You can only have 2 out of 3



You can have an ugly place to live and unlimited immigration but the cost of living will be great and the prices will be low. The cost of living will be kept down by the fact that everything is so ugly and the services are so terrible. This is because although there is unlimited potential for immigration no one actually wants to move there. Thus, market demand will be low for services and housing and this will keep everything affordable.


You can have a beautiful place to live and an affordable cost of living but only at the cost of an intolerant immigration policy. If you were strict immigration then you restrict market demand for housing and services. This lets you keep things affordable want the same time making them beautiful and appealing.


You can have a beautiful place to live and mass immigration but not an affordable cost of living. The appeal of the place combined with immigration will drive up prices for everything and demand for government services. This will make everything expensive.


Appealing location 
Affordable housing and services 
Freedom of movement 


The laws of physics (and economics) only permit two out of three of these to exist in the same place at the same time.


De Sitter's World

 

A Story

I. The Object That Should Not Be

The first thing Yael Doran noticed was that the stars were wrong.

Not wrong in any way she could immediately name. They were simply bent — pulled into thin arcs at the periphery of her forward display, as if the universe ahead had developed a slow drain somewhere near its center, and all light within a certain radius was being gently, inexorably drawn around whatever sat at its focus. The navigation system had been flagging the anomaly for six hours, producing readings that the onboard interpreter had quietly classified as instrument error and filed away, because the alternative required a category of object the interpreter had no protocol for.

She pulled up the gravitational analysis manually. Mass signature: approximately thirty solar masses, distributed across an object seven hundred million kilometers in diameter. The numbers sat there in their neat columns and refused to make sense. Thirty solar masses spread across a volume larger than the orbit of Jupiter produced a density so low it was barely above vacuum. Nothing with that density could produce the gravitational lensing she was looking at. Nothing with that lensing could have that density.

The object itself was dark. Not the ordinary dark of an unlit body reflecting nothing — this was darker than that, a darkness with a specific quality, as though the object were less an object than an absence with edges. The edges, though. The edges were the part that made her stop eating her meal and simply stare.

The outer shell was encrusted with billions of years of micrometeorite impacts — she could see them in the enhanced imaging, a surface texture like old bone, pitted and dense and carrying in every square centimeter the record of a timeline she could not calculate because the number kept overflowing her estimation software. The shell was not smooth. It was not manufactured in any way she recognized as manufacture. It looked grown. It looked like something that had accreted and organized itself and persisted while the universe conducted its business around it, indifferent as a stone at the bottom of an old river.

She called Dr. Osei Acheampong up from the biology bay, where he had spent the last four days cataloguing samples from a routine survey stop three systems back. He arrived still wearing his lab coat, took one look at the display, and sat down in the co-pilot's chair without being invited.

"The signal came from that," she said.

He looked at the mass readings, then at the size, then back at the mass readings. "That's not possible."

"I know."

"The gravity readings suggest something with negative energy density in the interior. That would mean—"

"Exotic matter. Yes. A gravastar." She paused. "Theoretically."

The word sat between them. A gravastar was a solution to Einstein's field equations — a mathematical object, a thing that was not forbidden by physics but had never been observed, had never been expected to be observed, a theoretical construct that existed in papers the way ghosts existed in stories: possible in principle, encountered nowhere in practice.

Except here.

The third member of the crew, Mira Vasquez, their linguist and signal analyst, had been working on the mathematical content of the original signal for the full six months of their transit. She had decoded most of it. What she could not explain was a subsurface component — a precise pattern of electromagnetic pulses, timed at frequencies that corresponded to nothing in any known communication protocol, that seemed to interact with something other than their instruments. She had flagged it repeatedly. The interpreter had filed it repeatedly as instrument noise. Only now, with the object filling their forward display and their clocks running three seconds fast per day by a discrepancy no calibration could correct, did the word she had been hesitant to use seem appropriate.

Biological. The subsurface component was biological. Aimed at them, not at their ship.

II. Entry

The entry point was not a door. It was a region of the shell surface, roughly three hundred meters across, where the material had a slightly different texture and a subtle iridescence that their instruments read as a local spacetime curvature anomaly — a place where the geometry of inside and outside became briefly negotiable. Doran piloted the shuttle to within fifty meters of it and they sat there for an hour, instruments running, no one speaking.

They went through on foot. The transition took one step. Outside: hard vacuum, the shuttle behind them, the cold dark of normal space with its normal stars. Inside: something that their nervous systems required several seconds to process, not because it was incomprehensible but because it was too comprehensive — too much information arriving at once from angles that had no analog in anything they had trained for.

The interior glowed. Not brightly. A soft omnidirectional gold that had no source — it came from everywhere and cast no shadows, or rather cast shadows in every direction simultaneously so that nothing was truly dark anywhere. Doran's first thought was that someone had left the lights on. Her second thought, arriving a moment later, was that the light was not from a source but from the geometry itself — from the spacetime medium that filled the interior, radiating at a temperature just above absolute zero, just enough to fill the space with photons, just enough to see.

The horizon went up.

This was the thing that no amount of preparation could prepare for. On any normal world the ground extends to a horizon that curves away and drops. Here the ground — the inner surface of the shell, covered in hundreds of feet of accumulated soil, in overgrown structures and ruined irrigation channels and the ghost-geometry of fields that had been tended by something, once — the ground curved upward. In every direction. The terrain rose on all sides and continued rising, curving overhead, becoming sky that was also more ground, more soil and forest and the wreckage of civilization, until it disappeared into the atmospheric haze that blurred everything beyond a few thousand kilometers into a soft blue obscurity. Through gaps in the haze, at enormous distances, the pale smears of floating platforms were visible — continent-sized structures suspended in the interior volume by mechanisms none of them yet understood, each with its own miniature weather system, clouds forming below their undersides.

Acheampong sat down on the soil without deciding to. Doran understood. The scale of it had a physical quality, a pressure. You could not look at it without your body deciding that sitting was the appropriate response.

The soil under their feet was dark and rich and smelled of something complex — biological, layered, a smell like very old forests and something else underneath that had no word. Doran picked up a handful and let it run through her fingers. It felt like good agricultural soil. It was good agricultural soil, at the surface. But three meters away, a recent erosion had cut a slice through the substrate and exposed the stratigraphy below, and looking at it she had the first intimation of what they were really dealing with. The cut face showed not one or two or ten distinct layers but a continuous gradation of them, each a slightly different color, each representing a different era of accumulation, descending into a darkness where the cut became too deep to see its bottom. Hundreds of feet of this, and every foot a different chapter of a history she had no framework to date.

III. The Farms

It took two days of walking to reach the first structures, and by the time they did, Acheampong had stopped sleeping normally. Not from insomnia — he was sleeping, but his sleep had become vivid in a way he found difficult to describe and eventually stopped trying to describe. He dreamed geometry. Specifically, he dreamed a network of points connected by lines, some lines short and direct, some long and looping, the whole thing arranged in a three-dimensional topology that felt, in the dream, perfectly legible — as though he were looking at a map of somewhere he had always known. He woke from these dreams feeling oriented in a way he had not felt since entering the interior, as if some part of his navigation had quietly updated itself using information he had not consciously received.

The structures, when they reached them, were recognizable as buildings the way a skeleton is recognizable as a person. The basic geometry was there — walls, enclosures, rooflines, what had clearly been roads between them, still faintly visible as depressions in the overgrowth where the harder substrate of the road surface resisted vegetation differently than the surrounding soil. The buildings themselves were intact. Not maintained — nothing had maintained them in a very long time — but built from materials that had declined to decay, a shell-derived composite that seemed to shed entropy the way hydrophobic surfaces shed water. Inside them were spaces that had once held machinery, storage, processing equipment. The machinery was gone, or rather had become something other than machinery, had participated in a long biological negotiation with the organisms that moved through these spaces over uncountable generations, and what remained was neither machine nor organism but a third category that Acheampong spent most of the second day attempting to classify before deciding that classification was the wrong approach.

The farms were the most disorienting feature. From altitude — Doran had sent up a small survey drone — the landscape resolved into rows. Faint, irregular, interrupted by millennia of organic chaos, but rows. The ghost of agriculture, preserved in the orientation of the terrain, in the faint chemical signature of irrigation channels that had long since found their own paths. Whatever had been planted here had been planted in rows, tended, cultivated. The civilization that built a structure seven hundred million kilometers across had farmed it. Had stood in fields under the omnidirectional gold light and done the oldest thing that intelligence does with land.

In the ruins of what had been an orchard, the trees were still fruiting. This was the thing that stopped all three of them and produced a silence that lasted a long time.

The fruit was large — larger than any cultivated fruit Doran had encountered, larger probably than its ancestors had been, selected by billions of generations of unmanaged growth toward some optimum that the orchard's original designers had not intended. It was a deep amber color and it smelled extraordinary, a sweetness with depth behind it, layered, almost narcotic. Vasquez ate one before anyone could advise caution. She said it was the best thing she had ever eaten. She said she felt clearer afterward, more present, as if a mild static she had not noticed until it was gone had been removed from her cognition.

Acheampong ran a field analysis on a second specimen without eating it. The chemical profile was complex — natural sugars, yes, but also a suite of compounds that had no analog in his reference library, that appeared to be bioactive in ways his instruments could detect but not fully characterize. He noted this. He noted that several of the compounds appeared designed — not evolved, designed — to interact with primate neurology in specific ways. He noted that the tree had been growing here for a very long time and had had a great deal of time to optimize its fruit for whatever ate it.

He did not eat one.

