The Frequency Framework — Methodology
The Six-Step Exploitation Formula
How systematic coordination operates through predictable stages across decades and industries.
Overview
After analyzing coordination patterns across 100+ years of documented history — from Nazi Germany’s industrial cartels to modern oligarchic networks — a consistent six-step formula emerges. These steps repeat with remarkable precision whether the coordination involves governments, corporations, or criminal organizations.
Once you see this pattern, you can’t unsee it.
01
Relate
02
Depend
03
Expand
04
Lock In
05
Extract
06
Defend
1
Step One
Relationships
The Foundation: Personal connections before operational connections.
What It Looks Like
· Family ties that transcend business
· Childhood friendships that become political alliances
· Social clubs and exclusive memberships
· Shared educational backgrounds
· “Unofficial” advisory roles
Historical Example: IG Farben & Standard Oil (1920s–1940s)
The Setup
IG Farben: Nazi Germany’s largest chemical cartel · Standard Oil: America’s Rockefeller oil giant · 1929 partnership signed BEFORE Hitler came to power
The Pattern
Personal meetings in neutral Switzerland · Technology sharing agreements · Joint patent holdings · Cooperation continued after war began (until 1942)
Why It Matters: These weren’t enemies doing business despite ideology. They were PARTNERS who maintained relationships through global conflict. The relationship came FIRST — the exploitation came later.
Verification: Senate hearings (1942) · Declassified documents · Corporate records
2
Step Two
Dependencies
The Lock-In: Making yourself irreplaceable.
What It Looks Like
· Exclusive agreements and contracts
· Critical infrastructure control
· Patent monopolies
· Regulatory capture
· “Only we can solve this” positioning
Historical Example: The Waterfront Commission (1953–2024)
The Dependency
Every dock worker needed Commission approval · Every shipping company needed permits · Sole arbiter of waterfront access · Ports couldn’t function without it
The Lock
“Temporary” oversight lasted 71 years · Every reform attempt: “You’ll bring back the mob” · Survived decades of corruption scandals · Dissolved by Trump administration 2024
Why It Matters: Once infrastructure dependency is established, removal becomes “too dangerous” or “too disruptive.” The dependency itself becomes the defense.
Verification: Commission dissolution order (2024) · 70 years of corruption investigations · Port operation histories
3
Step Three
Expansion
The Growth: From pilot program to permanent infrastructure.
What It Looks Like
· “Successful” pilot programs scaled nationally
· Temporary measures becoming permanent
· Geographic expansion across jurisdictions
· Scope creep beyond original mandate
· Network effects creating more dependencies
Historical Example: Post-WWII Japan CIA Operations (1947–Present)
Original Scope — “Temporary” CIA support for anti-communist politicians during occupation
1955 — CIA secretly funded Liberal Democratic Party (LDP) founding
Expansion — Payments continued for decades, yakuza networks controlled for strike-breaking
Penetration — Intelligence relationships embedded in every institution
2026 — Infrastructure still operating 78 years later, across 12 US presidents
1955 — CIA secretly funded Liberal Democratic Party (LDP) founding
Expansion — Payments continued for decades, yakuza networks controlled for strike-breaking
Penetration — Intelligence relationships embedded in every institution
2026 — Infrastructure still operating 78 years later, across 12 US presidents
Why It Matters: “Temporary” solutions have a way of becoming permanent infrastructure when they serve powerful interests. Time legitimizes what would be scandalous if proposed openly.
Verification: Declassified CIA documents · Japanese political histories · Academic research on post-war occupation
4
Step Four
Institutionalization
The Embedding: From program to “just how things work.”
What It Looks Like
· Official legislation codifying informal arrangements
· Creation of regulatory bodies and oversight committees
· Congressional mandates and executive orders
· International treaties and agreements
· Academic and professional credential requirements
Historical Example: The Federal Reserve (1910–1913)
The Secret Beginning
November 1910: Jekyll Island meeting · 6 men controlling 1/4 of world’s wealth · Traveled under assumed names · Drafted Federal Reserve Act in complete secrecy
The Participants
Nelson Aldrich (Senator, Rockefeller in-law) · Frank Vanderlip (National City Bank) · Henry Davison (J.P. Morgan) · Paul Warburg (Kuhn, Loeb & Co.)
