A proprietary three-phase methodology for identifying, mapping, and stress-testing the fracture points within operational infrastructure, supply chains, and critical systems. Every engagement passes through three sequential stages: Expose the Mirage, Map the Blast Radius, Stress the Exit.
Identifying assumptions that mask structural dependency — outsourcing that transfers control but not risk, SLAs that cover availability but not logic, dashboards that show green while the architecture beneath drifts.
Modelling contagion paths from a single fracture point through interconnected systems. A vendor insolvency, a chokepoint closure, a sanctions designation — tracing propagation from origin to enterprise-level impact.
Testing whether the organisation can physically extract itself under duress. Not theoretical contingency plans — operationally verified ability to migrate, reroute, or replace under hostile conditions.
The domains define where you look. The three phases define how you look.
Before capital is deployed, the target’s infrastructure must be stress-tested — not just its financials. I assess the physical and digital architecture of acquisition targets to identify integration risks, single points of failure, and operational debt that standard due diligence misses. The question is not “Does it work?” but “Will it survive the transition?”
Modern supply chains are optimised for efficiency, not survivability. I map the single points of failure across physical logistics networks — from port congestion and rail bottlenecks to vendor lock-in within contested corridors. When a critical supplier enters administration, I model the “blast radius” before the shockwave arrives.
Sanctions regimes, export controls, and trade corridor disruptions are no longer background noise — they are primary drivers of asset liquidity and operational continuity. I monitor opaque markets across EMEA and the Gulf, mapping how regulatory shifts and geopolitical events cascade into commercial exposure.
Critical National Infrastructure operates at the boundary between physical and digital systems. I assess the resilience of this interface — where a cyber event becomes a physical failure and a physical breach compromises digital integrity. Nuclear new-builds, energy networks, data centres, and high-frequency trading environments all share the same architectural vulnerability: the assumption that the boundary will hold.
Automated systems accumulate operational debt invisibly. A billing system pursues a debt that does not exist. A compliance dashboard shows “In Stock” while the warehouse says otherwise. I identify the race conditions, timing vulnerabilities, and silent failures within automated systems before they cascade into enterprise-level events. The architecture is the risk.
A decade of open-source intelligence practice, built through live event monitoring with the Project Owl community and sustained engagement with geopolitical pattern recognition. I bridge the gap between raw intelligence and commercial execution — identifying market-moving events from AIS vessel tracking, conflict monitoring, and sanctions activity before they reach mainstream analysis.