Perils of Public AI from a Counterintelligence Perspective: The Madhu Gottumukkala Case

a.i., artificial intelligence, spy, spies, intelligence, counterintelligence, espionage, counterespionage, C. Constantin Poindexter

The Perils of Public AI from a Counterintelligence Operator’s View: A Case Study on Madhu Gottumukkala’s Reckless Use of ChatGPT

In the clandestine world of national security, the line between operational success and catastrophic failure is often measured in millimeters of discretion. The recent revelation that Madhu Gottumukkala, the acting director of the Cybersecurity and Infrastructure Security Agency (CISA), utilized a public, commercially available version of ChatGPT to process “for official use only” (FOUO) documents is not merely a procedural misstep. It is an incredibly stupid counterintelligence debacle, I mean, “of the highest order” (Sakellariadis, 2026). This incident exposes a chasm of staggering depth between the rapid adoption of transformative technology and the foundational principles of information security that have, until now, protected the nation’s most sensitive secrets. From my perspective as a counterintelligence expert, Gottumukkala’s actions were not born of ignorance but of a dangerous arrogance, a presumption that his position insulated him from the very rules he was sworn to enforce. This presumption is a gift to adversarial FIS and a nightmare for those tasked with defending the integrity of our intelligence apparatus.

The Inherent Treachery of Public Large Language Models

To understand the gravity of Gottumukkala’s error, one must first dissect the fundamental architecture and data policies of public Large Language Models (LLMs) like OpenAI’s ChatGPT. These models are not inert tools; they are dynamic, cloud-hosted systems designed to learn and evolve from user interactions. OpenAI’s policy, while occasionally nuanced, has consistently maintained that submitted data may be retained and used to train and refine their models (OpenAI, 2025). This means that every prompt, every document fragment, and every query entered into the public interface becomes part of a vast, aggregated dataset. For a civilian user, this might raise privacy concerns. For a government official handling sensitive material, it represents an unauthorized and uncontrolled data spill of potentially catastrophic proportions.

The data itself is only half the problem. The metadata generated by the interaction, i.e., user’s IP address, device fingerprinting, session timings, and the very nature of the queries, etc., provides a rich tapestry of intelligence for a determined adversary. A sophisticated FIS such as China’s Ministry of State Security (MSS) or Russia’s SVR does not need to directly breach OpenAI’s servers to benefit. They can analyze the model’s outputs over time to infer the types of questions being asked by government entities. If an official uploads a contracting document related to a critical infrastructure project, the model’s subsequent, more knowledgeable answers about that specific topic could signal a point of interest. This is a form of signals intelligence (SIGINT) by proxy, where the adversary learns not what we know, but what we are focused on, thereby revealing strategic priorities and operational vulnerabilities.

Furthermore, the security of these public platforms is a moving target. While no direct evidence of a major breach of OpenAI’s training data is publicly available, the possibility cannot be discounted. The U.S. intelligence community operates on the principle of need-to-know and compartmentalization precisely because no system is impenetrable. Deliberately placing sensitive data into a system with an opaque security posture, governed by a private company with its own corporate interests and potential vulnerabilities, is an abdication of the most basic tenets of information security. The 2023 breach of MoveIt Transfer, a widely used file-transfer software, which impacted hundreds of organizations, including government agencies, serves as a stark reminder that even trusted third-party systems can be compromised (CISA, 2023). Gottumukkala’s actions effectively created a similar, albeit digital, vulnerability by choice.

The Anatomy of an Insider Threat: Arrogance as a Vector

Counterintelligence professionals spend their careers identifying and mitigating insider threats, which are often categorized as malicious, coerced, or unintentional. Gottumukkala’s case falls into a particularly insidious subcategory, . . . the entitled or arrogant insider. This is an individual who, often due to seniority or perceived importance, believes that security protocols are for lesser mortals. His reported actions paint a textbook picture. Faced with a blocked application, he did not seek to understand the policy or use the approved alternative; he reportedly demanded an exemption, forcing his subordinates to override security measures designed to protect the agency (Sakellariadis, 2026). He just assumed that the rules simply did not apply to him.

This behavior is more than a simple lapse in judgment. It is a systemic cancer. When a leader demonstrates a flagrant disregard for established rules, it erodes the entire security culture of an organization. Junior personnel, witnessing a senior official flout policy without immediate repercussion, receive a clear message. The rules are flexible, especially for the powerful. This creates an environment ripe for exploitation, where other employees may feel justified in likewise ignoring rules that they don’t find convenient, exponentially increasing the agency’s attack surface. Adversarial FIS are adept at exploiting this kind of cultural rot. They understand that a demoralized workforce with a cynical view of leadership is more susceptible to coercion, recruitment, or simple negligence.

Gottumukkala’s reported professional history amplifies these concerns. His documented failure to pass a counterintelligence-scope polygraph examination is a monumental red flag that should have precluded any role involving access to sensitive operational or intelligence information (Sakellariadis, 2026). A polygraph is not a perfect lie detector, but in the counterintelligence context, it is a critical counterespionage tool for assessing an individual’s trustworthiness, susceptibility to coercion, and potential for undeclared foreign contacts. A failure in this screening is a definitive signal of elevated risk. Making matters worse, he sought to remove CISA’s Chief Information Officer (CIO), the very official responsible for maintaining the agency’s cybersecurity posture (Sakellariadis, 2026). This pattern suggests a hostility toward institutional oversight that is antithetical to the role of a cybersecurity leader in addition to hostility towards basic INFOSEC protocols.

The Strategic Cost of a Single Data Point

The documents in question were reportedly FOUO, not classified. This distinction, while bureaucratically significant, is strategically irrelevant to a capable adversary. FOUO documents often contain the building blocks of classified intelligence. They can reveal details about sources and methods, sensitive but unclassified contract information about critical infrastructure, internal deliberations on policy, and/or the identities and roles of key personnel involved in national security efforts.

Consider a hypothetical but plausible scenario. A FOUO document details a DHS contract with a private firm to harden the cybersecurity of a specific sector of the electrical grid. Uploaded to a public AI, this data point is now part of a larger model. An adversary, through persistent querying of the public AI, could potentially coax the model into revealing more about this sector’s vulnerabilities than it otherwise would. Even if the model does not explicitly reveal the document, the adversary’s knowledge of the type of work being done allows them to focus their espionage, cyberattacks, or influence operations on that specific firm or sector. The FOUO document becomes the breadcrumb that leads the adversary to the feast. The Office of the Director of National Intelligence (ODNI) has repeatedly warned in its annual threat assessments that adversaries prioritize unclassified data collection to build a mosaic of intelligence (ODNI, 2025). Each piece is harmless on its own, but together they form a clear and actionable picture.

The existence of secure, government-controlled alternatives makes this incident all the more infuriating. The Department of Homeland Security has developed and deployed its own AI-powered tool, DHSChat, specifically designed to operate within a secured federal network, ensuring that sensitive data does not leave the government’s digital ecosystem (DHS, 2024). Gottumukkala’s insistence on using the public, less secure option over the purpose-built, secure one is the action of someone who either lacks a fundamental understanding of the threat landscape or simply doesn’t give a shit. In either case, the result is the same. It is an unnecessary forced error, and self-inflicted wound on national security.

The Imperative of Accountability and a Zero-Tolerance Mandate

The response to this incident should be unequivocal and severe. The Department of Homeland Security’s own Management Directive 11042.1 mandates that any unauthorized disclosure of FOUO information be investigated as a security incident, potentially resulting in “reprimand, suspension, removal, or other disciplinary action” (DHS, 2023). Anything less than a full counterintelligence investigation, coupled with Gottumukkala’s immediate removal from any position of trust, signals a tacit acceptance of reckless behavior.

This case should catalyze a broader policy shift across the entire Intelligence Community which has been visibly altered by current leadership. A zero-tolerance policy for the use of public AI tools with any government data, let alone sensitive information, must be implemented and enforced without exception. This requires more than a memo. It requires robust technical controls, including network-level blocks to prevent such data exfiltration and continuous monitoring for policy violations. It also demands a cultural reset led from the very top, where security is not seen as a bureaucratic hurdle but as an integral component of every mission.

The arrogance displayed by Madhu Gottumukkala is a counterintelligence nightmare. The arrogance and hubris are breathtaking. This case represents a willful blindness to the reality of the threats we face, or worse, zero concern whatsoever for the protection of national security assets. Our adversaries are relentless, sophisticated, and constantly probing for weaknesses. We cannot tolerate bureaucrats who view security protocols as optional. The integration of AI into our national security architecture holds immense promise, but that promise can only be realized if it is guided by the enduring principles of vigilance, discipline, and respect for the sanctity of sensitive information. To do otherwise is not just foolish. It is a betrayal of the public trust and a dereliction of the duty to protect the nation.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

Bibliography

  • Department of Homeland Security. (2023). Management Directive 11042.1: Safeguarding Sensitive But Unclassified (For Official Use Only) Information. Retrieved from DHS.gov
  • Department of Homeland Security. (2024). DHS’s Responsible Use of Generative AI Tools. Retrieved from DHS.gov
  • National Counterintelligence and Security Center. (2025). Annual Threat Assessment: Adversary Exploitation of Leaked Data. Washington, D.C.: Office of the Director of National Intelligence.
  • OpenAI. (2025). ChatGPT Data Usage Policy. Retrieved from OpenAI.com
    Sakellariadis, J. (2026, January 27). Trump’s Acting Cyber Chief Uploaded Sensitive Files into a Public Version of ChatGPT. POLITICO. Retrieved from Politico.com
  • Cybersecurity and Infrastructure Security Agency (CISA). (2023, June 1). *AA23-165A: MOVEit Transfer Vulnerability Exploit

Espionaje en Bávaro: El caso Novikov – contrainteligencia, desinformación y la anatomía de una operación de influencia

espia, espias, espionage, inteligencia, contraespionaje, contrainteligencia, DNI, J2, C. Constantin Poindexter

La detención en Bávaro del ciudadano ruso Dmitrii Novikov constituye uno de los expedientes más reveladores de la historia de la inteligencia (y contrainteligencia) de nuestra Quisqueya. Apto para estudiar la convergencia entre operaciones de influencia, crimen transnacional y técnicas contemporáneas de encubrimiento financiero, su envergadura no podemos pasar por alto. Según la información pública difundida por autoridades dominicanas y replicada por medios de referencia, Novikov habría dirigido desde territorio dominicano una red de “ciberinfluencia” vinculada al Proyecto Lakhta, también denominado “La Compañía”, orientada a la creación y difusión de contenido digital con fines de desinformación política y manipulación en redes sociales, con efectos proyectados tanto sobre la República Dominicana como sobre otros países de la región, entre ellos Argentina (Listín Diario, 2025; EFE, 2025). Para el profesional de contrainteligencia, la importancia del caso no reside únicamente en la imputación, sino en los indicadores de método: cobertura social verosímil, externalización operacional mediante colaboradores locales, y un esquema de financiación y pagos diseñado para opacar origen y trazabilidad, todo ello enmarcado en una tradición rusa de guerra informativa ampliamente documentada por fuentes judiciales y regulatorias estadounidenses y sus semejantes europeos.

Los hechos son nítidos. El Ministerio Público, actuando junto con la Unidad Especializada del Crimen Organizado, detuvo a Novikov durante un operativo en una villa del residencial Palmas del Sol II, Bávaro, donde residía con familiares (Listín Diario, 2025; EFE, 2025). Se le acusó de haber operado con la intención explícita de evitar que se percibiera el origen del contenido promovido, ocultando su nacionalidad rusa y utilizando colaboradores locales, bajo la apariencia de un deportista de artes marciales mixtas, mientras recibía fondos y dirección de asociados al Proyecto Lakhta (Listín Diario, 2025; EFE, 2025). En términos de ‘tradecraft’, la “leyenda” personal (el relato de identidad que permite acceso, normaliza contactos y reduce sospecha) aparece aquí como instrumento de penetración social y, por extensión, de influencia. No se trata de un detalle anecdótico. La cobertura deportiva opera como camuflaje cultural, facilita redes sociales orgánicas y diluye la percepción de intencionalidad política hasta hoy en día igual como para los fines de Novikov sirvió.

La dimensión financiera del caso merece atención especial. Las autoridades afirman haber comprobado que Novikov manejaba operaciones económicas y transacciones internacionales mediante billeteras electrónicas con criptomonedas, usando plataformas como Binance y activos como Bitcoin y Ethereum (Listín Diario, 2025; EFE, 2025). La Fiscalía considera que estos mecanismos habrían sido empleados para mover fondos internacionales encubriendo el origen de los recursos y facilitando actividades ilícitas vinculadas al lavado de activos y al financiamiento transnacional (EFE, 2025; Listín Diario, 2025). Para la contrainteligencia es instructivo. Ilustra una realidad operativa, el ecosistema cripto no es en sí “invisible”, pero sí ofrece fricción adicional para la atribución y la congelación rápida de flujos, especialmente cuando se combina con identidades prestadas, intermediarios y jurisdicciones con distinta y bien variada velocidad de cooperación. En operaciones de influencia, el dinero no es accesorio. Es el sistema circulatorio que paga infraestructura, compra amplificación, remunera operadores, y sostiene persistencia.

