Legal Remedies Open to Minnesota: ICE Operations and Redress for Civilian Deaths

justice, alex pretti, renee good, ICE, C. Constantin Poindexter

I am a patriot. I have always felt it a privilege to be American and very proud of what we represent to the world. Times have changed, and something strickingly ugly has happened to us. The Renee Good, Keith Porter and Alex Pretti homicides are the last straw. If our President will not step in to stop this, the state(s) must. Minnesota’s ability to halt federal immigration enforcement is constrained by federal supremacy, but it is not null. A state cannot nullify or physically obstruct federal law enforcement acting within lawful federal authority, because immigration enforcement is a core federal power and the Supremacy Clause preempts contrary state action (U.S. Const., art. VI; Arizona v. United States, 2012). The practical and legally durable approach is to distinguish between lawful federal immigration enforcement and allegedly unlawful operational conduct, including unconstitutional crowd control, unreasonable seizures, excessive force, and agency action that exceeds statutory or constitutional limits. Within that framing, Minnesota and its political subdivisions can pursue aggressive, legally cognizable remedies that combine federal court equitable relief, state sovereign measures that deny logistical support and eliminate state entanglement, evidence preservation and independent investigations for lethal force incidents, and damages pathways structured around the Federal Tort Claims Act and carefully pleaded individual capacity claims.

A decisive early step is to build the record and procedural posture for emergency relief. Minnesota’s Attorney General and major cities have already placed this template into the federal docket by seeking declaratory and injunctive relief against what they characterize as an unprecedented surge operation, and by pleading constitutional and Administrative Procedure Act theories (State of Minnesota v. Noem, Complaint, 2026; Minnesota Attorney General’s Office, 2026a). Contemporary reporting describes civilian deaths during the surge, including Alex Pretti on January 24, 2026, and notes that a federal judge ordered preservation of evidence connected to that incident (CBS Minnesota, 2026; The Guardian, 2026). Reporting also documents a prior death earlier in the month and recurring force allegations tied to the surge environment (The Marshall Project, 2026). These allegations and procedural developments are central to remedy selection, because courts are materially more willing to restrain specific unconstitutional tactics than to enjoin immigration enforcement as a category.

A primary remedy is immediate federal court equitable relief. Minnesota’s fastest lawful braking mechanism is a temporary restraining order and preliminary injunction focused on unlawful conduct rather than federal authority in the abstract (28 U.S.C. §§ 1331, 2201–2202). Minnesota can seek a declaratory judgment that discrete federal practices violate the Constitution or exceed statutory authority, coupled with injunctive relief that prohibits specified behaviors, mandates training and supervision changes, and compels evidence retention and production schedules (State of Minnesota v. Noem, Complaint, 2026). Evidence control is not merely ancillary. In lethal force disputes, preservation orders can be the most attainable short-term relief and can materially influence later liability outcomes. Reporting indicates a preservation order in the Pretti matter, and allegations of obstruction in gaining access to the scene, which underscores why Minnesota should continue to press targeted preservation and access relief for body-worn camera footage, dispatch logs, chain of custody documentation, and third-party video sources (CBS Minnesota, 2026).

On the merits, Minnesota can plead multiple constitutional theories that are cognizable in equity even when actions for damages against federal actors are limited. First Amendment claims can be framed as retaliation and viewpoint discrimination, and as a chilling regime when federal agents are alleged to use force against peaceful expressive activity (Hartman v. Moore, 2006; Nieves v. Bartlett, 2019). Fourth Amendment claims can be framed as unreasonable seizures and excessive force. Those claims support injunctive relief to change practices governing stops, detentions, and use of force, particularly where plaintiffs can show a pattern, policy, or command structure rather than a one-off incident (Graham v. Connor, 1989; Tennessee v. Garner, 1985). Fifth Amendment due process framing can supplement where conduct is alleged to be arbitrary or conscience-shocking in a civil enforcement setting (County of Sacramento v. Lewis, 1998). In each lane, the remedy posture should be calibrated to what courts will enjoin. The goal is not a sweeping ban on federal presence, but enforceable constraints and oversight mechanisms that prevent unconstitutional practices and preserve evidence.

Statutorily, the Administrative Procedure Act remains a central lever when the dispute can be characterized as unlawful agency action, ultra vires deployment, or a final agency policy that is arbitrary and capricious, contrary to constitutional right, or adopted without required procedure (5 U.S.C. §§ 702, 706). Even where the government frames the operation as discretionary, plaintiffs can target categorical rules and structured practices that resemble policy rather than case-by-case discretion, including deployment criteria, operational directives, and deviations from articulated enforcement protocols (State of Minnesota v. Noem, Complaint, 2026; Minnesota Attorney General’s Office, 2026a). The APA posture also aligns with remedy realism. Courts often resist ordering how to enforce immigration law, but will restrain agency actions that lack lawful procedure, exceed statutory authority, or violate constitutional limits.

Separately, Minnesota’s structural state power is strongest in disentanglement. The anti-commandeering doctrine bars the federal government from compelling states or localities to administer or enforce federal regulatory programs (Printz v. United States, 1997; Murphy v. NCAA, 2018). This doctrine does not permit obstruction, but it does permit Minnesota to prohibit state and local employees from participating in certain federal immigration activities, such as honoring civil detainers absent judicial warrants, providing nonpublic data access beyond what federal law requires, and using state resources for federal tasking. Operationally, Minnesota can reinforce disentanglement through statewide policies governing state facilities and state-controlled information systems. The objective is to ensure that federal operations must stand on federal resources and federal legal authority alone, while Minnesota maintains compliance with any narrow federal preemption requirements and avoids discrimination against federal officers as such.

For redress of deaths and serious injuries, Minnesota’s investigative and prosecutorial tools matter, but they are bounded by Supremacy Clause immunity principles. Homicide and assault are state crimes, and Minnesota agencies can investigate shootings within Minnesota’s territory. However, federal officers may assert a Supremacy Clause-related immunity against state prosecution for actions taken within the scope of federal duties and authorized by federal law (In re Neagle, 1890). That doctrine is not absolute. If facts indicate actions outside lawful authority, or actions that no reasonable officer could regard as necessary and proper to execute federal duties, state prosecution becomes more plausible. Even where prosecution is foreclosed or removed, robust state investigation is still consequential. It establishes an independent factual record, constrains narratives, supports federal civil remedies, and can trigger institutional accountability mechanisms. In this context, contemporaneous reporting about contested accounts and video evidence underscores the importance of independent scene processing where possible, preservation of third-party footage, coordinated witness interviewing, and transparent public reporting (CBS Minnesota, 2026; The Guardian, 2026).

For damages, Minnesota must separate who can sue and under what theory. Wrongful death damages generally belong to estates and statutory beneficiaries under state law, but the state can support and, in some contexts, pursue recovery for sovereign and proprietary harms. The principal damages route for torts committed by federal employees is the Federal Tort Claims Act, which waives sovereign immunity for certain torts and applies the law of the place where the act occurred (28 U.S.C. §§ 1346(b), 2671–2680). The FTCA law enforcement proviso permits claims for specified intentional torts, including assault and battery, when committed by investigative or law enforcement officers (28 U.S.C. § 2680(h)). Lethal force cases frequently litigate as operational conduct rather than protected policy discretion, though the United States regularly pleads discretionary function defenses and other exceptions (28 U.S.C. § 2680(a)). Plaintiffs must also satisfy the FTCA’s administrative presentment, exhaustion, and limitations requirements, which makes early evidence preservation and record building essential.

If plaintiffs sue individual officers under state tort theories, the Westfall Act frequently triggers substitution of the United States as the defendant for acts within scope, routing the matter back into FTCA exclusivity (28 U.S.C. § 2679). That substitution fight can be dispositive, and it makes careful pleading and factual support crucial, including any evidence that conduct was outside the scope of employment or otherwise not in furtherance of federal duties. Constitutional damages claims against federal officers under Bivens remain theoretically available for some Fourth Amendment paradigms, but the Supreme Court has sharply limited extensions into new contexts, particularly those touching immigration and national security adjacent environments (Bivens v. Six Unknown Named Agents, 1971; Hernández v. Mesa, 2020; Egbert v. Boule, 2022). As a result, victims’ counsel should treat Bivens as a high-risk vehicle and pair any constitutional damages strategy with FTCA claims and equitable relief that does not depend on implying a new damages remedy.

The phrase “stop operations in their tracks” should be operationalized into legally enforceable outcomes: a court-ordered prohibition on unconstitutional suppression of protest, restrictions on unreasonable stops and seizures, strict evidence preservation and production directives for lethal force incidents, and APA-compliant justification and process for any mass surge policy. Minnesota’s existing litigation posture already seeks declaratory and injunctive relief and frames the surge as extraordinary, which positions the state to pursue precisely this kind of targeted judicial control rather than an unattainable blanket prohibition (State of Minnesota v. Noem, Complaint, 2026; Minnesota Attorney General’s Office, 2026a). When paired with disciplined state non-cooperation grounded in anti-commandeering doctrine and meticulous state-level investigation of lethal force incidents, Minnesota can constrain the operational environment, preserve accountability evidence, and position victims’ families for meaningful damages recovery.

In short, the strongest legal tools are not physical resistance or nullification. They are rapid federal court equitable relief, disciplined state disentanglement, evidence-centered litigation, and damages architectures that convert unlawful force into enforceable liability under the FTCA and related doctrines, while recognizing the Supreme Court’s narrowing of implied constitutional damages remedies.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

Bibliography

  • Arizona v. United States, 567 U.S. 387 (2012).
  • Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics, 403 U.S. 388 (1971).
  • CBS Minnesota. (2026, January 25). Judge grants restraining order against DHS after Border Patrol kills Alex Pretti in Minneapolis.
  • County of Sacramento v. Lewis, 523 U.S. 833 (1998).
  • Egbert v. Boule, 596 U.S. 482 (2022).
  • Graham v. Connor, 490 U.S. 386 (1989).
  • Hartman v. Moore, 547 U.S. 250 (2006).
  • Hernández v. Mesa, 589 U.S. 93 (2020).
  • In re Neagle, 135 U.S. 1 (1890).
  • Minnesota Attorney General’s Office. (2026a, January 12). Attorney General Ellison and cities of Minneapolis and Saint Paul sue to halt ICE surge into Minnesota.
  • Murphy v. NCAA, 584 U.S. 453 (2018).
  • Nieves v. Bartlett, 587 U.S. 391 (2019).
  • Printz v. United States, 521 U.S. 898 (1997).
  • State of Minnesota v. Noem, Complaint for Declaratory and Injunctive Relief, U.S. District Court for the District of Minnesota, Case No. 0:26-cv-00190 (D. Minn. filed 2026, January 12).
  • Tennessee v. Garner, 471 U.S. 1 (1985).
  • The Guardian. (2026, January 24). Report on the killing of a U.S. citizen in Minneapolis during federal agent activity.
  • The Marshall Project. (2026, January 7). Report on use of force allegations connected to immigration enforcement activity in Minneapolis.

When Counterintelligence Did Not “Catch” Jonathan Soong

espionage, counterespionage, intelligence, counterintelligence, spy, spies, C. Constantin Poindexter

When Counterintelligence Did Not “Catch” the Bad Guy: How Export Compliance and Oversight Stopped an Illicit Transfer

As a counterintelligence guy, I would love to claim one for the team, telling you a story of how counterintelligence “caught” Jonathan Soong. The question presumes a familiar arc: a clandestine plot detected by a vigilant counterintelligence service, followed by an investigative takedown. In practice, many of the most consequential national security cases in the defense industrial base begin elsewhere. They begin in the unglamorous terrain of export controls, contractual oversight, documentation requirements, and compliance escalation. The Soong matter is best read not as a story of counterintelligence brilliance at the point of origin, but as a demonstration that a robust compliance mechanism can function as a practical counterintelligence force multiplier, surfacing deception through audit friction, verification, and internal accountability (U.S. Department of Justice 2025a).

Jonathan Yet Wing Soong worked under a University Space Research Association arrangement supporting NASA, where he helped administer licensing and distribution of U.S. Army-owned aviation and flight control software subject to U.S. export controls. Public charging and plea materials describe a pattern that is familiar to any counterintelligence professional who has studied insider-enabled technology transfer. A trusted administrator leveraged authorized access to facilitate improper export to a prohibited end user, while using misrepresentation and intermediaries to reduce detection risk and sustain the activity long enough to monetize it (U.S. Department of Justice 2022; U.S. Department of Justice 2023; U.S. Department of Commerce, Bureau of Industry and Security 2022).

Export compliance as counterintelligence by another name

In the contractor ecosystem, counterintelligence is no longer confined to investigations and briefings. It is built into controls that regulate who can access what, who can receive what, and what documentation must exist to justify a transfer. Export compliance is the legal expression of strategic technology denial. When an export compliance program is mature, it creates a perimeter of verification around controlled software, technical data, and sensitive know-how. It does this through end-user screening, licensing checks, record retention, and the expectation that representations are auditable, not merely asserted (U.S. Department of Justice 2025a).

Soong’s conduct, as publicly described, involved providing controlled U.S. Army aviation software to the Beijing University of Aeronautics and Astronautics, commonly known as Beihang University, an end-user on the U.S. Entity List. The Entity List designation matters because it transforms what might otherwise be a complicated compliance decision into a bright-line restriction: an elevated risk recipient that generally requires licensing and heightened scrutiny. In counterintelligence terms, it is a government signal that a recipient is associated with activities of concern and therefore must be treated as a strategic risk, not just a commercial counterparty (U.S. Department of Commerce, Bureau of Industry and Security 2022; U.S. Department of Justice 2022).

The decisive tripwire was oversight, not classic counterintelligence detection

The core point that the public often misses is timing. The publicly documented narrative indicates that the scheme was not halted because counterintelligence detected hostile tasking in real time. Rather, the activity began to unravel when NASA asked questions about software licensing activity involving China-based purchasers. That inquiry triggered internal examination at USRA, which then forced Soong’s process, documentation, and representations into a higher scrutiny environment (U.S. Department of Justice 2025a).

From a former operator’s perspective, that is the moment the system displayed its value. Oversight created heat. Heat compelled review. Review compelled proof. Proof created contradictions. Contradictions produced admissions and preserved evidence. That sequence is not incidental. It is the operational logic of compliance as an investigative engine. When a compliance system is designed to verify rather than merely record, it becomes difficult for an insider to sustain a cover story indefinitely.

