| Author | Collin George · Independent Research (Center for Competitive Statecraft and Strategic Policy — informal designation) |
| Contact | [email protected] |
| Published | March–April 2026 |
| Status | Unclassified // Open Source // Independent Policy Research |
| Repository | https://github.com/collingeorge/WP-2026 |
| License | CC BY 4.0 |
All papers in this series are independent academic and policy research produced solely by the author in a personal capacity. Nothing in this repository reflects the views or positions of the University of Washington, UW Medical Center, or any other institution. All analysis is based entirely on open-source, publicly available information. No classified or controlled information was used or implied. This repository does not constitute legal advice or operational guidance. This work is analytical in nature and does not propose or direct specific government action.
WP-2026 is a 60+ document open-source policy research corpus covering sanctions enforcement law, financial intelligence, competitive statecraft, proliferation finance, counter-narcotics, terrorism financing, multi-domain operations doctrine, threat analysis, U.S. energy infrastructure and grid modernization policy, U.S. cybersecurity infrastructure and operational posture, PRC defense-industrial enforcement calibration, and CMMC compliance risk assessment. It is organized as a modular analytical system: each document owns a defined analytical domain, imports conclusions from other documents by cross-reference rather than restatement, and is governed by a series architecture memo (SAM-01) that identifies ownership boundaries, series failure conditions, and analytic compliance standards.
The core series was produced between January 15 and April 10, 2026. Sources are primarily Tier 1 (U.S. Government, UN bodies, primary legal texts) or Tier 2 (credible policy institutions and commercial data providers) as defined in the series source tier framework. No classified intelligence was used or implied. The OSINT ceiling doctrine, defined in WP-2026-SENI-ARCH-01, governs the boundary between open-source analysis and classified intelligence requirements throughout.
The analytical register is structured to align with ODNI analytic standards: dual-axis probability and confidence labeling, agent-specific attribution with authority and date, explicit statement of limits and unknowns, and prohibition on prosecutorial certainty, emotive inflation, and advocacy language. Style Guide v3.0 and Verbiage Guide v2.2 govern all series papers. The enforcement architecture series (UNIFIED-01, CTF-01, CPF-02, ARCH-03) additionally applies case-handler style institutional standards: six-part mechanism format, discretion nodes, record-building requirements, and litigation risk analysis.
- Not an intelligence product
- Not an operational directive or implementation instruction
- Not a legal determination or enforcement recommendation
- Not a recommendation to any government authority
- Not a product of any government agency, academic institution, or policy organization
No inference should be made regarding classified capabilities, intelligence sources, or non-public operational methods. This repository is an analytical research framework intended for evaluation, adaptation, and critique.
The following contributions are analytical frameworks derived from open-source synthesis and are presented as research constructs for evaluation, not operational prescriptions.
1. The Nexus Protocol (ATTRIBUTION-01 / NEXUS-01) A five-rung state nexus attribution framework with explicit disconfirmation criteria, corroboration standards, and institutional calibration across OFAC, DOJ, State, IC, and Commerce/BIS. Identifies six attribution failure modes including advocacy capture and toleration-as-tasking.
2. The Multi-Channel Financial Denial Framework (SIEGE-01) A deployment-constrained, litigation-resilient analytic framework assessing limitations of sequential designation and why simultaneous seven-channel pressure is analytically different. Identifies Tier A/B/C network classification, cumulative cost-escalation logic, the fragmentation governing finding, and falsifiable observable indicators. Examined against the Lazarus Group as a high-complexity test case in CI-PLATFORM-01.
3. The PERSIST Architecture (PERSIST-01 / TARIFF-01 / CONTAIN-01 / MAXPRESS-01) A litigation-resilient competitive statecraft framework with six authority rails, tiered escalation ladder, four-tier standards of proof, neutral designation-selection rule, guardrail index, and the Coalition Conflict Resolution Protocol (CCRP). TARIFF-01 v9.5 addresses the post-Learning Resources v. Trump (Feb. 20, 2026) authority architecture; see also FISCAL-01 for the fiscal sustainability architecture that informs enforcement campaign credibility over multi-year timelines.