El expediente añade un componente que, de confirmarse, ampliaría su gravedad estratégica. Durante el operativo se incautaron evidencias que comprometerían al imputado con la venta y distribución de armas de fuego (Listín Diario, 2025; EFE, 2025). Esta intersección entre desinformación y armas sugiere un patrón conocido por los profesionales del ámbito castrense investigativo y de inteligencia nacional. Cuando convergen propaganda, financiación opaca y armamento, el fenómeno trasciende la “influencia blanda” y se aproxima a un ecosistema habilitador de coerción, intimidación y/o criminalidad organizada. En términos analíticos, el riesgo ya no es sólo cognitivo (degradación de confianza pública, polarización, distorsión deliberativa) sino también material, por la capacidad de introducir violencia o amenaza en el teatro social.

Para comprender el rótulo “Lakhta” y su peso, conviene situarlo en el marco histórico documentado por instancias judiciales y regulatorias. El Departamento de Justicia de Estados Unidos describió el Proyecto Lakhta como un esfuerzo paraguas, financiado por Yevgeniy Prigozhin, que incluía componentes orientados a audiencias extranjeras y que administraba presupuestos multimillonarios para actividades de influencia, incluyendo compras de anuncios, registros de dominios, uso de servidores proxy y “promoción” de publicaciones en redes sociales. El objetivo estratégico fue de sembrar discordia y socavar la fe en instituciones democráticas (U.S. Department of Justice, 2018). El propio gobierno estadounidense, en documentación oficial, asoció la operación con “information warfare” (guerra informática) y con esfuerzos para simular activismo local mediante identidades ficticias y técnicas de ocultación de origen (U.S. Department of Justice, 2018). Por su parte, el Departamento del Tesoro de Estados Unidos caracterizó el Proyecto Lakhta como una campaña de desinformación financiada por Prigozhin dirigida a audiencias en Estados Unidos, Europa, Ucrania e incluso Rusia, destacando su uso de “personas” ficticias y su financiación de “troll farms” (U.S. Department of the Treasury, 2022). Complementariamente, el propio registro público de sanciones de OFAC identifica a la Internet Research Agency LLC (la “fábrica de trolls”) con alias explícitos que incluyen “LAKHTA INTERNET RESEARCH”, reforzando la continuidad nominal y organizacional del constructo Lakhta en la arquitectura de influencia rusa (U.S. Department of the Treasury, Office of Foreign Assets Control, 2026).

La República Dominicana, por su posición geográfica, sociedad libre y abierta, su centralidad turística, su conectividad logística y su apertura de ecosistemas digitales, constituye un espacio atractivo para operaciones de influencia que busquen “plausible deniability” y a la vez proyección regional. Las autoridades dominicanas sostienen que las operaciones atribuidas a Novikov apuntaban a incidir en la opinión pública, con impactos directos en el país y en otros entornos regionales (Listín Diario, 2025). En paralelo, fuentes periodísticas reseñaron que en Argentina se detectó una estructura denominada “La Compañía”, supuestamente vinculada al gobierno ruso y al Proyecto Lakhta, cuyo objetivo sería conformar redes locales leales a intereses rusos para campañas de desinformación, con operadores dedicados a recibir financiamiento y tejer vínculos con colaboradores (Listín Diario, 2025). Reportajes contemporáneos sobre Argentina describieron hallazgos de redes asociadas a campañas de desinformación para promover intereses de Moscú (The Record, 2025; Buenos Aires Times, 2025). Este encadenamiento (nodos nacionales que replican un mismo manual) es típico de operaciones de influencia sostenidas. Se construyen “células” de baja visibilidad, se tercerizan tareas, y se mantiene dirección estratégica a distancia.

Desde la perspectiva profesional, el caso Novikov ofrece lecciones operativas concretas para el diseño de defensa. Primero, la atribución moderna depende menos de “una prueba reina” y más de una constelación de indicadores: patrón de contenido, sincronización de amplificación, infraestructura digital, y rutas de financiación. Cuando el Ministerio Público afirma que Novikov recibía dirección y fondos de asociados a Lakhta, está apuntando a la hipótesis de mando y control, es decir, a una cadena de coordinación, no a mera actividad individual (Listín Diario, 2025; EFE, 2025). Segundo, la cobertura social, en este caso la apariencia de atleta, no debe subestimarse. Es un mecanismo de acceso y normalización, capaz de producir capital social y reclutar facilitadores locales sin que éstos perciban la finalidad estratégica (Listín Diario, 2025). Tercero, el uso de criptoactivos en plataformas globales exige capacidades técnicas y jurídicas específicas como la analítica de blockchain, cooperación con ‘exchanges’, preservación de evidencia digital y coordinación internacional, porque la velocidad del flujo financiero suele superar la velocidad administrativa del Estado (EFE, 2025; Listín Diario, 2025).

Cuarto, la operación descrita confirma un principio que en contrainteligencia conviene reiterar. La desinformación no es simple “mentira” sino una disciplina de ingeniería social, orientada a modificar percepciones, elevar costos de gobernabilidad y erosionar la confianza y legitimidad institucional. El propio marco estadounidense sobre Lakhta enfatiza objetivos estratégicos de discordia y debilitamiento de confianza pública mediante identidades falsas y manipulación del debate (U.S. Department of Justice, 2018). En consecuencia, las respuestas estatales deben integrar no sólo persecución penal, sino resiliencia cognitiva, i.e., alfabetización mediática, transparencia proactiva, y mecanismos de advertencia temprana que permitan a la ciudadanía reconocer narrativas “fabricadas” sin necesidad de censura. La censura también es parte de un complot nefasto. Es el terreno que estas operaciones buscan. Cuanto más se perciba represión informativa, mayor será la rentabilidad propagandística del atacante.

El caso Novikov puede leerse como un capítulo dominicano de un guión ya observado en otras latitudes. Fue una operación de influencia con sello ruso, asociada nominalmente al Proyecto Lakhta, que combinaba ingeniería social, encubrimiento de origen, financiación opaca y utilización de facilitadores locales para maximizar alcance y minimizar atribución (Listín Diario, 2025; EFE, 2025; U.S. Department of the Treasury, 2022). La presencia de indicios de tráfico de armas simultáneamente sugiere una peligrosísima convergencia entre desinformación y criminalidad material, una simbiosis que multiplica el daño potencial y exige respuesta integral del Estado (Listín Diario, 2025; EFE, 2025). Para la contrainteligencia, la conclusión es sobria. La República Dominicana no está “al margen” del tablero. Por su propia conectividad en integración con un mundo MUCHO más allá de la Altagracia, nuestro país es un objetivo y bien uno bien atractivo. La defensa exige capacidades de investigación financiera moderna, cooperación internacional, y una comprensión clara de que la guerra informativa es una operación clandestina de largo aliento y alcance cuyo campo de batalla es la confianza.

~ C. Constantin Poindexter, MA en Inteligencia, Certificado de Posgrado en Contrainteligencia, JD, certificación CISA/NCISS OSINT, certificación DoD/DoS BFFOC

Bibliografía

  • Buenos Aires Times. (2025, 19 de junio). Argentina’s spies expose alleged Russian disinformation group.
  • EFE. (2025, 19 de septiembre). La Fiscalía dominicana detiene a un hombre ruso vinculado a un proyecto de desinformación.
  • Listín Diario. (2025, 19 de septiembre). Ministerio Público arresta a joven ruso que habría dirigido campañas de desinformación desde RD.
  • Listín Diario. (2025, 19 de septiembre). EEUU y Argentina: Otros países que han detectado presencia de rusos pertenecientes a “Lakhta”.
  • The Record. (2025, 19 de junio). Argentina uncovers suspected Russian spy ring behind disinformation campaigns.
  • U.S. Department of Justice. (2018, 19 de octubre). Russian National Charged with Interfering in U.S. Political System.
  • U.S. Department of the Treasury. (2022, 29 de julio). Treasury Targets the Kremlin’s Continued Malign Political Influence Operations in the U.S. and Globally.
  • U.S. Department of the Treasury, Office of Foreign Assets Control. (2026, 23 de enero). Sanctions List Search entry: Internet Research Agency LLC (incluye alias “LAKHTA INTERNET RESEARCH”).

A Pier Walk, an Encrypted App, and a Trail of Receipts: The Wei Espionage Case, Counterintelligence and PRC Tradecraft

china, PRC, PLA, espionage, spy, spies, counterespionage, counterintelligence, intelligence, C. Constantin Poindexter, counterespionage;

The two-hundred-month federal sentence imposed on U.S. Navy sailor Jinchao Wei, also known as Patrick Wei, is not merely a cautionary tale about a single insider’s betrayal. It is a contemporary, well documented case study in the People’s Republic of China’s persistent espionage campaign against U.S. defense entities, executed through an operational pattern that has become all too familiar to counterintelligence practitioners, i.e., low friction spotting and assessment via online platforms, cultivation under plausible non-official cover, incremental tasking that begins with seemingly innocuous collection, and compensation methods that leave a financial signature even when communications are migrated to encrypted channels (U.S. Department of Justice, 2023; U.S. Department of Justice, 2026a). The Wei matter is also a reminder that insider threats rarely begin with the theft of a crown jewel. They begin with ego, attention, a sense of being chosen, and the seductive illusion that the handler is impressed and that the target is smarter than the system.

Public reporting and Department of Justice releases describe Wei as having been arrested in August 2023 as he arrived for duty at Naval Base San Diego, where he was assigned to the amphibious assault ship USS Essex (U.S. Department of Justice, 2023; U.S. Department of Justice, 2026b). The arrest timing and location are operationally significant. Counterintelligence cases often culminate when investigators can control the environment, secure devices and storage, and prevent further loss of national defense information while preserving evidentiary integrity. The government’s narrative, as presented publicly, reflects a mature, documentable case anchored in communications and payment records rather than exotic or highly sensitive sources. The Department of Justice has been explicit that not every investigative step can be disclosed and I don’t intend to do so here, but it has been equally clear that the evidentiary core included intercepts of communication between Wei and his PRC handler, and documentation of how Wei was rewarded for his betrayal (U.S. Department of Justice, 2026a).

The recruitment vector in this case aligns with PRC modus operandi in insider targeting. Wei was approached through social media by an individual presenting as a “naval enthusiast” who claimed a connection to China’s state-owned shipbuilding sector, a cover story designed to appear adjacent to legitimate maritime interest while still close enough to naval affairs to justify pointed questions (U.S. Department of Justice, 2026a; Associated Press, 2026). That presentation is instructive. It reduces the psychological barrier to engagement, provides a rationale for curiosity-driven dialogue, and permits gradual escalation from general discussion to tasking. A handler does not need immediate access to classified networks to create damage. He needs a human source who can provide operationally relevant details, and then he needs to keep the source talking long enough to normalize betrayal.

Once engaged, Wei’s operational security behavior demonstrates both awareness and complicity. He told a Navy friend that the activity looked “quite obviously” like espionage and, after that realization, he shifted communications to a different encrypted messaging application that he believed was more secure (U.S. Department of Justice, 2026a; USNI News, 2026). This is an important marker for investigators and security managers. When a cleared person acknowledges illicit intent yet continues, the motivation is not confusion. It is volition. The move to a “more secure” platform is also characteristic of PRC handling in HUMINT collection. Chinese FIS does not need to provide sophisticated technical tradecraft if the target will self-generate it. Public charging language indicates agreed steps to conceal the relationship, including deletion of conversation records and use of encrypted methods, which reflects basic but purposeful counter-surveillance and denial behavior (U.S. Department of Justice, 2023).

Tasking, as described in public releases, combined opportunistic collection with specific collection requirements. Wei was asked to “walk the pier” and report which ships were present, provide ship locations, and transmit photos and videos along with ship-related details (U.S. Department of Justice, 2026a). From a counterintelligence perspective, these are not trivial asks. Pier-side observations can support pattern of life analysis, readiness inference, and operational planning, particularly when fused with open source material and other clandestine reporting. The case officer’s methodology is “incrementalism”. A handler begins with items that feel observational and deniable, then pulls the source toward more sensitive materials by normalizing the exchange relationship and introducing compensation.

The most damaging element is the alleged transfer of classified technical and operational documents. DOJ accounts state that over an approximately 18-month relationship, Wei provided approximately sixty manuals and other sensitive materials, including at least thirty manuals transmitted in one tranche in June 2022, some of which clearly bore export control warnings. The materials were related to ship systems such as power, steering, weapons control, elevators, and damage and casualty controls (U.S. Department of Justice, 2026a; U.S. Department of Justice, 2026b; Associated Press, 2026). In counterintelligence risk terms, technical manuals provide adversaries with a low-cost blueprint for exploitation. They can inform electronic attack planning, maintenance and sustainment targeting, and vulnerability discovery. They also enable synthetic training and doctrine development for adversary operators. A single manual can be operationally relevant for years because systems and procedures often evolve incrementally, not continuously.