The cover story failed under verification pressure

Public DOJ descriptions emphasize that Soong initially lied and fabricated evidence to make it appear that purchaser diligence had been conducted. In my experience, this is the most common failure mode for organizations that treat compliance as a box-checking function: insiders learn the minimum artifacts that satisfy superficial review. The Soong case illustrates what happens when counsel and compliance do not accept the first answer. DOJ accounts describe further investigation by USRA’s counsel, confrontation with contradictions, and Soong’s eventual admissions, including that he knew the end user was on the Entity List and that an export license was required (U.S. Department of Justice 2025a).

That is not just a legal detail. It is the fulcrum that turns suspicion into provable intent. Counterintelligence professionals care about intent because intent distinguishes mistake from exploitation and distinguishes weak governance from an insider who is actively enabling a strategic competitor or worse, adversarial FIS. Admissions anchored to documented contradictions are highly durable. They are not dependent on classified sources or contested analytic judgments. They are built for court cases.

Intermediaries and misdirection are a compliance evasion pattern

The public record also describes the use of an intermediary to obscure the true end user and facilitate the commercial pathway. This is a standard concealment vector. Intermediaries can be used to launder payment trails, shift transactional geography, and create plausible deniability within internal processes that rely on surface-level end-user statements. If a program relies on the integrity of a single administrator’s “screening,” the administrator becomes the control. If the administrator is compromised, the system is compromised. In this case, public materials describe intermediary involvement and a transfer pathway that, when examined, revealed the underlying restricted recipient (Department of Defense Office of Inspector General, Defense Criminal Investigative Service 2023; U.S. Department of Justice 2025a).

For counterintelligence practitioners, the lesson is straightforward: third party structures are not merely procurement conveniences. They are also tradecraft. In an export controls environment, every intermediary should be treated as a potential concealment method unless diligence is independently verifiable.

Voluntary self-disclosure converted an internal discovery into a national security case

Once internal discovery occurred, the matter moved from corporate governance to national security enforcement. DOJ’s public declination notice emphasized that USRA self disclosed export control offenses committed by its employee and cooperated, which shaped the government’s posture toward the company while leaving the individual to face prosecution (U.S. Department of Justice 2025a). That sequence is important for practitioners because it demonstrates how compliance maturity affects outcomes. Prompt internal escalation, self disclosure, and remediation can separate an organization’s institutional exposure from the conduct of a rogue insider, while also strengthening the government’s ability to build a case against the perpetrator.

DOJ also identified the investigative constellation, including Commerce export enforcement, the FBI, Defense Criminal Investigative Service, NASA Office of Inspector General, and U.S. Army elements including Army counterintelligence and investigative components. In other words, counterintelligence was present and relevant, but it was not the initial tripwire. It was part of the enforcement and investigative consolidation phase after compliance mechanisms surfaced the issue and the company disclosed it (U.S. Department of Justice 2025a; U.S. Department of Justice 2023).

Compliance “caught” the act and counterintelligence helped finish the job

If we insist on the verb “catch,” my professional assessment is that counterintelligence did not “catch” Jonathan Soong in the popular sense of the term. The decisive early detection function was performed by oversight and export compliance mechanisms. NASA’s questions triggered organizational scrutiny. Scrutiny demanded documentation. Documentation collapsed under verification. Verification produced contradictions and admissions. Those admissions and records enabled self-disclosure and a multi-agency investigation that culminated in a guilty plea. Counterintelligence contributed where it often contributes most effectively in the contractor environment: by supporting the investigative and enforcement architecture once a compliance tripwire has surfaced misconduct, and by helping translate a technical compliance failure into a national security narrative that the government can prosecute (U.S. Department of Justice 2025a; U.S. Department of Justice 2023).

This is not a criticism of counterintelligence. It is an argument for modernizing how we describe counterintelligence effectiveness. In the defense industrial base, export compliance is not adjacent to counterintelligence. Export compliance is frequently counterintelligence in operational form. When built correctly, it makes illicit transfer hard to hide, expensive to sustain, and likely to fail under audit pressure. The Soong case is the quiet proof that governance, oversight, and export controls can stop a technology transfer plot even when no one is running a classic counterintelligence operation at the beginning.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

Bibliography

  • Department of Defense Office of Inspector General, Defense Criminal Investigative Service. 2023. “Defendant Admits Using Intermediary to Funnel Payments for United States Army Aviation Software Exported to Beihang University.” Press release, January 17, 2023.
  • U.S. Department of Commerce, Bureau of Industry and Security. 2022. “South Bay Resident Charged with Smuggling and Exporting American Aviation Technology to Beijing University.” Press release, May 26, 2022.
  • U.S. Department of Justice. 2022. “South Bay Resident Charged with Smuggling and Exporting American Aviation Technology to Beijing University.” Press release, U.S. Attorney’s Office, Northern District of California, May 26, 2022.
  • U.S. Department of Justice. 2023. “Castro Valley Resident Pleads Guilty to Illegally Exporting American Aviation Technology.” Press release, U.S. Attorney’s Office, Northern District of California, January 17, 2023.
  • U.S. Department of Justice. 2025a. “Justice Department Declines Prosecution of Company That Self Disclosed Export Control Offenses Committed by Employee.” Press release, Office of Public Affairs, April 30, 2025.

“Due diligence” inmobiliaria en la República Dominicana: la disciplina que separa una compra segura de un riesgo evitable

bienes raices, republica dominicana, abogado, bufete de abogados, despacho legal, abogado santo domingo, C. Constantin Poindexter Salcedo

En el mercado inmobiliario dominicano, especialmente en operaciones transfronterizas donde el comprador reside en Estados Unidos o Europa, el “entusiasmo por el proyecto” suele adelantarse a la verificación jurídica y financiera del promotor. Esa asimetría de información se amplifica cuando la propiedad se adquiere en preventa, cuando la construcción apenas iniciará, o cuando el comprador recibe un paquete de documentos que aparenta exhaustividad pero no necesariamente acredita lo esencial. Precisamente por eso, nuestro bufete en Santo Domingo ha estructurado un servicio integral de diligencia debida o due diligence inmobiliaria en la República Dominicana, diseñado para auditar riesgos, confirmar hechos registrales y contractuales, y producir un informe accionable que permita comprar con criterio técnico y no por confianza implícita.

El punto de partida de toda diligencia debida sería la comprensión del sistema de publicidad inmobiliaria dominicano y de la función del Estado en la mutación de derechos reales. La Ley núm. 108 05 de Registro Inmobiliario establece el marco institucional y los principios que gobiernan el saneamiento y el registro de los derechos reales, así como la registración de cargas y gravámenes sobre inmuebles, con intervención de los órganos de la Jurisdicción Inmobiliaria (República Dominicana, Ley 108 05, 2005). Esto no es un tecnicismo: en la práctica, la seguridad jurídica de la compra depende de que el inmueble esté correctamente identificado, que el derecho del vendedor esté debidamente registrado y que el estado jurídico del inmueble no esté afectado por gravámenes, anotaciones o conflictos que desnaturalicen el valor económico de la transacción.

Nuestro servicio de due diligence se estructura, primero, alrededor de la verificación robusta de la parcela y del título. Ello implica confirmar la identidad registral del inmueble y revisar el Certificado de Título, su coherencia con la realidad física y la cadena de titularidad, así como verificar que el vendedor es el titular registral o que posee facultades válidas para transferir. En términos operativos, el Registro de Títulos es la institución que custodia y procesa actuaciones vinculadas al estado jurídico de los inmuebles, y mantiene trámites y certificaciones que permiten establecer, con evidencia documental, la situación registral de un bien (Registro Inmobiliario, s. f.). En adición, existe una certificación específica para acreditar el estado jurídico del inmueble y la vigencia del duplicado del Certificado de Título, lo cual resulta particularmente útil cuando el comprador exige una constatación oficial del estatus registral antes de comprometer pagos significativos (Gobierno de la República Dominicana, s. f.).

Esta revisión no se limita a constatar “si hay título”. La diligencia debida examina si existen cargas y gravámenes susceptibles de afectar la compraventa, como hipotecas, embargos, anotaciones preventivas, servidumbres, restricciones registrales, o promesas previas que introduzcan riesgos de doble venta o de litigio. Dado que la Ley 108 05 contempla expresamente el registro de cargas y gravámenes y busca garantizar la legalidad de la mutación o afectación de derechos reales, la lectura crítica del expediente registral es un componente esencial de la gestión de riesgo (República Dominicana, Ley 108 05, 2005). En lenguaje empresarial, esto equivale a validar el “activo subyacente” antes de adquirirlo.

El segundo eje del servicio es la diligencia debida del vendedor o promotor, enfocada en su legitimación y capacidad jurídica para contratar. Cuando el vendedor es una sociedad, la revisión debe confirmar existencia, vigencia, órganos de representación y facultades del firmante a través del Registro Mercantil y los documentos corporativos pertinentes. Este paso, que con frecuencia se subestima, es determinante: un contrato firmado por una persona sin representación válida puede convertirse en un instrumento difícil de ejecutar, incluso si la narrativa comercial del proyecto es convincente. La diligencia debida, por tanto, actúa como un control de gobierno corporativo aplicado a la transacción, verificando que la voluntad contractual del vendedor esté jurídicamente bien formada y sea oponible.

El tercer componente, crítico en preventa, es la diligencia del proyecto y su ejecutabilidad regulatoria. Cuando “se va a empezar a construir ahora”, la compra deja de ser una adquisición de un inmueble terminado y pasa a ser, en gran medida, una exposición al riesgo de ejecución del promotor. En ese escenario, la debida diligencia revisa el paquete documental del proyecto y la disponibilidad de permisos o autorizaciones conforme aplique al tipo de obra y ubicación, y analiza si el cronograma y el esquema de pagos propuesto están alineados con hitos verificables y con condiciones suspensivas razonables. La intención no es burocratizar la compra, sino asegurar que el comprador no financie de forma desprotegida un proyecto cuyo avance no pueda medirse ni exigirse contractualmente.

Cuando el inmueble se enmarca en un régimen de condominio, la revisión añade un plano adicional de seguridad. La Ley 5038 sobre condominios regula la posibilidad de dividir la propiedad por unidades exclusivas y áreas comunes, y establece el régimen especial aplicable a ese tipo de inmuebles, lo que impacta la forma en que se constituye el proyecto, se registran derechos y se definen obligaciones de copropiedad (República Dominicana, Ley 5038, 1958). En términos prácticos, el comprador no solo adquiere una unidad, sino un paquete de derechos y obligaciones que deben estar correctamente articulados en la documentación del proyecto para evitar conflictos posteriores.

El cuarto eje del servicio, solicitado de manera recurrente por compradores internacionales, es la evaluación razonable de solvencia y capacidad de ejecución del vendedor o promotor. Conviene ser metodológicamente honestos: en el contexto dominicano, la disponibilidad de estados financieros auditados, información pública comparable o reportes crediticios corporativos estandarizados puede ser limitada. Por ello, nuestro enfoque no promete una auditoría financiera, sino una evaluación de fortaleza y capacidad operacional basada en evidencia documental aportada por el promotor, verificación de consistencia, y mitigación contractual del riesgo cuando la información sea incompleta. Este módulo suele incluir solicitud y análisis de documentación financiera disponible, certificaciones bancarias cuando proceda, identificación de estructura de financiamiento, revisión de proyectos ejecutados y en curso, y verificación razonable de contingencias relevantes. El resultado se expresa como un nivel de riesgo y confianza, acompañado de recomendaciones específicas para proteger el capital del comprador.

En esa línea, la ingeniería contractual se vuelve una herramienta de control de riesgo tan importante como el análisis registral. Un comprador en preventa debe negociar términos que traduzcan hallazgos de diligencia debida en protecciones reales: pagos contra avance comprobable, penalidades por incumplimiento, retenciones, condiciones suspensivas y, cuando sea viable, mecanismos de administración de fondos que reduzcan el riesgo de desvío. En el ordenamiento dominicano, la Ley 189 11 incorpora la figura del fideicomiso y crea un marco para impulsar el mercado hipotecario y estructuras fiduciarias que, bien diseñadas, pueden servir como arquitectura de protección en proyectos inmobiliarios (República Dominicana, Ley 189 11, 2011). Sin convertir cada operación en un proyecto financiero sofisticado, la debida diligencia responsable contempla estas herramientas cuando el perfil de riesgo lo justifica.

El entregable de nuestro servicio es un Informe de Diligencia Debida redactado con enfoque probatorio y ejecutivo. Ese informe integra los hallazgos registrales, corporativos y contractuales, identifica riesgos por categorías, y recomienda acciones concretas: desde subsanaciones previas al cierre hasta cláusulas que deben incorporarse o modificarse en la promesa de venta. Para clientes en Estados Unidos, este documento cumple una función adicional: sirve como evidencia de que la decisión de compra se adoptó con estándares comparables a un “legal due diligence” corporativo, lo cual es especialmente valioso cuando existen co inversionistas, asesores financieros o entidades bancarias revisando el expediente.

En síntesis, la due diligence inmobiliaria en la República Dominicana no es un gasto accesorio, sino una prima de control de riesgo. Su valor se mide por lo que evita: títulos defectuosos, cargas ocultas, vendedores sin legitimación, contratos desequilibrados, proyectos sin permisos suficientes o promotores cuya capacidad de ejecución no está demostrada. En un entorno donde la documentación puede ser abundante pero la verificación independiente es escasa, la diligencia debida convierte documentos en certezas y promesas en obligaciones exigibles. Nuestro bufete ofrece ese proceso con disciplina técnica, enfoque probatorio y un objetivo claro: que el cliente compre con seguridad jurídica, previsibilidad económica y mecanismos reales de protección.

~ C. Constantin Poindexter Salcedo, MA, JD, CPCU, MA2, AINS, AIS

Bibliografía

  • Gobierno de la República Dominicana. (s. f.). Certificación de estado jurídico del inmueble.
  • Registro Inmobiliario. (s. f.). Registro de Títulos.
  • República Dominicana. (1958). Ley 5038 sobre condominios.
  • República Dominicana. (2005). Ley 108 05 de Registro Inmobiliario.
  • República Dominicana. (2011). Ley 189 11 para el desarrollo del mercado hipotecario y el fideicomiso.