4. The Strategic Enforcement Node Index (SENI-01 + sub-series) A large-scale global sanctions enforcement targeting register (374 nodes) with an 11-document analytical sub-series mapping the Russian nuclear fuel cycle across three analytical layers — intelligence estimate, enforcement playbook, and strategic model — and a georeferenced interactive map covering multiple threat networks.
5. The AML/CFT/CPF Control Matrix (AML-01 / SENI-02) A bank-grade, policy-grade control matrix mapping 20 node types across nine illicit finance categories with eight-column control structure, three-pass red-team statutory audit, and a named-entity enforcement index of 65+ institutions drawn from public enforcement record.
6. The Corridor Wager (BRI-01 / EST-01) A grand strategy assessment of the conditional strategic opportunity opened by the March 2026 Hormuz crisis, identifying a US-led coalition corridor architecture capable of competing with BRI at contestable nodes and institutionalizing transit governance through a Hormuz-Indian Ocean Forum.
7. The Cross-Domain Enforcement Architecture (UNIFIED-01 / CTF-01 / CPF-02 / ARCH-03) A four-document enforcement architecture structured using case-handler style legal analysis, coordinating counter-narcotics (FEND Off Fentanyl Act, § 2339B material support), counter-terrorism financing (E.O. 13224, class-based § 5318A(a)(4)(A) hawala designation), and counter-proliferation finance (E.O. 13382, CAATSA/CISADA/NKSPEA secondary sanctions, registry-level maritime de-flagging) through shared statutory authorities (Section 311, § 981(k), § 5323). Each mechanism is presented in six-part format (authority, threshold showing, procedural path, evidentiary basis, principal legal risks, operational effect) with discretion nodes, record-building requirements, and litigation risk analysis. The integration layer (UNIFIED-01) assesses that cross-domain designation requires independent evidentiary basis for each predicate — shared infrastructure co-location does not substitute for domain-specific record support.
For readers new to the series, this four-document sequence provides the governing logic, core mechanism, cross-domain application, and empirical validation:
| Step | Document | Function |
|---|---|---|
| 1 | WP-2026-SAM-01.pdf | Governing architecture — ownership, constraints, compliance |
| 2 | WP-2026-SIEGE-01.pdf | Core mechanism — seven-channel financial denial |
| 3 | WP-2026-UNIFIED-01.pdf | Cross-domain application — narcotics, TF, and CPF |
| 4 | WP-2026-CI-PLATFORM-01.pdf | Empirical stress test — Lazarus Group gate assessment |
All other documents extend or operationalize this core.
Different readers will find different entry points most productive. The following guidance reflects the analytical function of each document cluster.
This path provides a direct assessment of CMMC Level 2 readiness risk in the Defense Industrial Base, including failure conditions, a structured 90-day remediation model, and evidence requirements for C3PAO assessment. The analytical methodology applied in this paper is the same structured evidence standard governing the full WP-2026 series.
| Document | Function |
|---|---|
| WP-2026-CMMC-READINESS-RISK-01.pdf | CMMC Level 2 readiness risk assessment — failure drivers, assessment failure conditions, 90-day remediation model, evidence requirements |
For structured readiness diagnostics: collinbgeorge.com
This path provides an integrated enforcement architecture framework from node-level control matrix through cross-domain designation logic, with structured legal rigor consistent with case-handler analysis including six-part mechanism format, threshold showings, evidentiary checklists, discretion nodes, and litigation risk analysis.
