WEBVTT

00:00:00.000 --> 00:00:02.600
Welcome to the Deep Dive. I'm really so glad

00:00:02.600 --> 00:00:04.280
you're here with us today. Yeah, it's a great

00:00:04.280 --> 00:00:07.240
topic we have lined up. Because if you have ever,

00:00:07.240 --> 00:00:09.740
you know, looked at the news cycle and wondered

00:00:09.740 --> 00:00:12.939
why certain political scandals seem to drop at

00:00:12.939 --> 00:00:16.059
the most suspiciously perfect moments, today's

00:00:16.059 --> 00:00:19.199
topic is really the skeleton key. It absolutely

00:00:19.199 --> 00:00:21.079
is. I mean, you see it all the time, right? A

00:00:21.079 --> 00:00:23.519
politician announces a major investigation into

00:00:23.519 --> 00:00:26.640
corruption and then completely out of the blue,

00:00:27.320 --> 00:00:30.710
like three days later, devastating video or a

00:00:30.710 --> 00:00:33.929
massive financial leak just destroys their career.

00:00:34.210 --> 00:00:35.869
Right. And we're often conditioned to think,

00:00:35.969 --> 00:00:38.070
wow, what a bizarre coincidence. But when you

00:00:38.070 --> 00:00:40.289
start looking at the actual mechanics of political

00:00:40.289 --> 00:00:43.109
leverage, you quickly realize that coincidence

00:00:43.109 --> 00:00:46.350
in that arena is incredibly rare. Almost nonexistent.

00:00:46.549 --> 00:00:48.950
Exactly. We are looking at a landscape that is

00:00:48.950 --> 00:00:51.469
highly engineered. It's the strategic deployment

00:00:51.469 --> 00:00:54.329
of manufactured crises where the timing is just

00:00:54.329 --> 00:00:56.770
as weaponized as the information itself. Which

00:00:56.770 --> 00:00:58.490
brings us to our mission for this deep dive.

00:00:58.710 --> 00:01:00.990
We are unpacking a really detailed Wikipedia

00:01:00.990 --> 00:01:03.789
article on a concept known as Compromat. Yes,

00:01:04.109 --> 00:01:07.530
Compromat. And we are going to explore how this

00:01:07.530 --> 00:01:12.750
dark art evolved from like 1930s secret police

00:01:12.750 --> 00:01:17.170
jargon into this massive modern global tool of

00:01:17.209 --> 00:01:19.670
digital extortion and political leverage. Right.

00:01:19.769 --> 00:01:21.909
So to give you a clear initial overview of what

00:01:21.909 --> 00:01:24.549
we're dealing with here, the word Compromat is

00:01:24.549 --> 00:01:26.950
a Russian portmanteau. Meaning it's two words

00:01:26.950 --> 00:01:29.109
smashed together. Exactly. It combines two words

00:01:29.109 --> 00:01:32.599
to mean compromising material. And in the English

00:01:32.599 --> 00:01:35.579
speaking world, you might hear PR executives

00:01:35.579 --> 00:01:37.939
or intelligence analysts refer to it as dark

00:01:37.939 --> 00:01:41.780
PR or black PR. But fundamentally, it's damaging

00:01:41.780 --> 00:01:44.219
information about a public figure. So whether

00:01:44.219 --> 00:01:46.239
that's a politician, a business person, or a

00:01:46.239 --> 00:01:49.200
journalist, that is systematically used to discredit

00:01:49.200 --> 00:01:52.959
them, blackmail them, or exert this immense ongoing

00:01:52.959 --> 00:01:55.420
pressure over their decisions. OK, let's unpack

00:01:55.420 --> 00:01:58.219
this. Because before we get into the really scandalous

00:01:58.219 --> 00:02:01.140
historical which are wild, you really need to

00:02:01.140 --> 00:02:02.900
understand the fundamental DNA of compromise.

00:02:02.939 --> 00:02:05.299
Yeah, you do. Because it is not just, you know,

00:02:05.519 --> 00:02:07.579
a standard issue smear campaign. Oh, far from

00:02:07.579 --> 00:02:09.539
it. I mean, a typical smear campaign is usually

00:02:09.539 --> 00:02:11.960
just a tactical strike, right? You want to make

00:02:11.960 --> 00:02:14.840
someone look bad in the immediate moment to,

00:02:14.840 --> 00:02:17.830
I don't know, win a new cycle. But... Compromat

00:02:17.830 --> 00:02:20.750
has a much deeper history and a fundamentally

00:02:20.750 --> 00:02:23.969
different psychological objective. If we trace

00:02:23.969 --> 00:02:27.050
the etymology, the word itself actually originates

00:02:27.050 --> 00:02:31.030
in the 1930s as internal slang for the Stalin

00:02:31.030 --> 00:02:34.229
-era NKVD. Which was a precursor to the KGB.

00:02:34.469 --> 00:02:37.169
Exactly, the Soviet secret police. And what I

00:02:37.169 --> 00:02:39.870
found so fascinating in the source material is

00:02:39.870 --> 00:02:43.080
that the Merriam -Webster dictionary Notes this

00:02:43.080 --> 00:02:45.180
word didn't even make its first known appearance

00:02:45.180 --> 00:02:48.780
in the English language until 1990. Wow, 1990.

