The Anti Puritan
Wednesday, March 4, 2026
An alternative to boots on the ground in Iran
Sunday, March 1, 2026
Assassination World: Drone Warfare, Prediction Markets, and the Coming Empire of the Trigger
Years ago I went to a housewarming party of a reactionary that I knew back in Denver and during conversations in his backyard I articulated my intuition that drone warfare was going to get democratized, and that a new regime of assassination was going to rise. He dismissed these claims and we laughed it off, but more and more I'm convinced that my initial intuition was correct. Now with the killing of the Ayatollah I know for certain the future I grasped back then is coming true now.
Three things are happening simultaneously and nobody is talking about how they fit together.
First, drones. The US and everyone else now has the ability to kill a specific individual anywhere on earth at low cost, with no risk to their own personnel, and with a reasonable claim to deniability. This is genuinely new. Previous long-range weapons killed in zones — cities, grids, general areas. A drone can, in principle, kill one guy at a wedding and leave the people standing next to him alive. It is distance combined with specificity. More than ninety countries now have some kind of military drone capability. Turkey's Bayraktar TB2, which performed well in Libya and Nagorno-Karabakh, proved that effective drone warfare is no longer an exclusive club for superpowers. A middle power can buy or build one. They're getting cheaper, smarter, and more autonomous every year. Eventually the capability to identify and kill a specific person from the air will be available to well-funded non-state actors, private military companies, and wealthy individuals acting outside any institutional framework.
Second, the United States is exhausted. The wars in Afghanistan and Iraq ate trillions of dollars and produced outcomes ranging from equivocal to catastrophic. The American public has made it absolutely clear it will not accept significant casualties in discretionary overseas conflicts. The national debt is enormous. The force is spread thin across NATO, the Pacific, the Middle East, and Africa. The era of the 150,000-troop deployment is over. So what replaced it?
Targeted decapitation. Rather than deploying an army to occupy territory and reshape the political landscape through prolonged presence, you identify the specific individuals who are the source of the problem and you remove them. The Joint Special Operations Command and the CIA's Special Activities Center between them have built an apparatus for identifying, tracking, and eliminating individuals across dozens of countries. The public knows the famous examples — bin Laden, Soleimani, al-Baghdadi — but those sit on top of a vast pyramid of lower-profile strikes in Pakistan, Yemen, Somalia, and elsewhere that constitute not exceptional actions but a continuous, routinized practice.
Third, prediction markets now exist that price the survival odds of political figures. Polymarket processed hundreds of millions of dollars in volume during the 2024 election cycle, and its prices were cited alongside polling averages in mainstream media. The information aggregation function of these markets is genuinely useful. They also create a problem that nobody wants to say out loud: if you can buy a contract that pays $10 million if a foreign leader is "out" by December 31st, and you have the capability to make sure he is dead by December 31st, you have turned assassination into a financial transaction. The prediction market becomes a kill market. Not hypothetically — the logic of it is just plain arithmetic. This even allows intelligence services like the CIA to self finance their own operations independent of congressional budget approval.
Put these three things together and you get something that deserves a name: an Assassination World. A global political order in which great powers govern the internal composition of weaker states not through the expensive and visible instrument of occupation, but through the precise, cheap, and deniable instrument of targeted killing.
The empire of the trigger
You don't need to invade a country to control its politics if you can reliably kill anyone who tries to consolidate power in ways hostile to your interests. You don't even necessarily need to do much killing. If foreign elites understand that accumulating too much power or taking too confrontational a posture will result in their elimination, they will self-moderate without any killing being required. The most efficient form of domination is one where the dominated police themselves.
This is not a new idea. The CIA's involvement in the overthrow of Mosaddegh in Iran in 1953, Arbenz in Guatemala in 1954, Allende in Chile in 1973, and the documented plots against Castro and Lumumba demonstrate that the United States has long viewed the removal of inconvenient foreign leaders as a legitimate tool of policy. What changes now is not the intent but the capability. The tools are dramatically more capable, more precise, and more deniable than anything available to the Cold War CIA. The infrastructure for global assassination management has been built. The question is what gets done with it as the technology matures.
This infrastructure is also not going away. Bureaucracies persist. Capabilities, once built, get used. Programs, once established, expand. The JSOC and the CIA's paramilitary apparatus have their own organizational culture, their own career structures, and their own momentum. Nobody is going to dismantle them when the strategic environment changes; they're going to be repurposed and extended.
The United States won't remain the only actor either. China is rapidly developing armed drone capability. Russia has conducted poisoning operations against dissidents in multiple countries. Israel has run one of the world's most sophisticated targeted killing programs for decades, including the cyber tools (Stuxnet, Pegasus) that are essentially the digital version of the same thing. As the technology continues to democratize, middle powers and eventually non-state actors will acquire comparable capabilities. The assassination world, initially a product of US technological dominance, will gradually become a multipolar regime. Multiple powers competing to eliminate each other's proxies and clients is not a stable equilibrium. It is a recipe for perpetual covert war.
The new tyrant is algorithmic
The tyrant that comes out of this is not the strutting dictator of the twentieth century with his rallies and his gulags. The new tyrant operates through markets and intelligence services and corporations rather than through identifiable institutions of state repression. His instrument is not the concentration camp but the targeted strike. Not the midnight knock but the sudden and unexplained death of someone who might have threatened him.
This tyranny is harder to resist than the old kind because it's harder to name. You cannot organize resistance against an algorithm. You cannot rally public opinion against a kill list you're not allowed to know exists. The traditional mechanisms of resistance to tyranny — collective action, legal challenge, international solidarity — are all severely weakened by a system where the violence is invisible, deniable, and technically sophisticated. And the surveillance required to run targeted assassination at scale is mass surveillance of everyone, because you can't identify specific targets without first watching everyone. The two technologies reinforce each other: better surveillance enables more precise targeting; the demonstrated capacity for targeted killing creates incentives for broader surveillance.
There is no obvious clean solution to this. Revolution requires organizing large numbers of people in physical proximity — targeted surveillance and preemptive killing can prevent that from reaching critical mass. Legal challenge requires courts with jurisdiction, independence, and information. International pressure requires an international community capable of agreeing on what the problem even is, which an assassination tyranny that operates covertly and deniably is specifically designed to prevent.
Distributed and decentralized counter-infrastructure is the direction that makes the most sense, for the same reason that it's hard to kill: you can't decapitate a Distributed Autonomous Organization (DAO) the way you can kill the leadership of a conventional organization. Encrypted communications, open-source intelligence, distributed storage networks, and censorship-resistant financial infrastructure are the building blocks of whatever resistance eventually limits this system. These aren't utopian projects; they're practical necessities for the medium-term future. The tools that will limit the tyranny need to be developed before the tyranny is mature enough to prevent their development. This is the work of decades.
What comes out the other side
Here is the uncomfortable conclusion: the capability for targeted killing cannot be uninvented. The formal prohibition on assassination as a tool of statecraft—enshrined in US law since Executive Order 12333 in 1981—has been consistently violated for decades. Demanding that existing international humanitarian law be applied to drone strikes is not wrong, but it treats the problem as a deviation from norms rather than asking whether the norms themselves require revision in light of capabilities that are now permanent.
If targeted killing capability is going to exist — and it is — the choice is not between a world with it and a world without it. The choice is between a world with regulated targeted killing and a world with unregulated targeted killing. Regulated is better. A framework that narrows the permitted targets to state officials who have themselves committed serious human rights violations—genocide, crimes against humanity, systematic torture—and that requires real procedural accountability before action is taken, is better than a formal prohibition that everyone violates and that therefore provides no constraint at all.
