Before the peninsula was irrevocably torn in half, my father’s family lived in Hwanghae-do. My grandfather was a man of specific, dangerous substance. He was a first-generation Christian and a landowner who utilized profit-sharing models with his farmers. He held the keys to independent survival: a rice and flour mill, apple orchards, and timber forests used for ship masts.
But in the family memory, his economic power is secondary to his passion. My father remembers the saxophone and the piano; he remembers a house filled with music.
Music was his sanctuary, but his existence was his crime. To the encroaching regime, he wasn’t just a man; he was a rival infrastructure. He controlled resources and operated under a moral framework that competed with the state. That made him a target.
When the war came in 1950, the illusion of safety evaporated. The North Korean forces didn’t just want territory; they wanted the liquidation of alternative power centers. They kidnapped him first. Then they came for my grandmother.
She was released weeks later, physically free but psychologically shattered. She died within a year. My grandfather never returned. He was detained, interrogated, and eventually executed. He left behind three children. My father was seven years old when he became an orphan, forced to flee south to Seoul with his younger brother and sister, running from a regime that had classified their existence as an error to be corrected.
I carry this history not as folklore, but as a foundational dataset. It taught me that civilization is not a permanent state of nature. It is a fragile architectural construct. And when that construct fails, it does not decay slowly. It collapses with the terrifying speed of an underwater implosion.
For over two decades, I have worked as a systems architect in the American financial and technology sectors. I did not inherit my grandfather’s music; I inherited the refugee’s obsession with structure. My professional life is dedicated to building redundancies, identifying points of failure, and ensuring that complex networks survive stress. I viewed the American constitutional order through this lens—as a system designed with enough checks and balances to withstand any load.
I was wrong. The “democratic backsliding” scholars warned about was a euphemism. We were witnessing a controlled demolition.
The summer of 2025 shattered the final assumption that American institutions were redundancy-proof. The assassination of Minnesota lawmaker Melissa Hortman in June was a shock to the system, a violation of the unspoken truce that keeps politics from becoming warfare.1 The “No Kings” protests in Washington dissolved into terrified silence, met not with reassurance but with a $50 million military parade—a message that the state possessed a monopoly on force and intended to flaunt it.2
But violence is often chaotic. It was the events of September that revealed the design.
When Charlie Kirk was shot by a sniper in Utah, the chaos was brief.3 Within hours, before a suspect was identified, the machinery of the state engaged with terrifying precision. The White House did not mourn; it mobilized. The tragedy was immediately repurposed as a warrant for total war against political opposition.
The President and Vice President announced a legislative and executive offensive. They invoked RICO statutes against liberal nonprofits. They encouraged the private sector to purge employees for “sympathizing with domestic terror.” They unleashed the Department of Justice to dismantle the “intellectual infrastructure” of the Left.4
This was not a reaction. It was an activation.
The policies deployed in the wake of the Kirk assassination were drawn directly from the text of Project 2025. The plans to weaponize the DOJ, to criminalize dissent—these were already written, reviewed, and staged. They were simply waiting for the right trigger.
Project 2025 did not invent American rage, polarization, or the anger that pulled the trigger in Utah. But it provided the permission structure that allowed the state to capitalize on it. It offered a blueprint for converting tragedy into tyranny.
This book is a dissection of that blueprint.
We are past the point of wondering if the republic is in danger. We are watching the seizure take place. The analysis in these pages is clinical because the situation demands it. We must look at the specific mechanisms used to break our republic: the executive orders, the court filings, the personnel changes. We must understand how the law is being inverted—turned from a shield for the citizen into a sword for the state.
There is a temptation to retreat into silence. To hope that if we keep our heads down, like my grandfather tried to do, the storm will pass. But the surveillance state built by this administration, powered by technologies my own industry helped create, leaves no room for shadows.
I spent months writing under the pseudonym “Hemlock Collective,” believing I could fight this battle from the dark. That was a mistake. My grandfather operated in the underground, and it did not save him. In an era where the state criminalizes the truth, speaking openly is the only strategy left. We must stake our claim to reality before they rewrite it entirely.
He gave his life for his principles. I can, at the very least, give my name to mine.