00:02:48.979 --> 00:02:51.740
Yeah, so you have this highly specialized, completely

00:02:51.740 --> 00:02:55.300
isolated concept that spent days being perfected

00:02:55.300 --> 00:02:57.400
behind the Iron Curtain before the West even

00:02:57.400 --> 00:02:59.580
had a name for it. And that isolation really

00:02:59.580 --> 00:03:01.780
allowed the methodology to become an institution.

00:03:02.240 --> 00:03:04.620
And a key part of that methodology is understanding

00:03:04.620 --> 00:03:06.819
that the material itself, it doesn't actually

00:03:06.819 --> 00:03:10.000
have to be an objective hidden truth. Yes, that

00:03:10.000 --> 00:03:11.780
is the part that really shifts your perspective.

00:03:11.689 --> 00:03:13.729
Yeah, it really does. Because I always assumed,

00:03:13.729 --> 00:03:15.729
you know, compromise meant digging up a dark,

00:03:15.870 --> 00:03:17.629
hidden reality about someone. Sure, like a real

00:03:17.629 --> 00:03:20.650
secret. Right. But according to the source, it

00:03:20.650 --> 00:03:22.909
can be entirely factual, it can be completely

00:03:22.909 --> 00:03:26.310
fabricated from thin air, or, and this seems

00:03:26.310 --> 00:03:28.550
to be the most insidious version, it can be a

00:03:28.550 --> 00:03:31.889
deceptive mix of both. Yeah, that mix is dangerous.

00:03:32.150 --> 00:03:34.650
You take a completely innocent photograph. or

00:03:34.650 --> 00:03:37.550
like a mundane financial transaction, and you

00:03:37.550 --> 00:03:40.909
present it wildly out of context to construct

00:03:40.909 --> 00:03:43.389
a completely nefarious narrative. Because the

00:03:43.389 --> 00:03:45.770
truth value of the material is almost secondary

00:03:45.770 --> 00:03:49.789
to its destructive value. The goal is the leverage.

00:03:50.050 --> 00:03:52.949
Right. And what makes Compromat so unique in

00:03:52.949 --> 00:03:55.210
the political culture of Russia and other post

00:03:55.210 --> 00:03:57.870
-Soviet states is the sheer volume of it that

00:03:57.870 --> 00:04:00.889
is collected. And honestly, how indiscriminately

00:04:00.889 --> 00:04:03.189
it's gathered. I love the analogy of a hoarder's

00:04:03.189 --> 00:04:05.419
insurance file. for this is very accurate because

00:04:05.419 --> 00:04:08.719
I always pictured a spy right identifying a specific

00:04:08.719 --> 00:04:11.060
target like a rogue general and then actively

00:04:11.060 --> 00:04:13.000
going out to dig up dirt on that one specific

00:04:13.000 --> 00:04:15.780
guy like in the movies exactly but the source

00:04:15.780 --> 00:04:17.759
indicates it's actually much broader than that

00:04:17.759 --> 00:04:20.379
the operatives gathering this material often

00:04:20.379 --> 00:04:22.379
don't even have a specific target in mind when

00:04:22.379 --> 00:04:25.120
they start no they don't They just gather information

00:04:25.120 --> 00:04:28.959
on everyone. Allies, enemies, neutral bureaucrats,

00:04:29.300 --> 00:04:31.860
they just stack it up in a massive vault. Just

00:04:31.860 --> 00:04:34.500
sweeping it all up. Yeah, sweeping up every piece

00:04:34.500 --> 00:04:36.860
of behavioral data, knowing that eventually,

00:04:36.939 --> 00:04:39.680
you know, someday... it might be useful leverage

00:04:39.680 --> 00:04:42.000
down the road. If we connect this to the bigger

00:04:42.000 --> 00:04:46.220
picture, it is really helpful to contrast Compromat

00:04:46.220 --> 00:04:49.180
with what we call opposition research in the

00:04:49.180 --> 00:04:51.439
United States or the UK. Right. Oppo research.

00:04:51.699 --> 00:04:55.000
Yeah. In Western politics, campaigns spend millions

00:04:55.000 --> 00:04:57.759
on opposition research to find compromising material

00:04:57.759 --> 00:05:00.860
on their opponents. But the goal there is almost

00:05:00.860 --> 00:05:04.370
always binary and destructive. Meaning you just

00:05:04.370 --> 00:05:06.250
want to take them out. Exactly. You release the

00:05:06.250 --> 00:05:08.189
information to weaken the opponent so you can

00:05:08.189 --> 00:05:10.230
win an election. Right. It's highly transactional.

00:05:10.389 --> 00:05:12.870
You drop the file, you win the race, the opponent

00:05:12.870 --> 00:05:15.430
goes home in disgrace. But Compromot flips that

00:05:15.430 --> 00:05:18.370
entirely. It is an investment strategy uniquely

00:05:18.370 --> 00:05:21.310
designed for ongoing control and influence. So

00:05:21.310 --> 00:05:23.170
you don't drop the file. Right. You actually

00:05:23.170 --> 00:05:25.750
do not want to destroy the person. You want them

00:05:25.750 --> 00:05:27.730
to stay in power, but you want to own them. Ah,

00:05:27.949 --> 00:05:31.199
I see. It's about behavioral blackmail. You hold

00:05:31.199 --> 00:05:34.060
that file over a politician or a business leader's

00:05:34.060 --> 00:05:36.620
head to ensure they vote a certain way or maybe

00:05:36.620 --> 00:05:38.600
award a lucrative state contract to the right

00:05:38.600 --> 00:05:41.160
company. Or griotly drop a pesky investigation.