Getting from here to there is likely to take fifty years. It involves the tyranny deepening, the counter-infrastructure developing, and the accumulated weight of documented abuses eventually making the status quo politically unsustainable. It is not a comfortable arc. The generation now entering political consciousness will live through the worst of it.
What I am saying is that history has two possible paths it can take with this technology. First it can take the long route. In this scenario some sort of assassination tyranny sponsored by the nuclear powers of the world rules despotically over the so-called third world and probably its own citizens. This involves a combination of technologies: Palantir style mass-surveillance, lethal drones (from large to microscopic), and assassination market coordination mechanisms into a supercharged tyranny of corporate domination, clothed behind anonymity of the killers and potential obscurity of the victims. It would start as killing political tyrants like the Ayatollah and evolve into lower and lower levels until ordinary local elected leaders, business competitors, and bureaucrats live in fear. Technology gets cheaper the more it is deployed and that means the capability of autonomous killing should get democratized over time. Into this situation a counter-resistance of the distributed autonomous organization first attempts to resist and regulate the assassination system and then attempts to control it. Eventually The tyranny combines with the DAO to form a kind of DAO-Assassination Republic. This arrangement arrives because the Distributed Republic provides moral legitimacy to the process and structure to chaos. Formalized rules let people know where they stand and let people avoid running afoul of the lethal system. The first route involves a long tortuous process where the state actors who initially control the lethal system refuse to give up that control or democratize it and face distributed resistance that eventually overthrows and captures their power. The second path, and the path humans never take because they procrastinate, is to cut to the chase and create the DAR (Distributed Assassination Republic) sooner rather than later. I don't really have a time horizon but this process could last anywhere from 30 to 150 years in my estimation. It will start as a thesis-antithesis dichotomy and eventually arrive at a synthesis organizational structure.
My point here is that this technological arrangement is inevitable and you should just cut to the chase rather than enduring the pain of a century or so of tyranny, humiliation, and resistance. The reason I think that the tyranny will win in the short term, is that assassination markets don't necessarily have to limit themselves to foreign leaders but might be employed by financial oligarchs against judges and politicians themselves. This is a system that can rapidly escape containment by the oligarchs who invented it. It's consolidated power only lasts as long as lower levels of the system don't have access to the same kind of mass surveillance, software, and drone capabilities as the oligarchs. Keeping things consolidated seems plausible until you realize that competition drives innovation and this competition is international. If the Soviet Union had trouble maintaining control of its nuclear arsenal; how much more could foreign powers have trouble containing their software? All it takes is one spiteful regime to develop mass surveillance killing tools and open source them. Since state actors have sponsored terrorism this is probably inevitable. Everything is subject to the law of supply and demand, even nuclear bombs, and even more so drones. Technology has a habit of coming down in cost. In the beginning this system will remain heavily gate-keeped: we might even get a golden age of peace for about 30 years as foreign tyrants are systematically eliminated and US hegemony asserts in a total capacity. But pressure breeds resistance and software is the one thing that gets cheapest the fastest. In the end there will be no "moat" around the assassination system. I had an inkling the things would go down this path when Ukraine started using drones and my view has only strengthened since then. This is also why I was studying DAOs even back then. I saw this thesis coming years ago.
What I see for the future is a sequence of events unfolding like this:
- The military industrial complex builds out the assassination system
- Foreign governments copy this and develop their own systems
- It escapes containment and winds up in the hands of terrorists
- The price of the technology comes down and it gets democratized
- Targeted killing becomes a regular feature of society flattening hierarchies, or perhaps consolidating them. Tall poppies get cut down. Tyranny sets in.
- DAOs rise to contain the threat, first opposing it, and then co-opting it
- A new regime of order is created around basic rights enforcement. The DAOs become DARs, synthesizing the two forces into a new organizational structure
In order to achieve moral legitimacy (and therefore Order) the "network state" must enshrine a Bill of Rights, enforceable only against politicians and corporate officials, that substantially aligns with the attitudes of the public. It should prohibit starting wars without provocation, genocide, terrorism (by both state and non-state actors), and enshrine free speech, freedom of association, freedom from association, and freedom from economic rent seeking laws. These are the crucial ones that make a regime stable. Freedom from state-sponsored rent-seeking is especially important since it gives longevity to government systems. Governments have a habit of accumulating laws and also of making corrupt laws that impoverish the people. The combination of these two forces: legislative accumulation and rent seeking are lethal to nations causing their long-term collapse. If you really want a government to last a thousand years you have to prohibit rent seeking provisions in the laws and limit the total length of the legal code. The architects of the Distributed Assassination Republic won't design it properly, but if they did, it could lead to a golden age of humanity, where all nations respect a set of rights worldwide regardless of whether or not they hold elections. The DAR ONLY ENFORCES RIGHTS AGAINST GOVERNMENTS. Having it make global law is a severe mistake that would lead to another round of thesis-antithesis overthrow of the system on a global scale. There is no one legal or cultural system that is appropriate for all humans everywhere because humans vary in their dominance hierarchies, genetic strategies, and religions that further those strategies, and any single cultural or political order marginalizes one or more of those strategies leading to a backlash of terrorism. Variance is good, actually, prevents all eggs from being in one basket. Genetically diverse cultural and religious strategies are a resilience mechanism of the species. The attempt to create global monoculture is a mistake, so the DAR must only enforce a very minimal set of rights with no feminism/LGBT/woke queer monoculture in the mix. Humans of course won't limit themselves to this sane respect for diversity and history will continue.
All of this ties into the system of blackmail they are building. Unless decentralized governance wrests these methods away from centralized control we are in for a long dark age. History is proving that classically liberal and rights-based decentralized anonymous governance are the only thing with any chance of surviving the future. Both centralization and governance by identifiable persons are vulnerable to assassination. This Distributed Assassination Republic becomes the only viable form by default. This intuition is one of the reasons why I have rejected—I will admit somewhat inconsistently—the notion of any kind of rule by a dictator. How could fascism possibly protect itself from assassination? Stability requires rights and moral legitimacy, and apparently will also require decentralized anonymous leadership. There is only one form of government that complies with all these requirements.
Thursday, February 26, 2026
Capitalism is self correcting, capitalism is suicidal
1. Family owned production businesses (not allowed to engage in mergers or sell the business, passed down from father to son. If the children don't want to run it then it is transferred to a group of competent tradesmen who are already it's managers. This would be the farming sector, trucking sector, home builders, aircraft manufacturers, logistics, freight, overseas shipping, tool manufacturers, auto companies, parts companies. Also roofing companies, plumbers, and electricians.
2. Worker owned retail and service businesses. This would include all chain restaurants, all supermarkets, and any other retail business with a wide economic footprint. It would not necessarily include bars or coffee shops which would be mostly sole proprietorships. It would include physical infrastructure like cable companies, garbage disposal, electric companies, and general manufacturers. It works like a regular corporate hierarchy but with worker vestment in the company stock. These are not workplace democracies.
3. Customer owned administrative businesses. This would include all banks—which would be credit unions, package delivery companies, Amazon, all dating websites, social media companies, and news businesses. It would also include hospitals and clinics which you would become a member-owner of to get your health care. Each of these businesses will be structured where the consumers review the actions of management and vote to kick out underperforming executives. Executives get their jobs through promotion and lose them through a kind of negative election.