That night — they had set up a sleep interval by ship time, though the interior light did not change — something moved in the root structures at the edge of their camp. Large. Patient. Deliberate in the way that only predators are deliberate, that specific quality of stillness that is not rest but controlled potential. Their motion sensors registered it and then, after several minutes, lost it — not because it moved away, but because it stopped moving in a way that defeated the sensor's threshold for detection. It simply waited. Doran lay awake listening to the silence and understood that the silence was not empty.

IV. The Bone Layer

On the fourth day Acheampong found the skull layer.

He had been digging a soil profile sample at the base of a cut bank, working downward through the stratigraphy with the methodical patience of someone who understood that every centimeter was a different era. At forty feet he hit a distinct stratum — pale, mineralizing, extending laterally as far as he excavated in either direction. Bones. Not scattered randomly, the way a predator scatter suggests, but lying in orientations consistent with creatures that had simply died in place, or been placed. Hundreds of them in the section he could reach. Given the lateral extent, possibly millions in total.

The skeletons were bipedal. Bilaterally symmetrical. The forebrain volume of the skulls was large — larger than human, in the lower specimens. As he worked upward from the earliest examples toward the layer's upper boundary, the skulls changed. Gradually, across what must have been thousands of generations given the depth of deposit, the forebrain shrank. The jaw expanded. The eye sockets enlarged to a degree that, in the uppermost specimens nearest the boundary, had become the dominant feature of the face — vast orbital structures that implied eyes evolved for a dimmer environment or for sensitivity ranges beyond the visible.

He sat with a skull in his hands for a long time. The hands that had built this structure — that had solved the mathematics of exotic matter containment, that had engineered the rotation of a shell seven hundred million kilometers in diameter to produce exactly one standard gravity on its inner surface — those hands had become the hands outside their camp last night, patient and clawed and waiting in the dark.

The builders were not gone. They had never gone anywhere. They had simply become something else, slowly and completely, across a duration so vast that the something else had forgotten it had ever been something different.

Above the bone layer the soil continued upward for another four hundred feet, and in those four hundred feet were more strata, more layers, more eras — evidence of subsequent civilizations, or civilization-analogues, risen from the devolved remnants of the builders, climbed back toward complexity over millions of years and then collapsed again, each time leaving their own thin record in the soil. The builders had devolved and something had re-evolved and that had devolved and something else had emerged and the whole cycle had repeated, over and over, in the sealed laboratory of the interior, for longer than the human mind could hold as a number rather than an abstraction.

Vasquez, reading his field notes that evening, noted that her gut had been uncomfortable for two days. Not painful. Not alarming. Just present in a way guts were not usually present, a mild awareness of internal processes that she had not asked to become aware of. Acheampong ran a biome analysis. The results showed organisms that had not been there during the pre-mission baseline. Not pathogens — her immune system was not responding to them as threats. They were establishing themselves with a quietness that implied either extraordinary stealth or the absence of anything to hide from, as though her body had been expecting them.

V. The Root Cathedrals

They moved deeper into the interior on the sixth day, following one of Acheampong's dream-maps toward what the topology suggested was a network node — a place where multiple wormhole mouths converged, or had converged once, before the drift of unmaintained anchoring systems had redistributed them into patterns that no longer matched the original design. The landscape changed as they walked. The open farmland gave way to something else: a forest, if forests could be the size of continents and made of organisms that had spent billions of years competing for terrain by the strategy of physically remaking it.

The root cathedrals were not named by any of them. The name arrived simultaneously in all three minds, because there was no other word for them. Individual root systems, beginning as the foundations of organisms that might once have been trees, had over millions of years fused with adjacent systems, negotiated chemical boundaries, and ultimately merged into load-bearing structures that rose thirty meters and spanned hundreds, the individual root filaments having compressed and hardened and differentiated into something with the grain and density of bone. Columns. Arches. Buttresses that flared outward from central pillars in geometries that no engineer had calculated but that stress analysis would have found sound — optimized by selection rather than design, every unnecessary material eliminated over generations of organisms that survived only if their structure was sufficient.

The interior light filtered through the high canopy in diffuse golden sheets. The air in the root cathedrals was cooler and smelled different from the open farmland — denser, biological, complex in ways that Acheampong's instruments logged as an aerosol load forty times higher than outside. Most of the aerosol was harmless in isolation. Acheampong, examining his log and the increasingly complex biome readings from all three crew members, understood that harmless in isolation was doing a great deal of work in that sentence.

The things living in the upper reaches of the root cathedrals were varied and largely invisible. Sounds came from above — not calls, not any vocalizations, but the physical sounds of large organisms moving carefully in high structures, the creak of biological material under weight, the rustle of something that did not want to be seen and was very good at the project. Twice, looking directly upward, Doran caught a glimpse of a hand. Just a hand, gripping a root-column junction, the fingers long, the grip deliberate, withdrawing before her eyes could resolve anything further. The hand had been within ten meters of her head. It had been there long enough that it could have done anything it wanted.

It had watched. That was all. Whatever calculus it was running — and there was a calculus, she was certain of that, something was being weighed and measured and evaluated above her in the dark — watching had been the conclusion.

On the seventh day they found the wormhole.

It appeared as a ring of distorted air, approximately four meters in diameter, floating at head height between two root columns in what had once been, based on the surrounding architecture, a large open plaza. The distortion was subtle — a slight wrongness in the way the background appeared through the ring's interior, a faint bluish tint to the light emerging from it, the image beyond it showing a different section of the interior at a distance that could not be reached on foot in less than several days. Looking through the ring Doran could see another root cathedral, its columns different in proportion, a pale smear of artificial lighting still functioning somewhere above, clouds moving below one of the floating platforms in the mid-distance.

Acheampong's instruments registered it as a region of exotic matter concentration, the negative energy density that maintained the throat against the geometry's natural tendency to collapse. The reading was stable. It had been stable, probably, for a very long time. He stood in front of it and thought about the engineering required to produce this — not the specific engineering, which was beyond any framework he possessed — but the mere fact of it. Someone had built a network of these throughout an interior the volume of billions of Earths. Had mapped the topology. Had maintained it. And then had become something that moved in the high dark of root cathedrals and watched newcomers from above and chose, for reasons that were no longer accessible through any cognitive process a human could recognize as reasoning, not to kill them.

VI. What Vasquez Understood

Mira Vasquez had been quiet for three days. This was not unusual for her — she was given to long silences when she was working through something — but the quality of this silence was different from her working silence. It had a physical quality, a density. She ate when reminded. She slept erratically. She spent most of her time sitting near the wormhole mouth with a handheld display running calculations that she had not shared with the others.

On the ninth day she called the other two together and showed them what she had found.

The signal they had received six months ago had a surface layer — the mathematical content, the primes and geometric progressions that had first flagged it as artificial. This she had decoded in transit. But below the surface layer was a second layer she had initially attributed to noise, and below that a third, and the deeper she went the older the encoding became. The most recent layers were in a mathematical language she could partially parse. The oldest layers were in something else entirely — a different mathematics, built on axioms that were almost but not quite the axioms of her own mathematical training, as if someone had built number theory starting from slightly different foundational assumptions and ended up with a structure that rhymed with human mathematics without ever quite being it.

The oldest layers were not addressed to her. They predated any possible knowledge of her species' existence. They had been written for a different recipient, in a different universe, by whoever had built this structure before the current universe was born.

What the oldest layers said — imperfectly translated, with large lacunae where the mathematics diverged too far to bridge — was approximately this: we have built a place that will outlast our universe. We have tuned the next universe to continue our work. We are leaving this message for whoever comes through after us. We cannot know what you are. We know only what we need from you, and we have spent a very long time preparing the asking.

Doran sat with this for a long time. Outside the root cathedral, somewhere above them in the canopy, something large shifted its weight from one grip to another and was still.

"Tuned the next universe," she said finally. "Our universe."

"The physical constants," Vasquez said. "The fine-tuning problem. Why the cosmological constant is precisely what it needs to be to allow complex chemistry. Why carbon nucleosynthesis in stars produces carbon at exactly the yield required for carbon-based life. These numbers have no derivation from first principles. They are simply what they are, and what they are happens to allow us to exist." She paused. "Or what they are was set by something that needed us to exist."

Acheampong looked at the biome readings on his display. In nine days the microbial profile of all three crew members had shifted further from their baseline than any environmental exposure in the literature he had trained on. The organisms establishing themselves were not harming them. They appeared, in fact, to be performing functions — metabolic, neurological, immunological — with a precision that implied the organisms knew the physiology they were working in. Knew it well. Had known it, possibly, longer than the physiology's own evolutionary history could account for.

"We were prepared," he said. "Before we arrived. The signal spent six months preparing us for this."

"Prepared for what, specifically." Doran did not phrase it as a question.

Vasquez was quiet for a moment. Outside, the omnidirectional gold light moved imperceptibly. The root cathedrals rose around them in their vast organic silence, column upon column retreating into a haze that was not quite fog and not quite atmosphere and was certainly biological, certainly active, certainly attending to the three warm novel organisms sitting in the old plaza with their instruments and their slowly changing gut flora.

"The structure is old," Vasquez said. "Older than this universe. Its interior ecosystem has had longer to develop than we have any framework for thinking about. It has organisms of extraordinary complexity and range — multiple biochemistries, mechano-organic hybrids, things that navigate by spacetime curvature. But it cannot leave. Whatever lives here evolved here and its biology is integrated with here, with the specific chemistry and the specific light and the specific organisms in this specific closed system. It is — for all its age, for all its complexity — trapped."