| Document | Function |
|---|---|
| WP-2026-AML-01.pdf | Node risk framework — 9 categories, 20 node types, 8-column control matrix |
| WP-2026-SENI-02.pdf | Named-entity enforcement index — 65+ institutions, public enforcement record |
| WP-2026-UNIFIED-01.pdf | Cross-domain enforcement integration — shared infrastructure analysis, coordinated sequencing |
| WP-2026-CTF-01.pdf | Counter-terrorism financing — class-based § 5318A(a)(4)(A), hawala, crypto enforcement |
| WP-2026-CPF-02.pdf | Counter-proliferation finance — E.O. 13382, CAATSA/CISADA/NKSPEA, maritime de-flagging |
| WP-2026-ARCH-03.pdf | Counter-narcotics (fentanyl) — FEND Off Fentanyl Act, enhanced notice procedures, § 2339B |
| WP-2026-STRAT-NSCC-01.pdf | PRC defense-industrial enforcement calibration — Section 311, export controls, multilateral coordination |
| WP-2026-SCORES-01.pdf | Official fiscal score compilation — ★/◆/◇ classification taxonomy |
| WP-2026-SENI-01.pdf | 374-node global enforcement targeting register |
| WP-2026-ESCALATE-01.pdf | Graduated enforcement decision architecture — 15 parts |
This path identifies attribution rigor, evidentiary thresholds, and analytic failure conditions structured to align with ODNI analytic standards, including adversary adaptation modeling and framework degradation analysis.
| Document | Function |
|---|---|
| WP-2026-ATTRIBUTION-01.pdf | Four-level nexus framework — Presence / Linkage / Support / Direct Tasking |
| WP-2026-NEXUS-01.pdf | PRC state nexus extension — five-rung ladder with Enablement |
| WP-2026-EVASION-01.pdf | Adversary adaptation architecture |
| WP-2026-COUNTERINTEL-01.pdf | Framework degradation conditions |
| WP-2026-STRAT-NSCC-01.pdf | Event-driven enforcement calibration — PRC defense-industrial intelligence exploitation |
| 06-threat-analysis/ | Iran nuclear/WMD, BW assessment, Hormuz crisis architecture |
This path provides reality-constrained U.S. infrastructure policy frameworks: nuclear capacity expansion and grid modernization, and cybersecurity execution gap analysis covering infrastructure defense, institutional capacity, and operational posture.
| Document | Function |
|---|---|
| WP-2026-NUC-01.pdf | U.S. nuclear capacity expansion — near-term reliability, industrial, and grid security strategy |
| WP-2026-CYBER-01.pdf | U.S. cybersecurity execution gap — infrastructure defense, institutional capacity, operational posture |
| WP-2026-RESILIENCE-01.pdf | Domestic industrial capacity prerequisite layer |
| WP-2026-FISCAL-01.pdf | Fiscal sustainability — federal financing and tax-credit policy context |
This path provides executive-level synthesis and strategy-layer documents structured for policy consumption, with explicit probability assessments and scenario-conditioned outcome pathways.
| Document | Function |
|---|---|
| WP-2026-SENI-EXEC-01.pdf | Two-page executive synthesis — priority enforcement options |
| WP-2026-STRAT-NSCC-01.pdf | PRC defense-industrial enforcement calibration — 12 actions, decision matrix, 90/180/360-day timelines |
| WP-2026-BRI-01.pdf | Grand strategy capstone — Hormuz leverage and corridor architecture |
| WP-2026-EST-01.pdf | IC-style strategic estimate — six Key Judgments, five scenario pathways |
| WP-2026-NUC-01.pdf | U.S. nuclear capacity expansion and grid modernization framework |
| WP-2026-CYBER-01.pdf | U.S. cybersecurity execution gap analysis |
| SENI_v4_Global_Map_FINAL.html | Interactive 374-node georeferenced enforcement map |
This path supports peer assessment of methodological rigor, original contribution, and analytic governance. The series has been through three red-team audit passes covering statutory precision, escalation language, and enforcement exposure.
| Document | Function |
|---|---|
| WP-2026-SAM-01.pdf | Series architecture and governance |
| WP-2026-StyleGuide-v3.pdf | Analytic register standard |
| WP-2026-CI-PLATFORM-01.pdf | Empirical validation — Lazarus Group gate assessment |
| WP-2026-AML-01.pdf | Red-teamed AML/CFT/CPF control matrix |
| WP-2026-SIEGE-01.pdf | Core analytical framework |
This path reflects sustained systematic analytical production: 60+ documents across 12 analytical domains, produced between January 15 and April 10, 2026, governed by an explicit series architecture memo, structured to align with ODNI analytic standards, and examined through three documented red-team audit passes. GitHub commit history provides timestamped provenance for the entire production chain.