SIGNAL: Una plataforma segura para profesionales de inteligencia, contrainteligencia, y lo será aún más en la era cuántica

SIGNAL, inteligencia, espionaje, contrainteligencia, contraespionaje, ciber, ciberseguridad, espia, C. Constantin Poindexter Salcedo, DNI, J2, CNI

Signal bien merece su reputación en comunidades de inteligencia, contrainteligencia e investigación por una razón práctica. A mí me encanta, y a usted también le debería gustar. La herramienta fue diseñada partiendo de supuestos adversariales que se alinean con el targeting real de activos en el terreno. Esos supuestos incluyen recolección a nivel estatal, interceptación encubierta y muchas veces ilegal, compromiso del endpoint, robo de credenciales y retención masiva de datos por largo tiempo para explotación futura. Signal no es mensajería convencional a la que luego se le “añadió” seguridad. Es un conjunto integrado de protocolos para acuerdo de claves, evolución de claves por mensaje y recuperación tras compromiso, sustentado en especificaciones abiertas y un endurecimiento criptográfico continuo.

Desde la perspectiva de un profesional de inteligencia, Signal es convincente porque está diseñado para mantenerse resiliente incluso bajo fallas parciales. Si un atacante “gana una batalla” capturando una clave, clonando un dispositivo por un rato o grabando tráfico durante años, Signal busca evitar que esa victoria puntual se convierta en acceso estratégico y duradero. Ese modelo de contención del daño encaja con prioridades de contrainteligencia: limitar el radio de impacto, reducir el tiempo de permanencia del adversario y forzarle esfuerzos repetidos que aumentan la probabilidad de detección.

El Double Ratchet y las claves por mensaje que limitan el daño

En el centro de la confidencialidad de mensajes en Signal está el algoritmo Double Ratchet, diseñado por Trevor Perrin y Moxie Marlinspike (Perrin and Marlinspike, 2025). En términos operacionales, el Double Ratchet importa porque entrega propiedades que se alinean con la realidad del tradecraft.

La “forward secrecy” (secreto hacia adelante) asegura que comprometer una clave actual no revele el contenido de mensajes anteriores. Los adversarios, de manera rutinaria, recolectan ciphertext en volumen y luego buscan un punto único de apalancamiento para descifrar más adelante mediante incautación de dispositivos, acceso interno, malware o procesos legales. La forward secrecy frustra esa estrategia al garantizar que el tráfico capturado anteriormente no se convierta en una “cosecha” de inteligencia en el futuro si una clave se expone después (Perrin y Marlinspike, 2025).

La “post-compromise security” (recuperación tras intrusión) aborda un escenario que los practicantes de inteligencia planifican: el compromiso temporal de un dispositivo. Inspecciones fronterizas, robo oportunista, acceso coercitivo o un implante de corta duración pueden ocurrir. El Double Ratchet incluye actualizaciones periódicas de Diffie-Hellman que inyectan entropía fresca, mientras su ratchet simétrico deriva nuevas claves de mensaje de manera continua. Una vez termina la ventana de compromiso, las claves de mensajes posteriores se vuelven criptográficamente inalcanzables para el atacante, siempre que ya no mantenga persistencia en el endpoint (Perrin and Marlinspike, 2025). Esto no es mercadeo exagerado: es una evolución disciplinada de claves que priva a servicios de inteligencia adversarios y a espías corporativos del uso indefinido de material de claves robado.

Aquí la lógica de respuesta a incidentes cambia: un compromiso breve no implica automáticamente exposición permanente de todo el historial y el futuro. En cambio, el atacante debe sostener persistencia para conservar visibilidad. Eso eleva la carga operativa y aumenta el riesgo de detección.

X3DH y PQXDH: el giro contra “cosecha ahora, descifra después”

Históricamente, Signal utilizó X3DH (Extended Triple Diffie-Hellman) para el establecimiento asíncrono de sesiones, algo vital en entornos móviles donde los destinatarios suelen estar offline. X3DH emplea claves de identidad de largo plazo y prekeys firmadas para autenticación, preservando a la vez forward secrecy y propiedades de negabilidad (Marlinspike and Perrin, 2016).

El panorama de riesgo estratégico cambió con la plausibilidad de computación cuántica criptográficamente relevante. La amenaza no es solo el descifrado futuro en tiempo real; es el modelo “harvest now/decrypt later”: intercepción masiva hoy con la expectativa de que avances futuros, incluida la capacidad cuántica, permitan abrir tráfico almacenado. Signal respondió introduciendo PQXDH (“Post Quantum Extended Diffie Hellman”), reemplazando el setup de sesión por una construcción híbrida que combina Diffie-Hellman clásico de curva elíptica (X25519) y un mecanismo post-cuántico de encapsulación de claves derivado de CRYSTALS-Kyber (Signal, 2024a). La implicación operacional es directa: el adversario tendría que romper tanto el componente clásico como el componente postcuántico para reconstruir el secreto compartido (Signal, 2024a).

Este establecimiento híbrido refleja ingeniería conservadora, muy típica de entornos de alta amenaza: migrar temprano, evitar cortes bruscos y no depender de un único primitivo nuevo. Esto también importa porque el componente post-cuántico corresponde a lo que NIST estandarizó como ML-KEM, derivado de CRYSTALS-Kyber, en FIPS 203 (NIST, 2024a; NIST, 2024b). La estandarización del NIST no garantiza invulnerabilidad, pero sí aumenta la confianza en que el primitivo ha sido escrutado y está siendo adoptado como línea base para entornos de alta seguridad.

Signal, además, hace una aclaración crucial en sus materiales sobre PQXDH: PQXDH aporta forward secrecy post-cuántica, mientras que la autenticación mutua en la revisión actual permanece anclada en supuestos clásicos (Signal, 2024b). Para los practicantes, esa precisión es valiosa porque define exactamente qué es post-cuántico hoy y qué no.

SPQR y el ratcheting poscuántico para operaciones de larga duración

El establecimiento de sesión es solo una parte del problema del ciclo de vida. Un recolector capaz puede grabar tráfico por periodos prolongados. Si la capacidad cuántica aparece más adelante, la pregunta es si la evolución continua de claves sigue siendo segura contra descifrado futuro. La introducción por parte de Signal del Sparse Post Quantum Ratchet (SPQR) atiende esa continuidad al añadir resiliencia postcuántica al mecanismo de ratcheting en sí (Signal, 2025).

SPQR extiende el protocolo para que no solo el handshake inicial, sino también las actualizaciones posteriores de claves, incorporen propiedades resistentes a cuántica, preservando forward secrecy y post-compromise security (Signal, 2025). Para profesionales de inteligencia esto es determinante, porque las relaciones operacionales suelen ser de largo aliento: activos y handlers, fuentes de investigación y coordinación entre equipos pueden durar meses o años. Un protocolo que solo endurece el handshake ayuda, pero uno que endurece el rekeying continuo encaja mejor con el modelo adversarial real de recolección persistente.

Trabajo académico ha analizado la evolución de X3DH a PQXDH dentro del movimiento de Signal hacia seguridad post-cuántica y enmarca PQXDH como mitigación del riesgo “cosecha ahora, descifra después” a escala (Katsumata et al., 2025). Ese enfoque cuadra con la gestión de riesgos en inteligencia: la confidencialidad se evalúa frente a adversarios pacientes, bien financiados y con horizonte estratégico.

Análisis formal, especificaciones abiertas y por qué esto importa operativamente

El practicante debe ser escéptico ante afirmaciones de seguridad que no soporten revisión externa. La suite de protocolos de Signal se beneficia de especificaciones públicas y escrutinio criptográfico sostenido. Un análisis formal ampliamente citado modela las propiedades de seguridad centrales del protocolo y examina en detalle su diseño basado en ratchets (Cohn Gordon et al., 2017). Ningún protocolo está “probado” contra cada modo de falla del mundo real. Sin embargo, métodos formales y análisis revisados por pares reducen la probabilidad de que debilidades estructurales permanezcan ocultas. Operacionalmente, esto se traduce en confiabilidad: cuando usted depende de una herramienta para trabajo sensible, evalúa si las afirmaciones son verificables, si los modos de falla están documentados y si las mejoras pueden validarse.

Metadatos, “Sealed Sender” y el rol del tradecraft

La confidencialidad del contenido es solo una parte de la seguridad en inteligencia. Los metadatos pueden ser decisivos: quién habla con quién, cuándo y con qué frecuencia puede producir inferencias dañinas. Sealed Sender de Signal fue diseñado para reducir la información del remitente visible al servicio durante la entrega del mensaje (Wired Staff, 2018). Investigación académica examina Sealed Sender y propone mejoras, además de discutir metadatos a nivel de red como la exposición de direcciones IP y las implicaciones para herramientas de anonimato (Martiny et al., 2021). Otro trabajo discute riesgos de análisis de tráfico que pueden persistir en entornos de grupos incluso cuando la identidad del remitente se oculta parcialmente (Brigham and Hopper, 2023).

La conclusión para el operador es clara: Signal mejora de manera material la seguridad del contenido y reduce ciertas exposiciones de metadatos. No elimina la necesidad de medidas de seguridad operacional. Dependiendo del perfil de misión, esas medidas pueden incluir endpoints endurecidos, manejo estricto de dispositivos, minimización de exposición de identificadores y protecciones de red consistentes con la ley y la política aplicables.

Por qué la trayectoria de SIGNAL es creíble en la transición cuántica

El enfoque de Signal hacia la transición cuántica refleja una postura de ingeniería creíble: migrar lo suficientemente temprano para amortiguar el riesgo “cosecha ahora, descifra después”; adoptar diseños híbridos para reducir la dependencia de un sólo supuesto; y extender garantías postcuánticas más allá del handshake hacia la evolución continua de claves (Signal, 2024a; Signal, 2025). La alineación con la dirección estandarizada por NIST para el establecimiento de claves también apoya la mantenibilidad a largo plazo y la interoperabilidad del ecosistema (NIST, 2024a; NIST, 2025). Desde la perspectiva de un practicante de inteligencia, el argumento central no es que Signal sea irrompible. El punto es que Signal está diseñado para limitar el daño, recuperarse tras un compromiso y anticipar amenazas estratégicas de descifrado. Está construido para un entorno hostil que se mueve hacia una realidad postcuántica.

Y lo digo sin rodeos ni disparates, Meta no hace nada de esto. FB Messenger y WhatsApp dejan huecos graves en la ciberseguridad porque el enfoque de Meta es la monetización del mecanismo de mensajería, no comunicaciones verdaderamente “a prueba” de adversarios. Úselos bajo su propio riesgo.

~ C. Constantin Poindexter, MA en Inteligencia, Certificado de Posgrado en Contrainteligencia, JD, certificación CISA/NCISS OSINT, certificación DoD/DoS BFFOC

Bibliografía

  • Brigham, Eric, and Nicholas Hopper. 2023. “Poster: No Safety in Numbers: Traffic Analysis of Sealed Sender Groups in Signal.” arXiv preprint.
  • Cohn Gordon, Katriel, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. 2017. “A Formal Security Analysis of the Signal Messaging Protocol.” Proceedings of the IEEE European Symposium on Security and Privacy.
  • Katsumata, Shota, et al. 2025. “X3DH, PQXDH to Fully Post Quantum with Deniable Ring.” Proceedings of the USENIX Security Symposium.
  • Marlinspike, Moxie, and Trevor Perrin. 2016. “The X3DH Key Agreement Protocol.” Signal Protocol Specification.
  • National Institute of Standards and Technology. 2024a. “NIST Releases First 3 Finalized Post Quantum Encryption Standards.” NIST News Release.
  • National Institute of Standards and Technology. 2024b. FIPS 203. “Module Lattice Based Key Encapsulation Mechanism Standard, ML KEM.” U.S. Department of Commerce.
  • National Institute of Standards and Technology. 2025. “Post Quantum Cryptography Standardization.” NIST Computer Security Resource Center.
  • Perrin, Trevor, and Moxie Marlinspike. 2025. “The Double Ratchet Algorithm.” Signal Protocol Specification.
  • Signal. 2024a. “Quantum Resistance and the Signal Protocol.” Signal Blog.
  • Signal. 2024b. “The PQXDH Key Agreement Protocol.” Signal Protocol Specification.
  • Signal. 2025. “Signal Protocol and Post Quantum Ratchets, SPQR.” Signal Blog.
  • Wired Staff. 2018. “Signal Has a Clever New Way to Shield Your Identity.” Wired Magazine.

2026 Surety Company Demand Drivers: Data Center and Power Infrastructure Projects

data centers, construction, surety, surety bond, surety bonds, surety one, suretyone.com, Janus Assurance Re, C. Constantin Poindexter

Predictions of rising surety capacity demand in 2026 are often described as a general consequence of higher infrastructure spending. That explanation is largely accurate, but it understates the specific mechanism most likely to shape surety markets in 2026. The sharper, more decision-useful view is that the data center construction cycle, paired with the surge in energy and grid work required to power those facilities, is creating a two-stage construction pipeline that expands bonded volume, increases average contract size, and raises the importance of contractor prequalification. In short, more data centers mean more power projects, and that combined workload is positioned to pull more surety capacity into the market in 2026. The data center boom and power appetite will affect surety companies significantly.

The ‘data center story’ matters for surety companies because it converts digital demand into physical, schedule-critical construction. Data centers are capital-intensive, equipment-dependent, and commissioning-sensitive assets. Their owners typically face time commitments to customers and revenue penalties for delayed delivery. That pushes owners, lenders, and counterparties toward risk transfer tools that reduce completion uncertainty, including performance and payment bonds. As the number of projects rises and as their scopes broaden, the surety market sees both higher bond counts and higher aggregate exposure.

Electric load growth is the most direct indicator that the pipeline will remain active. The U.S. Energy Information Administration’s January 2026 Short Term Energy Outlook anticipates continued growth in electricity consumption and highlights data centers as a key contributor to demand growth through 2027 (U.S. Energy Information Administration 2026a; U.S. Energy Information Administration 2026b). For surety markets, this is not merely a macroeconomic footnote. Rising load implies that energy infrastructure must be accelerated, which means new contracting opportunities that frequently come with bonding requirements. When owners and utilities confront tight timelines and high outage sensitivity, they tend to prefer contractors with strong balance sheets and proven delivery histories, which increases the value of surety prequalification and, simultaneously, increases the pull on available surety capacity for qualified firms.