Compensation details illuminate tradecraft and investigative leverage. Wei received more than $12,000 over the course of the relationship, including an alleged $5,000 payment connected to the June 2022 manual transfer. The DOJ has described the use of online payment methods (U.S. Department of Justice, 2023; U.S. Department of Justice, 2026a). This is common in modern espionage involving HUMINT assets who are not professional intelligence officers. Financial transfers create documentary evidence, establish quid pro quo, and provide prosecutors with a corroborating narrative that is legible to a jury. For counterintelligence professionals, this observation is instructive. When communications shift to encrypted platforms, payment flows often remain discoverable through records, device artifacts, and third-party reporting. The operational discipline required to truly eliminate financial signatures is rarely present in an insider unless he or she is COMSEC sophisticated.

Public disclosures describe the case’s investigative architecture in broad but meaningful terms which are instructive even in the absence of the classified story. The FBI and Naval Criminal Investigative Service conducted the investigation. The DOJ characterized the matter as a “first of its kind” espionage investigation in the district, language that signals a substantial investigative effort and a prosecutorial commitment to proving the national security dimension in open court (U.S. Department of Justice, 2026a). The described evidence set emphasizes calls and electronic and audio messages with the PRC handler, payment records and receipts, and a post-arrest interrogation in which Wei admitted to providing the materials and described his conduct as espionage (U.S. Department of Justice, 2026a). Those elements are not glamorous, but they are decisive. They reflect the fundamentals of counterintelligence case building: document the relationship, document tasking and exchanges, document intent and benefit.

This IS PRC modus operandi! The Wei case fits a familiar pattern. The approach was enabled by digital access to targets, the cover identity was plausibly adjacent to the target’s professional interests, and the relationship was escalated through a play on Wei’s ego, . . . a mix of attention, manipulation, and money to compromise him. Tradecraft relied on human psychology, not advanced technical means. The Chinese FIS officer did not need to defeat a classified network. He convinced an insider to carry information out through routine channels and to do so voluntarily. This is a good example of why insider threat programs cannot focus only on clearance adjudication and periodic training. They must incorporate behavioral indicators, targeted education about online elicitation, and strong reporting pathways that reward early disclosure rather than stigmatize it (U.S. Department of Justice, 2023; U.S. Department of Justice, 2026a).

There is also a supervisory and cultural lesson embedded here. Wei voiced suspicion to another sailor. That disclosure was a moment when the damage could have been immediately contained. Peers often see the first signs of a peril, yet peers hesitate, either because they do not want to “ruin someone’s career” or because they assume someone else will act. Counterintelligence operators should treat this as a design requirement. Reporting must be made psychologically easy, procedurally simple, and institutionally supported. A peer report should trigger a calibrated and coordinated response, not an immediate public spectacle. The goal is to get ahead of compromise, not to create an environment where personnel conceal concerns to avoid attention.

The Wei case is a well-evidenced illustration of PRC espionage tradecraft against the United States. Chinese FIS spots and contacts potential insiders at scale through social platforms, cultivates via plausible identity, normalizes secret communications, introduces tasking that begins with the innocuous then escalates to classified materials, and pays through channels that are convenient to the target while still supporting handler control and a firm compromise of the asset (U.S. Department of Justice, 2023; U.S. Department of Justice, 2026a; USNI News, 2026). In my professional judgment, this is another textbook example of ego as the primary driver beneath the surface rationalizations. Even when loneliness, financial temptation, or grievance are present, the consistent psychological engine in treasonous espionage is the ego’s appetite to feel important, chosen, liked, befriended and exceptional. Wei’s conduct underscores that dynamic. He recognized the espionage for what it was, believed he could manage his exposure by encrypted applications, and continued down the road of betrayal. That is not naïveté. It is a belief that rules apply to others, that risk can be controlled by personal cleverness, and that the handler’s attention is a validation of one’s importance in the world. In very few espionage cases, money is the hook. The I.C. likes to think that examples like the Ames Case was a money-motivated treason. It was only partially. Likewise, the I.C. report on Ana Montés lays the blame at the feet of “ideology”. That really wasn’t it. Ego is the line that keeps the source from walking away when conscience and common sense offer an exit. It is almost ALWAYS ego.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

Bibliography

  • Associated Press. (2026, January 12). Former Navy sailor sentenced to 16 years for selling information about ships to Chinese intelligence.
  • U.S. Department of Justice. (2023, August 3). Two U.S. Navy servicemembers arrested for transmitting military information to the People’s Republic of China.
  • U.S. Department of Justice. (2026a, January 13). Former U.S. Navy sailor sentenced to 200 months for spying for China.
  • U.S. Department of Justice. (2026b, January 14). U.S. Navy sailor sentenced to more than 16 years for spying for China.
  • USNI News. (2026, January 13). Sailor to serve 16 year prison sentence for selling secrets to China.

Legal Remedies Open to Minnesota: ICE Operations and Redress for Civilian Deaths

justice, alex pretti, renee good, ICE, C. Constantin Poindexter

I am a patriot. I have always felt it a privilege to be American and very proud of what we represent to the world. Times have changed, and something strickingly ugly has happened to us. The Renee Good, Keith Porter and Alex Pretti homicides are the last straw. If our President will not step in to stop this, the state(s) must. Minnesota’s ability to halt federal immigration enforcement is constrained by federal supremacy, but it is not null. A state cannot nullify or physically obstruct federal law enforcement acting within lawful federal authority, because immigration enforcement is a core federal power and the Supremacy Clause preempts contrary state action (U.S. Const., art. VI; Arizona v. United States, 2012). The practical and legally durable approach is to distinguish between lawful federal immigration enforcement and allegedly unlawful operational conduct, including unconstitutional crowd control, unreasonable seizures, excessive force, and agency action that exceeds statutory or constitutional limits. Within that framing, Minnesota and its political subdivisions can pursue aggressive, legally cognizable remedies that combine federal court equitable relief, state sovereign measures that deny logistical support and eliminate state entanglement, evidence preservation and independent investigations for lethal force incidents, and damages pathways structured around the Federal Tort Claims Act and carefully pleaded individual capacity claims.

A decisive early step is to build the record and procedural posture for emergency relief. Minnesota’s Attorney General and major cities have already placed this template into the federal docket by seeking declaratory and injunctive relief against what they characterize as an unprecedented surge operation, and by pleading constitutional and Administrative Procedure Act theories (State of Minnesota v. Noem, Complaint, 2026; Minnesota Attorney General’s Office, 2026a). Contemporary reporting describes civilian deaths during the surge, including Alex Pretti on January 24, 2026, and notes that a federal judge ordered preservation of evidence connected to that incident (CBS Minnesota, 2026; The Guardian, 2026). Reporting also documents a prior death earlier in the month and recurring force allegations tied to the surge environment (The Marshall Project, 2026). These allegations and procedural developments are central to remedy selection, because courts are materially more willing to restrain specific unconstitutional tactics than to enjoin immigration enforcement as a category.

A primary remedy is immediate federal court equitable relief. Minnesota’s fastest lawful braking mechanism is a temporary restraining order and preliminary injunction focused on unlawful conduct rather than federal authority in the abstract (28 U.S.C. §§ 1331, 2201–2202). Minnesota can seek a declaratory judgment that discrete federal practices violate the Constitution or exceed statutory authority, coupled with injunctive relief that prohibits specified behaviors, mandates training and supervision changes, and compels evidence retention and production schedules (State of Minnesota v. Noem, Complaint, 2026). Evidence control is not merely ancillary. In lethal force disputes, preservation orders can be the most attainable short-term relief and can materially influence later liability outcomes. Reporting indicates a preservation order in the Pretti matter, and allegations of obstruction in gaining access to the scene, which underscores why Minnesota should continue to press targeted preservation and access relief for body-worn camera footage, dispatch logs, chain of custody documentation, and third-party video sources (CBS Minnesota, 2026).

On the merits, Minnesota can plead multiple constitutional theories that are cognizable in equity even when actions for damages against federal actors are limited. First Amendment claims can be framed as retaliation and viewpoint discrimination, and as a chilling regime when federal agents are alleged to use force against peaceful expressive activity (Hartman v. Moore, 2006; Nieves v. Bartlett, 2019). Fourth Amendment claims can be framed as unreasonable seizures and excessive force. Those claims support injunctive relief to change practices governing stops, detentions, and use of force, particularly where plaintiffs can show a pattern, policy, or command structure rather than a one-off incident (Graham v. Connor, 1989; Tennessee v. Garner, 1985). Fifth Amendment due process framing can supplement where conduct is alleged to be arbitrary or conscience-shocking in a civil enforcement setting (County of Sacramento v. Lewis, 1998). In each lane, the remedy posture should be calibrated to what courts will enjoin. The goal is not a sweeping ban on federal presence, but enforceable constraints and oversight mechanisms that prevent unconstitutional practices and preserve evidence.

Statutorily, the Administrative Procedure Act remains a central lever when the dispute can be characterized as unlawful agency action, ultra vires deployment, or a final agency policy that is arbitrary and capricious, contrary to constitutional right, or adopted without required procedure (5 U.S.C. §§ 702, 706). Even where the government frames the operation as discretionary, plaintiffs can target categorical rules and structured practices that resemble policy rather than case-by-case discretion, including deployment criteria, operational directives, and deviations from articulated enforcement protocols (State of Minnesota v. Noem, Complaint, 2026; Minnesota Attorney General’s Office, 2026a). The APA posture also aligns with remedy realism. Courts often resist ordering how to enforce immigration law, but will restrain agency actions that lack lawful procedure, exceed statutory authority, or violate constitutional limits.

Separately, Minnesota’s structural state power is strongest in disentanglement. The anti-commandeering doctrine bars the federal government from compelling states or localities to administer or enforce federal regulatory programs (Printz v. United States, 1997; Murphy v. NCAA, 2018). This doctrine does not permit obstruction, but it does permit Minnesota to prohibit state and local employees from participating in certain federal immigration activities, such as honoring civil detainers absent judicial warrants, providing nonpublic data access beyond what federal law requires, and using state resources for federal tasking. Operationally, Minnesota can reinforce disentanglement through statewide policies governing state facilities and state-controlled information systems. The objective is to ensure that federal operations must stand on federal resources and federal legal authority alone, while Minnesota maintains compliance with any narrow federal preemption requirements and avoids discrimination against federal officers as such.

For redress of deaths and serious injuries, Minnesota’s investigative and prosecutorial tools matter, but they are bounded by Supremacy Clause immunity principles. Homicide and assault are state crimes, and Minnesota agencies can investigate shootings within Minnesota’s territory. However, federal officers may assert a Supremacy Clause-related immunity against state prosecution for actions taken within the scope of federal duties and authorized by federal law (In re Neagle, 1890). That doctrine is not absolute. If facts indicate actions outside lawful authority, or actions that no reasonable officer could regard as necessary and proper to execute federal duties, state prosecution becomes more plausible. Even where prosecution is foreclosed or removed, robust state investigation is still consequential. It establishes an independent factual record, constrains narratives, supports federal civil remedies, and can trigger institutional accountability mechanisms. In this context, contemporaneous reporting about contested accounts and video evidence underscores the importance of independent scene processing where possible, preservation of third-party footage, coordinated witness interviewing, and transparent public reporting (CBS Minnesota, 2026; The Guardian, 2026).

For damages, Minnesota must separate who can sue and under what theory. Wrongful death damages generally belong to estates and statutory beneficiaries under state law, but the state can support and, in some contexts, pursue recovery for sovereign and proprietary harms. The principal damages route for torts committed by federal employees is the Federal Tort Claims Act, which waives sovereign immunity for certain torts and applies the law of the place where the act occurred (28 U.S.C. §§ 1346(b), 2671–2680). The FTCA law enforcement proviso permits claims for specified intentional torts, including assault and battery, when committed by investigative or law enforcement officers (28 U.S.C. § 2680(h)). Lethal force cases frequently litigate as operational conduct rather than protected policy discretion, though the United States regularly pleads discretionary function defenses and other exceptions (28 U.S.C. § 2680(a)). Plaintiffs must also satisfy the FTCA’s administrative presentment, exhaustion, and limitations requirements, which makes early evidence preservation and record building essential.

If plaintiffs sue individual officers under state tort theories, the Westfall Act frequently triggers substitution of the United States as the defendant for acts within scope, routing the matter back into FTCA exclusivity (28 U.S.C. § 2679). That substitution fight can be dispositive, and it makes careful pleading and factual support crucial, including any evidence that conduct was outside the scope of employment or otherwise not in furtherance of federal duties. Constitutional damages claims against federal officers under Bivens remain theoretically available for some Fourth Amendment paradigms, but the Supreme Court has sharply limited extensions into new contexts, particularly those touching immigration and national security adjacent environments (Bivens v. Six Unknown Named Agents, 1971; Hernández v. Mesa, 2020; Egbert v. Boule, 2022). As a result, victims’ counsel should treat Bivens as a high-risk vehicle and pair any constitutional damages strategy with FTCA claims and equitable relief that does not depend on implying a new damages remedy.