00:05:41.420 --> 00:05:43.420
Exactly, because the moment you actually publish

00:05:43.420 --> 00:05:45.819
the compromise, you lose the leverage. Which

00:05:45.819 --> 00:05:49.120
brings us to the actual messy physical reality

00:05:49.120 --> 00:05:51.060
of how this was gathered in the 20th century.

00:05:51.339 --> 00:05:54.199
Oh yeah. the old school methods. I was reading

00:05:54.199 --> 00:05:56.459
through the sources and thinking, wait, so how

00:05:56.459 --> 00:05:58.040
are they actually getting this stuff? Are we

00:05:58.040 --> 00:06:00.519
really talking about classic spy movie tropes

00:06:00.519 --> 00:06:03.060
here? The hidden cameras and planted evidence?

00:06:03.279 --> 00:06:05.300
Pretty much, yeah. Because I've got two specific

00:06:05.300 --> 00:06:08.199
cases from the 1950s that read exactly like a

00:06:08.199 --> 00:06:10.500
John Le Carre novel. Let's hear them. There's

00:06:10.500 --> 00:06:13.399
a British civil servant named John Vassal and

00:06:13.399 --> 00:06:16.199
an American journalist named Joseph Alsop. both

00:06:16.199 --> 00:06:18.540
very famous cases. Yeah, both of them were stationed

00:06:18.540 --> 00:06:21.139
in Moscow during the Cold War. Yeah. And both

00:06:21.139 --> 00:06:25.079
fell victim to classic KGB honey traps. Right.

00:06:25.220 --> 00:06:27.639
And the honey trap is perhaps the most enduring

00:06:27.639 --> 00:06:30.920
physical entrapment technique in the espionage

00:06:30.920 --> 00:06:33.980
playbook. It's iconic, really. It is. The KGB

00:06:33.980 --> 00:06:37.060
would employ operatives, often sex workers, working

00:06:37.060 --> 00:06:40.839
with the state to seduce foreign targets in Moscow

00:06:40.839 --> 00:06:44.240
hotel rooms. And while that was happening, operatives

00:06:44.240 --> 00:06:46.519
film the encounters through two -way mirrors

00:06:46.519 --> 00:06:49.360
or with hidden cameras. Just incredibly invasive.

00:06:49.579 --> 00:06:51.959
And the reason the Vassal and Alsop cases are

00:06:51.959 --> 00:06:54.180
so historically significant is because they're

00:06:54.180 --> 00:06:56.980
both gay honey traps. And to really understand

00:06:56.980 --> 00:06:59.319
the mechanics of why that was so devastating,

00:06:59.740 --> 00:07:02.000
you have to look at the legal and social context

00:07:02.000 --> 00:07:04.540
of the 1950s. Right. The environment back then.

00:07:04.899 --> 00:07:07.060
Homosexuality was strictly illegal in Britain

00:07:07.060 --> 00:07:10.480
at the time and a massive, massive social taboo

00:07:10.480 --> 00:07:12.980
in the U .S. Absolutely. So the KGB wasn't just

00:07:12.910 --> 00:07:15.290
capturing an embarrassing indiscretion. They

00:07:15.290 --> 00:07:17.250
were capturing an act that, if mailed back to

00:07:17.250 --> 00:07:19.449
London or Washington, would lead to complete

00:07:19.449 --> 00:07:23.129
societal ruin, loss of career, and actual criminal

00:07:23.129 --> 00:07:25.670
prosecution. So the leverage was absolute. The

00:07:25.670 --> 00:07:27.689
target was forced to choose between committing

00:07:27.689 --> 00:07:30.389
treason by passing secrets to the Soviets or

00:07:30.389 --> 00:07:32.550
facing total destruction at home. What a nightmare.

00:07:32.689 --> 00:07:35.149
It really was. But what is truly fascinating

00:07:35.149 --> 00:07:37.769
about the evolution of Compromat is what happens

00:07:37.769 --> 00:07:40.149
when the Cold War ends. Right, the shift in the

00:07:40.149 --> 00:07:43.399
90s. Yeah, moving into the 1990s and after the

00:07:43.399 --> 00:07:46.639
fall of the Soviet Union, you had thousands of

00:07:46.639 --> 00:07:48.879
highly trained intelligence officers suddenly

00:07:48.879 --> 00:07:51.339
operating in a fractured state. Looking for work,

00:07:51.339 --> 00:07:54.519
basically. Exactly. So the tactics turned inward.

00:07:54.819 --> 00:07:56.920
Compromat wasn't just for foreign spies anymore.

00:07:57.399 --> 00:08:00.199
It became the standard operating procedure for

00:08:00.199 --> 00:08:02.980
internal Russian politics and business rivalries.

00:08:03.199 --> 00:08:06.439
And you see that shift perfectly. in the 1997

00:08:06.439 --> 00:08:09.720
case of Valentin Kovalev. Oh, the Kovalev case.

