// Investigative Files
Intelligence Report
/report
Full investigation overview with findings, profiles, syntheses.
The Architecture of Secrecy
/book
Long-form investigative document with chapter-level cross-refs.
Risk Analysis
/threats
Threat assessments derived from cross-entity exposure modelling.
Preparedness Analysis
/preparedness
Strategic readiness scans across tracked institutions.
// Ledgers
Contradictions
/contradictions
Public statements set against the entity's own filings, votes, and transactions.
Documented Lies
/lies
Public commitments paired with their documented violations.
Money Flow Chains
/money-flow
Traceable funding paths from origin to recipient.
Shadow Ledger
/shadow-ledger
Off-the-books financial relationships inferred from the public record.
Closed Loops
/closed-loops
Self-reinforcing circuits of exchange between small entity networks.
Investigation Chains
/chains
Connected dossiers tracing sequenced findings across entities.
// Surveillance
Crinkle News
/news
Daily anchor briefing — current event readouts.
Social Shock
/social-shock
Anomalous social-media activity flagged by the detector.
Congress Monitor
/congress
Live tracking of legislative activity on the watchlist.
Cognitive Impact
/cognitive-impact
Documented effects of contested information environments.
Structural Findings
/findings/structural
Patterns in the network, not single-entity events.
Claims Archive
/claims-archive
Searchable archive of every recorded claim.
Corrections Log
/corrections
Every published correction, with diff and source.