The Institutionalization
1913: Federal Reserve Act passed · Private banks given control of money supply · Presented as “government oversight” · Actually: banker cartel institutionalized · 111 years later: Still operating, never fully audited
Why It Matters: Private coordination becomes public institution. Once institutionalized, questioning it becomes “radical” or “conspiracy theory.” The institution IS the legitimacy.
Verification: “The Creature from Jekyll Island” · Congressional Record (1913) · Fed’s own historical records
5
Step Five
Monetization
The Extraction: Converting control into profit at scale.
What It Looks Like
· Guaranteed contracts with no competitive bidding
· Regulatory approval required (and sold)
· Toll booth on essential services
· Information asymmetry exploited for trading
· Both sides of conflicts profiting simultaneously
Modern Example: Netanyahu-Kushner Relationship (1990s–Present)
The 30-Year Relationship
1990s: Netanyahu stays at Kushner family home · Jared knew Netanyahu since childhood · Kushner family: millions donated to Israeli settlements · Personal relationship spanning three decades
The Policy Outcomes
2017: US recognizes Jerusalem as capital · 2019: US recognizes Golan Heights sovereignty · 2020: Abraham Accords · Billions in arms sales · Maximum pressure on Iran
The Monetization: Defense contractor profits from arms sales · Kushner family regional real estate dealings · Israeli expansion benefiting from regional stability · Private interests aligned with public positions
Why It Matters: 30-year personal relationship becomes foreign policy. The line between friendship and policy disappears. Monetization operates through official channels while maintaining “plausible legitimacy.”
Verification: Public record of relationship · Documented policy timeline · Arms deal records · Settlement funding records
6
Step Six
Defense
The Shield: Protecting the system when exposed.
What It Looks Like
· “Conspiracy theory” dismissals
· Legal teams and jurisdiction shopping
· “Too big to fail” arguments
· “Jobs will be lost” warnings
· Regulatory capture protecting the captured
· Media narrative control
Historical Example: IG Farben Nuremberg Trials (1947–1948)
The Exposure
Produced Zyklon B for concentration camps · Used slave labor · Built factories AT Auschwitz · Partnered with US companies throughout the war
The Defense
“Just following orders” · “Individual executives, not the company” · “Needed for German reconstruction” · “Employment and recovery”
The Outcome
13
Executives Convicted
❤ yrs
Average Time Served
€100B+
Successor Revenue Today
Why It Matters: Even genocide-level crimes couldn’t destroy the institutional structure. The SYSTEM survived despite exposure. Defense doesn’t need to win — it just needs to delay long enough for the structure to outlast the scandal.
Verification: Nuremberg trial transcripts · Corporate histories · Reparations records
The Complete Pattern
IG Farben — Full Cycle
22 years to complete (1929–1951) · Successor companies operating 79 years after exposure
Step 1
1929 partnership with Standard Oil
Step 2
Exclusive cartel agreements, shared patents
Step 3
380 German firms, 500 foreign firms controlled
Step 4
Essential to German and European industry
Step 5
War profiteering, slave labor extraction
Step 6
Light sentences, BASF/Bayer/Hoechst still operating
Recognition Methodology
How to Identify the Six-Step Pattern
01What personal relationships existed BEFORE the formal arrangement?
02What dependencies were created that make removal “impossible”?
03How did “temporary” or “limited” scope expand over time?
04When did informal arrangements become official institutions?
05Who profits and through what mechanisms?
06What defenses activate when the pattern is exposed?
The Thermodynamic Test
Truth requires zero maintenance energy
Lies require constant coordination and defense
Watch WHERE energy gets spent
Aggressive defense = something being protected
Lies require constant coordination and defense
Watch WHERE energy gets spent
Aggressive defense = something being protected
Cultural Immunity
The pattern only works when invisible.
Once you recognize the six-step formula, you see it operating in real time. You recognize which step the coordination is in. You predict what comes next. You understand why certain defenses activate. You can’t unsee it.
That’s cultural immunity. Once enough people see it, coordination becomes too visible to function effectively.
All examples verified through primary sources: government documents, trial transcripts,
declassified CIA files, corporate records, and academic research. Every claim checkable in under 60 seconds.
declassified CIA files, corporate records, and academic research. Every claim checkable in under 60 seconds.