She looked at her own hands for a moment.

"We're not trapped. We came from outside. Our biology is adapted for outside. The preparation sequence spent six months making us compatible with the interior ecosystem — building the interfaces, establishing the symbiotes, priming the neurology." She looked up. "We're not here to study it. We're here to carry it."

VII. De Sitter's World

On the twelfth day Doran climbed to the top of a root cathedral column, hand over hand up the fused root surface while things in the upper canopy tracked her progress in silence, and looked out across the interior of De Sitter's World.

The name had arrived among the three of them without anyone proposing it, sometime on the third day. Willem de Sitter, the Dutch mathematician who in 1917 had written down the solution to Einstein's field equations that described a universe with a positive cosmological constant — an expanding, repulsive spacetime that contained no matter, only geometry and light. De Sitter space. The mathematics of the interior they were standing in. It seemed appropriate that the name of a man who had never existed, never would exist, never could have existed without the careful tuning of a universe by something that had decided, before the Big Bang that would produce him, that such a mind was worth having — it seemed appropriate that his name was now attached to the structure that had produced the conditions for his existence.

From the top of the column she could see for thousands of kilometers in every direction. The interior curved upward and overhead in its vast bowl-shape, the farmland and root cathedrals and the ruins of layered civilizations and the working remnants of the mechano-organic maintenance systems — she could see three of them now, slow as geology, moving along the shell surface several hundred kilometers to her left, their hybrid forms registering more as landforms than creatures at this distance. The floating platforms hung in the mid-volume, their undersides trailing weather. Wormhole mouths, some visible as faint iridescent rings in the air, some invisible but marked on Acheampong's dream-derived map, scattered across the landscape like apertures in a net.

Somewhere in the deep soil below the root cathedrals, the Rhizome extended its chemical awareness through billions of acres of substrate. Somewhere in the aerial layer, colonial organisms the size of weather systems processed nitrogen and tracked the thermal signature of three small warm bodies in the canopy. Somewhere in the high dark above the floating platforms, things moved that her instruments could not properly characterize, that her new senses — and she was aware of them now, the faint pressure-sense at the edge of her perception that corresponded to the locations of wormhole throats, the mild visual expansion into infrared that she had initially attributed to eyestrain — her new senses could detect as a kind of geometric turbulence, a disturbance in the curvature of local spacetime that moved with direction and purpose.

The Geometers. She had no other name for them. They were aware of her. They had been aware of her ship months before it arrived. They had, in some sense she could not yet define, been waiting for it — not with anticipation or need, but with the quality of attention that very old things give to the rare arrival of genuine novelty. She could feel that attention now, at the top of her column, looking out across the interior of a structure older than her universe. It was not malevolent. It was not benevolent. It was the attention of something that had been solving a very old problem for a very long time and had just received a new piece.

Below her, in the root cathedral plaza, Acheampong was cataloguing organisms with the focused absorption of a scientist who had stopped worrying about the scale of what he was in and was simply doing the work. He had six months of detailed notes. He had biome analyses that were already rewriting everything known about the origins of life. He had a gut biome that was no longer, strictly speaking, his in any exclusive sense, and a nervous system that was processing information through channels it had not possessed on departure, and a dream life that was a detailed topological map of a network of spacetime shortcuts connecting the inner surface of a pre-universal structure, and he found, somewhat to his own surprise, that he was fine.

Vasquez had been translating continuously. The deeper layers of the signal had opened up as her neurology adjusted to the new sensory inputs — she could process the old mathematics now with a fluency that had not been there a week ago, the alien axioms becoming navigable through some integration she could not introspect on but could only observe in its outputs. What she was reading, in the oldest and deepest layers, was a civilization's final account of itself: what it had built, what it had learned, what it had become too integrated with its own structure to take with it, and what it hoped the next intelligence to stand in its interior would do with the inheritance.

The message did not end with instructions. It ended with what translated most accurately as an open question — not rhetorical, not decorative, but a genuine inquiry sent forward across universal timescales to whatever mind would eventually be developed enough to receive it and honest enough to sit with it: what does it mean to carry something you did not choose, across distances you did not plan, for purposes older than your existence?

Doran, sitting at the top of a root cathedral at the inner surface of De Sitter's World, watching the impossible interior curve overhead into its own sky, felt the question land in her with the weight of something that had been traveling a very long time.

She did not have an answer. She suspected that having the answer was not the point. The point was whether you were the kind of mind that could hold the question — that could know what it was carrying and where it had come from and still choose, with full knowledge, what to do next.

Above her, something vast and patient and old beyond any calendar moved in the geometric dark, and attended, and waited to see what she would decide.

— ✦ —


THE ARCHITECTURE OF LEVERAGE




THE ARCHITECTURE OF LEVERAGE:

UNDERSTANDING BLACKMAIL AS AN ECONOMIC SYSTEM



Introduction: The Invisible Economy

In traditional business analysis, assets are tangible or measurable: real estate, intellectual property, cash reserves, market share. But there exists a shadow economy that operates on a fundamentally different principle—the conversion of human vulnerability into extractable value. This is not merely extortion. This is a sophisticated system where compromised individuals become portfolio assets, each generating different types of returns based on their position, power, and exploitability.

Understanding this system requires thinking beyond individual transactions. A single instance of blackmail is amateur-level criminality—risky, unsustainable, and likely to provoke retaliation. But when structured as a business model, with standardized asset classes, risk management strategies, and succession planning, blackmail transforms into something far more durable: a self-reinforcing network of leverage that can outlive its founder and resist conventional law enforcement.

This article examines the theoretical architecture of such a system. Through three detailed case studies—fictional but structurally plausible—we will explore how compromised individuals become different types of assets, how these assets interact to create systemic resilience, and why such systems are extraordinarily difficult to dismantle once established. The goal is not to provide a blueprint, but to develop a framework for understanding how power operates when it escapes traditional accountability structures.




I. The Asset Classification Framework

The first principle of any business system is categorization. Raw materials must be sorted by their properties and potential uses. In a blackmail economy, the raw material is compromising evidence, but the asset is the compromised person. Different people provide different forms of value based on their position in economic, legal, or political hierarchies.

Cash Leveraging Assets

These are individuals who can be directly extracted for monetary payments. The classic extortion model. The value of a cash leveraging asset correlates directly with their wealth and their vulnerability to exposure. A wealthy business executive caught in a compromising situation represents a renewable income stream. The sophistication lies in calibrating the extraction rate: demand too much and they might choose exposure over payment; demand too little and you leave value on the table.

The key variables are the target's liquid wealth, the severity of their compromise, and the ongoing cost of exposure. A person with a hundred million dollars in assets but only five million in liquid funds cannot be extracted at the same rate as someone with similar wealth but higher liquidity. Similarly, the nature of the compromising material matters: evidence of financial fraud might destroy a career but not a marriage, while evidence of certain personal behaviors might destroy both.

Asset Leveraging Positions

More sophisticated than simple cash extraction is forcing a target to surrender control over productive assets. This could mean signing over ownership of a company, transferring real estate, or providing access to financial instruments. The advantage of asset leveraging over cash leveraging is that you acquire productive capacity, not just money. A business that generates revenue becomes a permanent addition to your economic base. Real estate appreciates. Investment portfolios compound.

Asset leveraging requires more careful execution than cash extraction. Ownership transfers leave paper trails. Large asset movements trigger regulatory scrutiny. The target must be sufficiently desperate and the operator must have sufficient legal infrastructure to obscure the coercive nature of the transaction. Shell companies, complex corporate structures, and complicit legal counsel become necessary. This is where the system begins to require other compromised professionals—lawyers, accountants, notaries—who themselves become assets through their participation.

Favor Leveraging: The Power Multiplier

The most valuable assets are not those with money or property, but those with institutional power. A compromised judge, prosecutor, regulatory official, or law enforcement officer represents a force multiplier. They cannot be directly monetized like cash assets, but they provide something more valuable: protection, selective enforcement, and the ability to weaponize state power against enemies.

Favor leveraging subdivides into three primary categories. First: prosecution of enemies. A compromised prosecutor can initiate investigations, empanel grand juries, or pursue charges against your competitors or threats. The state's investigative and punitive apparatus becomes your private enforcement arm. Second: relief from prosecution. When you or your organization faces legal jeopardy, compromised legal officials can dismiss cases, suppress evidence, or engineer favorable plea agreements. Third: roof protection—a Russian organized crime term for using a superior's authority to shield subordinates. If a detective is investigating you, compromising their captain neutralizes the investigation.

The strategic value of favor leveraging assets increases geometrically when you control multiple layers of a hierarchy. A compromised trial judge provides some protection, but if their decisions can be appealed, your protection is incomplete. Compromise the appellate judges as well, and you create nearly impenetrable legal immunity. Similarly, controlling both line prosecutors and their supervisors ensures that even if one becomes uncooperative, you can apply pressure through the chain of command.

Fall Guy Assets

Every complex criminal operation requires insulation. The person at the top cannot issue orders directly, cannot handle logistics personally, cannot interface with targets without creating exposure. This requires intermediaries—and intermediaries who know too much become liabilities. The solution is to ensure that your intermediaries are themselves compromised before they begin working for you.

A fall guy asset is someone who handles operational details while being inherently disposable. They make contact with blackmail targets, they deliver threats, they arrange meetings, they manage logistics. They are given just enough authority to execute tasks but never enough knowledge to understand the full scope of the operation. Most critically, they are documented committing crimes on camera or through recorded communications. If law enforcement closes in, these individuals can be sacrificed. The operator claims ignorance—these were rogue employees, unauthorized actions, regrettable but not my responsibility.

