The Six-Step Exploitation Formula

How systematic coordination operates through predictable stages across decades and industries.


Overview

After analyzing coordination patterns across 100+ years of documented history—from Nazi Germany’s industrial cartels to modern oligarchic networks—a consistent six-step formula emerges. These steps repeat with remarkable precision whether the coordination involves governments, corporations, or criminal organizations.

Once you see this pattern, you can’t unsee it.


STEP 1: RELATIONSHIPS

The Foundation: Personal connections before operational connections.

What It Looks Like:

  • Family ties that transcend business
  • Childhood friendships that become political alliances
  • Social clubs and exclusive memberships
  • Shared educational backgrounds
  • “Unofficial” advisory roles

Historical Example: IG Farben & Standard Oil (1920s-1940s)

The Setup:

  • IG Farben: Nazi Germany’s largest chemical cartel (produced Zyklon B for concentration camps)
  • Standard Oil: America’s oil giant controlled by Rockefeller interests
  • The Relationship: 1929 partnership agreement signed BEFORE Hitler came to power

The Pattern:

  • Personal meetings between executives in neutral Switzerland
  • Technology sharing agreements (“cartel arrangements”)
  • Joint patent holdings that prevented competition
  • Continued cooperation even after war began (until 1942)

Why It Matters:
These weren’t enemies doing business despite ideology. They were PARTNERS who maintained relationships through global conflict. The relationship came FIRST, the exploitation came later.

Verification: Senate hearings (1942), declassified documents, corporate records. Check it in 60 seconds.


STEP 2: DEPENDENCIES

The Lock-In: Making yourself irreplaceable.

What It Looks Like:

  • Exclusive agreements and contracts
  • Critical infrastructure control
  • Patent monopolies
  • Regulatory capture
  • “Only we can solve this” positioning

Historical Example: The Waterfront Commission (1953-2024)

The Setup:

  • Created as “temporary” solution to organized crime on NY/NJ docks
  • Given power to license all longshoremen
  • Interstate compact = both states had to agree to dissolve it

The Dependency:

  • Every dock worker needed Commission approval to work
  • Every shipping company needed Commission permits
  • Commission became SOLE arbiter of waterfront access
  • Ports literally couldn’t function without Commission approval

The Lock:

  • “Temporary” oversight lasted 71 years (1953-2024)
  • Every reform attempt: “You’ll bring back the mob”
  • Commission survived decades of corruption scandals
  • Finally dissolved by Trump administration in 2024

Why It Matters:
Once infrastructure dependency is established, removal becomes “too dangerous” or “too disruptive.” The dependency itself becomes the defense.

Verification: Commission dissolution order (2024), 70 years of corruption investigations, port operation histories.


STEP 3: EXPANSION

The Growth: From pilot program to permanent infrastructure.

What It Looks Like:

  • “Successful” pilot programs scaled nationally
  • Temporary measures becoming permanent
  • Geographic expansion across jurisdictions
  • Scope creep beyond original mandate
  • Network effects creating more dependencies

Historical Example: Post-WWII Japan CIA Operations (1947-Present)

The Original Scope:

  • Post-war occupation (1945-1952)
  • Rebuild democratic institutions
  • “Temporary” CIA support for anti-communist politicians

The Expansion:

  • CIA secretly funded Liberal Democratic Party (LDP) founding (1955)
  • Payments to politicians continued for decades
  • Expanded to controlling yakuza networks for strike-breaking
  • Embedded intelligence relationships in every institution
  • 78 years later, infrastructure still operating

The Scope Creep:

  • From “temporary” anti-communist support…
  • To permanent political party funding…
  • To organized crime utilization…
  • To complete institutional penetration…
  • Operating continuously across 12 U.S. presidents

Why It Matters:
“Temporary” solutions have a way of becoming permanent infrastructure when they serve powerful interests. Time legitimizes what would be scandalous if proposed openly.

Verification: Declassified CIA documents, Japanese political histories, academic research on post-war occupation.


STEP 4: INSTITUTIONALIZATION

The Embedding: From program to “just how things work.”

What It Looks Like:

  • Official legislation codifying informal arrangements
  • Creation of regulatory bodies and oversight committees
  • Congressional mandates and executive orders
  • International treaties and agreements
  • Academic and professional credential requirements

Historical Example: The Federal Reserve (1910-1913)

The Secret Beginning:

  • November 1910: Secret meeting at Jekyll Island, Georgia
  • Six men representing one-quarter of world’s wealth
  • Traveled under assumed names
  • Drafted Federal Reserve Act in complete secrecy
  • Public had no idea meeting occurred

The Participants:

  • Nelson Aldrich (Senator, father-in-law to Rockefeller Jr.)
  • Frank Vanderlip (National City Bank president)
  • Henry Davison (J.P. Morgan partner)
  • Charles Norton (First National Bank president)
  • Benjamin Strong (J.P. Morgan lieutenant)
  • Paul Warburg (Kuhn, Loeb & Company)

The Institutionalization:

  • 1913: Federal Reserve Act passed by Congress
  • Private banks given control of money supply
  • Presented as “government oversight” of banking
  • Actually: banker cartel institutionalized
  • 111 years later: Still operating, never audited

Why It Matters:
Private coordination becomes public institution. Once institutionalized, questioning it becomes “radical” or “conspiracy theory.” The institution IS the legitimacy.