Federal research and energy authorities have also quantified how significantly data centers could reshape U.S. electricity demand. The U.S. Department of Energy, citing Lawrence Berkeley National Laboratory’s 2024 work, reports that data centers used roughly 4.4 percent of U.S. electricity in 2023 and could reach approximately 6.7 percent to 12 percent by 2028. The same discussion estimates data center electricity use rising from about 176 terawatt hours in 2023 to a range of roughly 325 to 580 terawatt hours by 2028 (U.S. Department of Energy 2024). These ranges signal a structural shift rather than incremental growth. If load rises toward the upper end, the scale of new generation, grid reinforcement, and interconnection work increases accordingly. Each of those categories tends to be delivered through large, multi-contractor contracting structures where owners and financiers frequently require bonding.

Commercial market research is consistent with that trajectory and provides near term context. S&P Global, summarizing 451 Research, has projected U.S. data center demand rising to around 75.8 gigawatts in 2026 and continuing upward afterward (Hering and Dlin 2025). In parallel, JLL’s 2026 outlook describes a construction supercycle and anticipates large additions in global data center capacity between 2026 and 2030, while also emphasizing construction cost escalation and the increasing use of onsite power and storage solutions (JLL 2025). For surety markets, the implication is straightforward: larger and more complex projects, delivered faster, tend to increase the use of bonds as a contractual safeguard, particularly where lenders want standardized completion security.

Here the “power appetite” element becomes decisive for my title statement. The surety effect is not limited to the data center buildings themselves. The more consequential driver for 2026 surety markets is that data center growth forces the construction of enabling energy assets outside the data center footprint. Those assets often include substations, transmission and distribution upgrades, utility interconnections, grid hardening, generation additions, utility scale storage, fuel supply tie-ins for thermal generation, and behind-the-meter microgrid solutions. Many of these projects face long equipment lead times, tight outage windows, right-of-way constraints, and regulatory milestones. Complexity and mission criticality increase the owner’s preference for bonding on the prime contract and sometimes for subcontractor bonding as well.

Contracting norms reinforce why surety demand rises as contract values rise. On federal construction, standard clauses generally require performance and payment bonds at 100 percent of the original contract price, with additional coverage needed if the contract price increases (Federal Acquisition Regulation 2026). Public works contracting also rests on the broader statutory framework requiring bonds for federal public buildings or public works (40 U.S.C. § 3131 2025). Even when data centers are privately financed, lenders frequently adopt bond requirements that mirror public sector practices because the economic consequences of nonperformance are severe. Also, our traditional bond forms and underwriting practices provide a familiar discipline.

The infrastructure spending environment remains relevant, but as a foundation rather than the marginal driver in this specific narrative. Federal reporting on IIJA funding status indicates continued movement from enacted funding to obligations and outlays, supporting a sustained baseline of public construction activity (U.S. Department of Transportation 2025). Industry reporting entering 2026 similarly points to durable construction demand while highlighting constraints such as labor availability, cost volatility, and schedule pressure (Construction Dive 2026). The key point for your title, however, is that data centers magnify the infrastructure baseline by adding a privately anchored project type that nevertheless pulls in large volumes of utility and grid work, often in the same regions and time windows. That coupling pushes surety markets in two ways: it increases total bonded work, and it concentrates demand in specialized contractor classes, especially electrical, power, and high-end mechanical trades.

Surety capacity demand in 2026 rises not only because there are more projects, but because the average risk profile and scope complexity both increase. Data center delivery depends on high-performance mechanical, electrical, and plumbing integration, plus commissioning and energization milestones that are intolerant of delay to the EXTREME. Energy projects that serve data centers add further interface risk between utilities, EPC firms, specialty subcontractors, and permitting authorities. As complexity rises, owners prefer contractors with stronger financials and deeper experience. That has two market effects. First, stronger contractors may require larger single job limits and higher aggregate programs to support expanding backlogs. Second, weaker or newer contractors may face tighter underwriting, higher collateral requirements, or reduced limits. The result is an overall rise in capacity demand, paired with more selective capacity allocation.

The global market context suggests that surety remains a growth segment, but not in an evenly distributed way. Broker market commentary continues to characterize surety as expanding, while also noting that underwriting discipline and loss experience affect where capacity is deployed and at what price (Aon 2025). Trade association and international surety company executive sentiment similarly reflect growth expectations while acknowledging performance pressures that can influence underwriting posture (International Credit Insurance and Surety Association 2025). For 2026, the implication is that surety markets may have ample aggregate capacity, yet will experience localized tightening in contractor classes or regions most exposed to data center and power project clustering.

To give some memorable perspective without undermining my academic rigor here, I’ll offer a metaphor. The 2026 data center wave is like opening a chain of all-night diners for a neighborhood of professional athletes. The diners are the data centers, but the real scramble is securing the supply chain of groceries, kitchens, and delivery trucks that keep them fed. In construction terms, the “groceries” are megawatts, substations, and interconnections. When the diners multiply, the supply chain projects multiply too. Sureties can get REALLY busy REALLY quickly, because more parties insist on guarantees that dinner will be served perfectly to picky diners and on time.

My point is supported by the causal chain observed in public forecasts and market outlooks. Data center construction growth is increasing electricity demand. Rising electricity demand is pulling forward grid and generation investment. Those projects, in turn, typically involve large contracts, complex scopes, and schedule-critical delivery that increases the use of performance and payment bonds. The combined effect in 2026 means higher surety capacity demand and more consequential surety market dynamics, particularly around limits, aggregates, and underwriting selectivity. Data centers and the power appetite of those centers will affect surety companies. This is not merely another construction category to take lightly. They are a load-driven construction engine that brings its own power infrastructure ecosystem, and that ecosystem is precisely what is poised to pressure and expand surety markets in 2026.

~ C. Constantin Poindexter, MA, JD, CPCU, AFSB, ASLI, ARe, AINS, AIS

Bibliography

  • Aon. 2025. 2025 Global Construction Insurance and Surety Market Report. Aon.
  • Construction Dive. 2026. “5 Construction Trends to Watch in 2026.” Construction Dive. January 2026.
  • Federal Acquisition Regulation. 2026. “52.228 15 Performance and Payment Bonds Construction.” Acquisition.gov.
  • Hering, Garrett, and Susan Dlin. 2025. “Data Center Grid Power Demand to Rise 22% in 2025, Nearly Triple by 2030.” S&P Global Commodity Insights. October 14, 2025.
  • International Credit Insurance and Surety Association. 2025. “ICISA Publishes 2025 Business Sentiment Report.” ICISA. November 3, 2025.
  • JLL. 2025. 2026 Global Data Center Outlook. Jones Lang LaSalle. January 2026.
  • U.S. Department of Energy. 2024. “DOE Releases New Report Evaluating Increase in Electricity Demand from Data Centers.” U.S. Department of Energy. December 20, 2024.
  • U.S. Department of Transportation. 2025. “Infrastructure Investment and Jobs Act Funding Status as of September 30, 2025.” U.S. Department of Transportation.
  • U.S. Energy Information Administration. 2026a. “Short Term Energy Outlook January 2026.” U.S. EIA. January 2026.
  • U.S. Energy Information Administration. 2026b. “EIA Forecasts Strongest Four Year Growth in U.S. Electricity Demand Since 2000.” U.S. EIA Press Release. January 13, 2026.
  • United States. 2025. “40 U.S.C. § 3131 Bonds of Contractors of Public Buildings or Public Works.” United States Code.

SIGNAL Secure for Intelligence Practitioners and will be for the Quantum Era

SIGNAL, intelligence, counterintelligence, spy, espionage, counterespionage, cyber security, C. Constantin Poindexter

Signal has earned its reputation in intelligence, counterintelligence, and investigative communities for a practical reason. I love it and you should too! The tool was engineered around adversarial assumptions that align with real-world asset targeting. Those assumptions include state-grade collection, cover and often illegal interception, endpoint compromise, credential theft, and long-term bulk retention for future exploitation. Signal is not conventional messaging with security added afterward. It is an integrated protocol suite for key agreement, per-message key evolution, and compromise recovery, supported by open specifications and sustained cryptographic hardening.

From an intelligence professional’s perspective, Signal is compelling because it is designed to remain resilient under partial failure. If an attacker wins a battle by capturing a key, briefly cloning a device, or recording traffic for years, Signal aims to prevent that single win from turning into durable, strategic access. This damage containment model aligns with counterintelligence priorities. Limit the blast radius, shorten adversary dwell time, and force repeated effort that increases the chance of detection.

The Double Ratchet and Per-Message Keys That Constrain Damage

At the core of Signal message confidentiality is the Double Ratchet algorithm, designed by Trevor Perrin and Moxie Marlinspike (Perrin and Marlinspike, 2025). Operationally, the Double Ratchet matters because it delivers properties that align with intelligence tradecraft realities.

Forward secrecy ensures that compromising a current key does not reveal prior message content. Adversaries routinely collect ciphertext in bulk and then hunt for a single point of decryption leverage later through device seizure, insider access, malware, or legal process. Forward secrecy frustrates that strategy by ensuring earlier captured traffic does not become a later intelligence windfall if a key is exposed at some later time (Perrin and Marlinspike, 2025).

Post-compromise security (“break-in recovery”) addresses a scenario intelligence practitioners plan for temporary device compromise. Border inspections, opportunistic theft, coercive access, or a short-lived implant can occur. The Double Ratchet includes periodic Diffie-Hellman updates that inject fresh entropy, while its symmetric ratchet derives new message keys continuously. Once the compromised window ends, later message keys become cryptographically unreachable to the attacker, provided the attacker is no longer persistently on the endpoint (Perrin and Marlinspike, 2025). This is not an exaggerated marketing claim. It is a disciplined key evolution that deprives the adversarial FIS and corporate spies of indefinite reuse of stolen key material.

Incident response logic has a new paradigm. A single brief compromise does not automatically mean permanent exposure of the entire history and future. Instead, the attacker must maintain persistence to retain visibility. That is a higher operational burden and a higher detection risk.

X3DH and PQXDH and the Move Against Harvest Now Decrypt Later

Signal historically used X3DH, Extended Triple Diffie-Hellman, for asynchronous session establishment. This is vital in mobile environments where recipients are often offline. X3DH uses long-term identity keys and signed prekeys for authentication while preserving forward secrecy and deniability properties (Marlinspike and Perrin, 2016). The strategic risk landscape shifted with the plausibility of cryptographically relevant quantum computing. The threat is not only future real-time decryption. It is harvest now/decrypt later. Bulk interception today is strategic, with the expectation that future breakthroughs, including quantum, could unlock stored traffic. Signal responded by introducing PQXDH, “Post Quantum Extended Diffie Hellman”, replacing the session setup with a hybrid construction that combines classical elliptic curve Diffie-Hellman using X25519 and a post quantum key encapsulation mechanism derived from CRYSTALS Kyber (Signal, 2024a). The operational implication is direct. An adversary would need to break both the classical and the post-quantum components to reconstruct the shared secret (Signal, 2024a).

Hybrid key establishment reflects conservative intelligence engineering. Migrate early, avoid sudden cutovers, and reduce reliance on a single new primitive. This also matters because the post-quantum component corresponds to what NIST standardized as ML KEM, derived from CRYSTALS Kyber, in FIPS 203 (NIST, 2024a; NIST, 2024b). NIST standardization does not guarantee invulnerability. It does increase confidence that the primitive has been scrutinized and is being adopted as a baseline for high assurance environments.

Signal also makes an important clarity point in its PQXDH materials. PQXDH provides post-quantum forward secrecy, while mutual authentication in the current revision remains anchored in classical assumptions (Signal, 2024b). Practitioners benefit from that precision because it defines exactly what is post-quantum today.

SPQR and Post Quantum Ratcheting for Long-Lived Operations

Session establishment is only one part of the lifecycle problem. A capable collector can record traffic for long periods. If quantum capabilities emerge later, the question becomes whether ongoing key evolution remains safe against future decryption. Signal’s introduction of the Sparse Post Quantum Ratchet, SPQR, directly addresses continuity by adding post-quantum resilience to the ratcheting mechanism itself (Signal, 2025).

SPQR extends the protocol so that not only the initial handshake but also later key updates gain quantum-resistant properties, while preserving forward secrecy and post-compromise security (Signal, 2025). For intelligence practitioners, this matters because long-lived operational relationships are common. Assets, handlers, investigative sources, and inter-team coordination can persist for months or years. A protocol that hardens only the handshake helps. A protocol that hardens ongoing rekeying is more aligned with the real adversary model of persistent collection.

Academic work has analyzed the evolution from X3DH to PQXDH in the context of Signal move toward post-quantum security and frames PQXDH as mitigation against harvest now decrypt later risk at scale (Katsumata et al., 2025). That framing fits intelligence risk management. Confidentiality is evaluated against patient, well-resourced adversaries.

Formal Analysis and Open Specifications and Why That Matters Operationally

Practitioners should be skeptical of security claims that cannot withstand external review. Signal protocol suite benefits from public specifications and sustained cryptographic scrutiny. A widely cited formal analysis models the protocol’s core security properties and examines its ratchet-based design in detail (Cohn Gordon et al., 2017). No protocol is proven secure against every real-world failure mode. Formal methods and peer-reviewed analysis reduce the chance that structural weaknesses remain hidden. Operationally, this supports reliability. When you rely on a tool for sensitive work, you evaluate whether the claims are testable, whether failure modes are documented, and whether improvements can be validated.

Metadata Constraints and Sealed Sender and the Role of Tradecraft

Message content confidentiality is only part of intelligence security. Metadata can be operationally decisive. Who communicates with whom, when, and how often can create damaging inferences. Signal Sealed Sender was designed to reduce sender information visible to the service during message delivery (Wired Staff, 2018). Research examines Sealed Sender and proposes improvements while discussing network-level metadata such as IP address exposure and the implications for anonymity tooling (Martiny et al., 2021). Additional academic work discusses traffic analysis risks that can persist in group settings even when sender identity is partially obscured (Brigham and Hopper, 2023).

The intelligence operator’s takeaway is that Signal materially improves content security and reduces certain metadata exposures. It does not eliminate the need for operational security measures. Depending on mission profile, those measures can include hardened endpoints, strict device handling, minimized identifier exposure, and network protections consistent with applicable law and policy.