4. Government-owned heavy industry. This would be your steel plants, nuclear power, solar power, oil companies, basically the entire energy sector, mining companies, defense contractors, and anything critical to national security.
5. Partner owned law firms, vet clinics and accountancies.
6. Privately owned businesses. Chinese restaurants, bars, gaming stores, record stores, coffee shops. Basically all the little retail stuff.
7. Pure capitalism. Since nearly everything in the entire economy is worker owned, customer owned, family business, or government owned the capitalist sector is used for financial occupation of foreign countries. The stock market is basically a bunch of corporations owned by Americans that sell to foreigners. The law requires that all domestic companies follow this five categorization system. Therefore the capitalist system is used as a tool of foreign conquest by financial occupation. This also means that private equity rating of domestic companies is illegal, but not of foreign ones. Pure capitalism is also allowed to sell the domestic bonds of corporations. Domestic companies might also be allowed to issue shares and sell them on the stock market but these shares have no voting power. Only companies whose customers are entirely in foreign countries can issue voting shares, and those voting shares can only be owned by Americans.
Tuesday, February 24, 2026
The Thousand Small Fixes: On Iteration, Selection, and the Perils of Grand Solutions
My Experience in Architecture School
Every semester of architecture school you have these group projects, and because college professors are ignorant communists, they never bother to appoint a leader for each team. The result is that team members often spend as much time trying to escape doing work as actually doing the work. The biggest bully winds up dominating the team, and hot and mid women alike escape their duties because the men of the team don't want to compromise their chance to fuck her.
When I was completing my degree at university, I was on a team with a bully. This was for an urban planning semester, and we were compiling information on a particular neighborhood about all the flaws and problems. I wanted to take a "dozens of solutions approach," where we documented each and every problem in the neighborhood and then proposed small solutions to fix each of them. The bully who dominated our team, a man who happened to be right wing on the only team of right-leaning males, demanded that we all agree to his grand vision to remake the downtown area with big public infrastructure and sculptures. Not wanting to do more battle with him or get ejected from the team, I went along with his proposal. These are student projects, and it's not like any of this is actually going to be built in the real world, though design juries are composed of actual professionals from the real world who occasionally appropriate a student's idea.
During the final presentation, it was a disaster. And to make matters worse, there was an all-female team that independently did the exact "dozen solutions" approach that I wanted to take and received wide praise for all their little innovative solutions. By addressing all the little flaws in the neighborhood, they created a cumulative uplifting of the whole area. They had used my approach and beaten me with it while I gave in to some bully and got trounced. I had to defend a presentation by a man I didn't even like while critiquing a presentation by a team that had taken my own approach. And all for a grade I didn't really care about in a tedious semester I didn't really care about. Thus is my real-life experience with the "great man / fearless leader" archetype.
There's always a "great man."
The Best Solutions Are Many Small Solutions
There's a fundamental recursive nature to reality going on here, and that is that every big, great solution sets off a chain of many small recursive side effects. Big solutions generally cause more problems than they solve—think Communist revolution. You would think that a conservative would understand that, but give a man power and watch him change. I have described before the problems-solution cycle. This is a cycle where every problem demands a solution, and every solution creates one or more problems of varying magnitude. The libertarian response is to throw up their hands and say that the government shouldn't bother doing anything. This is a mistake and fundamentally misunderstands the situation. The correct approach is to create new solutions whose side effects diminish in magnitude. If every solution creates a new problem, then the new problem needs to be much smaller than the old one. If enough cumulative solutions like this are put in place, then the total uncontrolled entropy in the system can be reduced to an absolute minimum. This is probably a principle of physics itself, a principle of systems in general, and you could probably plot it on a graph: that the first solution has a high-level magnitude of negative side effects, while each successive one (when done correctly) has smaller and smaller severity.
You can see this principle in action with history. The invention of agriculture was supposed to solve starvation and the human calorie deficit problem. It created the problems of feudalism, slavery, and pandemics. Slavery has never been completely abolished in the world, and the problems of democracy are legendary. Everyone thought pandemics were abolished until recently.
It goes on and on. Air conditioning solves a problem, creates social isolation as another problem. Smartphones solve a problem, create social isolation even more. Cars solve a problem, create auto-dependent cities as another problem. Birth control solves a problem, crashes birth rates and creates nasty women as another problem. Wherever there is a solution, I guarantee there is another problem created by that solution. This is especially true with technology but is also true with law. Most of what governments do is try to fix problems created by their predecessors. The problem-solutions cycle is recursive, with each new solution producing the next set of problems like turbulence in the flow of a liquid. This is why good solutions inevitably reform existing systems; they straighten out that turbulence into a laminar flow. When it's done wrong, the magnitude of chaos in society increases. This is why I consider modern internet technology to be more trouble than it's worth; it has obviously increased the magnitude of total chaos in the system.
This is also why revolution is disastrous. When you have a revolution, you are just starting the whole process over from the beginning. First, you start with a big solution, and then you iterate continuously through its problems-solutions cycle, trying to solve each little problem created by the previous solution. Far easier to just take a known political form or policy and improve upon it. Civilization does this instinctively anyway; the modern Chinese system is an improvement on the old imperial exam system. The modern Constitutional order is an improvement on ancient Greek democracy. Even religions get upgrades to make them better at being whatever they are supposed to be doing. The only mystery here is why it takes so long to iterate through new organizational forms and why politicians are so uninterested in running beta tests.
The Location of Natural Selection May Move But Its Existence Is Not Abolished
People do this thing where they scoff at selection effects. They do everything in their power to argue that selection effects don't exist or that discussing natural selection is social Darwinism, as if one could object to a fact using a moral injunction. If you know anything about reality, you know that moral injunctions don't change it. But since humans never really grow out of the childhood activity of make-believe, there is a gigantic subset of the population for which saying that something shouldn't be true is adequate justification for establishing it as false. These people engage in "ought therefore is," a form of logic that says things ought to be a certain way and therefore they are. I heard this excellently described as "wishcasting" and may explain why so many people on the left used to love Harry Potter. When you think language is a spell, then reciting the correct language changes reality, and therefore good people have good opinions, and evil people have evil opinions. Since talking about reality contradicts the wishcast, it is an evil activity. This is the old "facts don't care about your feelings" and "nature, to be commanded, must be obeyed," both of which are true statements and both of which go in one ear and out the other. (The first of these two statements comes from Ben Shapiro, and the second from Ayn Rand).
Anyway, there is a greater point at play here, a more sophisticated and high-resolution picture, which is that the location of natural selection may change but not its existence. Let's go through some examples:
If one creates artificial womb technology, then reproduction is handled by the corporations or governments that breed humans. This means that the location of natural selection is moved to the government or corporation, or perhaps the future fathers that pay for the gestation of their children. Right now, the location of natural selection is the traditional heteronormative patriarchal family unit (or whatever you want to call it).
If androids replace humanity, then the location position of natural selection is moved to the factories that make them.
If consciousness lives on a machine, then the position of natural selection is moved to the software update.
If the controller of natural selection is a religion, then the location at which natural selection occurs is the ideological corporation (the church), and the church is partially or fully in control of the direction of natural selection.