Verification: “The Creature from Jekyll Island” (G. Edward Griffin), Congressional Record (1913), Fed’s own historical records.


STEP 5: MONETIZATION

The Extraction: Converting control into profit at scale.

What It Looks Like:

  • Guaranteed contracts with no competitive bidding
  • Regulatory approval required (and sold)
  • Toll booth on essential services
  • Information asymmetry exploited for trading
  • Both sides of conflicts profiting simultaneously

Modern Example: Netanyahu-Kushner Relationship (1990s-Present)

The 30-Year Relationship:

  • 1990s: Netanyahu stays at Kushner family home during U.S. visits
  • Jared Kushner knew Netanyahu since childhood
  • Personal relationship spanning three decades
  • Kushner family donations: Millions to Israeli settlements

The Institutional Positions:

  • 2017: Jared Kushner becomes White House Senior Advisor
  • Netanyahu: Prime Minister of Israel (multiple terms)
  • Personal friendship now operates at state level

The Policy Outcomes:

  • 2017: U.S. recognizes Jerusalem as Israeli capital
  • 2019: U.S. recognizes Israeli sovereignty over Golan Heights
  • 2020: Abraham Accords (Kushner-negotiated)
  • Arms deals: Billions in sales to Israel and Gulf states
  • Regional policy: Maximum pressure on Iran (Israel’s enemy)

The Monetization:

  • Defense contractor profits from increased arms sales
  • Kushner family real estate dealings in region
  • Regional stability benefits Israeli expansion
  • Personal relationships converting to state policy
  • Private interests aligned with public positions

Why It Matters:
30-year personal relationship becomes foreign policy. The line between friendship and policy disappears. Monetization operates through official channels while maintaining “plausible legitimacy.”

Verification: Public record of relationship, documented policy timeline, arms deal records, settlement funding records.


STEP 6: DEFENSE

The Shield: Protecting the system when exposed.

What It Looks Like:

  • “Conspiracy theory” dismissals
  • Legal teams and jurisdiction shopping
  • “Too big to fail” arguments
  • “Jobs will be lost” warnings
  • Regulatory capture protecting the captured
  • Media narrative control

Historical Example: IG Farben Nuremberg Trials (1947-1948)

The Exposure:

  • Nuremberg trials revealed full extent of IG Farben’s role
  • Produced Zyklon B for concentration camps
  • Used slave labor from camps
  • Built factories AT Auschwitz
  • Partnered with U.S. companies throughout war

The Defense:

  • Legal: “Just following orders” defense
  • Corporate: “Individual executives, not company” defense
  • Political: “Needed for German reconstruction” argument
  • Economic: “Employment and recovery” justification

The Outcome:

  • 13 executives convicted (1948)
  • Sentences: 1-8 years (most served less than 3)
  • Company “broken up” into BASF, Bayer, Hoechst
  • All three companies still operating today
  • Combined revenue: Over €100 billion annually

Why It Matters:
Even genocide-level crimes couldn’t destroy the institutional structure. Executives got light sentences. Companies reorganized but continued. The SYSTEM survived despite exposure.

Verification: Nuremberg trial transcripts, corporate histories, reparations records.


THE COMPLETE PATTERN

IG Farben Example (Full Cycle):

  1. RELATIONSHIPS: 1929 partnership with Standard Oil
  2. DEPENDENCIES: Exclusive cartel agreements, shared patents
  3. EXPANSION: 380 German firms, 500 foreign firms controlled
  4. INSTITUTIONALIZATION: Essential to German/European industry
  5. MONETIZATION: War profiteering, slave labor
  6. DEFENSE: Light sentences, companies still operating

Timeline: 22 years (1929-1951)
Survival: Companies operating 79 years after exposure


RECOGNITION METHODOLOGY

How to Identify the Six-Step Pattern:

Ask These Questions:

  1. What personal relationships existed BEFORE the formal arrangement?
  2. What dependencies were created that make removal “impossible”?
  3. How did “temporary” or “limited” scope expand over time?
  4. When did informal arrangements become official institutions?
  5. Who profits and through what mechanisms?
  6. What defenses activate when the pattern is exposed?

The Thermodynamic Test:

  • Truth requires zero maintenance energy
  • Lies require constant coordination and defense
  • Watch WHERE energy gets spent
  • Aggressive defense = something being protected

CULTURAL IMMUNITY

The pattern only works when invisible.

Once you recognize the six-step formula:

  • You see it operating in real-time
  • You recognize which STEP the coordination is in
  • You predict what comes next
  • You understand why certain defenses activate
  • You can’t unsee it

That’s cultural immunity. Once enough people see it, coordination becomes too visible to function effectively.

You’re learning to see. Now you can’t unsee.


All examples verified through primary sources: government documents, trial transcripts, declassified CIA files, corporate records, and academic research. Every claim checkable in under 60 seconds.