Why Signal Trajectory Is Credible in the Quantum Transition

The Signal approach to the quantum transition reflects a credible engineering posture. Migrate early enough to blunt harvest now/decrypt later risk. Adopt hybrid designs to reduce reliance on one assumption. Extend post-quantum guarantees beyond the handshake into ongoing key evolution (Signal, 2024a; Signal, 2025). Alignment with NIST standardized direction for key establishment further supports long-term maintainability and ecosystem interoperability (NIST, 2024a; NIST, 2025). From an intelligence practitioner’s perspective, the central claim is not that Signal is unbreakable. The point is that Signal is engineered to constrain damage, recover after compromise, and anticipate strategic decryption threats. It is designed for a hostile environment that is moving toward post-quantum reality. I will state at the end here that Meta does not do any of this. FB messenger and WhatsApp leave gaping holes in cybersecurity as Meta’s focus is on monetization of the I.M. mechanism, not unbreakable coms. Use them at your own risk.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

Bibliography

  • Brigham, Eric, and Nicholas Hopper. 2023. “Poster: No Safety in Numbers: Traffic Analysis of Sealed Sender Groups in Signal.” arXiv preprint.
  • Cohn Gordon, Katriel, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. 2017. “A Formal Security Analysis of the Signal Messaging Protocol.” Proceedings of the IEEE European Symposium on Security and Privacy.
  • Katsumata, Shota, et al. 2025. “X3DH, PQXDH to Fully Post Quantum with Deniable Ring.” Proceedings of the USENIX Security Symposium.
  • Marlinspike, Moxie, and Trevor Perrin. 2016. “The X3DH Key Agreement Protocol.” Signal Protocol Specification.
  • National Institute of Standards and Technology. 2024a. “NIST Releases First 3 Finalized Post Quantum Encryption Standards.” NIST News Release.
  • National Institute of Standards and Technology. 2024b. FIPS 203. “Module Lattice Based Key Encapsulation Mechanism Standard, ML KEM.” U.S. Department of Commerce.
  • National Institute of Standards and Technology. 2025. “Post Quantum Cryptography Standardization.” NIST Computer Security Resource Center.
  • Perrin, Trevor, and Moxie Marlinspike. 2025. “The Double Ratchet Algorithm.” Signal Protocol Specification.
  • Signal. 2024a. “Quantum Resistance and the Signal Protocol.” Signal Blog.
  • Signal. 2024b. “The PQXDH Key Agreement Protocol.” Signal Protocol Specification.
  • Signal. 2025. “Signal Protocol and Post Quantum Ratchets, SPQR.” Signal Blog.
  • Wired Staff. 2018. “Signal Has a Clever New Way to Shield Your Identity.” Wired Magazine.

SuretyBind, a Competitor Owned Surety Data Platform? Mmmmm, . . . not so sure about that.

surety, surety bond, surety bonds, suretyone.com, surety one, Janus Assurance Re, C. Constantin Poindexter;

A Competitor-Owned Surety Data Platform Is a Strategic and Counterintelligence Hazard

On December 8, 2025, Chubb, The Hartford, Liberty Mutual, and Travelers announced the formation of SuretyBind, LLC, a technology company intended to provide a shared digital infrastructure to advance the surety industry (PR Newswire 2025; SuretyBind 2025; Carrier Management 2025). Public materials identify two initial priorities: a data transmission platform to connect sureties, brokers, and other participants in order to reduce duplicative data entry and improve data quality (PR Newswire 2025; SuretyBind 2025), and secondarily, leadership and technology to drive digital bond execution, improve verification, and reduce fraud. Services are expected in 2027 (PR Newswire 2025; SuretyBind 2025). The same announcement adds a sentence that should concern any serious surety executive. It states that all SuretyBind activities are conducted under “strict antitrust supervision” (PR Newswire 2025; SuretyBind 2025).

I am pondering this from the standpoint of an ex-counterintelligence operator in the U.S. I.C., so this is going to be a bit technical, but I’ll try to keep out of the woods here. In competitive industries, shared infrastructure is frequently a precondition for avoidable compromise because it concentrates sensitive operational signals, creates asymmetric incentives, and widens the attack surface. In surety, underwriting edge is built from proprietary loss experience, contractor behavior signals, i.e., known red flags to a particular surety, claims handling patterns, indemnity enforcement outcomes, and relationship intelligence. Placing any portion of the workflow on a platform co-owned by direct competitors creates structural incentives and technical pathways for abuse or worse, conspiratorial market monopolization. Even if every participant acts in good faith, the platform becomes a high-value collection point for penetration. A single breach, insider compromise, governance failure, or gradual expansion of scope can expose trade secrets and reshape market dynamics.

What the public reporting says and what it does not

The best sourced reporting largely recirculates the same core statement. PR Newswire published the launch release on December 8, 2025 (PR Newswire 2025). SuretyBind’s own press page mirrors the same language and repeats the strict antitrust supervision claim without explaining its mechanics (SuretyBind 2025). Carrier Management adds an operational detail that is material for risk analysis. A SuretyBind representative said the four sureties funded the company and will be co-owners. Carrier Management also reported that the owners will not be providing personnel to the technology company, while still participating in an advisory capacity and ultimately becoming users of the platform (Carrier Management 2025). The Insurer also reported the formation, but provides limited additional substance in the portion broadly accessible (The Insurer 2025). That thin public record is itself a risk signal. A competitor-owned platform can be built safely only with explicit and auditable commitments on data boundaries, governance controls, technical segregation, and enforceable sanctions. The public materials provide none of that detail, while asking the market to trust the platform with sensitive traffic. In other words, the interested parties’ narrative emphasizes benefits while omitting the control framework that would allow counterparties to evaluate and judge the true risk.

“Strict antitrust supervision” is not a reassuring

The phrase appears to be self-described, not a reference to a defined government oversight program. The announcement does not cite a consent decree, a published monitor, a public compliance protocol, a set of scope limitations, or enforcement triggers (PR Newswire 2025; SuretyBind 2025). In ordinary United States practice, antitrust agencies do not supervise day-to-day commercial conduct of a private joint venture absent a litigation resolution, order, or decree. Where companies seek agency feedback in advance, they may pursue structured options, however, that is not equivalent to continuous supervision. Actually, continuous supervision does not transform a risky design into a safe one either.

The current antitrust environment also matters. On December 11, 2024, the Federal Trade Commission and the Department of Justice withdrew the 2000 Antitrust Guidelines for Collaborations Among Competitors, stating that the guidelines no longer provide reliable guidance and emphasizing case-by-case enforcement (FTC 2024; FTC and DOJ 2024). This shift increases uncertainty around competitor collaboration structures and heightens the need for precise internal controls rather than reliance on generic comfort language. Compliance programs must be designed for effectiveness, monitoring, and documentation. The Department of Justice Antitrust Division has also emphasized evaluation of compliance programs and their effectiveness in criminal antitrust investigations (DOJ Antitrust Division 2024).

From a counterintelligence guy’s view, antitrust is only one layer. A platform that aggregates competitor adjacent operational data flows can enable tacit coordination, whether intentional or not, by increasing market transparency around demand patterns, submission characteristics, broker behaviors, and execution timing. Even without explicit exchange of pricing (a definitive invitation for litigation or prosecution) granular operational signals can reduce uncertainty and soften competition.

The surety-specific danger is that operational data becomes underwriting intelligence

Some advocates may argue that the platform only transmits administrative data. In surety, that distinction is simply illusory. A data transmission platform that reduces duplicative entry implies common schemas, common routing, and shared pipes across sureties, brokers, and other parties (PR Newswire 2025; SuretyBind 2025). Even if each surety maintains its own decisioning, several categories of intelligence can leak through metadata, workflow patterns, or integrations. Ponder these. Appetite inference. Which submissions are accepted into workflow, how fast they are processed, and what documentation is demanded can reveal risk tolerance by class, geography, contractor size, or obligee type. Surety broker and channel intelligence. Submission frequency, conversion rates, and timing reveal who controls deal flow and how competitors prioritize relationships. Loss cost signals. Even without explicit loss runs, claim-related workflow events, verification anomalies, amendment frequency, and execution delays can correlate with adverse development and portfolio stress. Process fingerprints. Digital execution embeds rules. Who requires what, when indemnity is tightened, when collateral is requested, and what exceptions are escalated are not merely operational details. They are strategic posture.

The eight-hundred-pound gorilla in the room? Over time, data quality advantages become modeling advantages. A shared system standardizes the collection of variables that eventually become features in predictive analytics. Whoever influences the schema, sees its evolution, or observes which optional fields others request learns what competitors believe matters, and can calibrate their own strategies accordingly. The risk is not only an overt breach. It is a gradual normalization of shared visibility that erodes differentiation.

Digital execution and fraud reduction goals can be achieved without competitor-owned intelligence exposure

The industry’s fraud and verification concerns are real. Industry materials, including NASBP resources, describe persistent problems of fraudulent bonds and emphasize verification as a core control (NASBP 2024). The workflow is fragmented, and obligees often verify bonds through manual steps or portal checks, which creates latency and inconsistency. Improving verification and reducing fraud is a legitimate objective that could benefit the market (PR Newswire 2025; SuretyBind 2025). However, governance and ownership models are not incidental. NASBP and RiskStream Collaborative have described digitizing the surety bond ecosystem through workflow standardization and stakeholder coordination (NASBP and RiskStream 2025). That goal does not logically require a competitor-owned central platform that becomes the market’s operational nervous system. The industry can pursue interoperability standards, verification registries, and secure execution rails in ways that compartmentalize each surety’s proprietary underwriting and claims intelligence. Of course, being the surety world’s “operational nervous system” may be the entire point. I’ll leave that one and its ramifications for you to ponder, especially those carriers that will not use the platform.

A threat model for participation

If I were advising a surety carrier evaluating participation, I would treat the platform as a high-threat environment even if the stated intent is benign. The incentives are asymmetric, and the attack surface is large, . . . huge counterintelligence concerns in more than just the insurance sector. Competitor collection risk arises when competitors can shape platform features, influence schema, participate in advisory structures, or obtain privileged visibility into operational telemetry. Insider threat risk grows because platform employees and contractors can access logs, routing rules, support tickets, and integration configurations, any of which can reveal proprietary posture. Supply chain risk rises because shared infrastructure tends to accumulate dependencies, and one compromised vendor can expose all participants. Design spillover risk is persistent because once multi party rails exist, there is continuous pressure to add analytics, benchmarking, fraud scoring, and dashboards, each framed as helpful, each capable of crossing the line into competitive intelligence. Finally, regulatory and litigation discovery risk expands because centralized logs and shared repositories become new targets for subpoenas and discovery demands.

What can surety companies do to protect proprietary underwriting and claims intelligence?

Participation should be conditioned on controls that are technical, contractual, and governance-based, designed for non-trust operation. Trust is not a control. So what to do?

Data minimization must be an enforced technical requirement. Only transmit fields strictly necessary for a defined transaction. Underwriting conclusions, internal risk grades, pricing logic, claim narratives, indemnity enforcement outcomes, and loss development artifacts should be prohibited by design and validated automatically against a published data dictionary. This is the surety equivalent of compartmentation, a well-known practice in the intelligence field.

Tenant isolation and clean room architecture are imperative. If the platform evolves beyond simple message passing, there must be cryptographic and architectural isolation with separate keys, separate storage, separate processors, strict access controls, and provable segmentation. Controls should align to recognized baselines such as NIST SP 800 53 Rev 5 for access control, audit logging, and system integrity (NIST 2020).

Immutable and independently reviewable auditability must be assured. All access to production data and logs should be recorded in a tamper-evident manner and reviewable by each participant, with thresholds for alerting and independent oversight. Require third-party security assessments and continuous monitoring aligned to recognized governance frameworks such as the NIST Cybersecurity Framework 2.0 (NIST 2024).

Governance designed to prevent competitor capture must be rigorous. A board with one seat per owner can institutionalize competitor influence rather than mitigate it. Demand an independent data governance body with veto power over schema changes, analytics features, and any cross-tenant functionality. A “one seat per JV participant” would be highly attractive to parties seeking to engage in behavior specifically prohibited by antitrust laws. Require formal change control with notice, impact analysis, and opt-out rights. Enforce purpose limitation at the governance layer so the platform cannot evolve into an intelligence lake by incremental decisions.

Antitrust compliance that is operationally real, if such a thing is even possible among the biggest players in an extreme niche sector. Given the shift to case-by-case scrutiny and the withdrawal of prior collaboration guidelines, antitrust must be treated as an ongoing operational risk, not a meaningless annual training module (FTC 2024; FTC and DOJ 2024). Implement monitored governance communications, documented escalation paths, and clear prohibitions on competitively sensitive exchanges. Use DOJ Antitrust Division compliance expectations as the reference model for program design and effectiveness testing (DOJ Antitrust Division 2024).

Contractual non-use and trade secret remedies with teeth. Simple non-disclosure will not work. Contracts should include purpose limitation, non-use clauses that prohibit competitive use, model training, and benchmarking, strong audit rights, rapid incident disclosure duties, and immediate injunctive relief triggers. Meaningful sanctions and termination rights for non-compliance must be built in. If the platform is essential to business operations, remedies that are practical and swift can serve as a deterrent.

Restrictions on personnel mixing and advisory interfaces are also important controls. The reporting that owners will not provide personnel is appropriate and should be preserved (Carrier Management 2025). Carrier participants must ban secondments of surety underwriters, claims staff, and analytics personnel into the platform operator. Advisory structures must be tightly scoped and closely monitored, as working groups can easily become informal intelligence exchanges.

All schemas and workflow rules must be viewed as highly sensitive. Even if no explicit loss data is stored, schema evolution can reveal competitive strategy. Any new data element must be justified as necessary for execution or verification and reviewed for competitive sensitivity. Red lines must include prohibition of any feature that compares participants or infers any market posture.

The structure must provide an exit capability and assume that a breach is inevitable. A robust counterintelligence posture assumes compromise will happen at some point. Rapid disengagement rights, verified data deletion and destruction, and integration architectures that allow a surety to disconnect without crippling operations are imperative. In parallel, keep internal systems compartmentalized so that a platform breach does not escalate into an enterprise breach.

