State Building & Reform Frameworks
We reject the "blank slate" approach. Rebuilding a state requires understanding its legacy systems. Our articles explore the architectural choices required to transition from emergency governance to functional sovereignty.
Adaptive Assurance Mechanisms for Volatile Operational Contexts
June 28, 2025
Learn why adaptability is crucial for project monitoring in uncertain environments, shifting from static plans to dynamic, principle-based approaches that thrive amidst global shocks.
Shadow Workflows: Identifying Risk in Unofficial Process Documentation
June 28, 2025
Discover how informal workarounds and "Shadow IT" like Post-it notes and unofficial spreadsheets reveal critical risks and expose the true, de facto workflows in organizations.
Political Economy Analysis - Structuring Monitoring in Complex Environments
June 27, 2025
Learn how to structure monitoring engagements in politically complex environments to ensure rigor and maintain productive relationships. Discover essential pillars for transparent terms of reference, data access, and communication protocols.
Operational Security and Business Continuity Standards for non-permissive deployments
June 5, 2025
Learn how integrating Security Risk Management (SRM) and Business Continuity Planning (BCP) is crucial for protecting non-permissive deployments and ensuring mission resilience in challenging environments.
Process Optimization vs. Obfuscation - Identifying Counterproductive Complexity
May 10, 2025
Digitizing flawed processes without critical analysis can lead to deeper obfuscation and new risks. Discover why process rationalization must precede technology to achieve true digital transformation.
Duty of care and security governance for non-permissive deployments
May 3, 2025
Learn about the non-negotiable duty of care in field operations within high-risk environments. Discover a systematic, proactive, and multi-layered security framework for protecting personnel and ensuring data integrity.
Sovereign Digital Infrastructure
Technology in government is not about IT; it is about law and process. We discuss the design of sovereign systems—from IFMIS to Biometric Payroll—that enforce the State's will through code.
Biometric Enrollment and Physical Enumeration Standards in Low-ID Contexts
July 15, 2025
Learn practical approaches for physical enumeration and enrollment of people in the 21st century focusing on planning resources and fieldcraft for cash assistance and national ID programs
Shadow Workflows: Identifying Risk in Unofficial Process Documentation
June 28, 2025
Discover how informal workarounds and "Shadow IT" like Post-it notes and unofficial spreadsheets reveal critical risks and expose the true, de facto workflows in organizations.
Digital Transformation in Field Enumeration and Verification
June 25, 2025
Explore how digital data collection using mobile tools transforms fieldwork by improving data quality, efficiency, and real-time availability in development projects.
Synthetic Data Validation: Forensic Testing of Financial Software Logic
June 25, 2025
Discover how curated test data sets can act as the ultimate lie detector for financial software, revealing hidden flaws and ensuring system robustness beyond "happy path" scenarios.
Silent Failure Modes - Detecting Latent Errors in Financial Technology
June 21, 2025
Explore the hidden dangers of silent systemic failures in financial technology, where errors occur without alarms. Learn about archetypes of silent failure and the need for proactive, independent verification.
Process Optimization vs. Obfuscation - Identifying Counterproductive Complexity
May 10, 2025
Digitizing flawed processes without critical analysis can lead to deeper obfuscation and new risks. Discover why process rationalization must precede technology to achieve true digital transformation.
Civil Service Professionalization
True capacity is not measured in workshops attended, but in the ability of the Civil Service to execute the budget without external support. These technical notes cover the transition from "Technical Assistance" to "Indigenous Capacity."
Adaptive Assurance Mechanisms for Volatile Operational Contexts
June 28, 2025
Learn why adaptability is crucial for project monitoring in uncertain environments, shifting from static plans to dynamic, principle-based approaches that thrive amidst global shocks.
Shadow Workflows: Identifying Risk in Unofficial Process Documentation
June 28, 2025
Discover how informal workarounds and "Shadow IT" like Post-it notes and unofficial spreadsheets reveal critical risks and expose the true, de facto workflows in organizations.
Political Economy Analysis - Structuring Monitoring in Complex Environments
June 27, 2025
Learn how to structure monitoring engagements in politically complex environments to ensure rigor and maintain productive relationships. Discover essential pillars for transparent terms of reference, data access, and communication protocols.
Digital Transformation in Field Enumeration and Verification
June 25, 2025
Explore how digital data collection using mobile tools transforms fieldwork by improving data quality, efficiency, and real-time availability in development projects.
Synthetic Data Validation: Forensic Testing of Financial Software Logic
June 25, 2025
Discover how curated test data sets can act as the ultimate lie detector for financial software, revealing hidden flaws and ensuring system robustness beyond "happy path" scenarios.
Silent Failure Modes - Detecting Latent Errors in Financial Technology
June 21, 2025
Explore the hidden dangers of silent systemic failures in financial technology, where errors occur without alarms. Learn about archetypes of silent failure and the need for proactive, independent verification.
Fiduciary Integrity & Resilience
In volatile environments, corruption is often a symptom of systemic fragility. We analyze how to design control frameworks that survive political shocks and protect the integrity of the public purse.
Investment-Grade Due Diligence - Applying Private Sector Rigor to Aid Portfolios
June 29, 2025
Learn how applying investment-grade due diligence to development aid programs goes beyond basic compliance. Discover a holistic, forward-looking assessment of operational models, technology, governance, and resilience for strategic assurance.
Adaptive Assurance Mechanisms for Volatile Operational Contexts
June 28, 2025
Learn why adaptability is crucial for project monitoring in uncertain environments, shifting from static plans to dynamic, principle-based approaches that thrive amidst global shocks.
Shadow Workflows: Identifying Risk in Unofficial Process Documentation
June 28, 2025
Discover how informal workarounds and "Shadow IT" like Post-it notes and unofficial spreadsheets reveal critical risks and expose the true, de facto workflows in organizations.
Silent Failure Modes - Detecting Latent Errors in Financial Technology
June 21, 2025
Explore the hidden dangers of silent systemic failures in financial technology, where errors occur without alarms. Learn about archetypes of silent failure and the need for proactive, independent verification.
Override Governance: Auditing Super-User Privileges in Sovereign Financial Systems
June 18, 2025
Explore the critical risk of privileged user accounts in financial systems and why auditing them is paramount. Learn about the governance framework for managing superuser access to ensure fiduciary oversight.
Architectural Pragmatism - Reassessing Monolithic Systems in Low-Capacity States
June 10, 2025
Explore the pragmatic argument for monolithic financial systems in low-capacity states. This article re-evaluates architectural risks, arguing that basic fiscal control and centralized accountability may outweigh the pursuit of modular agility in certain contexts.
Discuss Institutional Objectives
Contact the partners for a confidential discussion regarding state capacity and reform.
Contact Partners