00:08:09.800 --> 00:08:11.740
Yeah, he was the sitting Russian Minister of

00:08:11.740 --> 00:08:14.079
Justice. The Minister of Justice. Right. And

00:08:14.079 --> 00:08:16.980
he was completely ousted after a newspaper published

00:08:16.980 --> 00:08:20.600
photographs of him in a sauna with prostitutes.

00:08:21.000 --> 00:08:23.560
But the kicker here. Yeah, the kicker. And I

00:08:23.560 --> 00:08:25.899
have to say, you really have to admire the sheer

00:08:25.899 --> 00:08:28.740
entrepreneurial audacity of the Russian underworld

00:08:28.740 --> 00:08:32.200
here. It's wild. It wasn't just any sauna. It

00:08:32.200 --> 00:08:35.299
was a facility entirely controlled by the Solsovsky

00:08:35.299 --> 00:08:37.799
Bratva. Which was one of the biggest crime syndicates

00:08:37.799 --> 00:08:40.539
in the country. Exactly. It's the ultimate synthesis

00:08:40.539 --> 00:08:43.440
of organized crime and political warfare. Yeah,

00:08:43.440 --> 00:08:46.159
the visual of the Minister of Justice compromising

00:08:46.159 --> 00:08:49.659
himself in a mob -controlled facility, it completely

00:08:49.659 --> 00:08:52.480
obliterates any authority he has to uphold the

00:08:52.480 --> 00:08:55.100
law. It's checkmate. It is. And it highlights

00:08:55.100 --> 00:08:58.480
how Compromat transitioned from a state intelligence

00:08:58.480 --> 00:09:02.009
tool to an oligarchy and mafia tool. And we also

00:09:02.009 --> 00:09:03.909
see the weaponization of timing that we talked

00:09:03.909 --> 00:09:06.129
about at the top of the show. Right. The suspicious

00:09:06.129 --> 00:09:10.330
timing. Because in 1999, Yuri Skuratov, who was

00:09:10.330 --> 00:09:13.210
the prosecutor general of Russia, started investigating

00:09:13.210 --> 00:09:16.250
the sitting president, Boris Yeltsin, and his

00:09:16.250 --> 00:09:19.029
close associates for corruption. A very dangerous

00:09:19.029 --> 00:09:21.330
investigation to launch. Very. And the investigation

00:09:21.330 --> 00:09:24.309
was actually gaining steam. And then... As if

00:09:24.309 --> 00:09:27.809
by magic, a grainy video airs on national television

00:09:27.809 --> 00:09:30.549
showing a man resembling Skorotov in bed with

00:09:30.549 --> 00:09:32.830
two women. And just like that, it's over. Yep.

00:09:32.950 --> 00:09:34.789
He's instantly suspended and later dismissed.

00:09:35.370 --> 00:09:37.789
The investigation into Yeltsin just evaporates.

00:09:37.950 --> 00:09:40.730
The causality is undeniable there. It's a direct

00:09:40.730 --> 00:09:44.110
surgical retaliatory strike. And the practitioners

00:09:44.110 --> 00:09:48.110
of Compromat are absolute masters of maximizing

00:09:48.110 --> 00:09:51.429
psychological damage through that timing. Look

00:09:51.429 --> 00:09:54.750
at the 2010 case involving a comedian and opposition

00:09:54.750 --> 00:09:57.309
figure named Victor Shandorovich. Oh, this one

00:09:57.309 --> 00:10:00.289
is brutal. It is. He was caught in a Kremlin

00:10:00.289 --> 00:10:03.129
honey trap video, but the people holding the

00:10:03.129 --> 00:10:05.149
compromise, they didn't just release it on a

00:10:05.149 --> 00:10:08.500
random Tuesday. No. They waited. They held onto

00:10:08.500 --> 00:10:11.460
that footage and released it exactly two days

00:10:11.460 --> 00:10:13.580
before his daughter's wedding. Two days. I mean,

00:10:13.879 --> 00:10:16.659
it is explicitly designed to inflict maximum

00:10:16.659 --> 00:10:19.299
personal and familial pain. It sends a message.

00:10:19.360 --> 00:10:21.519
Yeah, a message to every other opposition figure.

00:10:21.580 --> 00:10:24.259
Like, we won't just ruin your career. We will

00:10:24.259 --> 00:10:26.340
humiliate your family on the most important days

00:10:26.340 --> 00:10:29.179
of their lives. It's terrifying. It is. But here's

00:10:29.179 --> 00:10:31.879
where it gets really interesting, because relying

00:10:31.879 --> 00:10:34.600
on physical honey traps, saunas, and hotel rooms,

00:10:35.129 --> 00:10:37.490
That requires immense manpower. And physical

00:10:37.490 --> 00:10:39.570
locations. Right. And it carries a really high

00:10:39.570 --> 00:10:41.830
risk of the operatives getting caught. So to

00:10:41.830 --> 00:10:44.070
scale this operation globally in the 21st century,

00:10:44.090 --> 00:10:46.429
they had to digitize. They did. The physical

00:10:46.429 --> 00:10:49.269
entrapment of the 20th century gives way to the

00:10:49.269 --> 00:10:51.330
cybercrime and digital framing of the modern

00:10:51.330 --> 00:10:53.750
era. And this is where the definition of compromise

00:10:53.750 --> 00:10:57.169
expands into something far more terrifying. We

00:10:57.169 --> 00:10:59.149
mentioned earlier that compromise doesn't actually

00:10:59.149 --> 00:11:01.370
have to be true. Right. The fabricated stuff.