The phrase “stop operations in their tracks” should be operationalized into legally enforceable outcomes: a court-ordered prohibition on unconstitutional suppression of protest, restrictions on unreasonable stops and seizures, strict evidence preservation and production directives for lethal force incidents, and APA-compliant justification and process for any mass surge policy. Minnesota’s existing litigation posture already seeks declaratory and injunctive relief and frames the surge as extraordinary, which positions the state to pursue precisely this kind of targeted judicial control rather than an unattainable blanket prohibition (State of Minnesota v. Noem, Complaint, 2026; Minnesota Attorney General’s Office, 2026a). When paired with disciplined state non-cooperation grounded in anti-commandeering doctrine and meticulous state-level investigation of lethal force incidents, Minnesota can constrain the operational environment, preserve accountability evidence, and position victims’ families for meaningful damages recovery.

In short, the strongest legal tools are not physical resistance or nullification. They are rapid federal court equitable relief, disciplined state disentanglement, evidence-centered litigation, and damages architectures that convert unlawful force into enforceable liability under the FTCA and related doctrines, while recognizing the Supreme Court’s narrowing of implied constitutional damages remedies.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

Bibliography

  • Arizona v. United States, 567 U.S. 387 (2012).
  • Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics, 403 U.S. 388 (1971).
  • CBS Minnesota. (2026, January 25). Judge grants restraining order against DHS after Border Patrol kills Alex Pretti in Minneapolis.
  • County of Sacramento v. Lewis, 523 U.S. 833 (1998).
  • Egbert v. Boule, 596 U.S. 482 (2022).
  • Graham v. Connor, 490 U.S. 386 (1989).
  • Hartman v. Moore, 547 U.S. 250 (2006).
  • Hernández v. Mesa, 589 U.S. 93 (2020).
  • In re Neagle, 135 U.S. 1 (1890).
  • Minnesota Attorney General’s Office. (2026a, January 12). Attorney General Ellison and cities of Minneapolis and Saint Paul sue to halt ICE surge into Minnesota.
  • Murphy v. NCAA, 584 U.S. 453 (2018).
  • Nieves v. Bartlett, 587 U.S. 391 (2019).
  • Printz v. United States, 521 U.S. 898 (1997).
  • State of Minnesota v. Noem, Complaint for Declaratory and Injunctive Relief, U.S. District Court for the District of Minnesota, Case No. 0:26-cv-00190 (D. Minn. filed 2026, January 12).
  • Tennessee v. Garner, 471 U.S. 1 (1985).
  • The Guardian. (2026, January 24). Report on the killing of a U.S. citizen in Minneapolis during federal agent activity.
  • The Marshall Project. (2026, January 7). Report on use of force allegations connected to immigration enforcement activity in Minneapolis.

When Counterintelligence Did Not “Catch” Jonathan Soong

espionage, counterespionage, intelligence, counterintelligence, spy, spies, C. Constantin Poindexter

When Counterintelligence Did Not “Catch” the Bad Guy: How Export Compliance and Oversight Stopped an Illicit Transfer

As a counterintelligence guy, I would love to claim one for the team, telling you a story of how counterintelligence “caught” Jonathan Soong. The question presumes a familiar arc: a clandestine plot detected by a vigilant counterintelligence service, followed by an investigative takedown. In practice, many of the most consequential national security cases in the defense industrial base begin elsewhere. They begin in the unglamorous terrain of export controls, contractual oversight, documentation requirements, and compliance escalation. The Soong matter is best read not as a story of counterintelligence brilliance at the point of origin, but as a demonstration that a robust compliance mechanism can function as a practical counterintelligence force multiplier, surfacing deception through audit friction, verification, and internal accountability (U.S. Department of Justice 2025a).

Jonathan Yet Wing Soong worked under a University Space Research Association arrangement supporting NASA, where he helped administer licensing and distribution of U.S. Army-owned aviation and flight control software subject to U.S. export controls. Public charging and plea materials describe a pattern that is familiar to any counterintelligence professional who has studied insider-enabled technology transfer. A trusted administrator leveraged authorized access to facilitate improper export to a prohibited end user, while using misrepresentation and intermediaries to reduce detection risk and sustain the activity long enough to monetize it (U.S. Department of Justice 2022; U.S. Department of Justice 2023; U.S. Department of Commerce, Bureau of Industry and Security 2022).

Export compliance as counterintelligence by another name

In the contractor ecosystem, counterintelligence is no longer confined to investigations and briefings. It is built into controls that regulate who can access what, who can receive what, and what documentation must exist to justify a transfer. Export compliance is the legal expression of strategic technology denial. When an export compliance program is mature, it creates a perimeter of verification around controlled software, technical data, and sensitive know-how. It does this through end-user screening, licensing checks, record retention, and the expectation that representations are auditable, not merely asserted (U.S. Department of Justice 2025a).

Soong’s conduct, as publicly described, involved providing controlled U.S. Army aviation software to the Beijing University of Aeronautics and Astronautics, commonly known as Beihang University, an end-user on the U.S. Entity List. The Entity List designation matters because it transforms what might otherwise be a complicated compliance decision into a bright-line restriction: an elevated risk recipient that generally requires licensing and heightened scrutiny. In counterintelligence terms, it is a government signal that a recipient is associated with activities of concern and therefore must be treated as a strategic risk, not just a commercial counterparty (U.S. Department of Commerce, Bureau of Industry and Security 2022; U.S. Department of Justice 2022).

The decisive tripwire was oversight, not classic counterintelligence detection

The core point that the public often misses is timing. The publicly documented narrative indicates that the scheme was not halted because counterintelligence detected hostile tasking in real time. Rather, the activity began to unravel when NASA asked questions about software licensing activity involving China-based purchasers. That inquiry triggered internal examination at USRA, which then forced Soong’s process, documentation, and representations into a higher scrutiny environment (U.S. Department of Justice 2025a).

From a former operator’s perspective, that is the moment the system displayed its value. Oversight created heat. Heat compelled review. Review compelled proof. Proof created contradictions. Contradictions produced admissions and preserved evidence. That sequence is not incidental. It is the operational logic of compliance as an investigative engine. When a compliance system is designed to verify rather than merely record, it becomes difficult for an insider to sustain a cover story indefinitely.

The cover story failed under verification pressure

Public DOJ descriptions emphasize that Soong initially lied and fabricated evidence to make it appear that purchaser diligence had been conducted. In my experience, this is the most common failure mode for organizations that treat compliance as a box-checking function: insiders learn the minimum artifacts that satisfy superficial review. The Soong case illustrates what happens when counsel and compliance do not accept the first answer. DOJ accounts describe further investigation by USRA’s counsel, confrontation with contradictions, and Soong’s eventual admissions, including that he knew the end user was on the Entity List and that an export license was required (U.S. Department of Justice 2025a).

That is not just a legal detail. It is the fulcrum that turns suspicion into provable intent. Counterintelligence professionals care about intent because intent distinguishes mistake from exploitation and distinguishes weak governance from an insider who is actively enabling a strategic competitor or worse, adversarial FIS. Admissions anchored to documented contradictions are highly durable. They are not dependent on classified sources or contested analytic judgments. They are built for court cases.

Intermediaries and misdirection are a compliance evasion pattern

The public record also describes the use of an intermediary to obscure the true end user and facilitate the commercial pathway. This is a standard concealment vector. Intermediaries can be used to launder payment trails, shift transactional geography, and create plausible deniability within internal processes that rely on surface-level end-user statements. If a program relies on the integrity of a single administrator’s “screening,” the administrator becomes the control. If the administrator is compromised, the system is compromised. In this case, public materials describe intermediary involvement and a transfer pathway that, when examined, revealed the underlying restricted recipient (Department of Defense Office of Inspector General, Defense Criminal Investigative Service 2023; U.S. Department of Justice 2025a).

For counterintelligence practitioners, the lesson is straightforward: third party structures are not merely procurement conveniences. They are also tradecraft. In an export controls environment, every intermediary should be treated as a potential concealment method unless diligence is independently verifiable.

Voluntary self-disclosure converted an internal discovery into a national security case

Once internal discovery occurred, the matter moved from corporate governance to national security enforcement. DOJ’s public declination notice emphasized that USRA self disclosed export control offenses committed by its employee and cooperated, which shaped the government’s posture toward the company while leaving the individual to face prosecution (U.S. Department of Justice 2025a). That sequence is important for practitioners because it demonstrates how compliance maturity affects outcomes. Prompt internal escalation, self disclosure, and remediation can separate an organization’s institutional exposure from the conduct of a rogue insider, while also strengthening the government’s ability to build a case against the perpetrator.

DOJ also identified the investigative constellation, including Commerce export enforcement, the FBI, Defense Criminal Investigative Service, NASA Office of Inspector General, and U.S. Army elements including Army counterintelligence and investigative components. In other words, counterintelligence was present and relevant, but it was not the initial tripwire. It was part of the enforcement and investigative consolidation phase after compliance mechanisms surfaced the issue and the company disclosed it (U.S. Department of Justice 2025a; U.S. Department of Justice 2023).

Compliance “caught” the act and counterintelligence helped finish the job

If we insist on the verb “catch,” my professional assessment is that counterintelligence did not “catch” Jonathan Soong in the popular sense of the term. The decisive early detection function was performed by oversight and export compliance mechanisms. NASA’s questions triggered organizational scrutiny. Scrutiny demanded documentation. Documentation collapsed under verification. Verification produced contradictions and admissions. Those admissions and records enabled self-disclosure and a multi-agency investigation that culminated in a guilty plea. Counterintelligence contributed where it often contributes most effectively in the contractor environment: by supporting the investigative and enforcement architecture once a compliance tripwire has surfaced misconduct, and by helping translate a technical compliance failure into a national security narrative that the government can prosecute (U.S. Department of Justice 2025a; U.S. Department of Justice 2023).

This is not a criticism of counterintelligence. It is an argument for modernizing how we describe counterintelligence effectiveness. In the defense industrial base, export compliance is not adjacent to counterintelligence. Export compliance is frequently counterintelligence in operational form. When built correctly, it makes illicit transfer hard to hide, expensive to sustain, and likely to fail under audit pressure. The Soong case is the quiet proof that governance, oversight, and export controls can stop a technology transfer plot even when no one is running a classic counterintelligence operation at the beginning.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

Bibliography

  • Department of Defense Office of Inspector General, Defense Criminal Investigative Service. 2023. “Defendant Admits Using Intermediary to Funnel Payments for United States Army Aviation Software Exported to Beihang University.” Press release, January 17, 2023.
  • U.S. Department of Commerce, Bureau of Industry and Security. 2022. “South Bay Resident Charged with Smuggling and Exporting American Aviation Technology to Beijing University.” Press release, May 26, 2022.
  • U.S. Department of Justice. 2022. “South Bay Resident Charged with Smuggling and Exporting American Aviation Technology to Beijing University.” Press release, U.S. Attorney’s Office, Northern District of California, May 26, 2022.
  • U.S. Department of Justice. 2023. “Castro Valley Resident Pleads Guilty to Illegally Exporting American Aviation Technology.” Press release, U.S. Attorney’s Office, Northern District of California, January 17, 2023.
  • U.S. Department of Justice. 2025a. “Justice Department Declines Prosecution of Company That Self Disclosed Export Control Offenses Committed by Employee.” Press release, Office of Public Affairs, April 30, 2025.

“Due diligence” inmobiliaria en la República Dominicana: la disciplina que separa una compra segura de un riesgo evitable

bienes raices, republica dominicana, abogado, bufete de abogados, despacho legal, abogado santo domingo, C. Constantin Poindexter Salcedo

En el mercado inmobiliario dominicano, especialmente en operaciones transfronterizas donde el comprador reside en Estados Unidos o Europa, el “entusiasmo por el proyecto” suele adelantarse a la verificación jurídica y financiera del promotor. Esa asimetría de información se amplifica cuando la propiedad se adquiere en preventa, cuando la construcción apenas iniciará, o cuando el comprador recibe un paquete de documentos que aparenta exhaustividad pero no necesariamente acredita lo esencial. Precisamente por eso, nuestro bufete en Santo Domingo ha estructurado un servicio integral de diligencia debida o due diligence inmobiliaria en la República Dominicana, diseñado para auditar riesgos, confirmar hechos registrales y contractuales, y producir un informe accionable que permita comprar con criterio técnico y no por confianza implícita.

El punto de partida de toda diligencia debida sería la comprensión del sistema de publicidad inmobiliaria dominicano y de la función del Estado en la mutación de derechos reales. La Ley núm. 108 05 de Registro Inmobiliario establece el marco institucional y los principios que gobiernan el saneamiento y el registro de los derechos reales, así como la registración de cargas y gravámenes sobre inmuebles, con intervención de los órganos de la Jurisdicción Inmobiliaria (República Dominicana, Ley 108 05, 2005). Esto no es un tecnicismo: en la práctica, la seguridad jurídica de la compra depende de que el inmueble esté correctamente identificado, que el derecho del vendedor esté debidamente registrado y que el estado jurídico del inmueble no esté afectado por gravámenes, anotaciones o conflictos que desnaturalicen el valor económico de la transacción.