Selection is never abolished; it is simply relocated. If the selection is not genetic, then it is ideological. Everything undergoes natural selection: language, culture, nations, businesses, business models, political forms, laws, the practices of individual families. If it takes a thousand years for the welfare state to cause the genetic decay of humanity, it might only take three generations to cause cultural decay within the family, as drug addicts and wife beaters out-reproduce everyone else. Decay does not have to be genetic to happen, it does not have to occur within the family to happen; natural selection is everywhere and operating at all times. Social Darwinism is the only view consistent with actually existing reality. Social Darwinism just is, and no transcendent leverage exists that could defeat it, since it is something we are within. Social Darwinism, and Darwinism of every form, is the actually existing nature of the universe that encompasses us. There is no moral that can rise above it because morals themselves are within it. Even moral codes undergo natural selection, as those with morals that contradict survival fail to survive and reproduce and to transmit their morals to future generations. Survival doesn't mean you're right, but death definitely means you're wrong. Survival is the beginning of morality but not its totality. For something to be moral, it must at minimum facilitate its own survival and reproduction, but that only establishes a minimum criterion of not-wrongness. An ideology that leads to your death is automatically wrong, but an ideology that leads to your survival is not automatically right.
Different locations of natural selection create different incentive structures. A corporation has incentive structures radically contradictory to things like individual liberty and human ability. The incentives of corporations that use artificial wombs are much more like those of ant colonies and other eusocial animals. Take the naked mole rat, for example; it has lost the ability to experience pain because it has been selected as a eusocial creature to take care of the offspring of the queen. Say what you want about the nuclear family, but parents have a strong incentive to educate their children and make them capable, since capable children are better equipped to navigate the world and reproduce the genes of their parents. The competitive nature of sex and reproduction between families, combined with the altruistic nature of a healthy parent relationship, pushes humans toward greater capability and intelligence. Oh sure, there are abusive parents, but those represent failures of the model, which would normally be eliminated by selection forces in the absence of the welfare state. The "compassionate" welfare state creates more dysfunctional families and more abuse by breeding more abusive families into existence, and this happens independently of any genetic component, since selection affects the culture of the family and not just its genes. The incentive structures of a selection system are tremendously important because we want to live in a world where human rights exist, and if the selection structure goes against that, then human rights must constantly swim upstream against the material force of incentives. A crashing birth rate creates a profound incentive for government to care about the conditions of the population. An infinitely expanding population creates a disincentive to care about human rights and an incentive to treat humans as disposable. Creating a moral paradigm that respects the rights of individuals is not achieved through wishcasting but through incentive engineering. When the right incentives are engineered, the selection system then favors the preservation and expansion of human rights. While moral systems may have no transcendent leverage to abolish natural selection, they may access leverage to manipulate natural selection by closing off the worst and most degrading potential futures it could evolve into. Natural selection may be forced in a particular direction with incentives. "Nature, to be commanded, must be obeyed" is exactly the technique you use to preserve and expand freedom, and you do that by choosing the location of your selection. You don't allow corporations to use artificial wombs, for example, but you do allow single men to use them. You don't allow the factory to mass-update android code, but you do allow the androids to trade code amongst themselves. Since selection is never abolished but its location can be changed, controlling the location is controlling your destiny. This is an understanding with parallels in The Art of War, since one must be subjected to selection forces, one can choose the location at which the battle for survival occurs, and thus give oneself an advantage over adversaries and adversarial conditions.
The patriarchal family unit is a known commodity, a big solution with countless small recursive compensatory mechanisms to limit its abuses. It has gone through the problems-solution cycle and come out with laws, cultural limitations, and even reproductive technologies that limit its power. It may be oppressive, but so is every location at which survival and reproduction take place. The question is not whether it oppresses but whether or not it oppresses in the manner in which you get a tactical advantage for your flourishing and human rights. Since there is nothing outside of nature, and since wishcasting does not make things real, all we can do is choose the location of our battle for survival. The goal is not exactly to maximize chances of survival—survival is only the beginning of ethics—we can do even better than merely survive. The goal is to control all iterative branch points going forward so that every battle works in favor of our rights and flourishing.
Changing the point at which natural selection occurs creates a new big problem, which then requires countless secondary recursive solutions. Changing the point at which natural selection occurs is more than likely going to be a disaster that creates horrors beyond comprehension, but humans cannot help themselves where technology is concerned.
The patriarchal family unit is a known commodity, a big solution with countless small recursive compensatory mechanisms to limit its abuses. It has gone through the problems-solution cycle and come out with laws, cultural limitations, and even reproductive technologies that limit its power. A corporation with a warehouse full of artificial wombs has none of those compensatory mechanisms limiting its power and abuse.
—Fin—
Saturday, February 21, 2026
Monday, February 16, 2026
THE ARCHITECTURE OF LEVERAGE: UNDERSTANDING BLACKMAIL AS AN ECONOMIC SYSTEM
THE ARCHITECTURE OF LEVERAGE:
UNDERSTANDING BLACKMAIL AS AN ECONOMIC SYSTEM
Introduction: The Invisible Economy
In traditional business analysis, assets are tangible or measurable: real estate, intellectual property, cash reserves, market share. But there exists a shadow economy that operates on a fundamentally different principle—the conversion of human vulnerability into extractable value. This is not merely extortion. This is a sophisticated system where compromised individuals become portfolio assets, each generating different types of returns based on their position, power, and exploitability.
Understanding this system requires thinking beyond individual transactions. A single instance of blackmail is amateur-level criminality—risky, unsustainable, and likely to provoke retaliation. But when structured as a business model, with standardized asset classes, risk management strategies, and succession planning, blackmail transforms into something far more durable: a self-reinforcing network of leverage that can outlive its founder and resist conventional law enforcement.
This article examines the theoretical architecture of such a system. Through three detailed case studies—fictional but structurally plausible—we will explore how compromised individuals become different types of assets, how these assets interact to create systemic resilience, and why such systems are extraordinarily difficult to dismantle once established. The goal is not to provide a blueprint, but to develop a framework for understanding how power operates when it escapes traditional accountability structures.
I. The Asset Classification Framework
The first principle of any business system is categorization. Raw materials must be sorted by their properties and potential uses. In a blackmail economy, the raw material is compromising evidence, but the asset is the compromised person. Different people provide different forms of value based on their position in economic, legal, or political hierarchies.
Cash Leveraging Assets
These are individuals who can be directly extracted for monetary payments. The classic extortion model. The value of a cash leveraging asset correlates directly with their wealth and their vulnerability to exposure. A wealthy business executive caught in a compromising situation represents a renewable income stream. The sophistication lies in calibrating the extraction rate: demand too much and they might choose exposure over payment; demand too little and you leave value on the table.
The key variables are the target's liquid wealth, the severity of their compromise, and the ongoing cost of exposure. A person with a hundred million dollars in assets but only five million in liquid funds cannot be extracted at the same rate as someone with similar wealth but higher liquidity. Similarly, the nature of the compromising material matters: evidence of financial fraud might destroy a career but not a marriage, while evidence of certain personal behaviors might destroy both.
Asset Leveraging Positions
More sophisticated than simple cash extraction is forcing a target to surrender control over productive assets. This could mean signing over ownership of a company, transferring real estate, or providing access to financial instruments. The advantage of asset leveraging over cash leveraging is that you acquire productive capacity, not just money. A business that generates revenue becomes a permanent addition to your economic base. Real estate appreciates. Investment portfolios compound.
Asset leveraging requires more careful execution than cash extraction. Ownership transfers leave paper trails. Large asset movements trigger regulatory scrutiny. The target must be sufficiently desperate and the operator must have sufficient legal infrastructure to obscure the coercive nature of the transaction. Shell companies, complex corporate structures, and complicit legal counsel become necessary. This is where the system begins to require other compromised professionals—lawyers, accountants, notaries—who themselves become assets through their participation.