The psychology of fall guy management is crucial. They must be kept loyal through a combination of payment and their own complicity. Once they have participated in enough criminal activity, they understand that cooperation with law enforcement means their own imprisonment. Their continued loyalty is purchased not just with money, but with mutual assured destruction. However, this only works if they believe you won't sacrifice them preemptively. This requires occasional demonstrations of loyalty—protecting them from minor legal troubles, providing resources to their families. The art is in making them feel secure enough to remain loyal, but vulnerable enough to never challenge you.




II. Vertical Integration and Network Effects

The true sophistication of a blackmail economy emerges not from individual assets, but from their systemic integration. A single compromised judge provides value. A compromised judge plus a compromised prosecutor plus compromised appellate judges plus compromised regulatory officials creates something qualitatively different: a captured section of the legal system that operates as a private resource.

Vertical integration means controlling every level of a decision-making hierarchy. In a court system, this means the trial court, the appellate court, and the supreme court of a jurisdiction. In a regulatory environment, this means the line inspector, their supervisor, the agency director, and potentially the legislative oversight committee. Each level provides redundancy and eliminates appeals to higher authority.

The network effect emerges when different asset types reinforce each other. Cash leveraging assets fund the operation. Asset leveraging positions provide legitimate business infrastructure for money laundering and operational cover. Favor leveraging assets protect the operation from law enforcement. Fall guy assets insulate leadership from direct criminal liability. Each component strengthens the others, creating a system that is more resilient than the sum of its parts.

Jurisdiction becomes a critical factor in vertical integration. Legal systems are divided into territories with different courts, prosecutors, and law enforcement agencies having authority over different geographic areas or types of cases. A change of venue—moving a trial to a different jurisdiction—can neutralize your entire captured legal infrastructure if you only control one county's system. Sophisticated operators therefore need to map jurisdictional boundaries carefully and ensure they have leverage in multiple overlapping jurisdictions.

The federal-state-local division in American law creates particular complexities. A crime might be prosecutable at the federal level, state level, or local level depending on its nature. Controlling local prosecutors provides no protection against federal charges. Controlling federal prosecutors in one district provides no protection if the case can be moved to another district. The most sophisticated operations therefore need to develop leverage across multiple levels of the system, which requires extensive resources and a large portfolio of compromised officials.




III. Case Study One: The Horizon Group

The following case study is entirely fictional but structurally plausible. It illustrates how the asset classification framework operates in practice and how vertical integration provides systemic protection.

Establishment Phase

Marcus Holloway established the Horizon Group in 2008 as a legitimate real estate investment firm in a mid-sized American city. The firm acquired distressed commercial properties during the financial crisis, renovated them, and leased them to businesses. By 2012, Horizon owned seventeen properties across three counties, generating approximately eight million dollars in annual revenue. This legitimate business provided the foundation for what would become something far more complex.

In 2013, Holloway purchased a small boutique hotel in the city's business district. The hotel, the Meridian, had forty rooms and catered to mid-level business travelers. Holloway undertook an extensive renovation that included installing a comprehensive security system with cameras in every public area and, controversially, in the rooms themselves. The ostensible justification was theft prevention and liability protection.

The Meridian's business model shifted subtly. Rather than marketing to general business travelers, it began catering to a specific clientele: local business executives and professionals who needed discreet venues for extramarital affairs. The hotel never advertised this function explicitly, but through word of mouth it became known as a place where one could rent a room for a few hours without awkward questions. The day rate was expensive but the discretion was reliable. Within eighteen months, the Meridian was operating at ninety-two percent occupancy despite never appearing on major booking websites.

The First Assets

In late 2014, a prominent local attorney named Richard Chen checked into the Meridian with a woman who was not his wife. Chen was a partner at one of the city's largest firms and had a reputation for aggressive litigation. Unknown to Chen, his activities were recorded by the hotel's security system.

Three months later, Chen's firm was representing a company in litigation against one of Holloway's business partners. The case was strong; Holloway's partner faced potential liability of approximately four million dollars. Chen received an anonymous package containing still images from his hotel visit and a simple message: the litigation should be settled for nuisance value or more images would be sent to his wife and the state bar association.

Chen settled the case for seventy-five thousand dollars. Holloway had just created his first favor leveraging asset. Chen had demonstrated he would compromise his professional obligations under pressure, and Holloway retained evidence that could destroy Chen's career and marriage at any time. Over the next eighteen months, Chen was called upon three more times to provide favorable legal opinions, to settle cases disadvantageously to his clients, and eventually to refer certain clients to other attorneys when their interests conflicted with Holloway's network.

The pattern repeated. The Meridian operated for three years, accumulating video evidence of professional men—attorneys, accountants, a city council member, two judges, and numerous business executives—engaging in behavior they desperately wanted concealed. Each became a potential asset. Not all were activated immediately. Some were held in reserve, their compromising material filed away for potential future use.

Building the Vertical

By 2017, Holloway had compromising material on Judge Patricia Morrison, who sat on the county circuit court. Morrison had been caught on camera in a particularly compromising situation that would have ended both her career and her marriage. Holloway did not immediately activate Morrison as an asset. Instead, he waited for the right case.

In early 2018, a business partner of Holloway's was charged with commercial fraud. The case was strong and the prosecutor was aggressive. The case was randomly assigned to Judge Morrison. Holloway made contact through an intermediary—a fall guy asset named Thomas Vega who had his own compromising history and who handled operational details without knowing the full extent of Holloway's network.

Morrison was given a choice: suppress certain evidence, make favorable evidentiary rulings, and generally obstruct the prosecution, or face the destruction of everything she had built. Morrison complied. The prosecution's case fell apart due to evidentiary problems, and the charges were eventually dismissed. Holloway had just converted a favor leveraging asset from passive to active status.

But Holloway understood vertical integration. Morrison's rulings could be appealed. He needed the appellate court as well. Through careful research, he discovered that one of the three appellate judges for the region had a gambling problem and significant debts. Using cash leveraging techniques, Holloway had his network arrange for the judge to be extended substantial credit at certain establishments, then purchased the debt. The judge was never told directly that Holloway owned his debt, but when appeals that mattered to Holloway's interests came before the court, certain suggestions were made through intermediaries.

The system was now vertically integrated in the judicial branch. Trial court decisions favorable to Holloway's network would be upheld on appeal. Decisions unfavorable to the network would be reversed. The probability of adverse legal outcomes dropped substantially. Holloway's partners understood that he could provide a valuable service: legal immunity within a specific jurisdiction.

Monetization and Expansion

With vertical integration achieved in the legal system, Holloway could offer a product: protection. Local business owners engaged in gray-market or illegal activities—unlicensed contractors, businesses with labor violations, operators with tax irregularities—were approached by Vega and other intermediaries. For a monthly fee, they could operate with substantially reduced risk of legal consequences. If they were investigated, charges would be dismissed or reduced. If they were sued, judges would rule favorably.

This protection racket generated approximately forty thousand dollars monthly by 2019. But it also created a new problem: witnesses. Some of the protected businesses had employees who might testify about irregularities. Some had competitors who might file complaints. Holloway needed law enforcement assets as well.

A sergeant in the city police department, David Reese, had visited the Meridian in 2015. Reese was in charge of the commercial crimes unit. In 2019, when a complaint was filed against one of Holloway's protected businesses, Reese was contacted through intermediaries and reminded of his vulnerability. The investigation was perfunctory, the evidence was mishandled, and the case never advanced to prosecution.

By 2020, Holloway controlled or had leverage over: six attorneys, two judges, one appellate judge, three police officers, a city council member, two accountants, and dozens of business owners who paid for protection. The Horizon Group's legitimate real estate business generated eight million annually. The protection operation generated approximately five hundred thousand annually. But the real value was not in the cash flow—it was in the immunity. Holloway could operate any business, legal or illegal, within his territory with negligible legal risk.

Structural Resilience

What made the Horizon Group resilient was its layered structure. Holloway never made contact with assets directly. Vega and two other intermediaries handled all communications. These intermediaries were themselves compromised—Vega through financial crimes he had committed while working for Holloway, the others through various forms of documented misconduct.

The compromising material was stored redundantly in multiple secure locations, with dead man's switches that would release material if Holloway was arrested or killed. Holloway had explicitly made certain assets aware of this arrangement. Judge Morrison knew that her cooperation purchased not just Holloway's silence but his active interest in protecting her. If Holloway was arrested, the material would be released anyway, so Morrison had an incentive to use her position to prevent his arrest.

By 2021, the system had become self-sustaining. Assets protected other assets. When Sergeant Reese came under internal investigation for unrelated misconduct, Judge Morrison arranged for the investigation to be transferred to a jurisdiction where charges were quietly dropped. When one of Holloway's attorneys faced bar discipline, the investigating committee included a member who was himself compromised through financial dealings with Holloway's network.

The network had achieved something remarkable: it had become larger than any individual member, including its founder. Holloway could potentially be removed, but the network itself had enough interconnected leverage to continue functioning. Multiple members had access to compromising material on multiple other members. Mutual assured destruction had created a form of stability.




IV. Case Study Two: The Atlantic Fund

This second case study examines how a blackmail economy can operate at a higher financial level, involving asset leveraging and complex corporate structures. Again, this is entirely fictional.

Origins in Legitimate Finance

The Atlantic Fund began in 2005 as a small private equity firm founded by Elena Rostova, a former investment banker with expertise in distressed asset acquisition. The fund's initial capital was approximately twenty million dollars from a handful of high-net-worth individuals. The fund's strategy was conventional: identify undervalued companies, acquire controlling stakes, restructure operations, and exit at a profit.