00:11:01.429 --> 00:11:04.269
Yeah. In the digital age, state actors and cyber

00:11:04.269 --> 00:11:06.750
criminals realized they could entirely bypass

00:11:06.750 --> 00:11:09.549
the messy human element of a honey trap. Well,

00:11:09.730 --> 00:11:12.029
instead of tricking a target into doing something

00:11:12.029 --> 00:11:15.049
compromising, they simply use malware to plant

00:11:15.049 --> 00:11:17.870
illegal material directly onto a target's personal

00:11:17.870 --> 00:11:20.679
computer to discredit them. Which brings us to

00:11:20.679 --> 00:11:23.799
the incredibly disturbing case of Vladimir Bukovsky.

00:11:24.100 --> 00:11:27.299
Yes. He was a very vocal, longtime critic of

00:11:27.299 --> 00:11:29.840
Soviet and Russian leaders who had been living

00:11:29.840 --> 00:11:33.580
in exile in the UK. And in 2015, the UK's Crown

00:11:33.580 --> 00:11:36.639
Prosecution Service announced they were prosecuting

00:11:36.639 --> 00:11:39.539
him. Right. Because they found prohibited images,

00:11:40.159 --> 00:11:42.840
specifically child pornography, on his computer.

00:11:43.179 --> 00:11:45.509
But the trial was halted. Investigators actually

00:11:45.509 --> 00:11:47.710
had to pause the entire prosecution to bring

00:11:47.710 --> 00:11:50.409
in cybersecurity experts. They needed to determine

00:11:50.409 --> 00:11:52.450
if Russian operatives had used sophisticated

00:11:52.450 --> 00:11:56.149
malware things like remote access Trojans or

00:11:56.149 --> 00:11:59.490
RATs to remotely access his hard drive. So they

00:11:59.490 --> 00:12:01.710
could digitally plant those images without him

00:12:01.710 --> 00:12:04.529
ever knowing. Exactly. Just to pause on the mechanics

00:12:04.529 --> 00:12:06.049
of that for a second, because it is crucial.

00:12:06.730 --> 00:12:09.509
A remote access Trojan basically acts like a

00:12:09.509 --> 00:12:12.129
digital skeleton key. It does. If you click the

00:12:12.129 --> 00:12:14.759
wrong link in an email. or even if your software

00:12:14.759 --> 00:12:17.860
is just out of date, an operative hundreds of

00:12:17.860 --> 00:12:20.879
miles away can quietly open a back door into

00:12:20.879 --> 00:12:23.519
your laptop, drop files into hidden folders,

00:12:23.779 --> 00:12:25.639
and then just close the door behind them. And

00:12:25.639 --> 00:12:28.539
Bukowski maintained his innocence from day one.

00:12:28.909 --> 00:12:32.409
But he tragically died in October of 2019 before

00:12:32.409 --> 00:12:34.570
the investigation into the planted evidence was

00:12:34.570 --> 00:12:37.730
fully resolved. It bypasses human agency entirely.

00:12:38.110 --> 00:12:39.789
You don't have to make a mistake. The mistake

00:12:39.789 --> 00:12:42.090
is forcefully uploaded to your life. It's chilling.

00:12:42.509 --> 00:12:45.090
And this digital evolution is also how Compromot

00:12:45.090 --> 00:12:47.690
started deeply infiltrating Western politics.

00:12:48.049 --> 00:12:50.110
Now, before we dive into these next examples

00:12:50.110 --> 00:12:52.370
regarding Western politics, I want to step out

00:12:52.370 --> 00:12:54.009
for a second and say something directly to you

00:12:54.009 --> 00:12:56.159
listening. Yeah, this is an important point.

00:12:56.480 --> 00:12:59.179
It is. Because the sources we are analyzing here

00:12:59.179 --> 00:13:01.960
mention some highly charged, very recent political

00:13:01.960 --> 00:13:04.600
figures in the U .S. and the U .K. Right. And

00:13:04.600 --> 00:13:08.080
our mission on this deep dive is strictly to

00:13:08.080 --> 00:13:11.299
look at these sources impartially. We are not

00:13:11.299 --> 00:13:13.919
endorsing any political viewpoints, left -wing

00:13:13.919 --> 00:13:16.340
or right -wing. Absolutely not. We are simply,

00:13:16.460 --> 00:13:19.679
neutrally, conveying the allegations in the historical

00:13:19.679 --> 00:13:22.759
record exactly as they are reported in the original

00:13:22.759 --> 00:13:25.309
source material. so we can understand the global

00:13:25.309 --> 00:13:27.990
expansion of this tactic. And that is an important

00:13:27.990 --> 00:13:29.990
boundary to set, because the source material

00:13:29.990 --> 00:13:32.350
illustrates that the fear of compromise is no

00:13:32.350 --> 00:13:36.409
longer just a post -Soviet problem, it is a recognized

00:13:36.409 --> 00:13:39.590
daily factor in Western intelligence. For instance,

