Nevada LLC | Defense Technology | AI & Investigations

Autonomous Intelligence
for Denied Environments

Tactical AI systems that operate without cloud, without connectivity, without compromise. Proprietary technology across 4 operational domains.

Four Operational Domains

Proprietary technology from edge AI deployment to regulatory fraud detection.

DDIL AI Systems

Multi-agent AI architectures that deploy, operate, and adapt in disconnected, denied, intermittent, and limited-bandwidth environments. Zero cloud dependency. Full edge autonomy. Purpose-built for tactical operations where reach-back is not an option.

Project Prometheus • Edge AI

Fraud Detection

Five-spine analytical framework for detecting anomalous financial patterns in government grants, nonprofit operations, and public fund flows. Validated against 340 million+ federal records and $148 billion in tracked disbursements.

PBRF-LE Framework • 30+ Detection Rules

Surveillance Technology

Covert autonomous sensor nodes with embedded AI processing, multi-spectrum collection, and mesh networking. Field-originated during combat operations. Deployed without infrastructure. Maintained without reach-back.

Covert Sensor Systems • Field-Proven

Investigation Services

Licensed private investigation services backed by AI-powered decision chain analysis, principal-agent modeling, and game-theoretic accountability frameworks. 648 decision nodes across all 50 state regulatory environments.

Nevada PI (Pending) • All 50 States

By the Numbers

0
Technology Domains
0
State Jurisdictions
0
Records Analyzed
0
Lines of Code

No Competitor
Has All Five

Multi-agent orchestration. Offline-first architecture. Purpose-built tactical hardware. Unified cross-tier operating system. Training doctrine for operators.


SSI is the only entity with working proof-of-concepts across the complete stack — from silicon to doctrine.

Capability Big Tech Defense Primes SSI
Multi-Agent AI Partial No Yes
Offline-First No Partial Yes
DDIL Architecture No Partial Yes
Tactical Hardware No Yes Yes
Training Doctrine No No Yes

Founded on Experience

Andrew Scott Fayal

Founder & Manager

Senior investigative specialist with over 16 years conducting and supervising high-risk investigations, post-blast analysis, IED forensics, scene reconstruction, intelligence processing, and multi-agency investigative operations across three continents.

U.S. Navy EOD (2000–2008) — Three combat deployments to Iraq including Ramadi, Al Anbar Province. Cleared 1,500+ submunitions. Destroyed 3+ million pounds of enemy ordnance. Supervised 235+ high-risk demolition operations. Conducted hundreds of post-blast analysis and IED exploitation missions. Trained 136+ EOD personnel in investigative techniques. Performed protective intelligence during SEAL Team 3 support operations.

U.S. Department of State — DS/ATA (2010–2018) — Senior EOD Advisor and Program Manager for the Diplomatic Security Anti-Terrorism Assistance program. Delivered advanced investigative training to hundreds of foreign EOD technicians, bomb squads, SWAT units, and intelligence officers across 10+ countries. Authored the first integrated SWAT–Bomb Squad capstone curriculum for East Africa, approved by the Department of State. Managed multi-million-dollar equipment inventories including robots, X-ray systems, forensic kits, and ECM systems.

Core sensor technology originated during combat operations in Ramadi — field innovation under fire, refined over two decades from battlefield concept to working prototype. Proprietary technology spanning defense AI, government transparency, and child welfare systems.

Published in the International Tactical Trainers and Officers Association on SWAT–Bomb Squad integration and explosive hazard response during active-assailant events. PI License pending, State of Nevada. 390,000+ lines of operational code.

Service United States Navy — AE / EOD (2000–2008)
Combat 3 Deployments — OIF, Ramadi, Al Anbar Province
Decorations Bronze Star (Combat "V") • Navy Commendation Medal (Combat "V") • Combat Action Ribbon ×2
Specialty Master Explosive Ordnance Disposal Warfare Specialist
Qualifications Military Freefall • SCUBA/Underwater EOD • Airborne • MOUT • Advanced IED Defeat
Federal Dept. of State DS/ATA — Senior EOD Advisor (10+ Countries)
Clearance TS/SCI (Former — DoD) • SECRET (Former — DoS)
PI License Nevada (Pending — April 2026)
IP Portfolio Proprietary Technology — 4 Domains — Patent Applications Planned
Code 390,000+ Lines — Operational AI Systems
Combat Stats 1,500+ Submunitions • 3M+ lbs Ordnance • 235+ Demolition Ops

Jeremy Sinks

Lead Investigator

Follow-the-money investigator who turned a personal encounter with systemic child welfare fraud into the largest independent forensic analysis of managed care corruption in U.S. foster care. In six weeks, produced 486 investigation files spanning 40+ states, uncovering the financial pipeline connecting corporate managed care organizations to foster care placement incentives.