Nuestro servicio de due diligence se estructura, primero, alrededor de la verificación robusta de la parcela y del título. Ello implica confirmar la identidad registral del inmueble y revisar el Certificado de Título, su coherencia con la realidad física y la cadena de titularidad, así como verificar que el vendedor es el titular registral o que posee facultades válidas para transferir. En términos operativos, el Registro de Títulos es la institución que custodia y procesa actuaciones vinculadas al estado jurídico de los inmuebles, y mantiene trámites y certificaciones que permiten establecer, con evidencia documental, la situación registral de un bien (Registro Inmobiliario, s. f.). En adición, existe una certificación específica para acreditar el estado jurídico del inmueble y la vigencia del duplicado del Certificado de Título, lo cual resulta particularmente útil cuando el comprador exige una constatación oficial del estatus registral antes de comprometer pagos significativos (Gobierno de la República Dominicana, s. f.).

Esta revisión no se limita a constatar “si hay título”. La diligencia debida examina si existen cargas y gravámenes susceptibles de afectar la compraventa, como hipotecas, embargos, anotaciones preventivas, servidumbres, restricciones registrales, o promesas previas que introduzcan riesgos de doble venta o de litigio. Dado que la Ley 108 05 contempla expresamente el registro de cargas y gravámenes y busca garantizar la legalidad de la mutación o afectación de derechos reales, la lectura crítica del expediente registral es un componente esencial de la gestión de riesgo (República Dominicana, Ley 108 05, 2005). En lenguaje empresarial, esto equivale a validar el “activo subyacente” antes de adquirirlo.

El segundo eje del servicio es la diligencia debida del vendedor o promotor, enfocada en su legitimación y capacidad jurídica para contratar. Cuando el vendedor es una sociedad, la revisión debe confirmar existencia, vigencia, órganos de representación y facultades del firmante a través del Registro Mercantil y los documentos corporativos pertinentes. Este paso, que con frecuencia se subestima, es determinante: un contrato firmado por una persona sin representación válida puede convertirse en un instrumento difícil de ejecutar, incluso si la narrativa comercial del proyecto es convincente. La diligencia debida, por tanto, actúa como un control de gobierno corporativo aplicado a la transacción, verificando que la voluntad contractual del vendedor esté jurídicamente bien formada y sea oponible.

El tercer componente, crítico en preventa, es la diligencia del proyecto y su ejecutabilidad regulatoria. Cuando “se va a empezar a construir ahora”, la compra deja de ser una adquisición de un inmueble terminado y pasa a ser, en gran medida, una exposición al riesgo de ejecución del promotor. En ese escenario, la debida diligencia revisa el paquete documental del proyecto y la disponibilidad de permisos o autorizaciones conforme aplique al tipo de obra y ubicación, y analiza si el cronograma y el esquema de pagos propuesto están alineados con hitos verificables y con condiciones suspensivas razonables. La intención no es burocratizar la compra, sino asegurar que el comprador no financie de forma desprotegida un proyecto cuyo avance no pueda medirse ni exigirse contractualmente.

Cuando el inmueble se enmarca en un régimen de condominio, la revisión añade un plano adicional de seguridad. La Ley 5038 sobre condominios regula la posibilidad de dividir la propiedad por unidades exclusivas y áreas comunes, y establece el régimen especial aplicable a ese tipo de inmuebles, lo que impacta la forma en que se constituye el proyecto, se registran derechos y se definen obligaciones de copropiedad (República Dominicana, Ley 5038, 1958). En términos prácticos, el comprador no solo adquiere una unidad, sino un paquete de derechos y obligaciones que deben estar correctamente articulados en la documentación del proyecto para evitar conflictos posteriores.

El cuarto eje del servicio, solicitado de manera recurrente por compradores internacionales, es la evaluación razonable de solvencia y capacidad de ejecución del vendedor o promotor. Conviene ser metodológicamente honestos: en el contexto dominicano, la disponibilidad de estados financieros auditados, información pública comparable o reportes crediticios corporativos estandarizados puede ser limitada. Por ello, nuestro enfoque no promete una auditoría financiera, sino una evaluación de fortaleza y capacidad operacional basada en evidencia documental aportada por el promotor, verificación de consistencia, y mitigación contractual del riesgo cuando la información sea incompleta. Este módulo suele incluir solicitud y análisis de documentación financiera disponible, certificaciones bancarias cuando proceda, identificación de estructura de financiamiento, revisión de proyectos ejecutados y en curso, y verificación razonable de contingencias relevantes. El resultado se expresa como un nivel de riesgo y confianza, acompañado de recomendaciones específicas para proteger el capital del comprador.

En esa línea, la ingeniería contractual se vuelve una herramienta de control de riesgo tan importante como el análisis registral. Un comprador en preventa debe negociar términos que traduzcan hallazgos de diligencia debida en protecciones reales: pagos contra avance comprobable, penalidades por incumplimiento, retenciones, condiciones suspensivas y, cuando sea viable, mecanismos de administración de fondos que reduzcan el riesgo de desvío. En el ordenamiento dominicano, la Ley 189 11 incorpora la figura del fideicomiso y crea un marco para impulsar el mercado hipotecario y estructuras fiduciarias que, bien diseñadas, pueden servir como arquitectura de protección en proyectos inmobiliarios (República Dominicana, Ley 189 11, 2011). Sin convertir cada operación en un proyecto financiero sofisticado, la debida diligencia responsable contempla estas herramientas cuando el perfil de riesgo lo justifica.

El entregable de nuestro servicio es un Informe de Diligencia Debida redactado con enfoque probatorio y ejecutivo. Ese informe integra los hallazgos registrales, corporativos y contractuales, identifica riesgos por categorías, y recomienda acciones concretas: desde subsanaciones previas al cierre hasta cláusulas que deben incorporarse o modificarse en la promesa de venta. Para clientes en Estados Unidos, este documento cumple una función adicional: sirve como evidencia de que la decisión de compra se adoptó con estándares comparables a un “legal due diligence” corporativo, lo cual es especialmente valioso cuando existen co inversionistas, asesores financieros o entidades bancarias revisando el expediente.

En síntesis, la due diligence inmobiliaria en la República Dominicana no es un gasto accesorio, sino una prima de control de riesgo. Su valor se mide por lo que evita: títulos defectuosos, cargas ocultas, vendedores sin legitimación, contratos desequilibrados, proyectos sin permisos suficientes o promotores cuya capacidad de ejecución no está demostrada. En un entorno donde la documentación puede ser abundante pero la verificación independiente es escasa, la diligencia debida convierte documentos en certezas y promesas en obligaciones exigibles. Nuestro bufete ofrece ese proceso con disciplina técnica, enfoque probatorio y un objetivo claro: que el cliente compre con seguridad jurídica, previsibilidad económica y mecanismos reales de protección.

~ C. Constantin Poindexter Salcedo, MA, JD, CPCU, MA2, AINS, AIS

Bibliografía

  • Gobierno de la República Dominicana. (s. f.). Certificación de estado jurídico del inmueble.
  • Registro Inmobiliario. (s. f.). Registro de Títulos.
  • República Dominicana. (1958). Ley 5038 sobre condominios.
  • República Dominicana. (2005). Ley 108 05 de Registro Inmobiliario.
  • República Dominicana. (2011). Ley 189 11 para el desarrollo del mercado hipotecario y el fideicomiso.

SIGNAL: Una plataforma segura para profesionales de inteligencia, contrainteligencia, y lo será aún más en la era cuántica

SIGNAL, inteligencia, espionaje, contrainteligencia, contraespionaje, ciber, ciberseguridad, espia, C. Constantin Poindexter Salcedo, DNI, J2, CNI

Signal bien merece su reputación en comunidades de inteligencia, contrainteligencia e investigación por una razón práctica. A mí me encanta, y a usted también le debería gustar. La herramienta fue diseñada partiendo de supuestos adversariales que se alinean con el targeting real de activos en el terreno. Esos supuestos incluyen recolección a nivel estatal, interceptación encubierta y muchas veces ilegal, compromiso del endpoint, robo de credenciales y retención masiva de datos por largo tiempo para explotación futura. Signal no es mensajería convencional a la que luego se le “añadió” seguridad. Es un conjunto integrado de protocolos para acuerdo de claves, evolución de claves por mensaje y recuperación tras compromiso, sustentado en especificaciones abiertas y un endurecimiento criptográfico continuo.

Desde la perspectiva de un profesional de inteligencia, Signal es convincente porque está diseñado para mantenerse resiliente incluso bajo fallas parciales. Si un atacante “gana una batalla” capturando una clave, clonando un dispositivo por un rato o grabando tráfico durante años, Signal busca evitar que esa victoria puntual se convierta en acceso estratégico y duradero. Ese modelo de contención del daño encaja con prioridades de contrainteligencia: limitar el radio de impacto, reducir el tiempo de permanencia del adversario y forzarle esfuerzos repetidos que aumentan la probabilidad de detección.

El Double Ratchet y las claves por mensaje que limitan el daño

En el centro de la confidencialidad de mensajes en Signal está el algoritmo Double Ratchet, diseñado por Trevor Perrin y Moxie Marlinspike (Perrin and Marlinspike, 2025). En términos operacionales, el Double Ratchet importa porque entrega propiedades que se alinean con la realidad del tradecraft.

La “forward secrecy” (secreto hacia adelante) asegura que comprometer una clave actual no revele el contenido de mensajes anteriores. Los adversarios, de manera rutinaria, recolectan ciphertext en volumen y luego buscan un punto único de apalancamiento para descifrar más adelante mediante incautación de dispositivos, acceso interno, malware o procesos legales. La forward secrecy frustra esa estrategia al garantizar que el tráfico capturado anteriormente no se convierta en una “cosecha” de inteligencia en el futuro si una clave se expone después (Perrin y Marlinspike, 2025).

La “post-compromise security” (recuperación tras intrusión) aborda un escenario que los practicantes de inteligencia planifican: el compromiso temporal de un dispositivo. Inspecciones fronterizas, robo oportunista, acceso coercitivo o un implante de corta duración pueden ocurrir. El Double Ratchet incluye actualizaciones periódicas de Diffie-Hellman que inyectan entropía fresca, mientras su ratchet simétrico deriva nuevas claves de mensaje de manera continua. Una vez termina la ventana de compromiso, las claves de mensajes posteriores se vuelven criptográficamente inalcanzables para el atacante, siempre que ya no mantenga persistencia en el endpoint (Perrin and Marlinspike, 2025). Esto no es mercadeo exagerado: es una evolución disciplinada de claves que priva a servicios de inteligencia adversarios y a espías corporativos del uso indefinido de material de claves robado.

Aquí la lógica de respuesta a incidentes cambia: un compromiso breve no implica automáticamente exposición permanente de todo el historial y el futuro. En cambio, el atacante debe sostener persistencia para conservar visibilidad. Eso eleva la carga operativa y aumenta el riesgo de detección.

X3DH y PQXDH: el giro contra “cosecha ahora, descifra después”

Históricamente, Signal utilizó X3DH (Extended Triple Diffie-Hellman) para el establecimiento asíncrono de sesiones, algo vital en entornos móviles donde los destinatarios suelen estar offline. X3DH emplea claves de identidad de largo plazo y prekeys firmadas para autenticación, preservando a la vez forward secrecy y propiedades de negabilidad (Marlinspike and Perrin, 2016).

El panorama de riesgo estratégico cambió con la plausibilidad de computación cuántica criptográficamente relevante. La amenaza no es solo el descifrado futuro en tiempo real; es el modelo “harvest now/decrypt later”: intercepción masiva hoy con la expectativa de que avances futuros, incluida la capacidad cuántica, permitan abrir tráfico almacenado. Signal respondió introduciendo PQXDH (“Post Quantum Extended Diffie Hellman”), reemplazando el setup de sesión por una construcción híbrida que combina Diffie-Hellman clásico de curva elíptica (X25519) y un mecanismo post-cuántico de encapsulación de claves derivado de CRYSTALS-Kyber (Signal, 2024a). La implicación operacional es directa: el adversario tendría que romper tanto el componente clásico como el componente postcuántico para reconstruir el secreto compartido (Signal, 2024a).

Este establecimiento híbrido refleja ingeniería conservadora, muy típica de entornos de alta amenaza: migrar temprano, evitar cortes bruscos y no depender de un único primitivo nuevo. Esto también importa porque el componente post-cuántico corresponde a lo que NIST estandarizó como ML-KEM, derivado de CRYSTALS-Kyber, en FIPS 203 (NIST, 2024a; NIST, 2024b). La estandarización del NIST no garantiza invulnerabilidad, pero sí aumenta la confianza en que el primitivo ha sido escrutado y está siendo adoptado como línea base para entornos de alta seguridad.

Signal, además, hace una aclaración crucial en sus materiales sobre PQXDH: PQXDH aporta forward secrecy post-cuántica, mientras que la autenticación mutua en la revisión actual permanece anclada en supuestos clásicos (Signal, 2024b). Para los practicantes, esa precisión es valiosa porque define exactamente qué es post-cuántico hoy y qué no.

SPQR y el ratcheting poscuántico para operaciones de larga duración

El establecimiento de sesión es solo una parte del problema del ciclo de vida. Un recolector capaz puede grabar tráfico por periodos prolongados. Si la capacidad cuántica aparece más adelante, la pregunta es si la evolución continua de claves sigue siendo segura contra descifrado futuro. La introducción por parte de Signal del Sparse Post Quantum Ratchet (SPQR) atiende esa continuidad al añadir resiliencia postcuántica al mecanismo de ratcheting en sí (Signal, 2025).