00:13:39.889 --> 00:13:42.330
during the 2016 U .S. presidential election,

00:13:42.750 --> 00:13:45.230
U .S. intelligence agencies investigated potentially

00:13:45.230 --> 00:13:47.649
compromising personal and financial information

00:13:47.649 --> 00:13:50.370
regarding Donald Trump. The Steele dossier. Yes,

00:13:50.470 --> 00:13:52.950
this was largely based on opposition research

00:13:52.950 --> 00:13:55.970
known as the Steele dossier. And it led to high

00:13:55.970 --> 00:13:58.350
level intelligence briefings regarding allegations

00:13:58.350 --> 00:14:01.330
that he or his administration could be vulnerable

00:14:01.330 --> 00:14:03.629
to manipulation by the Russian government. And

00:14:03.629 --> 00:14:06.210
the source also details the situation with Michael

00:14:06.210 --> 00:14:08.929
Flynn, who was the incoming U .S. national security

00:14:08.929 --> 00:14:12.950
adviser in 2016. Right. He allegedly lied to

00:14:12.950 --> 00:14:14.750
the White House about the extent of his phone

00:14:14.750 --> 00:14:17.649
calls with the Russian ambassador, Sergey Kislyak.

00:14:17.769 --> 00:14:20.149
And what's fascinating about the mechanics of

00:14:20.149 --> 00:14:24.149
this case is how the lie itself became the compromise.

00:14:24.350 --> 00:14:26.809
Exactly. According to testimony from former acting

00:14:26.809 --> 00:14:29.450
U .S. Attorney General Sally Yates, the Department

00:14:29.450 --> 00:14:31.629
of Justice believed that this lie placed Flynn

00:14:31.629 --> 00:14:34.509
in a highly compromised situation. Yes. The psychology

00:14:34.509 --> 00:14:37.450
of the Flynn situation is a textbook compromise

00:14:37.450 --> 00:14:39.870
vulnerability. How so? Well, if the Russians

00:14:39.870 --> 00:14:42.389
knew the actual content of the phone calls and

00:14:42.389 --> 00:14:44.389
they knew Flynn had lied to his own government

00:14:44.389 --> 00:14:47.009
about them, they suddenly held leverage over

00:14:47.009 --> 00:14:49.809
the U .S. national security adviser. I see. They

00:14:49.809 --> 00:14:52.570
could theoretically say, do what we want or we

00:14:52.570 --> 00:14:54.769
will reveal that you lied to your president.

00:14:55.450 --> 00:14:58.049
The vulnerability itself becomes the compromising

00:14:58.049 --> 00:15:01.049
material. Wow. And we see this crossing the Atlantic

00:15:01.049 --> 00:15:04.440
as well. In the UK, Chris Bryant. a Labor Party

00:15:04.440 --> 00:15:07.100
member of parliament and ex -chair of the All

00:15:07.100 --> 00:15:09.659
-Party Parliamentary Group for Russia publicly

00:15:09.659 --> 00:15:11.799
claimed the Russian government orchestrated a

00:15:11.799 --> 00:15:14.600
homophobic campaign to remove him from his position.

00:15:14.600 --> 00:15:17.039
Right. Targeting MPs. Furthermore, he claimed

00:15:17.039 --> 00:15:19.259
that the Kremlin had actively acquired compromise

00:15:19.259 --> 00:15:22.980
on high -profile conservative party MPs, specifically

00:15:22.980 --> 00:15:25.000
naming prominent figures like Boris Johnson,

00:15:25.240 --> 00:15:28.700
Liam Fox, Alan Duncan, and David Davis. It really

00:15:28.700 --> 00:15:31.899
has become a standard tool of geopolitical statecraft.

00:15:32.200 --> 00:15:34.440
But what might be more impactful for everyday

00:15:34.440 --> 00:15:37.039
people is how these tactics trickle down from

00:15:37.039 --> 00:15:39.759
state -sponsored espionage into the private sector.

00:15:40.019 --> 00:15:42.120
Right, the commercialization of it. Exactly.

00:15:42.480 --> 00:15:44.360
After the Soviet Union collapsed, you had a lot

00:15:44.360 --> 00:15:46.259
of people who knew how to gather and weaponize

00:15:46.259 --> 00:15:48.279
information, realizing there was a lot of money

00:15:48.279 --> 00:15:50.779
to be made in corporate warfare. Compromat was

00:15:50.779 --> 00:15:53.100
commercialized into an everyday digital shakedown.

00:15:53.259 --> 00:15:54.940
I was reading this section of the source and

00:15:54.940 --> 00:15:58.480
thinking, wait, so has this trickled down to

00:15:58.480 --> 00:16:00.759
the business world? Like, how does an average

00:16:00.759 --> 00:16:04.559
executive end up... dealing with KGD style tactics.

00:16:05.820 --> 00:16:08.259
You can trace this commercialization back to

00:16:08.259 --> 00:16:11.360
a few key pioneers on the early internet. In

00:16:11.360 --> 00:16:15.460
1999, a man named Sergey Gorshkov created a blog

00:16:15.460 --> 00:16:18.159
called Compromat .ru. He essentially put the

00:16:18.159 --> 00:16:20.240
business model right on the tip. He really did.

00:16:20.559 --> 00:16:22.820
It was a site dedicated entirely to scandals

00:16:22.820 --> 00:16:25.440
involving Russian politicians and oligarchs.