| Document | Function |
|---|---|
| WP-2026-SAM-01.pdf | Series architecture — ownership domains, failure conditions, compliance |
| WP-2026-ATTRIBUTION-01.pdf | Foundational methodology — nexus attribution framework |
| WP-2026-AML-01.pdf | Applied methodology — illicit finance node control architecture |
| WP-2026-SIEGE-01.pdf | Core framework — deployment-constrained, litigation-resilient design |
The work is unclassified, open-source, and institutionally independent. It is structured using interagency policy analysis conventions and reflects familiarity with U.S. enforcement authorities, export control frameworks, and multilateral coordination mechanisms.
GitHub commit history provides full timestamped provenance: https://github.com/collingeorge/WP-2026/commits/main
WP-2026/
├── 00-governance/ SAM-01, StyleGuide v3.0, Verbiage Guide v2.2, Authority Index, CI Assessments
├── 01-methodology/ ATTRIBUTION-01, NEXUS-01, AML-01, SENI-02, SCORES-01
├── 02-core-frameworks/ PERSIST-01, SIEGE-01, UNIFIED-01, EVASION-01, COUNTERINTEL-01, CI-PLATFORM-01
├── 03-strategic-architecture/ CONTAIN-01, MAXPRESS-01, TARIFF-01 v9.5, BRI-01, EST-01, FISCAL-01, STRAT-NSCC-01, MAXPRESS-IMMIG-01, NUC-01, CYBER-01
├── 04-applied-enforcement/ ESCALATE-01, SHIELD-01, SENI-01, AXIS-01, INFRA-01, CTF-01, CPF-02, ARCH-03
├── 05-seni-system/ SENI sub-series — 11 documents across L1/L2/L3 architecture
├── 06-threat-analysis/ HORMUZ-01/02, Iran Nuclear, Iran WMD, BW Assessment
├── 07-visualization/ SENI v4 Global Map (interactive), MDO-01 console, MAP-CI-01
├── 08-resilience-foundation/ RESILIENCE-01
├── 09-isr-annexes/ ISR Decision Support Annex, ISR WMD Intelligence Briefing
├── 10-under-revision/ (empty — all documents deployed to permanent locations)
├── 11-archive/ SIEGE-01 v1, UNIFIED-01 v1, UNIFIED-01 v3 (superseded)
├── 12-cmmc-compliance/ CMMC Level 2 readiness risk assessment — commercial compliance domain
└── 99-source-docx/ Working DOCX files — not primary publication artifacts
This architecture reflects analytical ownership and dependency relationships defined under SAM-01. Documents do not duplicate claims; they import validated conclusions from upstream sources. Arrows indicate upstream dependency for analytic validity.