SPQR extiende el protocolo para que no solo el handshake inicial, sino también las actualizaciones posteriores de claves, incorporen propiedades resistentes a cuántica, preservando forward secrecy y post-compromise security (Signal, 2025). Para profesionales de inteligencia esto es determinante, porque las relaciones operacionales suelen ser de largo aliento: activos y handlers, fuentes de investigación y coordinación entre equipos pueden durar meses o años. Un protocolo que solo endurece el handshake ayuda, pero uno que endurece el rekeying continuo encaja mejor con el modelo adversarial real de recolección persistente.

Trabajo académico ha analizado la evolución de X3DH a PQXDH dentro del movimiento de Signal hacia seguridad post-cuántica y enmarca PQXDH como mitigación del riesgo “cosecha ahora, descifra después” a escala (Katsumata et al., 2025). Ese enfoque cuadra con la gestión de riesgos en inteligencia: la confidencialidad se evalúa frente a adversarios pacientes, bien financiados y con horizonte estratégico.

Análisis formal, especificaciones abiertas y por qué esto importa operativamente

El practicante debe ser escéptico ante afirmaciones de seguridad que no soporten revisión externa. La suite de protocolos de Signal se beneficia de especificaciones públicas y escrutinio criptográfico sostenido. Un análisis formal ampliamente citado modela las propiedades de seguridad centrales del protocolo y examina en detalle su diseño basado en ratchets (Cohn Gordon et al., 2017). Ningún protocolo está “probado” contra cada modo de falla del mundo real. Sin embargo, métodos formales y análisis revisados por pares reducen la probabilidad de que debilidades estructurales permanezcan ocultas. Operacionalmente, esto se traduce en confiabilidad: cuando usted depende de una herramienta para trabajo sensible, evalúa si las afirmaciones son verificables, si los modos de falla están documentados y si las mejoras pueden validarse.

Metadatos, “Sealed Sender” y el rol del tradecraft

La confidencialidad del contenido es solo una parte de la seguridad en inteligencia. Los metadatos pueden ser decisivos: quién habla con quién, cuándo y con qué frecuencia puede producir inferencias dañinas. Sealed Sender de Signal fue diseñado para reducir la información del remitente visible al servicio durante la entrega del mensaje (Wired Staff, 2018). Investigación académica examina Sealed Sender y propone mejoras, además de discutir metadatos a nivel de red como la exposición de direcciones IP y las implicaciones para herramientas de anonimato (Martiny et al., 2021). Otro trabajo discute riesgos de análisis de tráfico que pueden persistir en entornos de grupos incluso cuando la identidad del remitente se oculta parcialmente (Brigham and Hopper, 2023).

La conclusión para el operador es clara: Signal mejora de manera material la seguridad del contenido y reduce ciertas exposiciones de metadatos. No elimina la necesidad de medidas de seguridad operacional. Dependiendo del perfil de misión, esas medidas pueden incluir endpoints endurecidos, manejo estricto de dispositivos, minimización de exposición de identificadores y protecciones de red consistentes con la ley y la política aplicables.

Por qué la trayectoria de SIGNAL es creíble en la transición cuántica

El enfoque de Signal hacia la transición cuántica refleja una postura de ingeniería creíble: migrar lo suficientemente temprano para amortiguar el riesgo “cosecha ahora, descifra después”; adoptar diseños híbridos para reducir la dependencia de un sólo supuesto; y extender garantías postcuánticas más allá del handshake hacia la evolución continua de claves (Signal, 2024a; Signal, 2025). La alineación con la dirección estandarizada por NIST para el establecimiento de claves también apoya la mantenibilidad a largo plazo y la interoperabilidad del ecosistema (NIST, 2024a; NIST, 2025). Desde la perspectiva de un practicante de inteligencia, el argumento central no es que Signal sea irrompible. El punto es que Signal está diseñado para limitar el daño, recuperarse tras un compromiso y anticipar amenazas estratégicas de descifrado. Está construido para un entorno hostil que se mueve hacia una realidad postcuántica.

Y lo digo sin rodeos ni disparates, Meta no hace nada de esto. FB Messenger y WhatsApp dejan huecos graves en la ciberseguridad porque el enfoque de Meta es la monetización del mecanismo de mensajería, no comunicaciones verdaderamente “a prueba” de adversarios. Úselos bajo su propio riesgo.

~ C. Constantin Poindexter, MA en Inteligencia, Certificado de Posgrado en Contrainteligencia, JD, certificación CISA/NCISS OSINT, certificación DoD/DoS BFFOC

Bibliografía

  • Brigham, Eric, and Nicholas Hopper. 2023. “Poster: No Safety in Numbers: Traffic Analysis of Sealed Sender Groups in Signal.” arXiv preprint.
  • Cohn Gordon, Katriel, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. 2017. “A Formal Security Analysis of the Signal Messaging Protocol.” Proceedings of the IEEE European Symposium on Security and Privacy.
  • Katsumata, Shota, et al. 2025. “X3DH, PQXDH to Fully Post Quantum with Deniable Ring.” Proceedings of the USENIX Security Symposium.
  • Marlinspike, Moxie, and Trevor Perrin. 2016. “The X3DH Key Agreement Protocol.” Signal Protocol Specification.
  • National Institute of Standards and Technology. 2024a. “NIST Releases First 3 Finalized Post Quantum Encryption Standards.” NIST News Release.
  • National Institute of Standards and Technology. 2024b. FIPS 203. “Module Lattice Based Key Encapsulation Mechanism Standard, ML KEM.” U.S. Department of Commerce.
  • National Institute of Standards and Technology. 2025. “Post Quantum Cryptography Standardization.” NIST Computer Security Resource Center.
  • Perrin, Trevor, and Moxie Marlinspike. 2025. “The Double Ratchet Algorithm.” Signal Protocol Specification.
  • Signal. 2024a. “Quantum Resistance and the Signal Protocol.” Signal Blog.
  • Signal. 2024b. “The PQXDH Key Agreement Protocol.” Signal Protocol Specification.
  • Signal. 2025. “Signal Protocol and Post Quantum Ratchets, SPQR.” Signal Blog.
  • Wired Staff. 2018. “Signal Has a Clever New Way to Shield Your Identity.” Wired Magazine.

2026 Surety Company Demand Drivers: Data Center and Power Infrastructure Projects

data centers, construction, surety, surety bond, surety bonds, surety one, suretyone.com, Janus Assurance Re, C. Constantin Poindexter

Predictions of rising surety capacity demand in 2026 are often described as a general consequence of higher infrastructure spending. That explanation is largely accurate, but it understates the specific mechanism most likely to shape surety markets in 2026. The sharper, more decision-useful view is that the data center construction cycle, paired with the surge in energy and grid work required to power those facilities, is creating a two-stage construction pipeline that expands bonded volume, increases average contract size, and raises the importance of contractor prequalification. In short, more data centers mean more power projects, and that combined workload is positioned to pull more surety capacity into the market in 2026. The data center boom and power appetite will affect surety companies significantly.

The ‘data center story’ matters for surety companies because it converts digital demand into physical, schedule-critical construction. Data centers are capital-intensive, equipment-dependent, and commissioning-sensitive assets. Their owners typically face time commitments to customers and revenue penalties for delayed delivery. That pushes owners, lenders, and counterparties toward risk transfer tools that reduce completion uncertainty, including performance and payment bonds. As the number of projects rises and as their scopes broaden, the surety market sees both higher bond counts and higher aggregate exposure.

Electric load growth is the most direct indicator that the pipeline will remain active. The U.S. Energy Information Administration’s January 2026 Short Term Energy Outlook anticipates continued growth in electricity consumption and highlights data centers as a key contributor to demand growth through 2027 (U.S. Energy Information Administration 2026a; U.S. Energy Information Administration 2026b). For surety markets, this is not merely a macroeconomic footnote. Rising load implies that energy infrastructure must be accelerated, which means new contracting opportunities that frequently come with bonding requirements. When owners and utilities confront tight timelines and high outage sensitivity, they tend to prefer contractors with strong balance sheets and proven delivery histories, which increases the value of surety prequalification and, simultaneously, increases the pull on available surety capacity for qualified firms.

Federal research and energy authorities have also quantified how significantly data centers could reshape U.S. electricity demand. The U.S. Department of Energy, citing Lawrence Berkeley National Laboratory’s 2024 work, reports that data centers used roughly 4.4 percent of U.S. electricity in 2023 and could reach approximately 6.7 percent to 12 percent by 2028. The same discussion estimates data center electricity use rising from about 176 terawatt hours in 2023 to a range of roughly 325 to 580 terawatt hours by 2028 (U.S. Department of Energy 2024). These ranges signal a structural shift rather than incremental growth. If load rises toward the upper end, the scale of new generation, grid reinforcement, and interconnection work increases accordingly. Each of those categories tends to be delivered through large, multi-contractor contracting structures where owners and financiers frequently require bonding.

Commercial market research is consistent with that trajectory and provides near term context. S&P Global, summarizing 451 Research, has projected U.S. data center demand rising to around 75.8 gigawatts in 2026 and continuing upward afterward (Hering and Dlin 2025). In parallel, JLL’s 2026 outlook describes a construction supercycle and anticipates large additions in global data center capacity between 2026 and 2030, while also emphasizing construction cost escalation and the increasing use of onsite power and storage solutions (JLL 2025). For surety markets, the implication is straightforward: larger and more complex projects, delivered faster, tend to increase the use of bonds as a contractual safeguard, particularly where lenders want standardized completion security.

Here the “power appetite” element becomes decisive for my title statement. The surety effect is not limited to the data center buildings themselves. The more consequential driver for 2026 surety markets is that data center growth forces the construction of enabling energy assets outside the data center footprint. Those assets often include substations, transmission and distribution upgrades, utility interconnections, grid hardening, generation additions, utility scale storage, fuel supply tie-ins for thermal generation, and behind-the-meter microgrid solutions. Many of these projects face long equipment lead times, tight outage windows, right-of-way constraints, and regulatory milestones. Complexity and mission criticality increase the owner’s preference for bonding on the prime contract and sometimes for subcontractor bonding as well.

Contracting norms reinforce why surety demand rises as contract values rise. On federal construction, standard clauses generally require performance and payment bonds at 100 percent of the original contract price, with additional coverage needed if the contract price increases (Federal Acquisition Regulation 2026). Public works contracting also rests on the broader statutory framework requiring bonds for federal public buildings or public works (40 U.S.C. § 3131 2025). Even when data centers are privately financed, lenders frequently adopt bond requirements that mirror public sector practices because the economic consequences of nonperformance are severe. Also, our traditional bond forms and underwriting practices provide a familiar discipline.

The infrastructure spending environment remains relevant, but as a foundation rather than the marginal driver in this specific narrative. Federal reporting on IIJA funding status indicates continued movement from enacted funding to obligations and outlays, supporting a sustained baseline of public construction activity (U.S. Department of Transportation 2025). Industry reporting entering 2026 similarly points to durable construction demand while highlighting constraints such as labor availability, cost volatility, and schedule pressure (Construction Dive 2026). The key point for your title, however, is that data centers magnify the infrastructure baseline by adding a privately anchored project type that nevertheless pulls in large volumes of utility and grid work, often in the same regions and time windows. That coupling pushes surety markets in two ways: it increases total bonded work, and it concentrates demand in specialized contractor classes, especially electrical, power, and high-end mechanical trades.

Surety capacity demand in 2026 rises not only because there are more projects, but because the average risk profile and scope complexity both increase. Data center delivery depends on high-performance mechanical, electrical, and plumbing integration, plus commissioning and energization milestones that are intolerant of delay to the EXTREME. Energy projects that serve data centers add further interface risk between utilities, EPC firms, specialty subcontractors, and permitting authorities. As complexity rises, owners prefer contractors with stronger financials and deeper experience. That has two market effects. First, stronger contractors may require larger single job limits and higher aggregate programs to support expanding backlogs. Second, weaker or newer contractors may face tighter underwriting, higher collateral requirements, or reduced limits. The result is an overall rise in capacity demand, paired with more selective capacity allocation.

The global market context suggests that surety remains a growth segment, but not in an evenly distributed way. Broker market commentary continues to characterize surety as expanding, while also noting that underwriting discipline and loss experience affect where capacity is deployed and at what price (Aon 2025). Trade association and international surety company executive sentiment similarly reflect growth expectations while acknowledging performance pressures that can influence underwriting posture (International Credit Insurance and Surety Association 2025). For 2026, the implication is that surety markets may have ample aggregate capacity, yet will experience localized tightening in contractor classes or regions most exposed to data center and power project clustering.

To give some memorable perspective without undermining my academic rigor here, I’ll offer a metaphor. The 2026 data center wave is like opening a chain of all-night diners for a neighborhood of professional athletes. The diners are the data centers, but the real scramble is securing the supply chain of groceries, kitchens, and delivery trucks that keep them fed. In construction terms, the “groceries” are megawatts, substations, and interconnections. When the diners multiply, the supply chain projects multiply too. Sureties can get REALLY busy REALLY quickly, because more parties insist on guarantees that dinner will be served perfectly to picky diners and on time.