00:16:25.620 --> 00:16:28.480
And Gorshkov would proactively post legitimate

00:16:28.480 --> 00:16:30.639
news links to build an audience. To make it look

00:16:30.639 --> 00:16:33.320
real. Right. But the real business was that he

00:16:33.320 --> 00:16:36.049
would accept direct cash payments. in exchange

00:16:36.049 --> 00:16:38.769
for posting unverified, highly scandalous dirt

00:16:38.769 --> 00:16:42.129
on specific people. Wow. It was incredibly controversial,

00:16:42.289 --> 00:16:43.950
but it proved that there was a lucrative market

00:16:43.950 --> 00:16:46.990
for bespoke smearing. And then a few years later,

00:16:46.990 --> 00:16:50.210
in 2005, a human rights activist named Vladimir

00:16:50.210 --> 00:16:53.929
Pribilovsky created AntiCompromat .org. And DeCompromatica.

00:16:53.990 --> 00:16:56.210
Yeah, which compiled opposition politics and

00:16:56.210 --> 00:16:58.110
information, further showing how the model could

00:16:58.110 --> 00:17:00.509
be adapted for different angles. But the jump

00:17:00.509 --> 00:17:03.350
from early 2000s blogging to what is happening

00:17:03.350 --> 00:17:06.400
right now is staggering. It's a totally different

00:17:06.400 --> 00:17:09.940
ballgame today. The source describes this massive

00:17:09.940 --> 00:17:13.740
modern ecosystem of anonymous fake news websites

00:17:13.740 --> 00:17:17.539
that operate as a sophisticated SEO extortion

00:17:17.539 --> 00:17:20.839
racket. Yes, SEO extortion. They use URLs loaded

00:17:20.839 --> 00:17:24.480
with keywords like Compromat, Roast Crime, or

00:17:24.480 --> 00:17:26.720
Anti -Cor, which is short for anti -corruption.

00:17:27.059 --> 00:17:29.400
And they use advanced search engine optimization

00:17:29.400 --> 00:17:32.420
to completely hijack a target's name on the web.

00:17:32.599 --> 00:17:34.539
To understand how they do this, you have to look

00:17:34.539 --> 00:17:37.299
at the mechanics of SEO. These extortionists

00:17:37.299 --> 00:17:39.960
use techniques like keyword stuffing and backlink

00:17:39.960 --> 00:17:42.160
farming. Like creating fake traffic. Exactly.

00:17:42.539 --> 00:17:44.859
They create hundreds of dummy sites that all

00:17:44.859 --> 00:17:47.640
link back to their main smear article. Google's

00:17:47.640 --> 00:17:50.079
algorithm sees all this traffic and interconnected

00:17:50.079 --> 00:17:52.740
linking, assumes the article is highly relevant

00:17:52.740 --> 00:17:55.299
and authoritative, and pushes it to the very

00:17:55.299 --> 00:17:57.380
top of the search results. That's crazy. So if

00:17:57.380 --> 00:18:00.220
you Google a specific mid -level business executive

00:18:00.220 --> 00:18:02.400
in Eastern Europe, the first page of results

00:18:02.400 --> 00:18:04.480
isn't their LinkedIn profile. It's flooded with

00:18:04.480 --> 00:18:06.430
articles from these... sites calling them an

00:18:06.430 --> 00:18:08.910
embezzler or a fraud. What's fascinating here

00:18:08.910 --> 00:18:11.750
is the sheer audacity of their business model.

00:18:12.829 --> 00:18:16.069
It is a closed -loop double -dipping extortion

00:18:16.069 --> 00:18:20.730
scheme. First, these anonymous websites secretly

00:18:20.730 --> 00:18:23.190
take payments from someone's competitors, whether

00:18:23.190 --> 00:18:25.950
in business or local politics, to publish the

00:18:25.950 --> 00:18:28.609
negative information. And again, this information

00:18:28.609 --> 00:18:31.509
might be true, it might be entirely false, or

00:18:31.509 --> 00:18:34.450
might be a deceptive mix. That's step one, get

00:18:34.450 --> 00:18:37.369
paid to launch the smear. Step two is where the

00:18:37.369 --> 00:18:40.190
real extortion happens. The shakedown. Yep. Once

00:18:40.190 --> 00:18:42.470
those articles are dominating the target's search

00:18:42.470 --> 00:18:44.970
results, ruining their business deals and personal

00:18:44.970 --> 00:18:48.190
reputation, the target inevitably contacts the

00:18:48.190 --> 00:18:50.390
site demanding they take the defamatory articles

00:18:50.390 --> 00:18:52.170
down. Because what else are they going to do?

00:18:52.190 --> 00:18:55.099
Right. And then the website demands a massive

00:18:55.099 --> 00:18:58.079
blackmail payment, often in cryptocurrency, from

00:18:58.079 --> 00:19:00.700
the victim to remove the very articles they were

00:19:00.700 --> 00:19:03.220
already paid by the competitor to post. It's

00:19:03.220 --> 00:19:06.160
brilliant in the darkest way possible. And to

00:19:06.160 --> 00:19:08.559
make it all look convincing to a casual observer,

00:19:09.059 --> 00:19:11.519
these sites don't just post the fake dirt. They

00:19:11.519 --> 00:19:14.019
build a veneer of absolute legitimacy. They do.

