EXTORTION -the oldest weapon in politics that doesn’t fire a single bullet – Just Ask Epstein

Posted on
“In politics, the most powerful vote isn’t cast in a booth — it’s cast in silence, by someone holding the receipts.”--YNOT!

What’s the oldest weapon in politics that doesn’t fire a single bullet?

It’s not drones. It’s not cyber. It’s not even propaganda.

It’s extortion—that ancient, ugly tool that turns powerful people into remote-controlled versions of themselves.

And if you’ve ever watched a political candidate suddenly drop out mid-campaign, or a senator resign “to spend more time with family,” with no clear reason… congratulations. You’ve seen the modern version of an old game.

They call it opposition research.
What it often really means is: dig until you find leverage—something that can be used for extortion.

It happens every day. If you don’t believe that, you probably still believe in the Tooth Fairy, and I respect your optimism.

Let’s dig into it.


What is extortion, really?

In intelligence tradecraft, extortion usually isn’t labeled “extortion” in polite company. It gets dressed up in safer words:

  • Coercion
  • Compromise / Exploitation (you’ve got damaging material; you use it)
  • Recruitment by coercion (turning someone into an asset using pressure)
  • Blackmail (the plain-English term—still alive and well)
  • Leverage (the clean corporate word everybody hides behind)

And the classic slang term you’ll hear most often:

  • Kompromat — short for “compromising material.” Famous in the Soviet/Russian tradition, but the concept is universal.

Related tactics and frameworks that often feed the pipeline:

  • Honey trap / honey pot (romantic/sexual setup to create leverage)
  • MICEMoney, Ideology, Compromise, Ego (common motivations used for recruitment)

Spies are old. Leverage is older.

Ancient Babylon, Egypt, India, Persia—full of spies. We have better technology now, but they had the same social skills.

Codebooks, secret signals, shekels, women and boys, even drugs.

Nothing new.

What is different is the packaging.

Because the truth nobody likes to say out loud is: leverage is older than government, and it survives every flag change like a cockroach with a passport.

Same instrument. Different music.


Do intelligence services all use the same dirty trick… or do they each have their own “brand” of leverage?

They absolutely have different “brands.”

Not necessarily different morals—different delivery systems.


The “nice guys” — CIA / MI6: the lawyered-up scalpel

If you had to describe CIA/MI6 in one phrase: results, but with paperwork.

  • Primary focus: foreign intelligence, threat prevention, geopolitical advantage
  • Constraint: democratic oversight (imperfect but real), media risk, internal legal rails
  • Style: more likely to recruit with incentives and ideology than build a pure blackmail factory—because coercion can backfire
  • Leverage posture: pragmatic. If compromising info exists, it’s often one tool among many, not the religion

Their Achilles’ heel: scandal. Not because they’re saints—because they’re accountable to a public that loves outrage almost as much as it loves denial.

And yes—rather than “torture and threats” as the main tool, a lot of their leverage looks like: money, passports, fake identities, access, and options. Quiet power.


The best at being the worst — Soviet/Russian services: the kompromat ecosystem

Russian services (and the Soviet tradition behind them) are famous for one word: kompromat.

  • Primary focus: regime security + destabilizing rivals + controlling elites
  • Constraint: fewer moral/press constraints; higher tolerance for gray zones
  • Style: leverage isn’t just a tool—it’s often a system. A method of governance
  • Pattern: create dependency, collect receipts, maintain pressure—because a controlled person is more reliable than a persuaded person

You also pointed out realities that matter:

  • Funding shifts change capability—Putin historically being generous to the services
  • They’ve fielded highly effective female agents and kept doing things other services backed away from

Their advantage: they’re comfortable living in the mud.
Their risk: the mud gets everywhere—institutions, economy, competence. Corruption eventually turns inward like an infection.


Trained by Russia, but playing the long contract — China: files, favors, and future punishment

China’s approach often feels less like a mugging and more like a long-term mortgage you didn’t realize you signed.

  • Primary focus: party security, technology acquisition, narrative control, long-horizon influence
  • Constraint: image management—Beijing wants to look “inevitable,” not “desperate”
  • Style: leverage is often economic, social, administrative—not just personal scandal
  • Signature move: pressure through access: markets, visas, contracts, approvals, permits, relatives, careers

This kind of leverage doesn’t need a dramatic photo.
It needs one quiet phone call and a signature that doesn’t come.

Their power: patience.
Their blind spot: when people stop fearing the future, the leverage loses interest.


The badasses — Mossad: surgical pragmatist

Mossad’s reputation is precision and mission focus. Not theatrical. Not sentimental.

  • Primary focus: existential security, counterterrorism, hostile networks, strategic deterrence
  • Constraint: small-state reality—every mistake echoes loudly
  • Style: direct and mission-driven—less about controlling your whole life, more about controlling one outcome that matters
  • Leverage usage: pragmatic, targeted, and often paired with HUMINT in a way that feels personal because it is

You nailed another point: it’s often more extensive than people think, because of part-time or auxiliary networks.

Their edge: clarity of mission.
Their risk: the mission can justify too much if nobody checks the map.


It’s about location — Turkey: the domestic-first pressure machine

Turkey sits at the crossroads of alliances, rivalries, and internal politics. That shapes the style.