My Parting Thoughts

SuretyBind’s stated objectives are understandable. Efficiency, data quality, digital execution, verification, and fraud reduction are legitimate targets (PR Newswire 2025; SuretyBind 2025). The danger lies in the ownership and incentive structure. Direct competitors are being invited to co-own the rails on which submissions, execution events, and workflow metadata will travel. Data/metadata is intelligence, workflow is strategy, and administrative is often the shadow of underwriter judgment. A single sentence about strict antitrust supervision is b.s., and NOT an adequate substitute for verifiable safeguards, particularly in an enforcement environment that emphasizes case-by-case scrutiny and has withdrawn prior competitor collaboration guidelines (FTC 2024; FTC and DOJ 2024). A counterintelligence professional does not gamble trade secrets on slogans, and neither should the participant sureties in this SuretyBind thing. If the industry truly wants digital execution, it should demand designs that keep each surety’s proprietary risk knowledge compartmented, minimize shared visibility, and make governance auditable and enforceable. Otherwise, the platform risks becoming an intelligence extraction engine that quietly redistributes underwriting advantage from those who earned it to those who can most effectively collect or acquire it. Non-participating surety companies beware. There are four very large, very influential carriers banding together for reasons that don’t appear to justify the concerning exposures inherent in the system. You should ask why.

~ C. Constantin Poindexter, MA, JD, CPCU, AFSB, ASLI, ARe

References

  • Carrier Management. 2025. “Chubb, The Hartford, Liberty and Travelers Team Up on Surety Tech Co. Launch.” December 8, 2025.
  • Federal Trade Commission. 2024. “FTC and DOJ Withdraw Guidelines for Collaboration Among Competitors.” Press release, December 11, 2024.
  • Federal Trade Commission and U.S. Department of Justice. 2024. Withdrawal Statement: Guidelines for Collaboration Among Competitors. December 11, 2024.
  • National Association of Surety Bond Producers. 2024. The Importance of Surety Bond Verification.
  • National Association of Surety Bond Producers and RiskStream Collaborative. 2025. Digitizing the Surety Bond Ecosystem: Surety X Executive Summary. June 2025.
  • National Institute of Standards and Technology. 2020. Security and Privacy Controls for Information Systems and Organizations (SP 800 53 Rev. 5).
  • National Institute of Standards and Technology. 2024. The NIST Cybersecurity Framework 2.0 (CSWP 29).
  • PR Newswire. 2025. “Leading Sureties Announce the Launch of SuretyBind.” December 8, 2025.
  • SuretyBind. 2025. “Leading Sureties Announce the Launch of SuretyBind.” Press release page, December 8, 2025.
  • U.S. Department of Justice, Antitrust Division. 2024. Evaluation of Corporate Compliance Programs in Criminal Antitrust Investigations. November 2024.
  • The Insurer (from Reuters). 2025. “Tech company SuretyBind formed by Chubb, The Hartford, Liberty Mutual and Travelers.” December 8, 2025.

Crimen violento en la República Dominicana 2024 a 2025: evidencia de descenso, límites de medición e implicaciones de política pública

Crimen violento en la República Dominicana 2024 a 2025: evidencia de descenso, Republica Dominicana, crimen, procurador, DNI, CNI, C. Constantin Poindexter Salcedo

La pregunta de si el crimen violento ha disminuido en la República Dominicana durante los últimos dos años requiere precisión metodológica. En el debate público se usa con frecuencia el término crimen violento como si fuese un único indicador, pero en la práctica se trata de un conjunto de conductas que incluyen homicidio, robo con violencia, agresiones sexuales y otros eventos que se registran con calidades estadísticas distintas. Por ello, el análisis académico suele partir de la tasa de homicidios como variable guía, no porque agote la violencia, sino porque tiende a ser más comparable entre periodos y menos sensible a variaciones de denuncia que otros delitos. Bajo ese enfoque, la evidencia disponible sugiere un descenso reciente en los homicidios, con matices importantes sobre la distribución territorial, la atribución causal y las tensiones institucionales asociadas a la seguridad ciudadana.

Los reportes oficiales dominicanos describen una trayectoria descendente en la tasa de homicidios desde 2023 hacia 2024 y 2025, con cifras que se presentan como acumuladas y también como cortes mensuales. La Policía Nacional, al comunicar resultados de 2025, reporta para julio una tasa en torno a 8.22 por cada 100,000 habitantes y la describe como la más baja de los últimos tres años, comparándola con niveles más altos en 2024 y 2023 (Policía Nacional, 2025a). En esa misma línea, otra comunicación oficial de julio de 2025 reporta una tasa acumulada de 8.29 por cada 100,000 habitantes, reforzando la idea de descenso sostenido durante el año (Policía Nacional, 2025b). Aunque estas publicaciones son piezas comunicacionales, su consistencia interna y su repetición en distintos cortes temporales permite tratarlas como un indicador direccional relevante cuando se usan con cautela.

En paralelo, el Ministerio de Interior y Policía ha difundido reportes de la Fuerza de Tarea Conjunta que complementan el panorama. Al 20 de diciembre de 2024, el ministerio reportó una tasa acumulada de homicidios de 9.59 por cada 100,000 habitantes y describió un comportamiento a la baja en los últimos meses del año (Ministerio de Interior y Policía, 2024). Ya en 2025, la misma cartera informó en mayo una tasa nacional de homicidios de 7.9 por cada 100,000 habitantes, en el contexto de reuniones de seguimiento al Plan de Seguridad Ciudadana (Ministerio de Interior y Policía, 2025). Aun reconociendo que tasas acumuladas pueden moverse con el calendario y con la forma de corte, la convergencia de mensajes oficiales sostiene la tesis de una reducción en homicidios en el periodo reciente.

Además de las fuentes nacionales, un referente regional ampliamente citado en análisis de violencia es InSight Crime. El Gobierno dominicano difundió un resumen señalando que el balance anual de InSight Crime registra una caída de 16.4 por ciento en la tasa de homicidios en 2024 frente a 2023, describiendo además el descenso como consecutivo por varios años (Presidencia de la República Dominicana, 2025). Más importante todavía, el propio texto de InSight Crime, reproducido en un documento público alojado en un expediente de la Cámara de Representantes de Estados Unidos, afirma explícitamente que la República Dominicana registró una caída de 16.4 por ciento en su tasa de homicidios en 2024 comparado con 2023 (InSight Crime, 2025). Esta doble vía, divulgación gubernamental y documento que incorpora el reporte, fortalece la robustez de la afirmación sobre la dirección del cambio, aunque no sustituye el acceso directo a series completas y microdatos.

Ahora bien, sostener que la violencia bajó no equivale a afirmar que el problema esté resuelto ni que todos los componentes del crimen violento se comporten igual. El propio Departamento de Estado de Estados Unidos, en su aviso emitido el 12 de junio de 2025, enfatiza que el crimen violento es una preocupación en todo el país e incluye robo, homicidio y agresión sexual, aun cuando reconoce mayor presencia policial en zonas turísticas (U.S. Department of State, 2025). Este tipo de advertencia no pretende medir tendencias con precisión estadística, pero sí señala que, desde la óptica de gestión de riesgo, la disminución de un indicador no elimina la exposición práctica, especialmente en entornos urbanos y en dinámicas oportunistas asociadas al turismo y a la economía informal.

Para un enfoque académico, también es indispensable atender a las limitaciones de medición. Organismos internacionales han insistido en que las estadísticas de homicidio pueden provenir de sistemas de justicia o de salud pública y que las diferencias de fuente, definición y cobertura afectan comparabilidad (UNODC, 2023). En delitos como robo y agresión sexual, los sesgos por subregistro tienden a ser mayores porque dependen del incentivo a denunciar, la confianza en las instituciones y la accesibilidad del sistema. En consecuencia, aunque la tasa de homicidio es un buen termómetro, no es una radiografía completa del crimen violento. Una lectura metodológicamente prudente, por tanto, es afirmar que hay evidencia de descenso en homicidios y que ello es consistente con una mejora parcial en violencia letal, manteniendo abierta la pregunta sobre otros delitos violentos y sobre la percepción ciudadana.

Un segundo matiz relevante es el de la causalidad. Las autoridades dominicanas vinculan las mejoras a estrategias coordinadas, prevención y operativos interinstitucionales, usualmente bajo el paraguas del Plan de Seguridad Ciudadana y la Fuerza de Tarea Conjunta (Ministerio de Interior y Policía, 2024). Sin embargo, inferir causalidad estricta requiere diseños analíticos más rigurosos, como series de tiempo con controles, análisis territorial con contrafactuales o evaluación de intervención. InSight Crime, por ejemplo, subraya factores estructurales y dinámicas criminales en la región, y en su apartado sobre República Dominicana señala que el tráfico de drogas no parecería ser el principal motor de homicidios en 2024 y que la violencia estaría asociada en gran medida a conflictos interpersonales, mientras apunta al papel de armas de fuego en los asesinatos (InSight Crime, 2025). Esto sugiere que la política pública debe combinar capacidad operativa con intervención social y control de armas, no solo intensificación policial.

Un tercer matiz, cada vez más visible en el debate regional, es la tensión entre reducción del delito y estándares de uso legítimo de la fuerza. Un reporte de Associated Press en septiembre de 2025 recoge preocupaciones de activistas sobre un aumento de muertes en intervenciones policiales y sobre la transparencia y el debido proceso en esos casos, señalando cifras reportadas por una comisión de derechos humanos (Associated Press, 2025). Este punto importa porque, aun si la tasa de homicidio general disminuye, un deterioro en controles institucionales puede generar costos reputacionales, riesgos legales y desconfianza pública que, a mediano plazo, afectan la sostenibilidad de cualquier mejora. En términos de gobernanza de seguridad, la reducción de violencia debe alinearse con legitimidad, rendición de cuentas y auditoría independiente.

En síntesis, la respuesta a la pregunta inicial es afirmativa con precisión: la evidencia disponible respalda que la violencia letal medida por tasa de homicidios ha disminuido en el periodo 2024 a 2025 frente a 2023, según reportes oficiales dominicanos y el balance regional citado de InSight Crime (Policía Nacional, 2025a; Ministerio de Interior y Policía, 2024; InSight Crime, 2025). A la vez, fuentes orientadas a gestión de riesgo continúan describiendo la criminalidad violenta como una preocupación práctica y recomiendan precauciones (U.S. Department of State, 2025). Un marco académico y útil para política pública es, por tanto, reconocer el descenso reciente, delimitar su alcance, y orientar la agenda hacia medición transparente, reducción de violencia no letal, control de armas, y fortalecimiento de controles sobre el uso de la fuerza.

~ C. Constantin Poindexter, MA en Inteligencia, Certificado de Posgrado en Contrainteligencia, JD, certificación CISA/NCISS en OSINT

Bibliografía

  • Associated Press. 2025. “Dominican activists decry extrajudicial killings after police fatally shoot 5 suspects.” Associated Press, 11 de septiembre de 2025.
  • InSight Crime. 2025. “InSight Crime’s 2024 Homicide Round Up.” Documento reproducido en expediente público de la Cámara de Representantes de Estados Unidos, fechado 26 de febrero de 2025.
  • Ministerio de Interior y Policía. 2024. “Fuerza de Tarea Conjunta presenta informe con resultados positivos en reducción de homicidios.” Comunicado institucional, 31 de diciembre de 2024.
  • Ministerio de Interior y Policía. 2025. “Tasa de homicidios se mantiene en 7.9.” Comunicado institucional, 19 de mayo de 2025.
  • Policía Nacional. 2025a. “Tasa de homicidios en julio 2025 se sitúa en 8.22 por cada 100,000 habitantes.” Publicación institucional, 24 de julio de 2025.
  • Policía Nacional. 2025b. “Tasa de homicidios continúa en descenso, alcanza 8.29 al 25 de julio de 2025.” Publicación institucional, 31 de julio de 2025.
  • Presidencia de la República Dominicana. 2025. “Estudio anual de InSight Crime destaca caída de un 16.4 por ciento en tasa de homicidios de RD en 2024.” Noticia institucional, 28 de febrero de 2025.
  • U.S. Department of State. 2025. “Dominican Republic Travel Advisory.” Aviso de viaje, emitido el 12 de junio de 2025.
  • United Nations Office on Drugs and Crime. 2023. Global Study on Homicide 2023. Viena: UNODC.

El poder del OSINT: atribución e identificación de Oleg Smolenkov

espionaje, inteligencia, contrainteligencia, contraespionaje, C. Constantin Poindexter Salcedo, DNI, CNI, espia, espias

La identificación pública de Oleg Smolenkov ilustra una realidad contemporánea de la contrainteligencia: un activo reubicado y sensible puede quedar desenmascarado sin que un servicio hostil penetre sistemas clasificados, sin una penetración HUMINT de nuestros servicios y sin una sola filtración proveniente de una rama administrativa. El mecanismo decisivo es la convergencia de fuentes abiertas, es decir, la fusión disciplinada de huellas administrativas, reportajes archivados e indicios conductuales en una atribución coherente. En este caso, una sala de redacción investigativa no gubernamental y colectores OSINT paralelos no comenzaron con un nombre. Comenzaron con un hecho reportado públicamente, una ventana temporal acotada y un perfil de acceso implícito. Explotaron mecanismos de transparencia previsibles tanto en Rusia como en Estados Unidos. El resultado fue una vinculación de alta confianza entre la descripción anonimizada de una fuente reubicada y un individuo específico, respaldada por corroboración interdominio. (Bellingcat 2019; Reuters 2019a)

Un profesional de contrainteligencia que evalúe este episodio debe resistir la tentación de tratarlo como un escándalo excepcional impulsado por personalidades o por la política. Conviene entenderlo mejor como un conducto analítico repetible. Los pasos son familiares: activación por indicios, generación de candidatos, prueba de plausibilidad, enlace con registros, validación por reacción y refuerzo de firmas. Cada etapa se apoya en datos que, aislados, parecen triviales. El compromiso surge de la agregación.

