rolled in without sirens. An unmarked van followed behind them. Another vehicle blocked the rear alley access where residents usually parked after midnight.

By 4:26 a.m., the house was fully surrounded.

By 4:28 a.m., agents had taken the front steps, the side gate, and the back patio entrance. No loud warnings. No chaos spilling into the street. Just whispered radio traffic, body armor shifting in the dark, and tension so sharp it felt like it could cut through the air.

At 4:30 a.m., the breach order came.

At 4:31 a.m., the front door was forced open.

At 4:32 a.m., agents rushed inside.

Lights sliced through the hallway. Commands echoed off the walls. A woman screamed from upstairs. A lamp shattered near the kitchen.

And within seconds, the target of the operation—a DEA agent—was dragged out of bed and ordered to the floor.

For years, he had carried a badge.

For years, he had sat in briefings, reviewed case files, and listened to the names of people risking everything to cooperate with the government.

For years, he had looked exactly like what he was supposed to be—a federal narcotics officer trusted with some of the most sensitive information in the system.

But that morning, investigators believed something far more horrifying.

He had not been protecting witnesses.

He had been delivering them.

By 4:36 a.m., his work phone was seized.

By 4:39 a.m., agents recovered two burner phones from a locked drawer in the bedroom.

By 4:43 a.m., they found handwritten notes inside a garage workbench—case initials, dates, hotel locations, transfer windows, coded markings that made no sense in any lawful DEA investigation.

At 4:48 a.m., the operation changed.

It was no longer just a corruption raid.

It became something much darker.

Because according to investigators, this was not a federal agent taking occasional bribes to tip off traffickers.

This was a man accused of selling protected witness identities to cartel handlers.

Names. Faces. Meeting locations. Relocation details.

Information that could get someone killed long before they ever reached a courtroom.

At 4:54 a.m., agents entered the home office.

Inside, they found a government-issued laptop, printed case summaries, unauthorized copies of witness movement logs, and a hidden flash drive taped beneath the desk.

That flash drive changed everything.

By 5:02 a.m., forensic preview showed files tied to active narcotics cases and internal witness data that should never exist outside secure federal systems.

By 5:08 a.m., the lead commander said the words that defined the case:

“Witness identities sold.”

Not leaked.

Not mishandled.

Sold.

By 5:16 a.m., the suspect was in restraints.

By 5:24 a.m., the number at the center of the case was spoken aloud inside the command van.

Twelve informants killed.

Twelve.

Twelve people who had trusted the system enough to talk.

Twelve people who never made it to safety.

By 5:31 a.m., teams were already moving on secondary locations—storage units, a second vehicle, a downtown apartment tied to an intermediary.

By 5:42 a.m., prosecutors locked down every case file the agent had touched over two years.

By 5:57 a.m., emergency alerts went out for surviving witnesses.

By 6:14 a.m., the first safe house transfer was underway.

Because if even part of the case was true, then the people still alive were already on borrowed time.

The betrayal hadn’t started that morning.

It started quietly—inside databases, briefings, access logs, sealed witness packets, internal trust.

The agent didn’t need to hack anything.

He already had access.

He knew who mattered.

He knew who was talking.

And investigators believe he turned that access into a product.

At first, the pattern was subtle.

A witness disappears.

Another is found dead before testifying.

A family gets threatened with details only a handful of officials should know.

One case could be coincidence.

Two could be bad luck.

But twelve?

That was no coincidence.

That was betrayal.

Analysts traced access logs.

Who opened relocation files?

Who viewed sealed summaries?

Who touched sensitive data before each incident?

Again and again, one name appeared.

The DEA agent.

Sometimes nothing happened after he accessed a file.

Sometimes a witness vanished days later.

Sometimes cartel movement suggested they suddenly knew exactly who to target.

Individually, each instance could be explained.

Together, they formed a pattern that no longer looked administrative.

It looked predatory.

Then came the money.

Not flashy.

Not obvious.

That was the brilliance.

Small cash deliveries. Debts quietly erased. Gambling covered. Travel funded indirectly. Transfers hidden through relatives.

Corruption survives longest when it looks modest.

And what the cartel was buying wasn’t muscle.

It was certainty.

Names.

Targets.

That’s what made this different.

A corrupt cop might protect a shipment.

A corrupt federal agent could destroy a life.

He turned cooperation into a death sentence.

He weaponized trust.

Because witness protection runs on one fragile thing:

Belief.

Belief that the government can hide you better than the cartel can find you.

Once that belief breaks, people stop talking.

And when people stop talking, entire cases collapse.

The breakthrough came from a seized cartel phone.

Inside deleted messages were coded fragments—initials, hotel numbers, dates.

At first meaningless.

Then terrifying.

Because they matched real witness relocation data.

Someone inside had been feeding the system.

Financial tracing led to a relative receiving unexplained funds.

Those payments aligned with witness compromises.

Phones were mapped.

Access windows narrowed.

Every path led back to the same man.

By then, investigators knew this wasn’t just a suspect.

It was an emergency.

That’s why the raid came before dawn.

That’s why phones were seized first.

That’s why witnesses were moved the same morning.

Inside his home, the evidence got worse.

Printed files marked with coded notes.

Witnesses categorized by value.

Contact lists tied to cartel intermediaries.

One file used a word that shook investigators:

“Neutralized.”

Not threatened.

Not targeted.

Neutralized.

By midday, the damage was everywhere.

Cases frozen.

Witnesses relocated.

Agents questioning years of work.

Every unexplained failure now looked different.

Because maybe the cartel hadn’t just been powerful.

Maybe it had been shopping from inside the system.

That’s why the number mattered.

Twelve.

Twelve lives.

Twelve warnings.

Twelve signals that trust could be bought.

By the end of the day, the image of a decorated federal agent collapsed into something else entirely.

A man accused of taking the names of the vulnerable—and selling them.

The door had been breached.

The files were seized.

The survivors were being moved.

But one question remained:

How many more were marked for death before the raid finally stopped?