The Centene Pipeline Discovery — Identified how Centene Corporation (NYSE: CNC, $154B revenue, Fortune 25) funds the Home Works! teacher home visit program through the Centene Foundation, deploying mandatory reporters into homes — while Centene’s subsidiary Home State Health simultaneously holds sole-source foster care Medicaid managed care contracts worth approximately $2 billion annually. Traced this dual-profit pipeline across 19 states and 4 sole-source contracts, documenting how the same corporate entity that funds adults entering homes profits when children enter foster care.

50-State Forensic Framework — Designed and executed a 7-module forensic analysis methodology: administrative removal structures, MCO/managed care financial flows, corporate-political timing analysis, foundation-reporter-removal alignment, hidden foster care diversion mechanisms, federal oversight failures, and structural incentive mapping. Applied systematically to 40+ state child welfare systems with full documentation.

Personally investigated 20+ persons of interest including network analysis, financial ecosystem mapping, and OSINT dossier production. Worked active missing children cases including emergency custody research, NCMEC verification, and social media distribution campaigns. Known for relentless quality control and manual fact-checking of every data point.

Role Lead Investigator — Sierra Special Investigations
Signature Case Centene Pipeline — $2B/yr Foster Care MCO Sole-Source Fraud
Coverage 40+ States — 7-Module Forensic Framework
Output 486 Investigation Files — 6 Weeks
Methodology Follow-the-Money • Grant Tracing • MCO Contract Analysis
POI Dossiers 20+ Persons of Interest — Financial & Network Mapping
Missing Children Active Case Work • NCMEC Verification • Distribution Campaigns
Specialties Shell Game Detection • MCO Contracts • Legislative Action

Fredrick “Cliff” Schum IV

Cyber Operations & Counter-Intelligence

Cybersecurity operator and OSINT investigator responsible for SSI’s entire defensive security posture and counter-intelligence operations. Maintains near-zero personal digital footprint while systematically dismantling the digital footprints of others.

Infrastructure Hardening — Designed and deployed production server security from bare metal to CIS Level 1 compliance. SSH hardening aligned to modern OpenSSH best practices with curve25519-only key exchange and chacha20-poly1305 ciphers. UFW firewall configuration, Fail2ban tuning with 24-hour ban cycles, TLS 1.2+ enforcement, NIST 800-53 audit logging, and legal 18 USC 1030 access banners. Authored the master cybersecurity reference, log retention policies, and P95-baseline threat monitoring with automated escalation models. Security philosophy: “Strive for boring — deviations from baseline are what matter.”

Counter-Intelligence Operations — Led the investigation into monetized conspiracy media networks, producing 188KB of sourced intelligence across 11 investigation files. Mapped financial flows across 14+ revenue streams with no nonprofit registration or public accountability. Traced network connections through 20+ figures across interconnected media operations, identifying critical bridge nodes between organizations. Cross-referenced FEC records, IRS nonprofit status, state business registries, certificate transparency logs, WHOIS records, and court filings. All open-source, all documented.

Maintains disaster recovery bundles, broadcast infrastructure architecture, and runs full OSINT self-assessments to validate operational security. Working-class roots — grandson of a 52-year electrical contractor from Binghamton, New York.

Role Cyber Operations & Counter-Intelligence — SSI
Security CIS Level 1 • NIST 800-53 • Modern OpenSSH • TLS 1.2+
OSINT Toolkit Sherlock • Maigret • Holehe • WHOIS • CT Logs • FEC • IRS
Intel Output 188KB Sourced Intelligence • 20+ Network Subjects Mapped
Methodology P95 Baseline Monitoring • Financial Flow Mapping • Network Analysis
Infrastructure Server Hardening • Firewall • Fail2ban • Disaster Recovery
OPSEC Minimal Digital Footprint • Self-Assessed • Verified Clean
Specialty Grift Network Exposure • Revenue Stream Accountability

Request a Briefing

Inquiries from DoD program managers, defense contractors, government agencies, and qualified investors.

Unclassified discussions only. NDA available upon request.