Favor Leveraging: The Power Multiplier
The most valuable assets are not those with money or property, but those with institutional power. A compromised judge, prosecutor, regulatory official, or law enforcement officer represents a force multiplier. They cannot be directly monetized like cash assets, but they provide something more valuable: protection, selective enforcement, and the ability to weaponize state power against enemies.
Favor leveraging subdivides into three primary categories. First: prosecution of enemies. A compromised prosecutor can initiate investigations, empanel grand juries, or pursue charges against your competitors or threats. The state's investigative and punitive apparatus becomes your private enforcement arm. Second: relief from prosecution. When you or your organization faces legal jeopardy, compromised legal officials can dismiss cases, suppress evidence, or engineer favorable plea agreements. Third: roof protection—a Russian organized crime term for using a superior's authority to shield subordinates. If a detective is investigating you, compromising their captain neutralizes the investigation.
The strategic value of favor leveraging assets increases geometrically when you control multiple layers of a hierarchy. A compromised trial judge provides some protection, but if their decisions can be appealed, your protection is incomplete. Compromise the appellate judges as well, and you create nearly impenetrable legal immunity. Similarly, controlling both line prosecutors and their supervisors ensures that even if one becomes uncooperative, you can apply pressure through the chain of command.
Fall Guy Assets
Every complex criminal operation requires insulation. The person at the top cannot issue orders directly, cannot handle logistics personally, cannot interface with targets without creating exposure. This requires intermediaries—and intermediaries who know too much become liabilities. The solution is to ensure that your intermediaries are themselves compromised before they begin working for you.
A fall guy asset is someone who handles operational details while being inherently disposable. They make contact with blackmail targets, they deliver threats, they arrange meetings, they manage logistics. They are given just enough authority to execute tasks but never enough knowledge to understand the full scope of the operation. Most critically, they are documented committing crimes on camera or through recorded communications. If law enforcement closes in, these individuals can be sacrificed. The operator claims ignorance—these were rogue employees, unauthorized actions, regrettable but not my responsibility.
The psychology of fall guy management is crucial. They must be kept loyal through a combination of payment and their own complicity. Once they have participated in enough criminal activity, they understand that cooperation with law enforcement means their own imprisonment. Their continued loyalty is purchased not just with money, but with mutual assured destruction. However, this only works if they believe you won't sacrifice them preemptively. This requires occasional demonstrations of loyalty—protecting them from minor legal troubles, providing resources to their families. The art is in making them feel secure enough to remain loyal, but vulnerable enough to never challenge you.
II. Vertical Integration and Network Effects
The true sophistication of a blackmail economy emerges not from individual assets, but from their systemic integration. A single compromised judge provides value. A compromised judge plus a compromised prosecutor plus compromised appellate judges plus compromised regulatory officials creates something qualitatively different: a captured section of the legal system that operates as a private resource.
Vertical integration means controlling every level of a decision-making hierarchy. In a court system, this means the trial court, the appellate court, and the supreme court of a jurisdiction. In a regulatory environment, this means the line inspector, their supervisor, the agency director, and potentially the legislative oversight committee. Each level provides redundancy and eliminates appeals to higher authority.
The network effect emerges when different asset types reinforce each other. Cash leveraging assets fund the operation. Asset leveraging positions provide legitimate business infrastructure for money laundering and operational cover. Favor leveraging assets protect the operation from law enforcement. Fall guy assets insulate leadership from direct criminal liability. Each component strengthens the others, creating a system that is more resilient than the sum of its parts.
Jurisdiction becomes a critical factor in vertical integration. Legal systems are divided into territories with different courts, prosecutors, and law enforcement agencies having authority over different geographic areas or types of cases. A change of venue—moving a trial to a different jurisdiction—can neutralize your entire captured legal infrastructure if you only control one county's system. Sophisticated operators therefore need to map jurisdictional boundaries carefully and ensure they have leverage in multiple overlapping jurisdictions.
The federal-state-local division in American law creates particular complexities. A crime might be prosecutable at the federal level, state level, or local level depending on its nature. Controlling local prosecutors provides no protection against federal charges. Controlling federal prosecutors in one district provides no protection if the case can be moved to another district. The most sophisticated operations therefore need to develop leverage across multiple levels of the system, which requires extensive resources and a large portfolio of compromised officials.
III. Case Study One: The Horizon Group
The following case study is entirely fictional but structurally plausible. It illustrates how the asset classification framework operates in practice and how vertical integration provides systemic protection.
Establishment Phase
Marcus Holloway established the Horizon Group in 2008 as a legitimate real estate investment firm in a mid-sized American city. The firm acquired distressed commercial properties during the financial crisis, renovated them, and leased them to businesses. By 2012, Horizon owned seventeen properties across three counties, generating approximately eight million dollars in annual revenue. This legitimate business provided the foundation for what would become something far more complex.
In 2013, Holloway purchased a small boutique hotel in the city's business district. The hotel, the Meridian, had forty rooms and catered to mid-level business travelers. Holloway undertook an extensive renovation that included installing a comprehensive security system with cameras in every public area and, controversially, in the rooms themselves. The ostensible justification was theft prevention and liability protection.
The Meridian's business model shifted subtly. Rather than marketing to general business travelers, it began catering to a specific clientele: local business executives and professionals who needed discreet venues for extramarital affairs. The hotel never advertised this function explicitly, but through word of mouth it became known as a place where one could rent a room for a few hours without awkward questions. The day rate was expensive but the discretion was reliable. Within eighteen months, the Meridian was operating at ninety-two percent occupancy despite never appearing on major booking websites.
The First Assets
In late 2014, a prominent local attorney named Richard Chen checked into the Meridian with a woman who was not his wife. Chen was a partner at one of the city's largest firms and had a reputation for aggressive litigation. Unknown to Chen, his activities were recorded by the hotel's security system.
Three months later, Chen's firm was representing a company in litigation against one of Holloway's business partners. The case was strong; Holloway's partner faced potential liability of approximately four million dollars. Chen received an anonymous package containing still images from his hotel visit and a simple message: the litigation should be settled for nuisance value or more images would be sent to his wife and the state bar association.
Chen settled the case for seventy-five thousand dollars. Holloway had just created his first favor leveraging asset. Chen had demonstrated he would compromise his professional obligations under pressure, and Holloway retained evidence that could destroy Chen's career and marriage at any time. Over the next eighteen months, Chen was called upon three more times to provide favorable legal opinions, to settle cases disadvantageously to his clients, and eventually to refer certain clients to other attorneys when their interests conflicted with Holloway's network.
The pattern repeated. The Meridian operated for three years, accumulating video evidence of professional men—attorneys, accountants, a city council member, two judges, and numerous business executives—engaging in behavior they desperately wanted concealed. Each became a potential asset. Not all were activated immediately. Some were held in reserve, their compromising material filed away for potential future use.
Building the Vertical
By 2017, Holloway had compromising material on Judge Patricia Morrison, who sat on the county circuit court. Morrison had been caught on camera in a particularly compromising situation that would have ended both her career and her marriage. Holloway did not immediately activate Morrison as an asset. Instead, he waited for the right case.