My point is supported by the causal chain observed in public forecasts and market outlooks. Data center construction growth is increasing electricity demand. Rising electricity demand is pulling forward grid and generation investment. Those projects, in turn, typically involve large contracts, complex scopes, and schedule-critical delivery that increases the use of performance and payment bonds. The combined effect in 2026 means higher surety capacity demand and more consequential surety market dynamics, particularly around limits, aggregates, and underwriting selectivity. Data centers and the power appetite of those centers will affect surety companies. This is not merely another construction category to take lightly. They are a load-driven construction engine that brings its own power infrastructure ecosystem, and that ecosystem is precisely what is poised to pressure and expand surety markets in 2026.

~ C. Constantin Poindexter, MA, JD, CPCU, AFSB, ASLI, ARe, AINS, AIS

Bibliography

  • Aon. 2025. 2025 Global Construction Insurance and Surety Market Report. Aon.
  • Construction Dive. 2026. “5 Construction Trends to Watch in 2026.” Construction Dive. January 2026.
  • Federal Acquisition Regulation. 2026. “52.228 15 Performance and Payment Bonds Construction.” Acquisition.gov.
  • Hering, Garrett, and Susan Dlin. 2025. “Data Center Grid Power Demand to Rise 22% in 2025, Nearly Triple by 2030.” S&P Global Commodity Insights. October 14, 2025.
  • International Credit Insurance and Surety Association. 2025. “ICISA Publishes 2025 Business Sentiment Report.” ICISA. November 3, 2025.
  • JLL. 2025. 2026 Global Data Center Outlook. Jones Lang LaSalle. January 2026.
  • U.S. Department of Energy. 2024. “DOE Releases New Report Evaluating Increase in Electricity Demand from Data Centers.” U.S. Department of Energy. December 20, 2024.
  • U.S. Department of Transportation. 2025. “Infrastructure Investment and Jobs Act Funding Status as of September 30, 2025.” U.S. Department of Transportation.
  • U.S. Energy Information Administration. 2026a. “Short Term Energy Outlook January 2026.” U.S. EIA. January 2026.
  • U.S. Energy Information Administration. 2026b. “EIA Forecasts Strongest Four Year Growth in U.S. Electricity Demand Since 2000.” U.S. EIA Press Release. January 13, 2026.
  • United States. 2025. “40 U.S.C. § 3131 Bonds of Contractors of Public Buildings or Public Works.” United States Code.

SIGNAL Secure for Intelligence Practitioners and will be for the Quantum Era

SIGNAL, intelligence, counterintelligence, spy, espionage, counterespionage, cyber security, C. Constantin Poindexter

Signal has earned its reputation in intelligence, counterintelligence, and investigative communities for a practical reason. I love it and you should too! The tool was engineered around adversarial assumptions that align with real-world asset targeting. Those assumptions include state-grade collection, cover and often illegal interception, endpoint compromise, credential theft, and long-term bulk retention for future exploitation. Signal is not conventional messaging with security added afterward. It is an integrated protocol suite for key agreement, per-message key evolution, and compromise recovery, supported by open specifications and sustained cryptographic hardening.

From an intelligence professional’s perspective, Signal is compelling because it is designed to remain resilient under partial failure. If an attacker wins a battle by capturing a key, briefly cloning a device, or recording traffic for years, Signal aims to prevent that single win from turning into durable, strategic access. This damage containment model aligns with counterintelligence priorities. Limit the blast radius, shorten adversary dwell time, and force repeated effort that increases the chance of detection.

The Double Ratchet and Per-Message Keys That Constrain Damage

At the core of Signal message confidentiality is the Double Ratchet algorithm, designed by Trevor Perrin and Moxie Marlinspike (Perrin and Marlinspike, 2025). Operationally, the Double Ratchet matters because it delivers properties that align with intelligence tradecraft realities.

Forward secrecy ensures that compromising a current key does not reveal prior message content. Adversaries routinely collect ciphertext in bulk and then hunt for a single point of decryption leverage later through device seizure, insider access, malware, or legal process. Forward secrecy frustrates that strategy by ensuring earlier captured traffic does not become a later intelligence windfall if a key is exposed at some later time (Perrin and Marlinspike, 2025).

Post-compromise security (“break-in recovery”) addresses a scenario intelligence practitioners plan for temporary device compromise. Border inspections, opportunistic theft, coercive access, or a short-lived implant can occur. The Double Ratchet includes periodic Diffie-Hellman updates that inject fresh entropy, while its symmetric ratchet derives new message keys continuously. Once the compromised window ends, later message keys become cryptographically unreachable to the attacker, provided the attacker is no longer persistently on the endpoint (Perrin and Marlinspike, 2025). This is not an exaggerated marketing claim. It is a disciplined key evolution that deprives the adversarial FIS and corporate spies of indefinite reuse of stolen key material.

Incident response logic has a new paradigm. A single brief compromise does not automatically mean permanent exposure of the entire history and future. Instead, the attacker must maintain persistence to retain visibility. That is a higher operational burden and a higher detection risk.

X3DH and PQXDH and the Move Against Harvest Now Decrypt Later

Signal historically used X3DH, Extended Triple Diffie-Hellman, for asynchronous session establishment. This is vital in mobile environments where recipients are often offline. X3DH uses long-term identity keys and signed prekeys for authentication while preserving forward secrecy and deniability properties (Marlinspike and Perrin, 2016). The strategic risk landscape shifted with the plausibility of cryptographically relevant quantum computing. The threat is not only future real-time decryption. It is harvest now/decrypt later. Bulk interception today is strategic, with the expectation that future breakthroughs, including quantum, could unlock stored traffic. Signal responded by introducing PQXDH, “Post Quantum Extended Diffie Hellman”, replacing the session setup with a hybrid construction that combines classical elliptic curve Diffie-Hellman using X25519 and a post quantum key encapsulation mechanism derived from CRYSTALS Kyber (Signal, 2024a). The operational implication is direct. An adversary would need to break both the classical and the post-quantum components to reconstruct the shared secret (Signal, 2024a).

Hybrid key establishment reflects conservative intelligence engineering. Migrate early, avoid sudden cutovers, and reduce reliance on a single new primitive. This also matters because the post-quantum component corresponds to what NIST standardized as ML KEM, derived from CRYSTALS Kyber, in FIPS 203 (NIST, 2024a; NIST, 2024b). NIST standardization does not guarantee invulnerability. It does increase confidence that the primitive has been scrutinized and is being adopted as a baseline for high assurance environments.

Signal also makes an important clarity point in its PQXDH materials. PQXDH provides post-quantum forward secrecy, while mutual authentication in the current revision remains anchored in classical assumptions (Signal, 2024b). Practitioners benefit from that precision because it defines exactly what is post-quantum today.

SPQR and Post Quantum Ratcheting for Long-Lived Operations

Session establishment is only one part of the lifecycle problem. A capable collector can record traffic for long periods. If quantum capabilities emerge later, the question becomes whether ongoing key evolution remains safe against future decryption. Signal’s introduction of the Sparse Post Quantum Ratchet, SPQR, directly addresses continuity by adding post-quantum resilience to the ratcheting mechanism itself (Signal, 2025).

SPQR extends the protocol so that not only the initial handshake but also later key updates gain quantum-resistant properties, while preserving forward secrecy and post-compromise security (Signal, 2025). For intelligence practitioners, this matters because long-lived operational relationships are common. Assets, handlers, investigative sources, and inter-team coordination can persist for months or years. A protocol that hardens only the handshake helps. A protocol that hardens ongoing rekeying is more aligned with the real adversary model of persistent collection.

Academic work has analyzed the evolution from X3DH to PQXDH in the context of Signal move toward post-quantum security and frames PQXDH as mitigation against harvest now decrypt later risk at scale (Katsumata et al., 2025). That framing fits intelligence risk management. Confidentiality is evaluated against patient, well-resourced adversaries.

Formal Analysis and Open Specifications and Why That Matters Operationally

Practitioners should be skeptical of security claims that cannot withstand external review. Signal protocol suite benefits from public specifications and sustained cryptographic scrutiny. A widely cited formal analysis models the protocol’s core security properties and examines its ratchet-based design in detail (Cohn Gordon et al., 2017). No protocol is proven secure against every real-world failure mode. Formal methods and peer-reviewed analysis reduce the chance that structural weaknesses remain hidden. Operationally, this supports reliability. When you rely on a tool for sensitive work, you evaluate whether the claims are testable, whether failure modes are documented, and whether improvements can be validated.

Metadata Constraints and Sealed Sender and the Role of Tradecraft

Message content confidentiality is only part of intelligence security. Metadata can be operationally decisive. Who communicates with whom, when, and how often can create damaging inferences. Signal Sealed Sender was designed to reduce sender information visible to the service during message delivery (Wired Staff, 2018). Research examines Sealed Sender and proposes improvements while discussing network-level metadata such as IP address exposure and the implications for anonymity tooling (Martiny et al., 2021). Additional academic work discusses traffic analysis risks that can persist in group settings even when sender identity is partially obscured (Brigham and Hopper, 2023).

The intelligence operator’s takeaway is that Signal materially improves content security and reduces certain metadata exposures. It does not eliminate the need for operational security measures. Depending on mission profile, those measures can include hardened endpoints, strict device handling, minimized identifier exposure, and network protections consistent with applicable law and policy.

Why Signal Trajectory Is Credible in the Quantum Transition

The Signal approach to the quantum transition reflects a credible engineering posture. Migrate early enough to blunt harvest now/decrypt later risk. Adopt hybrid designs to reduce reliance on one assumption. Extend post-quantum guarantees beyond the handshake into ongoing key evolution (Signal, 2024a; Signal, 2025). Alignment with NIST standardized direction for key establishment further supports long-term maintainability and ecosystem interoperability (NIST, 2024a; NIST, 2025). From an intelligence practitioner’s perspective, the central claim is not that Signal is unbreakable. The point is that Signal is engineered to constrain damage, recover after compromise, and anticipate strategic decryption threats. It is designed for a hostile environment that is moving toward post-quantum reality. I will state at the end here that Meta does not do any of this. FB messenger and WhatsApp leave gaping holes in cybersecurity as Meta’s focus is on monetization of the I.M. mechanism, not unbreakable coms. Use them at your own risk.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

Bibliography

  • Brigham, Eric, and Nicholas Hopper. 2023. “Poster: No Safety in Numbers: Traffic Analysis of Sealed Sender Groups in Signal.” arXiv preprint.
  • Cohn Gordon, Katriel, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. 2017. “A Formal Security Analysis of the Signal Messaging Protocol.” Proceedings of the IEEE European Symposium on Security and Privacy.
  • Katsumata, Shota, et al. 2025. “X3DH, PQXDH to Fully Post Quantum with Deniable Ring.” Proceedings of the USENIX Security Symposium.
  • Marlinspike, Moxie, and Trevor Perrin. 2016. “The X3DH Key Agreement Protocol.” Signal Protocol Specification.
  • National Institute of Standards and Technology. 2024a. “NIST Releases First 3 Finalized Post Quantum Encryption Standards.” NIST News Release.
  • National Institute of Standards and Technology. 2024b. FIPS 203. “Module Lattice Based Key Encapsulation Mechanism Standard, ML KEM.” U.S. Department of Commerce.
  • National Institute of Standards and Technology. 2025. “Post Quantum Cryptography Standardization.” NIST Computer Security Resource Center.
  • Perrin, Trevor, and Moxie Marlinspike. 2025. “The Double Ratchet Algorithm.” Signal Protocol Specification.
  • Signal. 2024a. “Quantum Resistance and the Signal Protocol.” Signal Blog.
  • Signal. 2024b. “The PQXDH Key Agreement Protocol.” Signal Protocol Specification.
  • Signal. 2025. “Signal Protocol and Post Quantum Ratchets, SPQR.” Signal Blog.
  • Wired Staff. 2018. “Signal Has a Clever New Way to Shield Your Identity.” Wired Magazine.

SuretyBind, a Competitor Owned Surety Data Platform? Mmmmm, . . . not so sure about that.

surety, surety bond, surety bonds, suretyone.com, surety one, Janus Assurance Re, C. Constantin Poindexter;

A Competitor-Owned Surety Data Platform Is a Strategic and Counterintelligence Hazard

On December 8, 2025, Chubb, The Hartford, Liberty Mutual, and Travelers announced the formation of SuretyBind, LLC, a technology company intended to provide a shared digital infrastructure to advance the surety industry (PR Newswire 2025; SuretyBind 2025; Carrier Management 2025). Public materials identify two initial priorities: a data transmission platform to connect sureties, brokers, and other participants in order to reduce duplicative data entry and improve data quality (PR Newswire 2025; SuretyBind 2025), and secondarily, leadership and technology to drive digital bond execution, improve verification, and reduce fraud. Services are expected in 2027 (PR Newswire 2025; SuretyBind 2025). The same announcement adds a sentence that should concern any serious surety executive. It states that all SuretyBind activities are conducted under “strict antitrust supervision” (PR Newswire 2025; SuretyBind 2025).

