Analytical Models

Recurring patterns identified across the investigation. Each model defines a mechanism, its indicators, and documented instances. Multiple models can apply to the same evidence.

Announcement Bundling

Manufacturing the price-moving event that the substantive activity already preceded

Escalation

Announcement Bundling is the pattern of orchestrating a high-profile public announcement that bundles multiple pre-existing investments, contracts, and capital commitments into a single dramatic narrative. The announcement itself creates the price-moving event, even though the components were committed months or quarters earlier. Insiders close to the underlying components reposition financially in advance of the announcement, benefiting from the announcement-driven price move. The diagnostic separation from routine corporate communications is the temporal precedence of components. A normal earnings call announces results that occurred during the quarter; a normal partnership announcement consummates a deal that closed that day. Announcement Bundling announces commitments that closed months earlier but were withheld from public disclosure or sub-aggregated until the bundle could be assembled. The announcement is not the substantive event — it is the manufactured promotional moment that turns already-committed activity into a tradable narrative.

5 steps 4 instances 1 dossiers

The Bridge Tax

Power from occupying structural holes

Success to the Successful

Power derived from occupying structural holes in a network — bridging otherwise disconnected groups and capturing the information asymmetry between them. The "tax" is what the broker extracts for providing the bridge: fees, information, obligation, or leverage.

4 steps 3 instances 1 dossiers

Complexity as Credential

The con and the infrastructure are the same thing

Growth and Underinvestment

The deliberate use of complex financial structures to simultaneously (a) obscure activity from oversight, (b) signal sophistication and wealth to marks, and (c) generate the conditions for manufactured dependency. The complexity serves the con and IS the con.

4 steps 3 instances

Controlled Detachment

Sacrificing the principal to preserve the capability

Shifting the Burden

Controlled Detachment is the pattern by which a network responds to exogenous pressure (legal exposure, scandal, sanctions, regulatory enforcement) on one of its principals by accepting that principal's visible loss while preserving — and often extending — the structural capability the principal provided. The mechanism requires that the network has already placed substitutable personnel in adjacent positions before the loss event, so that the replacement can be made quickly and without negotiation. The conceptual core is substitutability of structural roles. In a network organized around a single charismatic principal, exposure of that principal collapses the network. In a network organized around roles (board seats, regulatory positions, market-access intermediary functions), exposure of any single role-occupant is absorbable as long as the role is fillable from within. The signature of Controlled Detachment is therefore the speed and seamlessness of replacement: a principal under pressure for years gives way to a successor announced within days, suggesting that the substitution was prepared in advance.

5 steps 3 instances

Durable Deregulation Scaffolding

Legal artifacts that outlast the personnel who authored them

Shifting the Burden

Durable Deregulation Scaffolding is the pattern by which a regulated industry — typically through alumni-of-the-regulator at a small number of vault firms — authors deregulatory legal artifacts (interpretive letters, no-action letters, advisory bulletins, FAQs, guidance documents) during a friendly administration, and those artifacts persist as operative law across administration changes. Subsequent transactions, often filed by partners from the same authoring firm, cite the prior artifacts as authority to obtain charters, approvals, exemptions, or preemption rulings. The mechanism's value is durability. Personnel rotate. Statutes are slow to amend. But interpretive letters and similar agency artifacts have a peculiar status: they are not formal rules subject to APA notice-and-comment, yet they are treated as binding agency interpretations. Once issued, they sit on the agency's website as a structural feature of the regulated industry's permitted activity, rescindable only by an equally slow successor action. The artifact outlasts the personnel who authored it; it becomes the durable infrastructure that subsequent personnel rotations exploit.

5 steps 4 instances

The Enabler Gradient

From architects to unwitting participants

Drifting Goals / Tragedy of the Commons

Within any complex financial crime network, participants operate at different levels of awareness and complicity — from fully complicit architects to unwitting service providers — and the system requires participants at every level.

5 steps 3 instances 1 dossiers

Jurisdictional Arbitrage

Exploiting gaps between legal regimes

Escalation

The exploitation of differences between legal, regulatory, and enforcement regimes across jurisdictions — extracting value where oversight is weak and storing/protecting it where institutions are strong.

4 steps 3 instances 1 dossiers

Manufactured Dependency

Creating problems to sell solutions

Fixes That Fail

A pattern where an operator creates the conditions for problems to arise, then positions themselves as the solution — generating leverage without explicit coercion.

5 steps 3 instances 1 dossiers

The Narrative Shield

Controlling the information environment

Shifting the Burden

Power maintained through controlling the information environment — shaping what is reported, what questions are asked, and what narratives dominate — not through direct coercion but through cultivated media relationships, strategic information placement, and reputation infrastructure.

5 steps 4 instances 1 dossiers

The Parallel Financial System

Where intelligence finance meets private crime

Shifting the Burden

Off-the-books financial infrastructure — maintained by or for intelligence services — that intersects with and enables private financial crime, because the same mechanisms (shell companies, compliant banks, deniable intermediaries) serve both purposes.

4 steps 3 instances

The Private Order

Access-controlled networks within open societies

Success to the Successful

A parallel access-controlled network operating within an ostensibly open-access democratic society, where membership is maintained through reciprocal obligation and access to the network IS the rent.

5 steps 3 instances

These eight models form an interlocking system. Hover over a node to see its relationships. Click to navigate to the full model page.

The Private Orderaccess-controlled networkBridge Taxstructural holesNarrative Shieldnarrative controlEnabler Gradientcomplicit → unwittingManufactured Dependencycreate problems, sell solutionsComplexity as Credentialthe con IS the productJurisdictional Arbitragemulti-jurisdiction exploitationParallel Financial Systemintel-finance shared infra