00:19:14.259 --> 00:19:17.160
They publish brief factual articles based on

00:19:17.160 --> 00:19:19.940
real news agency reports interspersed with the

00:19:19.940 --> 00:19:23.579
smears. They either invent fake journalist names

00:19:23.579 --> 00:19:26.900
with AI -generated headshots or they literally

00:19:26.900 --> 00:19:29.779
copy the names of real respected journalists.

00:19:29.940 --> 00:19:31.960
So if you just glance at the site or if an investor

00:19:31.960 --> 00:19:34.119
does a quick background check, it looks like

00:19:34.119 --> 00:19:36.519
a legitimate investigative journalism portal.

00:19:36.680 --> 00:19:39.579
It exploits our modern reliance on search engines.

00:19:39.799 --> 00:19:42.980
as arbiters of truth. It really does. We're conditioned

00:19:42.980 --> 00:19:45.779
to believe that if the first five links on Google

00:19:45.779 --> 00:19:48.579
say someone is a criminal, there must be fire

00:19:48.579 --> 00:19:51.059
behind that smoke. Exactly. So what does this

00:19:51.059 --> 00:19:53.039
all mean? When you take a step back and look

00:19:53.039 --> 00:19:55.880
at this entire historical arc from the physical

00:19:55.880 --> 00:19:59.519
KGB honey traps in 1950s hotel rooms to remotely

00:19:59.519 --> 00:20:02.119
planting digital evidence via malware to these

00:20:02.119 --> 00:20:05.279
modern SEO shakedown sites, you realize something.

00:20:05.619 --> 00:20:08.430
Comprompt at its core. is a highly specialized

00:20:08.430 --> 00:20:11.869
form of disinformation. Its primary product isn't

00:20:11.869 --> 00:20:14.029
actually a specific truth or even a specific

00:20:14.029 --> 00:20:17.170
lie. Its primary product is confusion. That is

00:20:17.170 --> 00:20:19.450
the ultimate takeaway of the source material.

00:20:19.690 --> 00:20:22.170
The overarching goal, especially when these tactics

00:20:22.170 --> 00:20:24.549
are deployed by state actors and amplified by

00:20:24.549 --> 00:20:28.029
the media, is to reduce public trust in institutions

00:20:28.029 --> 00:20:30.630
altogether. Just break down trust completely.

00:20:30.849 --> 00:20:34.009
Yes. If the public is constantly bombarded with

00:20:34.009 --> 00:20:36.710
scandals, both real and fake, they eventually

00:20:36.710 --> 00:20:39.490
experience total cognitive exhaustion. They just

00:20:39.490 --> 00:20:41.420
tune out. They stop trying to figure out what

00:20:41.420 --> 00:20:43.559
is true. They simply throw their hands up and

00:20:43.559 --> 00:20:45.940
assume everyone is corrupt, everyone is dirty,

00:20:46.319 --> 00:20:49.059
and objective truth no longer exists. Which leaves

00:20:49.059 --> 00:20:52.400
you with a really provocative, almost unsettling

00:20:52.400 --> 00:20:55.279
thought to ponder as we wrap up today. Definitely.

00:20:55.619 --> 00:20:58.460
In a world where fake compromise, planted digital

00:20:58.460 --> 00:21:00.859
evidence, and AI -generated scandals are becoming

00:21:00.859 --> 00:21:03.279
so incredibly common and easy to manufacture,

00:21:03.960 --> 00:21:06.099
what happens to actual accountability? That is

00:21:06.099 --> 00:21:09.130
the big question. Because... Does the mere existence

00:21:09.130 --> 00:21:12.630
of fake compromise create a perfect impenetrable

00:21:12.630 --> 00:21:15.289
shield for truly guilty people? Think about it.

00:21:15.589 --> 00:21:18.089
If you are a corrupt politician or a fraudulent

00:21:18.089 --> 00:21:21.349
CEO and you get caught in a real undeniable scandal,

00:21:21.930 --> 00:21:23.430
all you have to do now is wave your hands at

00:21:23.430 --> 00:21:25.930
the press and say, it's fake. I was set up. It's

00:21:25.930 --> 00:21:28.539
just compromise. Right. And because the public

00:21:28.539 --> 00:21:32.339
knows that fake compromise exists, a huge portion

00:21:32.339 --> 00:21:34.559
of them will actually believe you. It is the

00:21:34.559 --> 00:21:37.799
ultimate paradox of the information age. The

00:21:37.799 --> 00:21:39.799
muddy waters don't just destroy the innocent,

00:21:40.200 --> 00:21:42.980
they provide the perfect ready -made camouflage

00:21:42.980 --> 00:21:45.359
for the guilty. You aren't just looking at a

00:21:45.359 --> 00:21:48.019
muddy picture anymore. You are looking at a system

00:21:48.019 --> 00:21:49.960
deliberately designed to make you doubt your

00:21:49.960 --> 00:21:52.500
own eyes. Truly. Thank you for joining us on

00:21:52.500 --> 00:21:54.880
this deep dive. Keep questioning what you read.

00:21:55.069 --> 00:21:57.029
Keep looking for the mechanics behind the news

00:21:57.029 --> 00:21:58.990
and we will catch you next time.
