Analytical Models

Named conceptual frameworks that transform raw findings into understanding. Each model is a pattern detector — once named, it can be applied systematically across the investigation. Multiple models can apply to the same evidence simultaneously.

The Bridge Tax

Power from occupying structural holes

Success to the Successful

Power derived from occupying structural holes in a network — bridging otherwise disconnected groups and capturing the information asymmetry between them. The "tax" is what the broker extracts for providing the bridge: fees, information, obligation, or leverage.

4 steps 3 instances 1 dossiers

Complexity as Credential

The con and the infrastructure are the same thing

Growth and Underinvestment

The deliberate use of complex financial structures to simultaneously (a) obscure activity from oversight, (b) signal sophistication and wealth to marks, and (c) generate the conditions for manufactured dependency. The complexity serves the con and IS the con.

4 steps 3 instances

The Enabler Gradient

From architects to unwitting participants

Drifting Goals / Tragedy of the Commons

Within any complex financial crime network, participants operate at different levels of awareness and complicity — from fully complicit architects to unwitting service providers — and the system requires participants at every level.

5 steps 3 instances 1 dossiers

Jurisdictional Arbitrage

Exploiting gaps between legal regimes

Escalation

The exploitation of differences between legal, regulatory, and enforcement regimes across jurisdictions — extracting value where oversight is weak and storing/protecting it where institutions are strong.

4 steps 3 instances 1 dossiers

Manufactured Dependency

Creating problems to sell solutions

Fixes That Fail

A pattern where an operator creates the conditions for problems to arise, then positions themselves as the solution — generating leverage without explicit coercion.

5 steps 3 instances 1 dossiers

The Narrative Shield

Controlling the information environment

Shifting the Burden

Power maintained through controlling the information environment — shaping what is reported, what questions are asked, and what narratives dominate — not through direct coercion but through cultivated media relationships, strategic information placement, and reputation infrastructure.

5 steps 4 instances 1 dossiers

The Parallel Financial System

Where intelligence finance meets private crime

Shifting the Burden

Off-the-books financial infrastructure — maintained by or for intelligence services — that intersects with and enables private financial crime, because the same mechanisms (shell companies, compliant banks, deniable intermediaries) serve both purposes.

4 steps 3 instances

The Private Order

Access-controlled networks within open societies

Success to the Successful

A parallel access-controlled network operating within an ostensibly open-access democratic society, where membership is maintained through reciprocal obligation and access to the network IS the rent.

5 steps 3 instances

These eight models form an interlocking system. Hover over a node to see its relationships. Click to navigate to the full model page.

The Private Orderaccess-controlled networkBridge Taxstructural holesNarrative Shieldnarrative controlEnabler Gradientcomplicit → unwittingManufactured Dependencycreate problems, sell solutionsComplexity as Credentialthe con IS the productJurisdictional Arbitragemulti-jurisdiction exploitationParallel Financial Systemintel-finance shared infra