Tactical AI systems that operate without cloud, without connectivity, without compromise. Proprietary technology across 4 operational domains.
Proprietary technology from edge AI deployment to regulatory fraud detection.
Multi-agent AI architectures that deploy, operate, and adapt in disconnected, denied, intermittent, and limited-bandwidth environments. Zero cloud dependency. Full edge autonomy. Purpose-built for tactical operations where reach-back is not an option.
Project Prometheus • Edge AIFive-spine analytical framework for detecting anomalous financial patterns in government grants, nonprofit operations, and public fund flows. Validated against 340 million+ federal records and $148 billion in tracked disbursements.
PBRF-LE Framework • 30+ Detection RulesCovert autonomous sensor nodes with embedded AI processing, multi-spectrum collection, and mesh networking. Field-originated during combat operations. Deployed without infrastructure. Maintained without reach-back.
Covert Sensor Systems • Field-ProvenLicensed private investigation services backed by AI-powered decision chain analysis, principal-agent modeling, and game-theoretic accountability frameworks. 648 decision nodes across all 50 state regulatory environments.
Nevada PI (Pending) • All 50 StatesMulti-agent orchestration. Offline-first architecture. Purpose-built tactical hardware. Unified cross-tier operating system. Training doctrine for operators.
SSI is the only entity with working proof-of-concepts across the complete stack — from silicon to doctrine.
| Capability | Big Tech | Defense Primes | SSI |
|---|---|---|---|
| Multi-Agent AI | Partial | No | Yes |
| Offline-First | No | Partial | Yes |
| DDIL Architecture | No | Partial | Yes |
| Tactical Hardware | No | Yes | Yes |
| Training Doctrine | No | No | Yes |
Senior investigative specialist with over 16 years conducting and supervising high-risk investigations, post-blast analysis, IED forensics, scene reconstruction, intelligence processing, and multi-agency investigative operations across three continents.
U.S. Navy EOD (2000–2008) — Three combat deployments to Iraq including Ramadi, Al Anbar Province. Cleared 1,500+ submunitions. Destroyed 3+ million pounds of enemy ordnance. Supervised 235+ high-risk demolition operations. Conducted hundreds of post-blast analysis and IED exploitation missions. Trained 136+ EOD personnel in investigative techniques. Performed protective intelligence during SEAL Team 3 support operations.
U.S. Department of State — DS/ATA (2010–2018) — Senior EOD Advisor and Program Manager for the Diplomatic Security Anti-Terrorism Assistance program. Delivered advanced investigative training to hundreds of foreign EOD technicians, bomb squads, SWAT units, and intelligence officers across 10+ countries. Authored the first integrated SWAT–Bomb Squad capstone curriculum for East Africa, approved by the Department of State. Managed multi-million-dollar equipment inventories including robots, X-ray systems, forensic kits, and ECM systems.
Core sensor technology originated during combat operations in Ramadi — field innovation under fire, refined over two decades from battlefield concept to working prototype. Proprietary technology spanning defense AI, government transparency, and child welfare systems.
Published in the International Tactical Trainers and Officers Association on SWAT–Bomb Squad integration and explosive hazard response during active-assailant events. PI License pending, State of Nevada. 390,000+ lines of operational code.
Follow-the-money investigator who turned a personal encounter with systemic child welfare fraud into the largest independent forensic analysis of managed care corruption in U.S. foster care. In six weeks, produced 486 investigation files spanning 40+ states, uncovering the financial pipeline connecting corporate managed care organizations to foster care placement incentives.
The Centene Pipeline Discovery — Identified how Centene Corporation (NYSE: CNC, $154B revenue, Fortune 25) funds the Home Works! teacher home visit program through the Centene Foundation, deploying mandatory reporters into homes — while Centene’s subsidiary Home State Health simultaneously holds sole-source foster care Medicaid managed care contracts worth approximately $2 billion annually. Traced this dual-profit pipeline across 19 states and 4 sole-source contracts, documenting how the same corporate entity that funds adults entering homes profits when children enter foster care.
50-State Forensic Framework — Designed and executed a 7-module forensic analysis methodology: administrative removal structures, MCO/managed care financial flows, corporate-political timing analysis, foundation-reporter-removal alignment, hidden foster care diversion mechanisms, federal oversight failures, and structural incentive mapping. Applied systematically to 40+ state child welfare systems with full documentation.
Personally investigated 20+ persons of interest including network analysis, financial ecosystem mapping, and OSINT dossier production. Worked active missing children cases including emergency custody research, NCMEC verification, and social media distribution campaigns. Known for relentless quality control and manual fact-checking of every data point.
Cybersecurity operator and OSINT investigator responsible for SSI’s entire defensive security posture and counter-intelligence operations. Maintains near-zero personal digital footprint while systematically dismantling the digital footprints of others.
Infrastructure Hardening — Designed and deployed production server security from bare metal to CIS Level 1 compliance. SSH hardening aligned to modern OpenSSH best practices with curve25519-only key exchange and chacha20-poly1305 ciphers. UFW firewall configuration, Fail2ban tuning with 24-hour ban cycles, TLS 1.2+ enforcement, NIST 800-53 audit logging, and legal 18 USC 1030 access banners. Authored the master cybersecurity reference, log retention policies, and P95-baseline threat monitoring with automated escalation models. Security philosophy: “Strive for boring — deviations from baseline are what matter.”
Counter-Intelligence Operations — Led the investigation into monetized conspiracy media networks, producing 188KB of sourced intelligence across 11 investigation files. Mapped financial flows across 14+ revenue streams with no nonprofit registration or public accountability. Traced network connections through 20+ figures across interconnected media operations, identifying critical bridge nodes between organizations. Cross-referenced FEC records, IRS nonprofit status, state business registries, certificate transparency logs, WHOIS records, and court filings. All open-source, all documented.
Maintains disaster recovery bundles, broadcast infrastructure architecture, and runs full OSINT self-assessments to validate operational security. Working-class roots — grandson of a 52-year electrical contractor from Binghamton, New York.
Inquiries from DoD program managers, defense contractors, government agencies, and qualified investors.
Unclassified discussions only. NDA available upon request.