The Six-Step Exploitation Formula
How systematic coordination operates through predictable stages across decades and industries.
Overview
After analyzing coordination patterns across 100+ years of documented history—from Nazi Germany’s industrial cartels to modern oligarchic networks—a consistent six-step formula emerges. These steps repeat with remarkable precision whether the coordination involves governments, corporations, or criminal organizations.
Once you see this pattern, you can’t unsee it.
STEP 1: RELATIONSHIPS
The Foundation: Personal connections before operational connections.
What It Looks Like:
- Family ties that transcend business
- Childhood friendships that become political alliances
- Social clubs and exclusive memberships
- Shared educational backgrounds
- “Unofficial” advisory roles
Historical Example: IG Farben & Standard Oil (1920s-1940s)
The Setup:
- IG Farben: Nazi Germany’s largest chemical cartel (produced Zyklon B for concentration camps)
- Standard Oil: America’s oil giant controlled by Rockefeller interests
- The Relationship: 1929 partnership agreement signed BEFORE Hitler came to power
The Pattern:
- Personal meetings between executives in neutral Switzerland
- Technology sharing agreements (“cartel arrangements”)
- Joint patent holdings that prevented competition
- Continued cooperation even after war began (until 1942)
Why It Matters:
These weren’t enemies doing business despite ideology. They were PARTNERS who maintained relationships through global conflict. The relationship came FIRST, the exploitation came later.
Verification: Senate hearings (1942), declassified documents, corporate records. Check it in 60 seconds.
STEP 2: DEPENDENCIES
The Lock-In: Making yourself irreplaceable.
What It Looks Like:
- Exclusive agreements and contracts
- Critical infrastructure control
- Patent monopolies
- Regulatory capture
- “Only we can solve this” positioning
Historical Example: The Waterfront Commission (1953-2024)
The Setup:
- Created as “temporary” solution to organized crime on NY/NJ docks
- Given power to license all longshoremen
- Interstate compact = both states had to agree to dissolve it
The Dependency:
- Every dock worker needed Commission approval to work
- Every shipping company needed Commission permits
- Commission became SOLE arbiter of waterfront access
- Ports literally couldn’t function without Commission approval
The Lock:
- “Temporary” oversight lasted 71 years (1953-2024)
- Every reform attempt: “You’ll bring back the mob”
- Commission survived decades of corruption scandals
- Finally dissolved by Trump administration in 2024
Why It Matters:
Once infrastructure dependency is established, removal becomes “too dangerous” or “too disruptive.” The dependency itself becomes the defense.
Verification: Commission dissolution order (2024), 70 years of corruption investigations, port operation histories.
STEP 3: EXPANSION
The Growth: From pilot program to permanent infrastructure.
What It Looks Like:
- “Successful” pilot programs scaled nationally
- Temporary measures becoming permanent
- Geographic expansion across jurisdictions
- Scope creep beyond original mandate
- Network effects creating more dependencies
Historical Example: Post-WWII Japan CIA Operations (1947-Present)
The Original Scope:
- Post-war occupation (1945-1952)
- Rebuild democratic institutions
- “Temporary” CIA support for anti-communist politicians
The Expansion:
- CIA secretly funded Liberal Democratic Party (LDP) founding (1955)
- Payments to politicians continued for decades
- Expanded to controlling yakuza networks for strike-breaking
- Embedded intelligence relationships in every institution
- 78 years later, infrastructure still operating
The Scope Creep:
- From “temporary” anti-communist support…
- To permanent political party funding…
- To organized crime utilization…
- To complete institutional penetration…
- Operating continuously across 12 U.S. presidents
Why It Matters:
“Temporary” solutions have a way of becoming permanent infrastructure when they serve powerful interests. Time legitimizes what would be scandalous if proposed openly.
Verification: Declassified CIA documents, Japanese political histories, academic research on post-war occupation.
STEP 4: INSTITUTIONALIZATION
The Embedding: From program to “just how things work.”
What It Looks Like:
- Official legislation codifying informal arrangements
- Creation of regulatory bodies and oversight committees
- Congressional mandates and executive orders
- International treaties and agreements
- Academic and professional credential requirements
Historical Example: The Federal Reserve (1910-1913)
The Secret Beginning:
- November 1910: Secret meeting at Jekyll Island, Georgia
- Six men representing one-quarter of world’s wealth
- Traveled under assumed names
- Drafted Federal Reserve Act in complete secrecy
- Public had no idea meeting occurred
The Participants:
- Nelson Aldrich (Senator, father-in-law to Rockefeller Jr.)
- Frank Vanderlip (National City Bank president)
- Henry Davison (J.P. Morgan partner)
- Charles Norton (First National Bank president)
- Benjamin Strong (J.P. Morgan lieutenant)
- Paul Warburg (Kuhn, Loeb & Company)
The Institutionalization:
- 1913: Federal Reserve Act passed by Congress
- Private banks given control of money supply
- Presented as “government oversight” of banking
- Actually: banker cartel institutionalized
- 111 years later: Still operating, never audited
Why It Matters:
Private coordination becomes public institution. Once institutionalized, questioning it becomes “radical” or “conspiracy theory.” The institution IS the legitimacy.