Between 2005 and 2010, the Atlantic Fund made seven investments with mixed results. Three were modest successes, three were failures, and one—the acquisition of a regional logistics company—was highly profitable. By 2010, the fund had grown to approximately forty million in assets under management. The returns were adequate but not exceptional. Rostova began looking for ways to gain competitive advantage.

The Compromise Mechanism

In 2011, Rostova was approached by a consultant named Michael Torres who specialized in opposition research and competitive intelligence. Torres had a particular specialty: identifying personal vulnerabilities in executives and board members of target companies. His methods included private investigators, digital surveillance, and human intelligence. He was, in essence, an information broker who dealt in compromising material.

Torres proposed a partnership. The Atlantic Fund would identify acquisition targets. Torres would research the personal lives of key executives and board members. If compromising material was found, it would be used not for blackmail in the traditional sense, but as leverage in negotiations. The target company would not be told explicitly that their executives were compromised, but those executives would be contacted privately and given a choice: support the acquisition at a favorable price, or face exposure.

The first test case was a manufacturing company in financial distress. The CEO was having an affair with a subordinate, creating potential liability for the company and personal liability for the CEO. Torres documented the relationship. When Atlantic Fund made an acquisition offer, the CEO privately received evidence of the documentation and a suggestion that supporting the acquisition would ensure the material never surfaced. The CEO did not inform the board of this pressure. He supported the acquisition. Atlantic Fund paid twenty percent below the company's fair value, a discount of approximately four million dollars.

Systematic Asset Leveraging

Over the next five years, the Atlantic Fund used this method in twelve acquisitions. Not every target had compromisable executives, but approximately sixty percent did. The cost of Torres's research services was approximately five hundred thousand per transaction. The average savings in acquisition price was three to seven million dollars. The return on investment was extraordinary.

But Rostova realized something more valuable than cost savings: she now owned compromising material on executives at twelve different companies. Even after the acquisitions were complete, these executives remained in place—either as employees of Atlantic Fund's portfolio companies or at other firms where they had found new positions. Each one was a potential asset.

In 2016, Rostova needed to place a large debt offering for one of her portfolio companies. The terms were unfavorable given the company's credit rating. However, the executive who made the credit decision at a major regional bank was someone who had been compromised during an earlier acquisition. The executive had left the target company and taken a position at the bank. He was contacted through intermediaries and reminded of his vulnerability. The debt offering was approved at unusually favorable terms, saving Atlantic Fund approximately two million in interest costs over the term of the loan.

The model had evolved. Compromised executives were no longer one-time assets used to facilitate individual transactions. They were permanent assets who could be activated whenever they achieved positions relevant to Atlantic Fund's interests. Torres maintained a database tracking the career movements of compromised individuals. When one reached a position of influence at a bank, regulatory agency, or potential acquisition target, they were flagged for potential activation.

The Regulatory Capture

In 2018, one of Atlantic Fund's portfolio companies faced investigation by state regulators for environmental violations. The violations were real and potentially expensive to remediate. However, the deputy director of the relevant regulatory agency was a former executive who had been compromised five years earlier during an acquisition. He had moved from the private sector to public service, likely hoping to escape his former life.

Rostova had Torres make contact. The deputy director was reminded of his past. He was not asked to dismiss the investigation—that would be too obvious and too risky. Instead, he was asked to slow the process, to accept the company's remediation proposals without extensive additional scrutiny, and to avoid escalating the matter to formal enforcement action. The deputy director complied. The company's remediation costs were approximately six million dollars—substantial, but far less than the twenty to thirty million that aggressive enforcement might have demanded, and certainly less than the cost if operations had been suspended pending compliance.

This event revealed a new dimension of the asset portfolio. Compromised individuals who moved into regulatory positions became favor leveraging assets. They provided protection from enforcement, favorable interpretations of regulations, and advance warning of investigations. Between 2018 and 2022, Atlantic Fund benefited from at least seven instances where compromised regulators provided protection or favorable treatment to portfolio companies.

The Succession Problem

By 2022, the Atlantic Fund managed approximately three hundred million in assets and had compromising material on forty-seven individuals in positions of influence across finance, industry, and government. Rostova was fifty-eight years old and beginning to consider succession. But succession created a profound problem: whoever inherited control of the compromising material would inherit the entire leverage network.

Rostova had a daughter, Natasha, who worked in the fund but had not been informed of the leverage operations. She believed her mother ran a successful but conventional private equity firm. Torres, however, knew everything. He maintained the database, he managed the communications with compromised assets, he handled the operational details. He was a fall guy asset in theory—Rostova had ensured he was sufficiently compromised through his own methods that he could be sacrificed if necessary—but he was also the only person who understood the full system.

In 2023, Rostova was diagnosed with a serious illness. She had perhaps five years remaining. The succession question became urgent. She could pass control to Natasha, but Natasha's ethical objections might lead her to dismantle the leverage system, destroying the fund's competitive advantage. She could pass control to Torres, but Torres had no capital and no legitimate business expertise. The fund would likely collapse without her operational knowledge.

Rostova chose a third option. She created a trust structure that gave Natasha control of the fund's operations but gave Torres permanent control of the information assets—the compromising material and the database of compromised individuals. Torres would provide services to the fund under long-term contract. Natasha would have plausible deniability about the sources of the fund's competitive advantages. Torres would have financial security and the ability to market his services to other clients if necessary.

The structure was brilliant in its cynicism. It ensured the leverage system would survive Rostova's death while protecting Natasha from direct legal liability. The compromising material became a form of property that could be transferred across generations. The business model had achieved true sustainability—it was no longer dependent on its founder's life or liberty.




V. Case Study Three: The Infrastructure Play

The final case study examines the most sophisticated form of leverage economy: one that operates at the level of critical infrastructure and achieves state-like functions. This scenario is fictional but illustrates the logical endpoint of leverage-based systems.

Digital Infrastructure as Leverage Platform

In 2015, a technology company called Sentinel Systems launched a cloud storage and communication platform called SafeVault. The product's marketing emphasized security and privacy. All data was encrypted. The company retained no access to user content. The platform was particularly attractive to professionals who handled sensitive information: attorneys, healthcare providers, financial advisors, and executives.

SafeVault's adoption grew rapidly. By 2018, the platform had approximately two million users, including forty thousand attorneys and twenty thousand physicians. The company's revenue model was subscription-based. The company was profitable but not extraordinarily so. However, the founders—three computer scientists named Anderson, Liu, and Okafor—had embedded backdoor access into the encryption system.

The backdoor was sophisticated. It did not simply bypass encryption. Instead, it exploited a flaw in the key generation algorithm that allowed the founders to derive encryption keys from publicly observable metadata. To any external security audit, the system appeared secure. The encryption was strong and the keys were properly generated. But the founders could access any user's data at will.

Building the Asset Database

Beginning in 2018, the founders began systematically accessing user data. Not all of it—that would have required impossible storage capacity and would have created unnecessarily large attack surfaces. Instead, they used automated systems to scan for particular types of content. Communications containing certain keywords. Documents with particular formatting that suggested legal memos or medical records. Financial documents. Personal photographs.

The system flagged approximately sixty thousand users as potentially valuable targets based on their content. These users were then subjected to more detailed analysis. Did their communications reveal affairs? Financial crimes? Professional misconduct? Medical malpractice? Tax evasion? Immigration violations? The automated systems could not make sophisticated judgments, but they could identify potential compromising material for human review.

By 2020, Sentinel Systems had identified approximately eight thousand users with clearly compromising material in their SafeVault accounts. These included twelve hundred attorneys, nine hundred physicians, four hundred executives at major corporations, three hundred government officials, and thousands of other professionals. The database was extraordinary: it contained not just evidence of misconduct, but the actual private communications and documents of influential people across the entire country.

Monetization Strategy

The founders understood that mass blackmail was impractical and risky. Contacting eight thousand people would create exposure and probable law enforcement action. Instead, they pursued a selective activation strategy. They would only activate assets when specific high-value opportunities emerged.

In 2020, Sentinel Systems needed to raise capital for expansion. They pitched to venture capital firms but found the terms unfavorable. However, one of the partners at a major venture firm was among their compromised users. The partner had used SafeVault to store communications about insider trading. Anderson made contact through an anonymous channel. The message was simple: invest on favorable terms or face criminal exposure.

The partner invested five million dollars personally and persuaded his firm to invest an additional twenty million. The terms were extremely favorable to Sentinel Systems. The company's valuation increased to two hundred million despite modest revenue. The partner had effectively been forced to pay millions to prevent his own prosecution.

Over the next three years, Sentinel Systems activated assets approximately thirty times. A compromised FDA official expedited approval for a partner company's medical device. A compromised SEC attorney provided advance warning of an investigation into insider trading at a firm that paid Sentinel for consulting services. A compromised judge ruled favorably in a patent dispute where Sentinel had financial interests. Each activation generated value—sometimes direct payments, sometimes favorable regulatory treatment, sometimes business opportunities.

Scale and Systematic Power

By 2023, Sentinel Systems had evolved beyond a technology company. It was effectively a private intelligence service with leverage over thousands of individuals in positions of power. The company began offering services to other entities. For a substantial fee, they would activate assets on behalf of clients. Need a regulatory approval? They could arrange it through a compromised official. Need to win a lawsuit? They could arrange favorable rulings. Need to damage a competitor? They could leak compromising material about the competitor's executives.