In early 2018, a business partner of Holloway's was charged with commercial fraud. The case was strong and the prosecutor was aggressive. The case was randomly assigned to Judge Morrison. Holloway made contact through an intermediary—a fall guy asset named Thomas Vega who had his own compromising history and who handled operational details without knowing the full extent of Holloway's network.
Morrison was given a choice: suppress certain evidence, make favorable evidentiary rulings, and generally obstruct the prosecution, or face the destruction of everything she had built. Morrison complied. The prosecution's case fell apart due to evidentiary problems, and the charges were eventually dismissed. Holloway had just converted a favor leveraging asset from passive to active status.
But Holloway understood vertical integration. Morrison's rulings could be appealed. He needed the appellate court as well. Through careful research, he discovered that one of the three appellate judges for the region had a gambling problem and significant debts. Using cash leveraging techniques, Holloway had his network arrange for the judge to be extended substantial credit at certain establishments, then purchased the debt. The judge was never told directly that Holloway owned his debt, but when appeals that mattered to Holloway's interests came before the court, certain suggestions were made through intermediaries.
The system was now vertically integrated in the judicial branch. Trial court decisions favorable to Holloway's network would be upheld on appeal. Decisions unfavorable to the network would be reversed. The probability of adverse legal outcomes dropped substantially. Holloway's partners understood that he could provide a valuable service: legal immunity within a specific jurisdiction.
Monetization and Expansion
With vertical integration achieved in the legal system, Holloway could offer a product: protection. Local business owners engaged in gray-market or illegal activities—unlicensed contractors, businesses with labor violations, operators with tax irregularities—were approached by Vega and other intermediaries. For a monthly fee, they could operate with substantially reduced risk of legal consequences. If they were investigated, charges would be dismissed or reduced. If they were sued, judges would rule favorably.
This protection racket generated approximately forty thousand dollars monthly by 2019. But it also created a new problem: witnesses. Some of the protected businesses had employees who might testify about irregularities. Some had competitors who might file complaints. Holloway needed law enforcement assets as well.
A sergeant in the city police department, David Reese, had visited the Meridian in 2015. Reese was in charge of the commercial crimes unit. In 2019, when a complaint was filed against one of Holloway's protected businesses, Reese was contacted through intermediaries and reminded of his vulnerability. The investigation was perfunctory, the evidence was mishandled, and the case never advanced to prosecution.
By 2020, Holloway controlled or had leverage over: six attorneys, two judges, one appellate judge, three police officers, a city council member, two accountants, and dozens of business owners who paid for protection. The Horizon Group's legitimate real estate business generated eight million annually. The protection operation generated approximately five hundred thousand annually. But the real value was not in the cash flow—it was in the immunity. Holloway could operate any business, legal or illegal, within his territory with negligible legal risk.
Structural Resilience
What made the Horizon Group resilient was its layered structure. Holloway never made contact with assets directly. Vega and two other intermediaries handled all communications. These intermediaries were themselves compromised—Vega through financial crimes he had committed while working for Holloway, the others through various forms of documented misconduct.
The compromising material was stored redundantly in multiple secure locations, with dead man's switches that would release material if Holloway was arrested or killed. Holloway had explicitly made certain assets aware of this arrangement. Judge Morrison knew that her cooperation purchased not just Holloway's silence but his active interest in protecting her. If Holloway was arrested, the material would be released anyway, so Morrison had an incentive to use her position to prevent his arrest.
By 2021, the system had become self-sustaining. Assets protected other assets. When Sergeant Reese came under internal investigation for unrelated misconduct, Judge Morrison arranged for the investigation to be transferred to a jurisdiction where charges were quietly dropped. When one of Holloway's attorneys faced bar discipline, the investigating committee included a member who was himself compromised through financial dealings with Holloway's network.
The network had achieved something remarkable: it had become larger than any individual member, including its founder. Holloway could potentially be removed, but the network itself had enough interconnected leverage to continue functioning. Multiple members had access to compromising material on multiple other members. Mutual assured destruction had created a form of stability.
IV. Case Study Two: The Atlantic Fund
This second case study examines how a blackmail economy can operate at a higher financial level, involving asset leveraging and complex corporate structures. Again, this is entirely fictional.
Origins in Legitimate Finance
The Atlantic Fund began in 2005 as a small private equity firm founded by Elena Rostova, a former investment banker with expertise in distressed asset acquisition. The fund's initial capital was approximately twenty million dollars from a handful of high-net-worth individuals. The fund's strategy was conventional: identify undervalued companies, acquire controlling stakes, restructure operations, and exit at a profit.
Between 2005 and 2010, the Atlantic Fund made seven investments with mixed results. Three were modest successes, three were failures, and one—the acquisition of a regional logistics company—was highly profitable. By 2010, the fund had grown to approximately forty million in assets under management. The returns were adequate but not exceptional. Rostova began looking for ways to gain competitive advantage.
The Compromise Mechanism
In 2011, Rostova was approached by a consultant named Michael Torres who specialized in opposition research and competitive intelligence. Torres had a particular specialty: identifying personal vulnerabilities in executives and board members of target companies. His methods included private investigators, digital surveillance, and human intelligence. He was, in essence, an information broker who dealt in compromising material.
Torres proposed a partnership. The Atlantic Fund would identify acquisition targets. Torres would research the personal lives of key executives and board members. If compromising material was found, it would be used not for blackmail in the traditional sense, but as leverage in negotiations. The target company would not be told explicitly that their executives were compromised, but those executives would be contacted privately and given a choice: support the acquisition at a favorable price, or face exposure.
The first test case was a manufacturing company in financial distress. The CEO was having an affair with a subordinate, creating potential liability for the company and personal liability for the CEO. Torres documented the relationship. When Atlantic Fund made an acquisition offer, the CEO privately received evidence of the documentation and a suggestion that supporting the acquisition would ensure the material never surfaced. The CEO did not inform the board of this pressure. He supported the acquisition. Atlantic Fund paid twenty percent below the company's fair value, a discount of approximately four million dollars.
Systematic Asset Leveraging
Over the next five years, the Atlantic Fund used this method in twelve acquisitions. Not every target had compromisable executives, but approximately sixty percent did. The cost of Torres's research services was approximately five hundred thousand per transaction. The average savings in acquisition price was three to seven million dollars. The return on investment was extraordinary.
But Rostova realized something more valuable than cost savings: she now owned compromising material on executives at twelve different companies. Even after the acquisitions were complete, these executives remained in place—either as employees of Atlantic Fund's portfolio companies or at other firms where they had found new positions. Each one was a potential asset.
In 2016, Rostova needed to place a large debt offering for one of her portfolio companies. The terms were unfavorable given the company's credit rating. However, the executive who made the credit decision at a major regional bank was someone who had been compromised during an earlier acquisition. The executive had left the target company and taken a position at the bank. He was contacted through intermediaries and reminded of his vulnerability. The debt offering was approved at unusually favorable terms, saving Atlantic Fund approximately two million in interest costs over the term of the loan.
The model had evolved. Compromised executives were no longer one-time assets used to facilitate individual transactions. They were permanent assets who could be activated whenever they achieved positions relevant to Atlantic Fund's interests. Torres maintained a database tracking the career movements of compromised individuals. When one reached a position of influence at a bank, regulatory agency, or potential acquisition target, they were flagged for potential activation.
The Regulatory Capture
In 2018, one of Atlantic Fund's portfolio companies faced investigation by state regulators for environmental violations. The violations were real and potentially expensive to remediate. However, the deputy director of the relevant regulatory agency was a former executive who had been compromised five years earlier during an acquisition. He had moved from the private sector to public service, likely hoping to escape his former life.