  • Primary focus: internal stability, counterinsurgency, regional leverage, diaspora influence
  • Constraint: political turbulence—rules can change depending on who’s winning this week
  • Style: pressure feels administrative and personal—employment, travel, legal exposure, family ties, social pressure

And your line is brutal (and it lands):
It can be safer for a foreign spy to walk the streets of Moscow than the streets of Turkey.

Their strength: proximity—regional access, networks, cultural reach.
Their risk: domestic politics can swallow strategic logic.


Was a disruptor — Cuba: the survival-state model

Cuba’s services are shaped by one obsession: regime survival under pressure.

  • Primary focus: internal control, counterintelligence, monitoring opposition, stability
  • Constraint: resources—less money means more reliance on human networks and social control
  • Style: persistent, local, relationship-based—less Hollywood gadgetry, more community-level leverage

You added the arc:
Once funded and trained by the USSR, they projected influence widely—U.S., Venezuela, Mexico, Africa, Europe.
Now: a shadow of its former self.

Their advantage: hunger.
Their limitation: no money, fewer capabilities.


Independents (Epstein-type networks): the private leverage business

Independent operators don’t have flags. They have business models.

  • Primary focus: protection, access, money, influence, immunity from consequences
  • Constraint: no sovereign cover—so they build protection through connections
  • Style: social engineering—status, parties, introductions, and “you owe me” wrapped in velvet
  • Key difference: states may want policy outcomes; independents often want control and insulation, and profit is the motive

Their power: exploiting vanity—and having no moral limits because they answer to nobody.
Their weakness: once exposed, they don’t have a country to hide behind—only favors.


Extortion is the unofficial currency of power

If you want to understand influence, stop imagining a smoky room with villains cackling.

Picture something modern:

  • a private message that shouldn’t exist
  • a photo that “wasn’t supposed to be taken”
  • a financial trail that’s fine… until someone highlights it in yellow
  • a consensual relationship… until it gets publicly weaponized
  • a “favor” that felt harmless… until it starts compounding like loan-shark interest

Extortion doesn’t always look like a threat.
Sometimes it looks like an invitation.


The leverage ladder

  1. Find a weakness — money, ego, sex, secrets, addiction, vanity, ambition, fear
  2. Document it — truth is optional; pressure is the product
  3. Start small — “just introduce me,” “just put in a word,” “just tell me what you’re hearing”
  4. Make it recurring — once you cross the line, you’re negotiating with gravity
  5. Turn favors into a subscription — the tiny asks add up to surrender

That’s what people miss. They think blackmail is a moment.
It’s usually a relationship.


The modern twist: everybody carries a leverage machine

Today everyone carries:

  • a camera
  • a microphone
  • a GPS tracker
  • and a confession machine called social media

So leverage isn’t scarce. It’s abundant.
The scarce part is discipline.

As someone once told me (and it sounds simple because it is):
Don’t do anything you wouldn’t want to explain to your mother.


Common extortion patterns (high-level)

1) Target selection

They look for people with:

  • Access (government, defense, finance, media)
  • Influence (leaders, donors, business owners)
  • Vulnerability (secrets, money trouble, immigration risk, reputational risk, “perversions”)
  • Network value (bridges to other people)

2) Collection of leverage

  • OSINT: social media, public records, filings, leaks
  • Human sources: acquaintances, partners, event photos
  • Cyber: phishing, account takeover, device compromise
  • Honey/money setups: engineered romance or “too-good” deals

3) Escalation ladder

Soft contact → reciprocity trap → compromise → pressure → control → punishment.

4) Typical demands

Introductions, documents, influence, silence, access… plus the dirty add-ons: money laundering, tax evasion, drugs, and other “habits.”

5) Plausible deniability

Cutouts, NGOs, “businessmen,” shell payments, criminal proxies.


Red flags in real life

  • secrecy early (“don’t tell anyone we met”)
  • pushing private channels fast
  • money/travel out of proportion
  • prying for personal details
  • urgency + isolation tactics
  • strange account behavior (logins, mailbox rules, SIM swaps)

How to protect yourself

  • separate work/personal identities
  • strong MFA + hardware keys
  • keep devices updated and encrypted
  • be cautious with gifts/consulting/travel
  • document early
  • don’t negotiate alone—get counsel/security

If someone tries it

  • stop engaging
  • preserve evidence
  • report through proper channels (law enforcement, workplace security/legal/compliance)

The twist nobody likes

The creepiest part isn’t that extortion exists.

It’s that a lot of “leaders” aren’t being led by principles or policies.

They’re being led by whatever secret they’re trying to keep from becoming a headline.

And once that’s true, voters don’t elect the future.

The receipts do.

#Intelligence #Tradecraft #Geopolitics #Power #HumanNature #Influence #Kompromat #NationalSecurity #Espionage #Corruption #Truth #Accountability #SystemsNotStories


EXTRA CREDIT:

Weaponized Rumors: The Real Legacy of the Steele Dossier…

 

EVIL does like EVIL does: The greed and power link between the Epstein, CCP and Western Elites

The Good Billionaire — or the Big Lie?

The Shadow Reel

 

 


© 2025 insearchofyourpassions.com - Some Rights Reserve - This website and its content are the property of YNOT. This work is licensed under a Creative Commons Attribution 4.0 International License. You are free to share and adapt the material for any purpose, even commercially, as long as you give appropriate credit, provide a link to the license, and indicate if changes were made.

How much did you like this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

Visited 14 times, 1 visit(s) today


Leave a Reply

Your email address will not be published. Required fields are marked *