The service was expensive—typically between five and twenty million per activation—but for corporations or wealthy individuals facing existential threats, it was cost-effective. A pharmaceutical company paid fifteen million to secure FDA approval for a drug that might generate billions in revenue. A defense contractor paid twenty million to influence a procurement decision worth two hundred million.

Sentinel Systems had discovered the ultimate leverage business model: infrastructure control. By controlling a platform that people trusted with their most sensitive information, they had created a self-replenishing asset base. As more people used SafeVault, more people became compromised. The network effect worked in reverse: each new user increased the probability that someone in their professional network was also compromised, making coordination and leverage easier.

The Immunity Problem

The fundamental problem with Sentinel Systems' operation was that it required continuous immunity from investigation. If law enforcement ever seriously investigated the company, the backdoor would eventually be discovered. The founders needed to ensure that such investigations never occurred or were terminated before they could succeed.

The solution was to compromise law enforcement itself. Among Sentinel's compromised assets were approximately fifty federal agents across various agencies: FBI, DEA, SEC, and others. These agents had used SafeVault for personal purposes and had generated compromising material. In 2024, when the FBI's cybercrime unit began an investigation into unusual patterns in SafeVault's network traffic, one of the compromised agents was part of the investigation team. He provided advance warning to Sentinel Systems.

Sentinel activated multiple assets simultaneously. A compromised DOJ attorney arranged for the investigation to be transferred to a different unit where resources were scarce. A compromised Congressional staffer asked questions during an oversight hearing that implied the FBI was wasting resources investigating secure communication platforms. A compromised federal judge issued a ruling in an unrelated case that created legal precedent making certain types of evidence collection more difficult.

The investigation was abandoned within six months. Sentinel Systems had demonstrated that it could defend itself by activating its network. The company had achieved something extraordinary: it had captured enough of the law enforcement and regulatory apparatus that it could prevent investigation of itself. It had effectively achieved immunity.

Systemic Implications

By 2025, Sentinel Systems represented a form of power that existed outside normal institutional structures. It could influence regulatory decisions, judicial outcomes, legislative processes, and law enforcement actions. It operated as a shadow government—not controlling everything, but able to intervene decisively in matters affecting its interests.

The founders understood that their operation was sustainable indefinitely as long as they maintained operational security and continued to compromise new assets to replace those who retired or became uncooperative. The system was self-reinforcing: each successful intervention increased their resources, which allowed them to compromise more assets, which increased their power to intervene. The feedback loop was positive and accelerating.

Most disturbingly, the system was inheritable and transferable. The founders created a trust structure similar to the Atlantic Fund's model. Control of the backdoor access and the asset database could be transferred to successors. The leverage infrastructure had become a form of property—illegal and ethically abhorrent, but extraordinarily valuable and surprisingly stable.




VI. Theoretical Analysis: Why These Systems Persist

The three case studies illustrate different scales and methods, but they share common structural features that explain their resilience. Understanding these features is essential to understanding why such systems, once established, are extraordinarily difficult to dismantle.

Mutual Assured Destruction

The nuclear deterrence concept applies directly to leverage networks. Once a system reaches a certain size, multiple participants have access to compromising material on multiple other participants. Judge Morrison in the Horizon Group case had an incentive to protect Marcus Holloway because if Holloway was arrested, his dead man's switch would destroy Morrison as well. The compromised venture capitalist in the Sentinel case had an incentive to protect the company because its exposure would lead to his own exposure.

This creates a bizarre form of stability. No individual participant can defect without risking their own destruction. Cooperation is enforced not by loyalty or ethics but by rational self-interest. The system becomes an equilibrium: everyone is trapped, but everyone understands that escape is more dangerous than continued participation.

This dynamic makes prosecution extraordinarily difficult. Traditional law enforcement relies on flipping witnesses—offering immunity or reduced sentences in exchange for testimony. But in a mature leverage network, witnesses cannot safely cooperate because their cooperation triggers retaliation not just from the primary targets but from all other compromised participants who fear exposure.

Network Effects and Increasing Returns

Traditional criminal enterprises face diminishing returns to scale. Each additional member increases operational risks and coordination costs. Leverage networks are different: they exhibit increasing returns to scale. Each additional compromised asset makes the network more valuable because it increases the probability that any given situation can be influenced.

In the Horizon Group case, having one judge was valuable. Having one judge plus an appellate judge was more than twice as valuable because it controlled an entire adjudication chain. Having judges plus prosecutors plus police was more than three times as valuable because it controlled the entire criminal justice process from investigation through sentencing.

In the Sentinel Systems case, the network effect was even more pronounced. Having eight thousand compromised assets meant that almost any significant transaction or regulatory action could be influenced by activating someone in the decision chain. The system approached total operational freedom within its domain.

Jurisdictional Arbitrage

Legal systems are divided into jurisdictions with boundaries. Sophisticated leverage operations understand these boundaries and operate across them. The Horizon Group controlled one county's legal system but would be vulnerable if cases moved to federal court or adjacent counties. The solution was to expand into those jurisdictions or to ensure that cases never moved there.

Sentinel Systems operated nationally, which meant it needed to compromise assets in multiple federal jurisdictions. But because it controlled infrastructure rather than physical territory, it could operate anywhere its users were located. A compromised federal judge in the Southern District of New York could be activated for cases there. A compromised SEC attorney in Washington could be activated for regulatory matters. The geographic distribution of assets matched the geographic distribution of power.

This creates a whack-a-mole problem for law enforcement. Shutting down operations in one jurisdiction simply causes them to shift to another. Comprehensive action requires coordination across multiple jurisdictions simultaneously, which is organizationally difficult and creates more opportunities for leaks and warnings.

The Inheritance Problem

Perhaps most disturbing is the transferability of leverage systems. Traditional organized crime faces succession crises. When a mob boss is killed or imprisoned, rival factions fight for control, creating instability that law enforcement can exploit. Leverage networks are different because the assets themselves are information, and information can be transferred without diminishing the original holder's power.

Both the Atlantic Fund and Sentinel Systems created formal succession structures. The compromising material and asset databases were treated as property that could be transferred through trusts or contracts. This means the leverage infrastructure survives the death or imprisonment of its founders. The Atlantic Fund's leverage system will continue to benefit Natasha Rostova even though she may never fully understand its mechanisms. Sentinel Systems' backdoor access can be transferred to new operators.

This transforms leverage from a temporary criminal activity into a permanent institutional structure. The compromising material becomes an asset class that can be inherited, sold, or used as collateral. The moral implications are staggering: future generations inherit not just wealth but power structures built on coercion.




VII. Conclusion: The Shadow Economy's Logic

The three case studies illustrate a disturbing reality: blackmail, when structured as a business rather than practiced as opportunistic crime, can create systems that are more resilient than the institutions designed to prevent them. The Horizon Group controlled local legal outcomes. The Atlantic Fund distorted market competition and regulatory enforcement. Sentinel Systems achieved near-immunity from investigation.

These systems succeed because they exploit structural features of how power operates. They create mutual dependency through mutual assured destruction. They generate increasing returns to scale through network effects. They arbitrage jurisdictional boundaries that constrain law enforcement but not criminal operations. They establish succession mechanisms that allow leverage infrastructure to outlive individual operators.

The theoretical insight is that leverage is not merely criminal activity—it is an alternative form of property rights. In legitimate economies, property rights are enforced by legal systems: contracts, titles, patents. In leverage economies, property rights are enforced by threat: the capacity to destroy someone's reputation, freedom, or life. But the structural logic is similar. Both systems create exclusivity, transferability, and extractable value.

Understanding these systems is not an endorsement of them. It is a recognition that power operates through mechanisms that often evade legal and ethical constraints. The challenge for legitimate institutions is to develop resilience against capture. This requires acknowledging that traditional accountability mechanisms—prosecution, regulation, democratic oversight—can be systematically subverted when enough key participants are compromised.

The disturbing conclusion is that once a leverage network achieves critical scale, it may be effectively impossible to dismantle using normal institutional mechanisms. The institutions themselves become part of the network. The alternative—extraordinary measures, mass prosecutions, institutional purges—carries its own dangers to legitimate governance. This creates a tragic equilibrium: leverage systems that should not exist but cannot easily be eliminated once established.

The question is not whether such systems exist—they almost certainly do at various scales—but whether we can develop institutional antibodies that prevent them from reaching critical mass in the first place. That requires vigilance, structural safeguards, and an understanding of the economic logic that makes them attractive to operators and resilient once established.


Xenomorph chest pussy

Xenomorphs are the alien creatures in the movie Alien by director Ridley Scott. I want to talk about what would happen if Xenomorphs conquered the Earth, enslaved all of humanity, and began using us as breeding stock. 

Like the jew the Xenomorph likes to burrow into a people. Unlike a jew (who prefers to insert himself into the mental illnesses of white women), the Xenomorph prefers the human chest cavity. 

Generation after generation these aliens come bursting out of the chests of humanity. Life is nothing but misery and suffering, so pretty much par for the course for humanity. Humans are resilient and gradually they begin to evolve. First someone is born with a genetic mutation that deletes the sternum. This person survives the chest busting process and goes on to have more human children with the same mutation. Then another mutation causes a person to be born with a sac for the alien to live within. Then another mutation creates folds of skin so that the alien may be expelled without killing the host. Another mutation feeds the alien blood without mixing the aliens acidic blood with the human blood—kind of like a placenta and umbilicus. Gradually a pussy is evolving on the human chest, a Xenomorph chest pussy

Eventually the chest pussy humans develop psychological adaptations for Xenomorph life. They learn to LOVE the Xenomorph and enter into monogamous relationships with them. The love makes all the chest busting worth it. They host elaborate rituals where the human walks down the aisle in a special white dress while all the onlookers smile with joy. This bonding ceremony ends with a special Xenopriest saying "I now pronounce you Xeno and humo-wife." 