Rostova had Torres make contact. The deputy director was reminded of his past. He was not asked to dismiss the investigation—that would be too obvious and too risky. Instead, he was asked to slow the process, to accept the company's remediation proposals without extensive additional scrutiny, and to avoid escalating the matter to formal enforcement action. The deputy director complied. The company's remediation costs were approximately six million dollars—substantial, but far less than the twenty to thirty million that aggressive enforcement might have demanded, and certainly less than the cost if operations had been suspended pending compliance.
This event revealed a new dimension of the asset portfolio. Compromised individuals who moved into regulatory positions became favor leveraging assets. They provided protection from enforcement, favorable interpretations of regulations, and advance warning of investigations. Between 2018 and 2022, Atlantic Fund benefited from at least seven instances where compromised regulators provided protection or favorable treatment to portfolio companies.
The Succession Problem
By 2022, the Atlantic Fund managed approximately three hundred million in assets and had compromising material on forty-seven individuals in positions of influence across finance, industry, and government. Rostova was fifty-eight years old and beginning to consider succession. But succession created a profound problem: whoever inherited control of the compromising material would inherit the entire leverage network.
Rostova had a daughter, Natasha, who worked in the fund but had not been informed of the leverage operations. She believed her mother ran a successful but conventional private equity firm. Torres, however, knew everything. He maintained the database, he managed the communications with compromised assets, he handled the operational details. He was a fall guy asset in theory—Rostova had ensured he was sufficiently compromised through his own methods that he could be sacrificed if necessary—but he was also the only person who understood the full system.
In 2023, Rostova was diagnosed with a serious illness. She had perhaps five years remaining. The succession question became urgent. She could pass control to Natasha, but Natasha's ethical objections might lead her to dismantle the leverage system, destroying the fund's competitive advantage. She could pass control to Torres, but Torres had no capital and no legitimate business expertise. The fund would likely collapse without her operational knowledge.
Rostova chose a third option. She created a trust structure that gave Natasha control of the fund's operations but gave Torres permanent control of the information assets—the compromising material and the database of compromised individuals. Torres would provide services to the fund under long-term contract. Natasha would have plausible deniability about the sources of the fund's competitive advantages. Torres would have financial security and the ability to market his services to other clients if necessary.
The structure was brilliant in its cynicism. It ensured the leverage system would survive Rostova's death while protecting Natasha from direct legal liability. The compromising material became a form of property that could be transferred across generations. The business model had achieved true sustainability—it was no longer dependent on its founder's life or liberty.
V. Case Study Three: The Infrastructure Play
The final case study examines the most sophisticated form of leverage economy: one that operates at the level of critical infrastructure and achieves state-like functions. This scenario is fictional but illustrates the logical endpoint of leverage-based systems.
Digital Infrastructure as Leverage Platform
In 2015, a technology company called Sentinel Systems launched a cloud storage and communication platform called SafeVault. The product's marketing emphasized security and privacy. All data was encrypted. The company retained no access to user content. The platform was particularly attractive to professionals who handled sensitive information: attorneys, healthcare providers, financial advisors, and executives.
SafeVault's adoption grew rapidly. By 2018, the platform had approximately two million users, including forty thousand attorneys and twenty thousand physicians. The company's revenue model was subscription-based. The company was profitable but not extraordinarily so. However, the founders—three computer scientists named Anderson, Liu, and Okafor—had embedded backdoor access into the encryption system.
The backdoor was sophisticated. It did not simply bypass encryption. Instead, it exploited a flaw in the key generation algorithm that allowed the founders to derive encryption keys from publicly observable metadata. To any external security audit, the system appeared secure. The encryption was strong and the keys were properly generated. But the founders could access any user's data at will.
Building the Asset Database
Beginning in 2018, the founders began systematically accessing user data. Not all of it—that would have required impossible storage capacity and would have created unnecessarily large attack surfaces. Instead, they used automated systems to scan for particular types of content. Communications containing certain keywords. Documents with particular formatting that suggested legal memos or medical records. Financial documents. Personal photographs.
The system flagged approximately sixty thousand users as potentially valuable targets based on their content. These users were then subjected to more detailed analysis. Did their communications reveal affairs? Financial crimes? Professional misconduct? Medical malpractice? Tax evasion? Immigration violations? The automated systems could not make sophisticated judgments, but they could identify potential compromising material for human review.
By 2020, Sentinel Systems had identified approximately eight thousand users with clearly compromising material in their SafeVault accounts. These included twelve hundred attorneys, nine hundred physicians, four hundred executives at major corporations, three hundred government officials, and thousands of other professionals. The database was extraordinary: it contained not just evidence of misconduct, but the actual private communications and documents of influential people across the entire country.
Monetization Strategy
The founders understood that mass blackmail was impractical and risky. Contacting eight thousand people would create exposure and probable law enforcement action. Instead, they pursued a selective activation strategy. They would only activate assets when specific high-value opportunities emerged.
In 2020, Sentinel Systems needed to raise capital for expansion. They pitched to venture capital firms but found the terms unfavorable. However, one of the partners at a major venture firm was among their compromised users. The partner had used SafeVault to store communications about insider trading. Anderson made contact through an anonymous channel. The message was simple: invest on favorable terms or face criminal exposure.
The partner invested five million dollars personally and persuaded his firm to invest an additional twenty million. The terms were extremely favorable to Sentinel Systems. The company's valuation increased to two hundred million despite modest revenue. The partner had effectively been forced to pay millions to prevent his own prosecution.
Over the next three years, Sentinel Systems activated assets approximately thirty times. A compromised FDA official expedited approval for a partner company's medical device. A compromised SEC attorney provided advance warning of an investigation into insider trading at a firm that paid Sentinel for consulting services. A compromised judge ruled favorably in a patent dispute where Sentinel had financial interests. Each activation generated value—sometimes direct payments, sometimes favorable regulatory treatment, sometimes business opportunities.
Scale and Systematic Power
By 2023, Sentinel Systems had evolved beyond a technology company. It was effectively a private intelligence service with leverage over thousands of individuals in positions of power. The company began offering services to other entities. For a substantial fee, they would activate assets on behalf of clients. Need a regulatory approval? They could arrange it through a compromised official. Need to win a lawsuit? They could arrange favorable rulings. Need to damage a competitor? They could leak compromising material about the competitor's executives.
The service was expensive—typically between five and twenty million per activation—but for corporations or wealthy individuals facing existential threats, it was cost-effective. A pharmaceutical company paid fifteen million to secure FDA approval for a drug that might generate billions in revenue. A defense contractor paid twenty million to influence a procurement decision worth two hundred million.
Sentinel Systems had discovered the ultimate leverage business model: infrastructure control. By controlling a platform that people trusted with their most sensitive information, they had created a self-replenishing asset base. As more people used SafeVault, more people became compromised. The network effect worked in reverse: each new user increased the probability that someone in their professional network was also compromised, making coordination and leverage easier.
The Immunity Problem
The fundamental problem with Sentinel Systems' operation was that it required continuous immunity from investigation. If law enforcement ever seriously investigated the company, the backdoor would eventually be discovered. The founders needed to ensure that such investigations never occurred or were terminated before they could succeed.