~ Jason I. Oh
Methodology: Diagnostic Architecture
This text treats Project 2025 as an architectural blueprint, not a conspiracy theory. We do not argue that a single document controls every event in real-time. History is too messy for that. Instead, we analyze how the Project functions as a permission structure—a set of pre-validated legal theories and personnel lists that allows opportunistic actors to seize power rapidly when crises occur. Our goal is to reverse-engineer the logic of the capture, making the mechanics of the authoritarian transition legible so they can be dismantled.
THEORY OF CAPTURE
A Systems Model of Democratic Degradation
Read as: Demand → Activation → Conversion → Outputs → Feedback Loops
INPUTS: Enabling Conditions
POLARIZATION
- Affective sorting / tribal ID
- Media fragmentation
- Zero-sum framing
CRISIS (real or manufactured)
- Economic precarity
- Security threat narrative
- Cultural displacement anxiety
INSTITUTIONAL EROSION
- Declining institutional trust
- Norm degradation / elite defection
- Prior capture-cycle residue
Some inputs are downstream products of earlier capture cycles (see Feedback Loops).
INSTRUMENTS OF CAPTURE
Mutual Reinforcement: Each instrument enables and amplifies the others
LAW
- Selective enforcement / non-enforcement
- Remedies + review disablement
- Removal/appointments
- Immunity & clemency
PERSONNEL
- Loyalty tests / purges
- Schedule F conversion
- Acting appointments
FUNDS
- Impoundment
- Conditional spending
- Contract steering
- Grant defunding
INFORMATION
- Collection halt / sabotage
- Access denial / classification
- Surveillance
NARRATIVE
- State propaganda
- Media intimidation
- Platform capture
VIOLENCE
- State: Militarization, Detention
- Stochastic: Intimidation, Vigilantism
OUTPUTS: Capture Products
MINORITY RULE
- Electoral lock-in (suppression, gerrymandering)
- Counter-majoritarian capture (courts, Senate)
- Policy decoupling from majority will
- Structural lock-in / hard-to-reverse rules
OLIGARCHIC EXTRACTION
- Regulatory capture
- Tax arbitrage / public asset transfer
- Rent extraction (health, housing, edu, energy)
- Wealth concentration acceleration
Minority rule provides political protection for extraction; extraction funds political protection.
FEEDBACK LOOPS (arcs flow right-to-left from Outputs back to earlier stages)
LOOP 1: IMPUNITY
Outputs → Instruments
No prosecution / clemency → Emboldens actors
"Transgression becomes precedent; precedent becomes entitlement."
LOOP 2: EXIT
Outputs → Permission Structure
Brain drain / capital flight → Weakened opposition
"Those who could resist leave; those who remain accommodate."
LOOP 3: EPISTEMIC COLLAPSE
Outputs → Inputs
Information destruction + narrative dominance → Cannot measure harm → Cannot mobilize
"You cannot fight what you cannot name or count. Hardest-to-reverse loop."
Figure: Theory of Capture — Systems Diagram. A model of democratic system conversion into instruments of minority rule and oligarchic extraction. Read left-to-right as causal chain (Demand → Activation → Conversion → Outputs), then trace feedback loops showing system stabilization.
Canonical: /diagrams/theory-of-capture/
1. On coordination: This model does not require conspiracy; systemic outcomes emerge from partial coordination plus convergent incentives.
2. On reversibility: Each feedback loop raises reversal costs and lowers detection probability. Epistemic collapse is the hardest-to-reverse loop: destroyed measurement infrastructure makes harm undocumentable.
3. On endogeneity: The system is self-amplifying. Today's outputs become tomorrow's inputs.
Sullivan, T., Karnowski, S., & Richer, A. D. (2025, June 14). ‘No Kings’ Protests in Minnesota Canceled after Lawmakers Shot. AP News. ↩︎
Levy, M., Lauer, C., & Vertuno, J. (2025, June 14). Military Parade Marks “Unity Day” as Protests Fade. AP News. ↩︎
Schoenbaum, H., et al. (2025, September 10). Conservative Activist Charlie Kirk Assassinated at Utah University. AP News. ↩︎
Rogers, K., & Kanno-Youngs, Z. (2025, September 15). On Charlie Kirk Show, JD Vance Talks of Crackdown on Liberal Groups. The New York Times. ↩︎