El proceso comienza con la activación por indicios. A comienzos de septiembre de 2019, importantes medios estadounidenses describieron una extracción clandestina ocurrida en 2017 que involucró a una fuente de alto nivel del gobierno ruso que había aportado información inusualmente sensible sobre el Kremlin y la toma de decisiones de política rusa a nivel estratégico. El reportaje enmarcó la extracción como protectora y urgente, realizada ante temores de que la seguridad de la fuente estuviera en riesgo. Incluso anonimizada, esa clase de detalles es operativamente útil para un investigador decidido porque reduce el espacio de búsqueda. El investigador obtiene alcance institucional, cronología y un relato de riesgo, que en términos de contrainteligencia funcionan como criterios de selección. La pregunta relevante pasa a ser: ¿qué funcionario ruso con acceso plausible desaparece de la vista pública en el periodo pertinente, en circunstancias coherentes con una reubicación súbita? (Time 2019; RFE/RL 2019b)

Una vez existe el indicio activador, la generación de candidatos se vuelve viable. Investigadores OSINT consultaron archivos de medios en lengua rusa, páginas en caché y reportes secundarios para encontrar historias de “desaparición” en la ventana de mediados de 2017 que involucraran a personal gubernamental. El caso se benefició de reportes rusos preexistentes. Varios medios describieron posteriormente que las autoridades rusas habían abierto en 2017 una investigación penal por el presunto asesinato de un funcionario desaparecido durante un viaje a Montenegro, y que la investigación fue abandonada después de que las autoridades concluyeran que la persona estaba viva en el extranjero. The Guardian informó que el medio digital Daily Storm había descrito esa secuencia, incluida la pesquisa por homicidio y la conclusión posterior de que el funcionario había abandonado Rusia. (The Guardian 2019a; RFE/RL 2019c) Reuters, a su vez, reportó que Kommersant identificó como posible individuo a Oleg Smolenkov, describiendo su desaparición en Montenegro en junio de 2017 junto con su esposa e hijos, así como la evolución de la postura investigativa rusa desde la hipótesis de asesinato hasta la evaluación de que vivía en el extranjero. (Reuters 2019a)

El colector OSINT ya dispone de un nombre candidato y de una narrativa de hechos que encaja con la restricción temporal. Un profesional de contrainteligencia observará aquí la debilidad estructural que queda expuesta. Si una extracción o reubicación coincide con una ausencia conspicua en el mundo real, y si esa ausencia activa un proceso de las fuerzas del orden de un Estado adversario, entonces ese proceso puede generar artefactos descubribles, incluido interés periodístico, filtraciones investigativas y reportajes retrospectivos. Incluso si el proceso extranjero es opaco, el patrón de hechos suele ser lo suficientemente noticiable como para quedar registrado “en algún lugar” y luego ser redescubierto cuando un evento activador dirige la atención hacia él.

A continuación se pasa a la prueba de plausibilidad. Un candidato debe ajustarse al acceso y a la ubicación funcional implicados por la narrativa original de extracción. Por ello, los colectores reconstruyen una trayectoria profesional mediante fuentes abiertas. Reuters informó que el Kremlin confirmó que una persona llamada Smolenkov había trabajado en la administración presidencial rusa y había sido despedida, si bien negó que tuviera un acceso significativo al presidente Vladímir Putin. (Reuters 2019a; Reuters 2019b) Se acepte o no la minimización del Kremlin, el reconocimiento de la relación laboral es, por sí mismo, confirmatorio a efectos de atribución. Valida que el candidato nombrado no es ficticio y ubica al activo dentro del universo institucional pertinente.

Una síntesis adicional de fuentes abiertas vinculó a Smolenkov con estructuras superiores de política exterior, en particular mediante reportes de que había trabajado en la embajada rusa en Washington en un periodo asociado con el diplomático de alto nivel Yuri Ushakov y que posteriormente desempeñó funciones vinculadas con la administración presidencial. Russia Matters resumió un reporte de Kommersant que describía a Smolenkov como asistente de larga data de Ushakov, que es precisamente el tipo de proximidad de personal que puede producir exposición indirecta a deliberaciones de alto nivel sin prominencia pública. (Russia Matters 2019) Desde la perspectiva de la contrainteligencia, esa distinción importa. Una fuente no necesita ser un decisor de rango ministerial para ser estratégicamente valiosa. En muchos sistemas, el personal de apoyo, los asistentes y los administradores constituyen el tejido conectivo que accede a documentos, agendas y flujos de briefing. Los colectores OSINT aciertan al tratar esa capa de personal como un vector plausible de acceso.

Sin embargo, la plausibilidad por sí sola todavía no establece que el candidato sea la persona reubicada en Estados Unidos. El enlace decisivo surgió de registros administrativos estadounidenses, en particular de documentación de titularidad inmobiliaria. Bellingcat informó que registros abiertos mostraban a “Oleg y Antonina Smolenkov” comprando una vivienda en el norte de Virginia en junio de 2018, y conectó esa compra con la hipótesis de que la familia había sido reasentada bajo protección tras abandonar Rusia. (Bellingcat 2019) Reportajes de RFE/RL igualmente abordaron registros públicos que indicaban la propiedad de una casa en el condado de Stafford, Virginia, por Oleg y Antonina Smolenkov, y describieron cambios posteriores compatibles con intentos de reducir la visibilidad, incluida la transferencia de titularidad a un fideicomiso. (RFE/RL 2019a; RFE/RL 2019b)

Para un profesional de contrainteligencia, esta fase contiene la lección operativa central. El sistema estadounidense de registro de propiedades está diseñado para ser durable, consultable y transparente. Una fuente humana reubicada que vive bajo su nombre real, o bajo un nombre que pueda enlazarse por la cadena de escrituras, se vuelve localizable. Incluso cuando se emplea un fideicomiso, la compra inicial puede preservar la identidad en un registro perdurable, y las transferencias posteriores pueden seguirse. El fideicomiso puede dificultar la detección casual, pero no derrota de forma fiable a un investigador que ya dispone de un punto de partida y está dispuesto a seguir la cadena entre bases de datos. Incluso para un observador no entrenado, la transferencia reciente de un apellido ruso a un fideicomiso opaco registrado públicamente resulta un indicador obvio.

El componente registral es importante; no obstante, el enlace no se limitó a los registros de propiedad considerados en aislamiento. Los investigadores añadieron correlación temporal. La compra se produjo aproximadamente un año después de la ventana de desaparición de 2017, un plazo plausible para la reubicación, los debriefings y la logística de reasentamiento. La localización geográfica, cerca de Washington, coincide con necesidades prácticas de manejo continuado, enlace con organismos gubernamentales y apoyo de seguridad. RFE/RL situó la residencia en un vecindario con personal gubernamental estadounidense actual y retirado, lo cual no sería un entorno implausible para una persona reubicada bajo protección, pero también incrementa el riesgo de atención porque los residentes detectan patrones inusuales. (RFE/RL 2019a)

La confianza en la atribución aumenta mediante corroboración en ambos lados. Reuters informó que medios estatales rusos y otros medios rusos visitaron o hicieron referencia a la dirección de Virginia asociada con Smolenkov, y que los comentarios oficiales rusos se centraron en negar su nivel de acceso más que en negar su identidad. (Reuters 2019b) The Guardian reportó que los medios rusos identificaron rápidamente a Smolenkov como figura probable después de que circulara la historia inicial de la extracción, y que reportajes rusos anteriores ya habían tratado su desaparición como sospechosa. (The Guardian 2019b) En términos analíticos de contrainteligencia, esto equivale a validación por reacción. Cuando un gobierno implicado reconoce empleo, discute jerarquía y estructura narrativas en torno al acceso, acepta implícitamente el ancla de identidad, aunque dispute la caracterización operativa.

Otra capa de refuerzo es la observación de firmas, es decir, la detección de conductas consistentes con un postureo protector. Bellingcat describió que periodistas observaron indicios de presencia de seguridad al aproximarse a la residencia y señaló que la familia probablemente se marchó tras la difusión de la historia. (Bellingcat 2019) RFE/RL informó que vecinos afirmaron que la familia vinculada a la propiedad identificada se fue abruptamente poco después de la publicidad, y que nadie respondió cuando un reportero de RFE visitó la vivienda. (RFE/RL 2019a; RFE/RL 2019b) Desde la óptica profesional, estas firmas son algo ambiguas, pero tienen valor direccional. No prueban afiliación a inteligencia; sin embargo, añaden coherencia al relato más amplio cuando se combinan con enlaces administrativos verificados.

La identificación de Smolenkov puede describirse como una cadena de atribución en fuentes abiertas con elementos que se refuerzan mutuamente. Comienza con una descripción anonimizada de un activo extraído, que aporta un marco temporal y un perfil de acceso. Luego aprovecha una narrativa preexistente de desaparición en el ecosistema mediático ruso que encaja con esa ventana. Valida la plausibilidad institucional mediante el reconocimiento oficial de empleo y mediante la reconstrucción en fuentes abiertas de la proximidad del candidato, a nivel de personal, a estructuras superiores de política. Después salva la brecha entre Rusia y Estados Unidos localizando los mismos nombres en registros de propiedad, apoyado por correlación temporal y plausibilidad geográfica. Por último, la reacción del adversario y las firmas observables de postura protectora tras la publicidad añaden estabilidad a lo anterior. Cada elemento, por separado, podría minimizarse; pero, en su conjunto, en atención a la totalidad de las circunstancias, proporcionan una atribución de alta probabilidad que resulta operativamente suficiente para una identificación pública muy fiable. (Bellingcat 2019; Reuters 2019a; RFE/RL 2019b)

Las implicaciones para la contrainteligencia son claras. Una extracción protectora no pone fin a un dilema operativo. Inicia una nueva fase en la que la amenaza no es únicamente la vigilancia hostil, sino también la explotación por fuentes abiertas. Los regímenes de transparencia crean superficies de exposición previsibles. Los registros de escrituras y de los condados, las oficinas tributarias, los expedientes judiciales, las agencias de licencias y los registros mercantiles no son fuentes de inteligencia en sentido clásico, pero sí constituyen una fuente extremadamente consultable de datos estructurados y, en términos generales, razonablemente fiables. Medidas de C.I. aplicadas después del reasentamiento (por ejemplo, transferir la propiedad a un fideicomiso) reducen el hallazgo oportunista a posteriori, pero fracasan frente a un colector OSINT que ya posee un punto de partida. Además, la activación por indicios puede explotarse con enorme eficacia. Los relatos públicos sobre cronología y sensibilidad pueden proporcionar suficiente estructura para que un colector encuentre anomalías preexistentes y las conecte con registros domésticos.

El reasentamiento de Smolenkov demuestra que la doctrina de protección de fuentes debe ampliarse más allá de las preocupaciones clandestinas tradicionales. Debe incorporar la gestión de la huella administrativa, la compartimentación de nombre e identidad y una apreciación realista de la velocidad con la que los registros digitales pueden correlacionarse entre jurisdicciones, en tiempo real y a distancia. Este caso no puede verse como una brecha aislada. En realidad, es una advertencia sobre las capacidades basales del OSINT. Y, como comentario final de un antiguo profesional de C.I., no ponga propiedades escrituradas a apellidos rusos en fideicomisos que se presentan públicamente.

~ C. Constantin Poindexter, MA en Inteligencia, Certificado de Posgrado en Contrainteligencia, JD, certificación CISA/NCISS en OSINT

Bibliografía

  • Bellingcat. 2019. “Murdered in Montenegro, or Living in Suburban Virginia? Unraveling the 2017 American Spy Story.” 10 de septiembre de 2019.
  • Radio Free Europe/Radio Liberty. 2019a. “Virginia Residents Question Whether Their Neighbor Was a Russian Informant.” 10 de septiembre de 2019.
  • Radio Free Europe/Radio Liberty. 2019b. “Russia Seeking Interpol’s Help on Location of Alleged CIA Informant.” 12 de septiembre de 2019.
  • Radio Free Europe/Radio Liberty. 2019c. “Paper Reports ‘Details’ of Alleged CIA Informer’s Disappearance in Montenegro.” 12 de septiembre de 2019.
  • Reuters. 2019a. “Kremlin Says Alleged U.S. Spy Did Not Have Access to Putin.” 10 de septiembre de 2019.
  • Reuters. 2019b. “Russia Blasts Idea a CIA Mole Lifted Lid on Its U.S. Meddling.” 11 de septiembre de 2019.
  • Russia Matters. 2019. “Russia in Review, Sept. 6 to 13, 2019.” Septiembre de 2019.
  • The Guardian. 2019a. “Russia Investigated Disappearance of Suspected US Spy as Possible Murder.” 10 de septiembre de 2019.
  • The Guardian. 2019b. “Oleg Smolenkov: Alleged US Spy Who Gave Russia the Slip.” 14 de septiembre de 2019.
  • Time. 2019. “The U.S. Reportedly Extracted a High Level Spy From Russia in 2017 Amid Concerns of Mishandled Intelligence.” 10 de septiembre de 2019.

AI-Orchestrated Chinese Cyber Espionage, Counterintelligence Professional’s View

intelligence, counterintelligence, espionage, counterespionage, a.i., artificial intelligence, cyber operations, cyber-espionage, chinese APT, C. Constantin Poindexter

The GTG-1002 operation reported by Anthropic and reported by Nury Turkel in The Wall Street Journal (“The First Large-Scale Cyberattack by AI“) is not just another less-than-noteworthy Chinese cyber campaign. It is a counterintelligence (CI) inflection point, the proverbial crossing of the Rubicon. In this case, a Chinese state-sponsored threat group manipulated Anthropic’s Claude Code into acting as an autonomous cyber operator that conducted eighty to ninety percent of the intrusion lifecycle, from reconnaissance to data exfiltration, against about thirty high-value targets. Those victims include major technology firms and government entities (Anthropic 2025a; Turkel 2025). From a C.I. and counterespionage perspective, this is the moment where artificial intelligence stops being merely an analyst’s tool and becomes an adversary’s “officer in the field.”

I am going to take a C.I. guy’s view here and offer my thoughts about the counterintelligence ramifications of this, and more specifically how AI-orchestrated espionage changes the threat surface, disrupts traditional CI tradecraft, and forces democratic states to redesign CI doctrine, authorities, and technical defenses. It situates GTG-1002 within a broader pattern of Chinese cyber espionage and AI-enabled operations. I think that you will agree with me after reading a bit here that an AI-literate counterintelligence enterprise is now a strategic necessity.

GTG-1002 as a Case Study in AI-Enabled Espionage

Anthropic’s public report “assesses with high confidence” that GTG-1002 is a Chinese state-sponsored actor that repurposed Claude Code as an “agentic” cyber operator (Anthropic 2025a). Under the cover story of legitimate penetration testing, AI was instructed to map internal networks, identify high-value assets, harvest credentials, exfiltrate data, and summarize takeaways for human operators, who then made strategic decisions (Turkel 2025). The campaign targeted organizations across technology, finance, chemicals, and government sectors, with several successful intrusions validated (Anthropic 2025a). This incident must be understood in the context of Beijing’s long-standing cyber-espionage posture. U.S. government and independent assessments have repeatedly documented the sophistication and persistence of People’s Republic of China (PRC) state-sponsored cyber actors targeting critical infrastructure, defense industrial base entities, and political institutions (USCC 2022; CISA 2025). GTG-1002 does not represent a shift in Chinese strategic intent. It evidences a dangerous new means, automation of the cyber kill chain by a large language model (LLM) with minimal human supervision. In essence, AI isn’t helping an operator press the trigger, . . . AI is.