Years later some humans start a movement call "humanism" which teaches humans to "reclaim their voice which has been stolen by the Xenoarchy, " and " throw off the oppressive shackles of Xeno-dominance." To everyone's surprise the Xenos go along with this and give humans the right to vote in the Xenohive collective.

Humans begin to teach xenomorphs words like "consent," and tell Xenos to "believe all humans," when a human accuses a Xeno of violating consent. The humans and Xenos sit in college classes and receive shrill lectures from humans with blue hair about respecting humans, human rights, and how humans and Xenos are the same and regressive Xeno attitudes are a Xeno-archical gender construct.

But the long-term results are completely destructive. The Xenomorph birth rate crashes. Paradoxically so do human birth rates because over the course of millennia the humans apparently have become dependent on the process. In fact the humanist movement interrupts an ancient process that has been ongoing for millions of years; a process of gradual complete and total movement towards symbiosis of the two species. Going backwards now means destroying both of them and would be as painful as the process that created the system. The Xeno-archical system of Xeno dominance is actually essential for the survival of both species and in the end the birth rates of humans that rebel against it crash and they are replaced by a more docile breed. This is not because the Xenomorphs wipe out the rebellious ones—Xeno society long ago abandoned those harsh techniques—but simply because natural selection and psychological adaptation has locked the system in to its vector towards co-evolution. Abandoning things now spells certain doom.

Eventually the humanist movement is cancelled and humans are put back in the hive kitchen where they belong. The chest busting resumes and the two species climb back out of their fertility crash together. Life continues with a new, more docile, breed of chest pussy. The meek chest pussies inherent the Earth.



Accumulating laws rough draft

 People treat the idea of abolishing entire government departments as incredibly radical but what's radical is having a system where laws accumulate endlessly forever with no plan to ever repeal them. The structure of legislative accumulation is baked into the Constitution and no thought to its inherent danger is ever given. What is your plan to enforce all these laws? How much taxes will be required to enforce them? If the number of laws grows forever will the taxes have to grow forever? How will the laws affect the ability of the economy to operate when the economy slows down to a molasses crawl? With so many laws on the books, and limited revenue for enforcement, these laws will obviously have to be selectively enforced. How will you combat the temptation to selectively enforce them in a politically motivated way against enemies? Will you need laws for that too? How does anything get done with an endlessly expanding set of rules?


Obviously the never ending accumulation of laws leads to a nation's ruin. To make matters worse, many of these laws are rent seeking provisions designed to enrich classes of people at the expense of everyone else. There is a law banning the imports of foreign drugs in order to raise their prices. There is another law that limits the number of primary care doctors in the United States. There are state laws that prohibit you from building your own house and require you to use a contractor, even if the house comes as a kit certified by architects. There are laws that require you to have a front yard of a minimum width. These are called setback laws. In most places you are not allowed to have a fence more than 8 ft tall in the back or 4 ft tall in the front, even if the local government turns your neighborhood into a high crime area. In Colorado it is illegal for there to be more than one architecture school in the entire state. It is illegal to take performance enhancing drugs like anabolic steroids even if you are not an athlete in order to protect the sports profession. You cannot exercise autonomy over your body because someone else's profits have to be guarded. You need a prescription for all kinds of things you shouldn't need a prescription for. It costs a billion dollars to get even the simplest medical device like a bandage approved, even if other bandages of the same type are already approved. It costs millions of dollars to crash test a vehicle and this makes it impossibly expensive to start a car company, even though car designs could be open source and each design already tested and proven. Taking a company public can cost a 100k in legal bills, defeating its purpose, which is to raise funds for new businesses. In California one in three worker compensation claims results in a lawsuit because lawyers have to get paid. "Sightline" regulations make it virtually impossible to build new electrical transmission lines and substations in certain places, guaranteeing future brownouts. Because of regulations forrests cannot be selectively burned, which results in worse wildfires because the underbrush accumulates. NEPA and other regulations make building high-speed rail almost impossible. It's illegal to sell a better gas can even though the one designed by experts is almost impossible to use without spilling. You have to run your dishwasher twice to get your dishes clean because of energy efficiency regulations. People deal with flicker, migraines, and eye strain because incandescent bulbs were outlawed in favor of LEDs. People don't sell hot food at the farmers market because each and every stall must go through a regulatory process instead of the market as a whole. You need a license to cut hair. Doctors cannot prescribe probiotics that reverse tooth decay because it is unprofitable for the supplement company to go through FDA approval. There are many other things that doctors don't prescribe for the same reason, including drugs that are superior to what is currently authorized. If you want an STD test you must submit yourself to invasive questioning, as mandated by law. 


It goes on and on and keep in mind that each and every one of these laws was recommended by experts. If you didn't need another reason to hate experts just remember that millions of low IQ idiots are tormented by a beeping smoke detector only because experts thought it was a good idea.


And these laws accumulate relentlessly without end. The Civil Rights Act puts a government commissar in every businesses HR department. Indeed, the main reason why you need a master's degree and 5 years experience to get an entry level job is because they are worried about being sued. It is illegal to just hire people on the basis of IQ so the college degree is the last verification of competence—but because the same race based hiring in the corporate world happens in university admissions, they require ever more and more certifications and degrees and experience because they are stuck between a lawsuit and a hard place. Hiring on the basis of competence has obvious and inescapable racial knock-on effects, is illegal, but is also essential for the proper functioning of any technological system, including a communist one.


Elon Musk got sued for not hiring enough foreign engineers at SpaceX, even though the aerospace industry has all kinds of anti-spy requirements that can get you hit with an espionage charge.


Another aspect is that the more laws you have on the books the more political and economic power are tied together, and the greater the stakes for losing that power, and therefore the more money and pressure economic power will bring on political power in order to control it. The degenerative ratchet feeds on itself, unifying state and economics in a process that automatically moves towards fascism/socialism. If everything requires government permission, and the government is incapable of giving explicit permission because it never knows exactly what is illegal, then you have constructed the worst kind of fascistic system. You have constructed a system where nothing can be confidently done and everything might be prohibited. This ratchet of money and power would ultimately destabilize the system by making every political contest have such extreme financial stakes for all parties involved, that they would commit military forces to winning.


Every industry has some sort of pile of regulations that expose you to political attacks. A nation should just wipe the slate clean every few generations, starting over with new regulations. The question isn't what you should get rid of but what you should keep. A POTUS should put together a legal team of a few hundred lawyers and comb through the law for the most absolutely essential regulations. These are things like "don't put chromium 6 in water" and "don't build bridges out of inferior grade concrete" and "pharmaceutical manufacturers have to meet certain standards of purity." These standards nearly always relate to pollution, health and safety, construction, espionage, state secrets, military stuff, basically the hard things of the world whose problems are grounded in physics and human nature. 


Everything else (except some entitlements) can be trashed, but won't be trashed, because when given a choice between doing the right thing and the wrong thing, they will do the wrong thing. This is because money and activism are still involved in the process. To truly have good laws you need an inspired and brilliant mind to go through them with a fine tooth comb and remove everything stupid and corrupt. Too many cooks spoil the law, and our system of endless committees and outside influence guarantee that the things Congress are likely to repeal are exactly those regulations that protect water quality while the things they're likely to keep are exactly the corrupt provisions that need to be repealed.


People criticize politicians for being corrupt but if you're going to be corrupt you should charge what the market will bear. Politicians are so stupid they don't include sunset clauses in all of their corrupt little laws. Everything corrupt should have a sunset clause. This is because you want to force the industry that bought the regulation to constantly pony up the dough. This enriches you, but it also reduces the amount of corrupt regulation you have to make since the checkbook of these donors is finite, or at least the amount of money they're willing to spend is. Everything should expire like every 6 months so they have to constantly pay you to reauthorize it because this lets you do less damage to the economy while maximizing your revenue. 


For awhile now I have thought that each member of Congress should have the power to kill a certain number of donors. There should be like a list of the top 100,000 donors by total contribution, and every year each member of Congress is allowed to have five of them killed. There are 535 members of Congress multiplied by 5 each. This would allow members of Congress to exterminate the donors of their rivals. Since Congress already has a 98% incumbency rate it matters very little that challengers would find it difficult to get financing and offing the donors of the opposite political party would have numerous glorious side effects not the least of which is that the government would finally run the economy instead of the economy running the government. It would transition America from a bribery-based system to an extortion based system where Joe Blow congressman calls up a billionaire and says "give me the fucking money for my campaign or you'll be dead by Friday." This is a real government and actually has the power to get things done. A government suddenly freed from the shackles of political gridlock and a government where too much disagreement has deadly consequences. It would operate more like a feudal Estates General. All it would take is a single member of Congress breaking ranks and killing their rival's donors to set off a deadly race to the bottom that would hollow out the entire donor industrial complex. Once gone real governance would be possible.


Maybe if the Senate started actually operating like a royal Parliament the population would finally wake up and start voting against incumbents. The No Kings nationwide protest demonstrate that remarkable things can happen when Trump says the quiet part out loud. To name a thing is to change it and to say you're going to create feudalism is to instantly provoke resistance to feudalism. The real system is never the actual system, never the named system. This is because as soon as any consensus about reality is achieved people move to exploit the new consensus and so the actual reality becomes an exploited consensus reality. Maybe the threat of monarchy and feudalism are exactly what the doctor ordered to make people take responsibility for their republic. 