I am pondering this from the standpoint of an ex-counterintelligence operator in the U.S. I.C., so this is going to be a bit technical, but I’ll try to keep out of the woods here. In competitive industries, shared infrastructure is frequently a precondition for avoidable compromise because it concentrates sensitive operational signals, creates asymmetric incentives, and widens the attack surface. In surety, underwriting edge is built from proprietary loss experience, contractor behavior signals, i.e., known red flags to a particular surety, claims handling patterns, indemnity enforcement outcomes, and relationship intelligence. Placing any portion of the workflow on a platform co-owned by direct competitors creates structural incentives and technical pathways for abuse or worse, conspiratorial market monopolization. Even if every participant acts in good faith, the platform becomes a high-value collection point for penetration. A single breach, insider compromise, governance failure, or gradual expansion of scope can expose trade secrets and reshape market dynamics.

What the public reporting says and what it does not

The best sourced reporting largely recirculates the same core statement. PR Newswire published the launch release on December 8, 2025 (PR Newswire 2025). SuretyBind’s own press page mirrors the same language and repeats the strict antitrust supervision claim without explaining its mechanics (SuretyBind 2025). Carrier Management adds an operational detail that is material for risk analysis. A SuretyBind representative said the four sureties funded the company and will be co-owners. Carrier Management also reported that the owners will not be providing personnel to the technology company, while still participating in an advisory capacity and ultimately becoming users of the platform (Carrier Management 2025). The Insurer also reported the formation, but provides limited additional substance in the portion broadly accessible (The Insurer 2025). That thin public record is itself a risk signal. A competitor-owned platform can be built safely only with explicit and auditable commitments on data boundaries, governance controls, technical segregation, and enforceable sanctions. The public materials provide none of that detail, while asking the market to trust the platform with sensitive traffic. In other words, the interested parties’ narrative emphasizes benefits while omitting the control framework that would allow counterparties to evaluate and judge the true risk.

“Strict antitrust supervision” is not a reassuring

The phrase appears to be self-described, not a reference to a defined government oversight program. The announcement does not cite a consent decree, a published monitor, a public compliance protocol, a set of scope limitations, or enforcement triggers (PR Newswire 2025; SuretyBind 2025). In ordinary United States practice, antitrust agencies do not supervise day-to-day commercial conduct of a private joint venture absent a litigation resolution, order, or decree. Where companies seek agency feedback in advance, they may pursue structured options, however, that is not equivalent to continuous supervision. Actually, continuous supervision does not transform a risky design into a safe one either.

The current antitrust environment also matters. On December 11, 2024, the Federal Trade Commission and the Department of Justice withdrew the 2000 Antitrust Guidelines for Collaborations Among Competitors, stating that the guidelines no longer provide reliable guidance and emphasizing case-by-case enforcement (FTC 2024; FTC and DOJ 2024). This shift increases uncertainty around competitor collaboration structures and heightens the need for precise internal controls rather than reliance on generic comfort language. Compliance programs must be designed for effectiveness, monitoring, and documentation. The Department of Justice Antitrust Division has also emphasized evaluation of compliance programs and their effectiveness in criminal antitrust investigations (DOJ Antitrust Division 2024).

From a counterintelligence guy’s view, antitrust is only one layer. A platform that aggregates competitor adjacent operational data flows can enable tacit coordination, whether intentional or not, by increasing market transparency around demand patterns, submission characteristics, broker behaviors, and execution timing. Even without explicit exchange of pricing (a definitive invitation for litigation or prosecution) granular operational signals can reduce uncertainty and soften competition.

The surety-specific danger is that operational data becomes underwriting intelligence

Some advocates may argue that the platform only transmits administrative data. In surety, that distinction is simply illusory. A data transmission platform that reduces duplicative entry implies common schemas, common routing, and shared pipes across sureties, brokers, and other parties (PR Newswire 2025; SuretyBind 2025). Even if each surety maintains its own decisioning, several categories of intelligence can leak through metadata, workflow patterns, or integrations. Ponder these. Appetite inference. Which submissions are accepted into workflow, how fast they are processed, and what documentation is demanded can reveal risk tolerance by class, geography, contractor size, or obligee type. Surety broker and channel intelligence. Submission frequency, conversion rates, and timing reveal who controls deal flow and how competitors prioritize relationships. Loss cost signals. Even without explicit loss runs, claim-related workflow events, verification anomalies, amendment frequency, and execution delays can correlate with adverse development and portfolio stress. Process fingerprints. Digital execution embeds rules. Who requires what, when indemnity is tightened, when collateral is requested, and what exceptions are escalated are not merely operational details. They are strategic posture.

The eight-hundred-pound gorilla in the room? Over time, data quality advantages become modeling advantages. A shared system standardizes the collection of variables that eventually become features in predictive analytics. Whoever influences the schema, sees its evolution, or observes which optional fields others request learns what competitors believe matters, and can calibrate their own strategies accordingly. The risk is not only an overt breach. It is a gradual normalization of shared visibility that erodes differentiation.

Digital execution and fraud reduction goals can be achieved without competitor-owned intelligence exposure

The industry’s fraud and verification concerns are real. Industry materials, including NASBP resources, describe persistent problems of fraudulent bonds and emphasize verification as a core control (NASBP 2024). The workflow is fragmented, and obligees often verify bonds through manual steps or portal checks, which creates latency and inconsistency. Improving verification and reducing fraud is a legitimate objective that could benefit the market (PR Newswire 2025; SuretyBind 2025). However, governance and ownership models are not incidental. NASBP and RiskStream Collaborative have described digitizing the surety bond ecosystem through workflow standardization and stakeholder coordination (NASBP and RiskStream 2025). That goal does not logically require a competitor-owned central platform that becomes the market’s operational nervous system. The industry can pursue interoperability standards, verification registries, and secure execution rails in ways that compartmentalize each surety’s proprietary underwriting and claims intelligence. Of course, being the surety world’s “operational nervous system” may be the entire point. I’ll leave that one and its ramifications for you to ponder, especially those carriers that will not use the platform.

A threat model for participation

If I were advising a surety carrier evaluating participation, I would treat the platform as a high-threat environment even if the stated intent is benign. The incentives are asymmetric, and the attack surface is large, . . . huge counterintelligence concerns in more than just the insurance sector. Competitor collection risk arises when competitors can shape platform features, influence schema, participate in advisory structures, or obtain privileged visibility into operational telemetry. Insider threat risk grows because platform employees and contractors can access logs, routing rules, support tickets, and integration configurations, any of which can reveal proprietary posture. Supply chain risk rises because shared infrastructure tends to accumulate dependencies, and one compromised vendor can expose all participants. Design spillover risk is persistent because once multi party rails exist, there is continuous pressure to add analytics, benchmarking, fraud scoring, and dashboards, each framed as helpful, each capable of crossing the line into competitive intelligence. Finally, regulatory and litigation discovery risk expands because centralized logs and shared repositories become new targets for subpoenas and discovery demands.

What can surety companies do to protect proprietary underwriting and claims intelligence?

Participation should be conditioned on controls that are technical, contractual, and governance-based, designed for non-trust operation. Trust is not a control. So what to do?

Data minimization must be an enforced technical requirement. Only transmit fields strictly necessary for a defined transaction. Underwriting conclusions, internal risk grades, pricing logic, claim narratives, indemnity enforcement outcomes, and loss development artifacts should be prohibited by design and validated automatically against a published data dictionary. This is the surety equivalent of compartmentation, a well-known practice in the intelligence field.

Tenant isolation and clean room architecture are imperative. If the platform evolves beyond simple message passing, there must be cryptographic and architectural isolation with separate keys, separate storage, separate processors, strict access controls, and provable segmentation. Controls should align to recognized baselines such as NIST SP 800 53 Rev 5 for access control, audit logging, and system integrity (NIST 2020).

Immutable and independently reviewable auditability must be assured. All access to production data and logs should be recorded in a tamper-evident manner and reviewable by each participant, with thresholds for alerting and independent oversight. Require third-party security assessments and continuous monitoring aligned to recognized governance frameworks such as the NIST Cybersecurity Framework 2.0 (NIST 2024).

Governance designed to prevent competitor capture must be rigorous. A board with one seat per owner can institutionalize competitor influence rather than mitigate it. Demand an independent data governance body with veto power over schema changes, analytics features, and any cross-tenant functionality. A “one seat per JV participant” would be highly attractive to parties seeking to engage in behavior specifically prohibited by antitrust laws. Require formal change control with notice, impact analysis, and opt-out rights. Enforce purpose limitation at the governance layer so the platform cannot evolve into an intelligence lake by incremental decisions.

Antitrust compliance that is operationally real, if such a thing is even possible among the biggest players in an extreme niche sector. Given the shift to case-by-case scrutiny and the withdrawal of prior collaboration guidelines, antitrust must be treated as an ongoing operational risk, not a meaningless annual training module (FTC 2024; FTC and DOJ 2024). Implement monitored governance communications, documented escalation paths, and clear prohibitions on competitively sensitive exchanges. Use DOJ Antitrust Division compliance expectations as the reference model for program design and effectiveness testing (DOJ Antitrust Division 2024).

Contractual non-use and trade secret remedies with teeth. Simple non-disclosure will not work. Contracts should include purpose limitation, non-use clauses that prohibit competitive use, model training, and benchmarking, strong audit rights, rapid incident disclosure duties, and immediate injunctive relief triggers. Meaningful sanctions and termination rights for non-compliance must be built in. If the platform is essential to business operations, remedies that are practical and swift can serve as a deterrent.

Restrictions on personnel mixing and advisory interfaces are also important controls. The reporting that owners will not provide personnel is appropriate and should be preserved (Carrier Management 2025). Carrier participants must ban secondments of surety underwriters, claims staff, and analytics personnel into the platform operator. Advisory structures must be tightly scoped and closely monitored, as working groups can easily become informal intelligence exchanges.

All schemas and workflow rules must be viewed as highly sensitive. Even if no explicit loss data is stored, schema evolution can reveal competitive strategy. Any new data element must be justified as necessary for execution or verification and reviewed for competitive sensitivity. Red lines must include prohibition of any feature that compares participants or infers any market posture.

The structure must provide an exit capability and assume that a breach is inevitable. A robust counterintelligence posture assumes compromise will happen at some point. Rapid disengagement rights, verified data deletion and destruction, and integration architectures that allow a surety to disconnect without crippling operations are imperative. In parallel, keep internal systems compartmentalized so that a platform breach does not escalate into an enterprise breach.

My Parting Thoughts

SuretyBind’s stated objectives are understandable. Efficiency, data quality, digital execution, verification, and fraud reduction are legitimate targets (PR Newswire 2025; SuretyBind 2025). The danger lies in the ownership and incentive structure. Direct competitors are being invited to co-own the rails on which submissions, execution events, and workflow metadata will travel. Data/metadata is intelligence, workflow is strategy, and administrative is often the shadow of underwriter judgment. A single sentence about strict antitrust supervision is b.s., and NOT an adequate substitute for verifiable safeguards, particularly in an enforcement environment that emphasizes case-by-case scrutiny and has withdrawn prior competitor collaboration guidelines (FTC 2024; FTC and DOJ 2024). A counterintelligence professional does not gamble trade secrets on slogans, and neither should the participant sureties in this SuretyBind thing. If the industry truly wants digital execution, it should demand designs that keep each surety’s proprietary risk knowledge compartmented, minimize shared visibility, and make governance auditable and enforceable. Otherwise, the platform risks becoming an intelligence extraction engine that quietly redistributes underwriting advantage from those who earned it to those who can most effectively collect or acquire it. Non-participating surety companies beware. There are four very large, very influential carriers banding together for reasons that don’t appear to justify the concerning exposures inherent in the system. You should ask why.

~ C. Constantin Poindexter, MA, JD, CPCU, AFSB, ASLI, ARe

References

  • Carrier Management. 2025. “Chubb, The Hartford, Liberty and Travelers Team Up on Surety Tech Co. Launch.” December 8, 2025.
  • Federal Trade Commission. 2024. “FTC and DOJ Withdraw Guidelines for Collaboration Among Competitors.” Press release, December 11, 2024.
  • Federal Trade Commission and U.S. Department of Justice. 2024. Withdrawal Statement: Guidelines for Collaboration Among Competitors. December 11, 2024.
  • National Association of Surety Bond Producers. 2024. The Importance of Surety Bond Verification.
  • National Association of Surety Bond Producers and RiskStream Collaborative. 2025. Digitizing the Surety Bond Ecosystem: Surety X Executive Summary. June 2025.
  • National Institute of Standards and Technology. 2020. Security and Privacy Controls for Information Systems and Organizations (SP 800 53 Rev. 5).
  • National Institute of Standards and Technology. 2024. The NIST Cybersecurity Framework 2.0 (CSWP 29).
  • PR Newswire. 2025. “Leading Sureties Announce the Launch of SuretyBind.” December 8, 2025.
  • SuretyBind. 2025. “Leading Sureties Announce the Launch of SuretyBind.” Press release page, December 8, 2025.
  • U.S. Department of Justice, Antitrust Division. 2024. Evaluation of Corporate Compliance Programs in Criminal Antitrust Investigations. November 2024.
  • The Insurer (from Reuters). 2025. “Tech company SuretyBind formed by Chubb, The Hartford, Liberty Mutual and Travelers.” December 8, 2025.