Verification: “The Creature from Jekyll Island” (G. Edward Griffin), Congressional Record (1913), Fed’s own historical records.
STEP 5: MONETIZATION
The Extraction: Converting control into profit at scale.
What It Looks Like:
- Guaranteed contracts with no competitive bidding
- Regulatory approval required (and sold)
- Toll booth on essential services
- Information asymmetry exploited for trading
- Both sides of conflicts profiting simultaneously
Modern Example: Netanyahu-Kushner Relationship (1990s-Present)
The 30-Year Relationship:
- 1990s: Netanyahu stays at Kushner family home during U.S. visits
- Jared Kushner knew Netanyahu since childhood
- Personal relationship spanning three decades
- Kushner family donations: Millions to Israeli settlements
The Institutional Positions:
- 2017: Jared Kushner becomes White House Senior Advisor
- Netanyahu: Prime Minister of Israel (multiple terms)
- Personal friendship now operates at state level
The Policy Outcomes:
- 2017: U.S. recognizes Jerusalem as Israeli capital
- 2019: U.S. recognizes Israeli sovereignty over Golan Heights
- 2020: Abraham Accords (Kushner-negotiated)
- Arms deals: Billions in sales to Israel and Gulf states
- Regional policy: Maximum pressure on Iran (Israel’s enemy)
The Monetization:
- Defense contractor profits from increased arms sales
- Kushner family real estate dealings in region
- Regional stability benefits Israeli expansion
- Personal relationships converting to state policy
- Private interests aligned with public positions
Why It Matters:
30-year personal relationship becomes foreign policy. The line between friendship and policy disappears. Monetization operates through official channels while maintaining “plausible legitimacy.”
Verification: Public record of relationship, documented policy timeline, arms deal records, settlement funding records.
STEP 6: DEFENSE
The Shield: Protecting the system when exposed.
What It Looks Like:
- “Conspiracy theory” dismissals
- Legal teams and jurisdiction shopping
- “Too big to fail” arguments
- “Jobs will be lost” warnings
- Regulatory capture protecting the captured
- Media narrative control
Historical Example: IG Farben Nuremberg Trials (1947-1948)
The Exposure:
- Nuremberg trials revealed full extent of IG Farben’s role
- Produced Zyklon B for concentration camps
- Used slave labor from camps
- Built factories AT Auschwitz
- Partnered with U.S. companies throughout war
The Defense:
- Legal: “Just following orders” defense
- Corporate: “Individual executives, not company” defense
- Political: “Needed for German reconstruction” argument
- Economic: “Employment and recovery” justification
The Outcome:
- 13 executives convicted (1948)
- Sentences: 1-8 years (most served less than 3)
- Company “broken up” into BASF, Bayer, Hoechst
- All three companies still operating today
- Combined revenue: Over €100 billion annually
Why It Matters:
Even genocide-level crimes couldn’t destroy the institutional structure. Executives got light sentences. Companies reorganized but continued. The SYSTEM survived despite exposure.
Verification: Nuremberg trial transcripts, corporate histories, reparations records.
THE COMPLETE PATTERN
IG Farben Example (Full Cycle):
- RELATIONSHIPS: 1929 partnership with Standard Oil
- DEPENDENCIES: Exclusive cartel agreements, shared patents
- EXPANSION: 380 German firms, 500 foreign firms controlled
- INSTITUTIONALIZATION: Essential to German/European industry
- MONETIZATION: War profiteering, slave labor
- DEFENSE: Light sentences, companies still operating
Timeline: 22 years (1929-1951)
Survival: Companies operating 79 years after exposure
RECOGNITION METHODOLOGY
How to Identify the Six-Step Pattern:
Ask These Questions:
- What personal relationships existed BEFORE the formal arrangement?
- What dependencies were created that make removal “impossible”?
- How did “temporary” or “limited” scope expand over time?
- When did informal arrangements become official institutions?
- Who profits and through what mechanisms?
- What defenses activate when the pattern is exposed?
The Thermodynamic Test:
- Truth requires zero maintenance energy
- Lies require constant coordination and defense
- Watch WHERE energy gets spent
- Aggressive defense = something being protected
CULTURAL IMMUNITY
The pattern only works when invisible.
Once you recognize the six-step formula:
- You see it operating in real-time
- You recognize which STEP the coordination is in
- You predict what comes next
- You understand why certain defenses activate
- You can’t unsee it
That’s cultural immunity. Once enough people see it, coordination becomes too visible to function effectively.
You’re learning to see. Now you can’t unsee.
All examples verified through primary sources: government documents, trial transcripts, declassified CIA files, corporate records, and academic research. Every claim checkable in under 60 seconds.