SAM-01 (provides the governing structure — ownership domains, failure conditions, compliance standard)
│
├── 00-governance/
│ StyleGuide v3.0 · Verbiage Guide v2.2 · Authority Index · CI Assessments
│
├── ATTRIBUTION-01 (4-level nexus: Presence / Linkage / Support / Direct Tasking)
│ │
│ └── NEXUS-01 / CSE-01 (5-rung PRC extension: adds Enablement)
│ │
│ ├── SHIELD-01 (CCRP) ──► SENI-01 v5.2 (374 nodes, 15 sections)
│ │ │ │
│ │ │ 05-seni-system/ sub-series (11 documents)
│ │ │ ├── SENI-ARCH-01 (3-layer product architecture)
│ │ │ ├── L1: Vol1-3 + Analytical (intelligence estimates)
│ │ │ ├── L2: SCORE-01, FPA-01, FPA-02 (enforcement playbooks)
│ │ │ ├── L3: Layer3 (strategic models)
│ │ │ └── SENI-EXEC-01 (executive synthesis)
│ │ └── SHIELD-01-Academic-Article
│ │
│ └── PERSIST-01 (authority rails, standards of proof, neutral selection rule)
│ │
│ ├── TARIFF-01 (litigation-resilient tariff enforcement)
│ ├── CONTAIN-01 (long-term sanctions containment doctrine)
│ │ └── MAXPRESS-01 (execution layer — practitioner-ready)
│ │ └── ESCALATE-01 (institutional decision architecture)
│ │ └── RESILIENCE-01 (domestic capacity prerequisite)
│ └── MAXPRESS-IMMIG-01 (immigration enforcement architecture)
│
├── SIEGE-01 Final (seven-channel mechanism — series governing framework)
│ ├── UNIFIED-01 v4 (cross-domain integration — case-handler style)
│ │ ├── CTF-01 (counter-terrorism financing — § 5318A(a)(4)(A), hawala, crypto)
│ │ ├── CPF-02 (counter-proliferation finance — E.O. 13382, CAATSA/CISADA/NKSPEA, maritime)
│ │ └── ARCH-03 (counter-narcotics — FEND Off Fentanyl, § 2339B, precursor supply chain)
│ ├── EVASION-01 (active adversary exploitation model)
│ ├── COUNTERINTEL-01 (passive degradation map — framework failure conditions)
│ └── CI-PLATFORM-01 (empirical stress test — Lazarus Group gate assessment)
│
├── AML-01 (illicit finance node control matrix — 9 categories, 20 node types)
│ └── SENI-02 (named-entity enforcement index — 65+ institutions)
│
├── AXIS-01 (Russia-China energy and financial axis — 60-node complex)
│
├── HORMUZ-01 ──► HORMUZ-02 (integrated Hormuz campaign architecture)
│ └── Iran Nuclear Assessment ──► Iran WMD Assessment ──► BW Assessment
│
├── TARIFF-01 v9.5 (post-Learning Resources authority architecture; revenue capacity)
│ └── FISCAL-01 (US fiscal sustainability — baseline, consolidation architecture)
│ └── [reads into ESCALATE-01 throughput constraints and RESILIENCE-01]
│
├── SCORES-01 (official fiscal score compilation — reference foundation for TARIFF-01 and FISCAL-01)
│
├── BRI-01 v4.1 (grand strategy capstone)
│ └── EST-01 (IC-style strategic estimate derivative)
│
├── STRAT-NSCC-01 (PRC defense-industrial enforcement calibration — event-driven)
│ └── [reads from UNIFIED-01 (enforcement integration), CYBER-01 (cybersecurity context)]
│ └── [cross-references CTF-01/CPF-02/ARCH-03 enforcement authorities]
│
├── NUC-01 (U.S. nuclear capacity expansion and grid modernization — prerequisite infrastructure)
│ └── [reads from FISCAL-01 (federal financing context) and RESILIENCE-01 (industrial capacity)]
│ └── [HALEU/Rosatom fuel-supply analysis connects to SENI-01 Russian nuclear fuel cycle nodes]
│
├── CYBER-01 (U.S. cybersecurity execution gap — infrastructure defense, institutional capacity, operational posture)
│ └── [reads from RESILIENCE-01 (industrial capacity) and ESCALATE-01 (institutional throughput)]
│
├── MDO-01 v3 + Console (multi-domain operations doctrine — three-track model)
│
└── CMMC-READINESS-RISK-01 (CMMC Level 2 readiness risk — independent domain, shared methodology)
The following order reflects dependency requirements, not mandatory reading sequence. Readers may enter at any point using the Rapid Orientation path above.