The solution was to compromise law enforcement itself. Among Sentinel's compromised assets were approximately fifty federal agents across various agencies: FBI, DEA, SEC, and others. These agents had used SafeVault for personal purposes and had generated compromising material. In 2024, when the FBI's cybercrime unit began an investigation into unusual patterns in SafeVault's network traffic, one of the compromised agents was part of the investigation team. He provided advance warning to Sentinel Systems.
Sentinel activated multiple assets simultaneously. A compromised DOJ attorney arranged for the investigation to be transferred to a different unit where resources were scarce. A compromised Congressional staffer asked questions during an oversight hearing that implied the FBI was wasting resources investigating secure communication platforms. A compromised federal judge issued a ruling in an unrelated case that created legal precedent making certain types of evidence collection more difficult.
The investigation was abandoned within six months. Sentinel Systems had demonstrated that it could defend itself by activating its network. The company had achieved something extraordinary: it had captured enough of the law enforcement and regulatory apparatus that it could prevent investigation of itself. It had effectively achieved immunity.
Systemic Implications
By 2025, Sentinel Systems represented a form of power that existed outside normal institutional structures. It could influence regulatory decisions, judicial outcomes, legislative processes, and law enforcement actions. It operated as a shadow government—not controlling everything, but able to intervene decisively in matters affecting its interests.
The founders understood that their operation was sustainable indefinitely as long as they maintained operational security and continued to compromise new assets to replace those who retired or became uncooperative. The system was self-reinforcing: each successful intervention increased their resources, which allowed them to compromise more assets, which increased their power to intervene. The feedback loop was positive and accelerating.
Most disturbingly, the system was inheritable and transferable. The founders created a trust structure similar to the Atlantic Fund's model. Control of the backdoor access and the asset database could be transferred to successors. The leverage infrastructure had become a form of property—illegal and ethically abhorrent, but extraordinarily valuable and surprisingly stable.
VI. Theoretical Analysis: Why These Systems Persist
The three case studies illustrate different scales and methods, but they share common structural features that explain their resilience. Understanding these features is essential to understanding why such systems, once established, are extraordinarily difficult to dismantle.
Mutual Assured Destruction
The nuclear deterrence concept applies directly to leverage networks. Once a system reaches a certain size, multiple participants have access to compromising material on multiple other participants. Judge Morrison in the Horizon Group case had an incentive to protect Marcus Holloway because if Holloway was arrested, his dead man's switch would destroy Morrison as well. The compromised venture capitalist in the Sentinel case had an incentive to protect the company because its exposure would lead to his own exposure.
This creates a bizarre form of stability. No individual participant can defect without risking their own destruction. Cooperation is enforced not by loyalty or ethics but by rational self-interest. The system becomes an equilibrium: everyone is trapped, but everyone understands that escape is more dangerous than continued participation.
This dynamic makes prosecution extraordinarily difficult. Traditional law enforcement relies on flipping witnesses—offering immunity or reduced sentences in exchange for testimony. But in a mature leverage network, witnesses cannot safely cooperate because their cooperation triggers retaliation not just from the primary targets but from all other compromised participants who fear exposure.
Network Effects and Increasing Returns
Traditional criminal enterprises face diminishing returns to scale. Each additional member increases operational risks and coordination costs. Leverage networks are different: they exhibit increasing returns to scale. Each additional compromised asset makes the network more valuable because it increases the probability that any given situation can be influenced.
In the Horizon Group case, having one judge was valuable. Having one judge plus an appellate judge was more than twice as valuable because it controlled an entire adjudication chain. Having judges plus prosecutors plus police was more than three times as valuable because it controlled the entire criminal justice process from investigation through sentencing.
In the Sentinel Systems case, the network effect was even more pronounced. Having eight thousand compromised assets meant that almost any significant transaction or regulatory action could be influenced by activating someone in the decision chain. The system approached total operational freedom within its domain.
Jurisdictional Arbitrage
Legal systems are divided into jurisdictions with boundaries. Sophisticated leverage operations understand these boundaries and operate across them. The Horizon Group controlled one county's legal system but would be vulnerable if cases moved to federal court or adjacent counties. The solution was to expand into those jurisdictions or to ensure that cases never moved there.
Sentinel Systems operated nationally, which meant it needed to compromise assets in multiple federal jurisdictions. But because it controlled infrastructure rather than physical territory, it could operate anywhere its users were located. A compromised federal judge in the Southern District of New York could be activated for cases there. A compromised SEC attorney in Washington could be activated for regulatory matters. The geographic distribution of assets matched the geographic distribution of power.
This creates a whack-a-mole problem for law enforcement. Shutting down operations in one jurisdiction simply causes them to shift to another. Comprehensive action requires coordination across multiple jurisdictions simultaneously, which is organizationally difficult and creates more opportunities for leaks and warnings.
The Inheritance Problem
Perhaps most disturbing is the transferability of leverage systems. Traditional organized crime faces succession crises. When a mob boss is killed or imprisoned, rival factions fight for control, creating instability that law enforcement can exploit. Leverage networks are different because the assets themselves are information, and information can be transferred without diminishing the original holder's power.
Both the Atlantic Fund and Sentinel Systems created formal succession structures. The compromising material and asset databases were treated as property that could be transferred through trusts or contracts. This means the leverage infrastructure survives the death or imprisonment of its founders. The Atlantic Fund's leverage system will continue to benefit Natasha Rostova even though she may never fully understand its mechanisms. Sentinel Systems' backdoor access can be transferred to new operators.
This transforms leverage from a temporary criminal activity into a permanent institutional structure. The compromising material becomes an asset class that can be inherited, sold, or used as collateral. The moral implications are staggering: future generations inherit not just wealth but power structures built on coercion.
VII. Conclusion: The Shadow Economy's Logic
The three case studies illustrate a disturbing reality: blackmail, when structured as a business rather than practiced as opportunistic crime, can create systems that are more resilient than the institutions designed to prevent them. The Horizon Group controlled local legal outcomes. The Atlantic Fund distorted market competition and regulatory enforcement. Sentinel Systems achieved near-immunity from investigation.
These systems succeed because they exploit structural features of how power operates. They create mutual dependency through mutual assured destruction. They generate increasing returns to scale through network effects. They arbitrage jurisdictional boundaries that constrain law enforcement but not criminal operations. They establish succession mechanisms that allow leverage infrastructure to outlive individual operators.
The theoretical insight is that leverage is not merely criminal activity—it is an alternative form of property rights. In legitimate economies, property rights are enforced by legal systems: contracts, titles, patents. In leverage economies, property rights are enforced by threat: the capacity to destroy someone's reputation, freedom, or life. But the structural logic is similar. Both systems create exclusivity, transferability, and extractable value.
Understanding these systems is not an endorsement of them. It is a recognition that power operates through mechanisms that often evade legal and ethical constraints. The challenge for legitimate institutions is to develop resilience against capture. This requires acknowledging that traditional accountability mechanisms—prosecution, regulation, democratic oversight—can be systematically subverted when enough key participants are compromised.
The disturbing conclusion is that once a leverage network achieves critical scale, it may be effectively impossible to dismantle using normal institutional mechanisms. The institutions themselves become part of the network. The alternative—extraordinary measures, mass prosecutions, institutional purges—carries its own dangers to legitimate governance. This creates a tragic equilibrium: leverage systems that should not exist but cannot easily be eliminated once established.
The question is not whether such systems exist—they almost certainly do at various scales—but whether we can develop institutional antibodies that prevent them from reaching critical mass in the first place. That requires vigilance, structural safeguards, and an understanding of the economic logic that makes them attractive to operators and resilient once established.