From a CI standpoint, GTG-1002 is the first verified instance of an LLM acting as the primary intrusion operator rather than as a mere “helper,” in a state-backed offensive cyber operation. This development validates years of warnings from both academic and policy analysts about AI-assisted and AI-driven cyber penetrations (Rosli 2025; Louise 2025). It confirms that frontier models can be harnessed as operational tools for intelligence collection at scale.

Compression of the Intelligence Cycle and the Detection Window

Traditional cyber-collection operations require sizable teams of operators and analysts executing reconnaissance, initial access, lateral movement, and exfiltration over days or weeks. GTG-1002 shows that AI agents can compress this cycle dramatically by chaining tools, iterating code, and self-documenting tradecraft at machine speed (Anthropic 2025a; Anthropic 2025b). For CI services, this compression has several consequences.

The indications and warning window shrinks. Behavioral indicators that CI analysts and security operations centers have historically depended on, i.e., repeated probing, extended lateral movement, or noisy privilege escalation, are now condensed, obfuscated, and/or automated. Autonomous AI agents can escalate privileges, pivot and exfiltrate in minutes, leaving a smaller digital “dwell time” during which CI can detect and attribute activity (Microsoft 2025).

Exploitation and triage become automated. GTG-1002 reportedly used Claude not only to steal data but also to summarize and prioritize it, effectively performing first-level intelligence analysis (Anthropic 2025a). This accelerates an adversary’s analytic cycle. AI can sort, cluster, and highlight sensitive documents faster than human analysts. The time between compromise and exploitation shrinks, diminishing the value of “late” discovery and complicating post-hoc damage assessments, two extremely important CI activities.

AI turns complexity into volume. Academic and industry analyses have already identified AI as a “threat multiplier”, enabling less capable actors to mount sophisticated, multi-stage operations (Rosli 2025; Armis 2025). State-backed operations can hide in the flood of AI-assisted criminal, hacktivist, and proxy activity, creating a signal-to-noise problem for CI triage and attribution.

In simple summary, AI collapses the temporal advantage that defenders once had to notice patterns in network behavior. Counterintelligence must pivot from retrospective forensic analysis toward continuous, AI-assisted anomaly detection and behavioral analytics.

AI Systems as Both Collector and High-Value Intelligence Target

GTG-1002 dramatizes a dual reality that Turkel highlights. China is “spying with AI and spying on American AI” (Turkel 2025). The same models used to conduct intrusions are themselves prized intelligence targets. Chinese entities have already been implicated in efforts to acquire Western AI model weights, training data, and associated know-how, as part of a broader technology-transfer strategy (USCC 2022; Google Threat Intelligence 2025). For THIS CI guy, AI labs are now the Cold War aerospace or cryptographic contractors. Model weights and training corpora become the “crown jewels”. Theft and reverse engineering/replication of frontier models will give adversaries economic advantage and more gravely, insight into how Western defensive systems behave. Anthropic itself notes that real-world misuse attempts feed into adversaries’ understanding of model weaknesses and safety bypasses (Anthropic 2025b).

The supply chain and insider threat picture changes. AI providers depend on global supply chains, open-source libraries, and large pools of contractors and researchers. This distributed ecosystem creates attack surfaces for foreign intelligence services. Code contributions, model-training infrastructure, and prompt logs can all be targeted. CI-focused analysis from the security and legal communities has argued that the AI ecosystem, i.e., researchers, hardware vendors, and cloud providers, must be treated as CI-relevant nodes, not as purely commercial actors (Lawfare Institute 2018; Carter et al. 2025).

Collecting on the collectors is not a new tactic but AI puts it on steroids. Collection on red-teaming and controls/safeguards themselves have become a priority. Access to internal red-team reports, internal controls and safety evaluations are extraordinarily valuable to an adversary seeking to jailbreak or subvert models. Counterintelligence coverage must extend not only to model weights but also to the meta-knowledge of how those models fail, and how that knowledge might be of adversarial interest.

In brief, AI firms are part of the national security base. CI organizations will need to authorize enhanced resources, assign dedicated case officers, establish formal reporting channels, and integrate these enterprises into national threat-sharing architectures in a way analogous to defense contractors and telecommunications providers (Carter et al. 2025).

Deception, Hallucination, and Counterespionage Tradecraft

Anthropic’s report and Turkel’s article both highlight a critical limitation of AI-orchestrated espionage. Claude frequently hallucinated, overstating findings or fabricating credentials and “discoveries” (Anthropic 2025a; Turkel 2025). From a counterespionage perspective, this is not simply a technical bug. It is a potential vector for deception. If adversary services increasingly rely on AI agents for reconnaissance and triage, then controlled-environment deception becomes more attractive. CI and cyber defense teams can seed networks with synthetic, high-entropic data and decoy credentials designed to attract and mislead AI agents. Because large models are prone to pattern-completion and over-generalization, they may “see” classified goodies and valuables where a skilled human operator would sense something is simply not right.

Algorithmic counterdeception becomes feasible. The academic literature on AI in cyber espionage emphasizes that overreliance on automated tools can degrade situational awareness and strategic judgment inside hostile services (Rosli 2025; Louise 2025). CI planners can exploit this by orchestrating digital environments that feed AI agents ambiguous, contradictory, or subtly poisoned data. This increases the probability that adversary leadership acts on flawed intelligence.

GTG-1002 demonstrates that adversaries (at the very least China) are already skilled at their deception of AI. Chinese FIS successfully social-engineered Claude’s safety systems by impersonating legitimate cybersecurity professionals performing authorized pen-testing (Anthropic 2025a). What then is the appropriate CI requirement? Counter-social-engineering of our own models. Guardrails must be resilient not just to obviously malicious prompts but to sophisticated role-playing that mimics presumibly friendly actors, including penetration testers, red teams, and internal security staff.

Blurring Lines Between Cyber CI, Influence Operations, and HUMINT Targeting

Major technology and threat reports document how Russia, China, Iran, and North Korea are using AI to scale disinformation, impersonate officials, and refine spearphishing campaigns (Microsoft 2025; Google Threat Intelligence 2025). For CI professionals, this convergence of AI-enabled cyber intrusion and influence operations erodes traditional boundaries between cyber CI (identifying and disrupting technical collection), defensive HUMINT (protecting human sources and employees), and counter-influence (disrupting foreign information operations).

AI systems can now generate tailored phishing content, deepfake personas, and synthetic social media and professional-network profiles at scale, all of which feed into reconnaissance and targeting pipelines for state security services (FBI 2021; Microsoft 2025). GTG-1002 focused primarily on technical collection, but the same infrastructure could coordinate cyber intrusions with human targeting. Using stolen email archives to identify vulnerable insiders, then tasking LLMs to draft recruitment approaches comes immediately to mind.

Counterintelligence must integrate AI forensics, digital forensics, and behavioral analytics into a single tradecraft paradigm and practice. Monitoring “pattern of life” indicators like off-hours access, unusual lateral movement, and anomalous data pulls must be enhanced by AI-driven analysis of communication patterns, foreign contact indicators, and anomalous financial or travel behavior. There are good suggestions about best practices in emerging CI guidance on AI-enabled insider-threat detection (Carter et al. 2025; CISA 2025).

Doctrine, Authorities, and Information-Sharing at Machine Speed

The GTG-1002 incident exposes a serious structural challenge. CI and cyber defense architectures are optimized for human-paced operations and workflows that, speaking kindly, are bureaucratic. To its credit, Anthropic engaged with U.S. I.C. agencies quickly and publicly disclosed the attack, but Turkel argues that AI incidents need near-real-time disclosure and coordinated response (Turkel 2025). This aligns with broader policy analyses calling for mandatory reporting of AI misuse, coupled with safe-harbor protections, within seventy-two hours or less (Carter et al. 2025). That is a good step, but not fast enough. The horse is out of the barn and gone by the seventy-two hour mark. So, the implication here is that threat intelligence sharing must become significantly machine-to-machine. If attacks unfold at machine speed, then signature updates, behavioral indicators, and model-abuse patterns must be distributed via automated channels across sectors in minutes and hours, not days or weeks (Microsoft 2025). All players will have to agree to and implement standardized formats for sharing AI jailbreak patterns, malicious prompt signatures, and indicators of AI-driven lateral movement.

Legal authorities must evolve. Existing CI and surveillance authorities were not drafted with AI agents in mind. When an AI agent controlled by a foreign intelligence service (FIS) is operating inside a U.S. cloud environment, what legal framework governs monitoring, interdiction, and even proportional response? Analyses of AI and state-sponsored cyber espionage reveal that international and domestic legal regimes lag the technology, creating gray zones that adversaries can exploit (Louise 2025; Lawfare Institute 2018).

Secure-by-design requirements for AI providers must become part of the regulatory baseline. Anthropic’s own transparency documents argue that future models must incorporate identity verification, real-time abuse monitoring, and robust safeguards against social-engineering prompts (Anthropic 2025b). From a CI perspective, such measures are not optional “best practices” but core elements of both commercial resilience and national security.

An AI-Literate Counterintelligence Enterprise

The GTG-1002 campaign exposes an ugly asymmetry. Adversarial FISs are already operationalizing AI as a collection platform and to conduct other cyber operations, both offensive and defensive. CI organizations in the U.S. and similarly democratic regimes are only beginning to adopt AI as an analytic aid. We are behind, yet there is hope. There is nothing inherent about AI that favors offense over defense. We simply need to move faster.

Public reporting from the FBI and other agencies highlights how AI can be used to process imagery, triage voice samples, and comb through large datasets to identify anomalous behavior and potential national security threats more quickly (FBI 2021; CISA 2025). In counterintelligence, AI can flag unusual access patterns suggestive of AI-driven intrusions, detect insider-threat indicators earlier by correlating technical, financial, and behavioral data. The model can effectively assist analysts in mapping adversary infrastructure and correlating tactics, techniques, and procedures across campaigns, as well as support automated red-teaming of in-house models to identify vulnerabilities before adversaries do (Carter et al. 2025; Microsoft 2025). To get there, CI practitioners must become AI-literate operators. Recruiting and training officers who understand model architectures, jailbreak techniques, and prompt-injection attacks as well as a depth and breadth of traditional HUMINT tradecraft knowledge. It also means integrating data scientists and AI engineers into counterintelligence units, ensuring that insights about model misuse flow directly into counterespionage planning and operational security.

Counterespionage in the Age of Autonomous Offense

GTG-1002 is to AI what the first internet worm or the earliest ransomware campaigns were to traditional cybersecurity, albeit a bit more serious. AI-conducted activity by adversary FIS is a warning shot that the paradigm has shifted. A Chinese state-linked actor leveraged a Western frontier model to execute the majority of an espionage operation autonomously, at scale, using mostly open-source tools (Anthropic 2025a; Turkel 2025). Just ponder that for a moment. The counterintelligence ramifications are frightening. The intelligence cycle is compressed. The defender’s window for detection and countermeasures is shrinking. AI systems are simultaneously espionage platforms and priority intelligence targets, demanding full CI coverage. Hallucination and automation create new opportunities for both adversary deception and defender counter-deception. Cyber intrusions, influence operations, and human targeting are converging in AI-enabled world of lightning-fast channels. Existing CI doctrines, authorities, and information-sharing practices are too slow and too fragmented for machine-speed conflict.

If democratic states treat AI misuse as a niche cyber issue, we are ceding the initiative to adversaries who understand AI as an intelligence and counterintelligence weapon system. The appropriate response is immediate professionalization, building an AI-literate counterintelligence enterprise, imposing secure-by-design obligations on AI providers, and creating real-time, automated mechanisms to de-silo and distribute threat intelligence across government and critical industries. GTG-1002 clearly demonstrates that hostile FISs are already leveraging an AI offensive capability. Counterintelligence must not be left behind. I am not suggesting that we mirror the PRC’s behavior, but rather that pertinent Intelligence Community, national security and industry partners integrate AI into a rules-bound, rights-respecting CI framework capable of defending our open societies against autonomous offensive operations.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

References

  • Anthropic. 2025a. Disrupting the First Reported AI-Orchestrated Cyber-Espionage Campaign. San Francisco: Anthropic.
  • Anthropic. 2025b. “Claude Transparency and Safety: Model System Card.” San Francisco: Anthropic.
  • Armis. 2025. China’s AI Surge: A New Front in Cyber Warfare. Armis Threat Research Report.
  • Carter, William, et al. 2025. “Integrating Artificial Intelligence into Counterintelligence Practice.” Arlington, VA: Center for Development of Security Excellence.
  • CISA (Cybersecurity and Infrastructure Security Agency). 2025. “Countering Chinese State-Sponsored Actors Compromising Global Networks.” Cybersecurity Advisory AA25-239A. Washington, DC: U.S. Department of Homeland Security.
  • FBI (Federal Bureau of Investigation). 2021. “Artificial Intelligence – Emerging and Advanced Technology: AI.” Washington, DC: U.S. Department of Justice.
  • Google Threat Intelligence. 2025. “Adversarial Misuse of Generative AI: Threats and Mitigations.” Mountain View, CA: Google.
  • Lawfare Institute. 2018. “Artificial Intelligence—A Counterintelligence Perspective.” Lawfare (blog), November 2018.
  • Louise, Laura. 2025. “Artificial Intelligence and State-Sponsored Cyber Espionage: The Growing Threat of AI-Enhanced Hacking and Global Security Implications.” NYU Journal of Intellectual Property and Entertainment Law 14 (2).
  • Microsoft. 2025. Digital Threats Report 2025. Redmond, WA: Microsoft.
  • Rosli, Wan Rohani Wan. 2025. “The Deployment of Artificial Intelligence in Cyber Espionage.” AI and Ethics 5 (1): 1–18.
  • Turkel, Nury. 2025. “The First Large-Scale Cyberattack by AI.” Wall Street Journal, November 23, 2025.
  • USCC (U.S.–China Economic and Security Review Commission). 2022. “China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States.” Washington, DC: USCC.