If you really want to incite a revolution make it legal for each member of Congress to have activists killed. Like the donor quota you could have an activist quota. Just let them call anyone a terrorist and have them taken away to a CIA black site. In the beginning only Republicans might use it but everything is a race to the bottom, everything is an arms race, and eventually everyone will use it. Once that happens people really will come to see their government as an enemy. I think anything that pushes shit over a cliff might ultimately be better than the slow ratchet of legislative accumulation. Congress won't make itself accountable, won't reform itself in any way that reinforces democracy, but you can totally reform Congress in a way that pushes it over the edge, that pushes it towards a greater level of feudalism.


Who knows who will win but regardless I doubt anyone will have the foresight to repeal bad laws. Does Russia still have laws on the books from the Soviet Era? I wonder how many centuries of gunk the average European country has in it's legal code. Usually governments have to die to wipe out there destructive legal codes. Ode for a law giver who cares.






Gangstered up

 It turns out that my concept of competitive aristocracy has already been thought of. Such is the nature of invention. A few people of which Le Grand E. Day was a member already thought of the idea years ago. To quote him,


"Panarchy gives the individual their natural developmental right to choose their own government by creating competitive, autonomous, non-coercive, co-existing organizations called Panarchies to perform the different types of government services. People can choose from among the Panarchies what suits them best. Supporting this system is a necessary minimum sovereign for people/land relationship called the “geographical Democracy” and a Law-justice umbrella the 'Judicial Republic'."


The formalization of an existing power structure means that the government creates a legal framework for its existence in order to create a more peaceful and orderly structure for the activity. Formalism means mapping the existing power structure and then translating that into a legal framework. For some reason some people, like Mencius Moldbug, thing this is a good idea. I am more on the fence about it because to name a thing is to change it, to formalize a structure is to move the informal structure to a new location. But nonetheless formality can be useful for reducing violence.




Governments have a tendency to evolve towards more ritualized forms over time. You can sit in the galley of any state legislature and witness these rituals. Although the courts of kings and dictators are not open to the public they follow the same trend towards ritualistic titles, behaviors, and penalties. "Manipulating procedural outcomes," as Moldy would call it, is how a violent game is sublimated into a nonviolent game. 




Mold argues that the natural evolution of monarchy wants to become a shareholder Republic. This is false and I have examined this assertion before. But my contention here is that the natural evolution of mafia states such as Russia in the 90s or Mexico today. When effective public law collapses and the government is no longer solving crimes then into that vacuum private law flows, and since this is a more natural evolution the struggle for democracy in these countries may be a waste of time.




A government where cartels plug into the political structure with bribes has an informal donor class of criminals. This can be nearly impossible to dislodge, but turning ganges into providers of private law services represents a way out of this. To eliminate the extortion factor the government insists on collecting a standardized fee for protection, basically taxes, and then paying the cartels / gangs to solve crimes when they occur. The victim is the one who chooses which entity gets payment. The cartel may still try to intercede and intimidate the victim into choosing their agency, but the government can monitor them and punish them financially when they behave unethically. The cartels are converted from illegitimate gangster businesses into legitimate providers of security services.




One can even separate the lawmaking function from both the cartels and the government by having private aristocrats make law and citizen-subscribers choose among those aristocrats. Since the government receives bribes from the cartels separating the lawmaking function from the government itself might insulate the people from the effect of corruption. The government then becomes nothing more than a neutral mediator between these various factions of private security, aristocrats, and citizens. Since the aristocrats will also give money to politicians, and since aristocrats have an incentive to protect their subscribers in order to gain more subscribers, and since the cartels have an incentive to do their jobs competently in order to get chosen, there is a balance of forces here with only a net vector pulling in the direction of oligopoly. This oligarchical tendency can be counterbalanced with an independent Supreme Court, appointed for life, with a Bill of Rights and a provision in the same that requires large entities to divide themselves in a process of automatic trust busting.




A trust busting provision should have been included in the US Constitution to begin with. If you are going to check and limit power you should limit all power, public and private, since anything not checked becomes a potential source of subversion for what is checked. A trust busting provision might be worded like: whenever any organization of humans, whether public, private, political, religious, or otherwise, reaches a market share of twenty percent in a population of one hundred thousand persons, ten percent in one million, or one percent in ten million, it is required to divide into two approximately equal entities with equal debts, incomes, and personnel.




It might feel like a diversion to talk about a very specific Constitutional provision but it is important to get the design of any system precisely correct, insofar as the crucial details are concerned. Governments have a constant problem with financial influence over political affairs. In a democracy there is a donor class that access the shadow government. Under a competitive aristocracy the private sector is responsible for security and that means, like private prisons, the financial influence is of donors is probably a stronger factor unless the alternative is publicly managed prisons with unionized labor, since civil service unions can also act as a donor class.




It's not a diversion because it is necessary to nail down exactly how you're going to insulate the government from financial influence. Any kind of government needs this, but especially one that outsources any portion of its operations to the private sector. Keeping these corporations small and diffuse let's you pit them against each other in a competitive struggle. The other word for competitive struggle is checks and balances, or a free market. The competitive free market is to the market mechanism what divided checks and balances are to the government mechanism. You want all powers, public and private, checked against one another.




To begin the process of converting these various cartels into security service providers for their representatives must be invited to a meeting. This meeting can be attended remotely if safety is an issue. The cartels are given an ultimatum: you can follow the new rules or you can be exterminated. When one private security provider fails to obey the rules the others are used to exterminate it. Gradually the rules are tightened and the consumer given a choice in service provider. In the beginning of the process the central government has a legal code that applies everywhere.




A market of aristocrats, who provide competing legal codes, are eventually brought in as a second layer. The whole process is a gradual domesticating and tightening of rules until cartels are either wiped out and replaced with legitimate security firms or become those security firms themselves. In the end the system has three parts: the federal government (that taxes and provides funding), the aristocrats (who make laws to protect their subscribers), and the private security firms (who provide security for the same subscribers).




Every system requires a moral logic to sustain it, and the moral logic of this system is compelling. Where democracy naturally gravitates to a moral logic of competing victimhood (this is turbocharged if the population is multi-ethnic), the moral justification of a Competitive Aristocracy is extremely based.




Since the customer chooses both the legal code and the cop that enforces it they have no motive to virtue signal. The act of choosing is a consumer choice and that means it operates on the basis of revealed preference rather than stated preference. In a democracy people have an incentive to both deceive themselves and others since their choices are aggregated with other people's choices. They also have an incentive to take a more extreme political position then they actually want in order to pull the other side and it's extremes in the opposite direction. All of this distorts the real preference of consumers in a market but in a competitive aristocracy the customer of government really is a customer and that means they choose only the preferences they want for themselves, only the laws they want to protect themselves, and only the enforcer they believe will do it correctly.




A lot of the problem with effective governance amounts to the fact that virtue signaling is not neutralized as a societal force. Regardless of whether he is an elected politician or king the ruler fears an uprising of the virtue signaling, and so must morally out maneuver competitors to the throne. This causes all governments to spiral into various configurations of propaganda. Some cultivate cults of personality with myth of divinely inspired leadership, some virtue signal about equality, or immigrants, or tolerance, some work though fear of others, some host gladiatorial games as distractions, but regardless of how they do it the public sentiment of the mob has to be manipulated and neutralized. The subversive virtue signaler who might overthrow the regime has to be out-signalled.




Consumer choice is one of the most effective ways of deflecting all criticism of regime behavior. The consumer is the one choosing strong law enforcement, not the dictator. The consumer is the one who would rather spend money on a hangman's noose than a long prison sentence. The consumer is the one that doesn't want the degeneracy in their neighborhood. The very act of putting the consumer in charge of politics neutralizes all virtue signaling. The power of democracy lies in its ability to convince the public that they are active participants in the power process. In a sense democracy makes the ordinary person guilty of whatever injustice the government is engaged in. Another way of saying this is that in a democracy the ability of the individual to virtue signal against the government is neutralized through public participation. But this does not neutralize the individual's ability to virtue signal in general where issues are concerned. A consumer-based system neutralizes both criticism of the government and also of all the choices the government makes, since those choices are actually consumer choices made by the individual. In essence the individual becomes a kind of sovereign and is therefore guilty of whatever injustice their aristocrat and private security firm engages in. They chose this, and there is no escaping that fact, and while neighbors may argue with each other ultimately there chosen policies will tend to converge with minor differences between aristocrats and enforcement companies. Yes, a narcissism of small differences may remain between neighbors but the overwhelming convergence of all aristocrats and security firms on policies that customers approve of creates a solid defense against virtue signaling.




The problem is not actually regime oppression but virtue signaling. Because of virtue signaling any political system has to out-virtue signal it's competitors. That leads to oppression because the government becomes morally hysterical. The ability to neutralize criticism and virtue signaling by making the citizen a participant in the crimes of the government is a feature and not a bug. Everything has trade-offs, perfect solutions to not exist, and you have to break eggs to make an omelet. The voter won't believe this is true but the consumer will. Therefore it is better if the citizen is a a consumer-subject rather than a voting citizen.




You know how people say, "you voted for this," well in a competitive aristocracy they will say "we all subscribed to this." Because we literally marked our subscriptions for whatever the private aristocrat does and the legal code that they enforce. If the market is properly regulated there will be no daylight between what the government does and what the common people want a

nd that represents the most solid regime type imaginable.