| # | Document | Folder | Function |
|---|---|---|---|
| 1 | WP-2026-SAM-01.pdf | 00-governance | Governing architecture — read first |
| 2 | WP-2026-StyleGuide-v3.pdf | 00-governance | Analytic register standard |
| 3 | WP-2026-Verbiage-Guide-v2.2.pdf | 00-governance | Drafting doctrine |
| 4 | WP-2026-Authority-Index.pdf | 00-governance | Legal authority reference |
| 5 | WP-2026-ATTRIBUTION-01.pdf | 01-methodology | Nexus attribution framework |
| 6 | WP-2026-NEXUS-01.pdf | 01-methodology | PRC state nexus extension |
| 7 | WP-2026-AML-01.pdf | 01-methodology | Illicit finance node control matrix |
| 8 | WP-2026-SENI-02.pdf | 01-methodology | Named-entity enforcement index |
| 9 | WP-2026-PERSIST-01.pdf | 02-core-frameworks | Authority rails and statecraft architecture |
| 10 | WP-2026-SIEGE-01.pdf | 02-core-frameworks | Seven-channel financial denial mechanism |
| 11 | WP-2026-UNIFIED-01.pdf | 02-core-frameworks | Cross-domain enforcement integration |
| 12 | WP-2026-CTF-01.pdf | 04-applied-enforcement | Counter-terrorism financing enforcement architecture |
| 13 | WP-2026-CPF-02.pdf | 04-applied-enforcement | Counter-proliferation financing enforcement architecture |
| 14 | WP-2026-ARCH-03.pdf | 04-applied-enforcement | Fentanyl supply chain enforcement architecture |
| 15 | WP-2026-EVASION-01.pdf | 02-core-frameworks | Adversary adaptation model |
| 16 | WP-2026-COUNTERINTEL-01.pdf | 02-core-frameworks | Framework degradation conditions |
| 17 | WP-2026-CI-PLATFORM-01.pdf | 02-core-frameworks | Empirical stress test — Lazarus Group |
| 18 | WP-2026-CONTAIN-01.pdf | 03-strategic-architecture | Long-term containment doctrine |
| 19 | WP-2026-MAXPRESS-01.pdf | 03-strategic-architecture | Maximum pressure execution |
| 20 | WP-2026-TARIFF-01.pdf | 03-strategic-architecture | Tariff enforcement architecture |
| 21 | WP-2026-BRI-01.pdf | 03-strategic-architecture | Grand strategy capstone |
| 22 | WP-2026-EST-01.pdf | 03-strategic-architecture | IC-style strategic estimate |
| 23 | WP-2026-SCORES-01.pdf | 01-methodology | Official fiscal score compilation |
| 24 | WP-2026-FISCAL-01.pdf | 03-strategic-architecture | US fiscal sustainability |
| 25 | WP-2026-STRAT-NSCC-01.pdf | 03-strategic-architecture | PRC defense-industrial enforcement calibration |
| 26 | WP-2026-RESILIENCE-01.pdf | 08-resilience-foundation | Domestic capacity prerequisite layer |
| 27 | WP-2026-NUC-01.pdf | 03-strategic-architecture | U.S. nuclear capacity expansion and grid modernization |
| 28 | WP-2026-CYBER-01.pdf | 03-strategic-architecture | U.S. cybersecurity execution gap analysis |
| 29 | WP-2026-ESCALATE-01.pdf | 04-applied-enforcement | Graduated enforcement decision architecture |
| 30 | WP-2026-SHIELD-01-V7-PUBLISH.pdf | 04-applied-enforcement | PRC-facilitated network enforcement |
| 31 | WP-2026-SENI-01.pdf | 04-applied-enforcement | 374-node enforcement targeting register |
| 32 | WP-2026-AXIS-01.pdf | 04-applied-enforcement | Russia-China axis assessment |
| 33 | WP-2026-INFRA-01.pdf | 04-applied-enforcement | Infrastructure enforcement framework |
| 34 | 05-seni-system/ | 05-seni-system | SENI sub-series — see folder README |
| 35 | WP-2026-HORMUZ-01.pdf | 06-threat-analysis | Hormuz regional posture assessment |
| 36 | WP-2026-HORMUZ-02.pdf | 06-threat-analysis | Integrated Hormuz campaign architecture |
| 37 | WP-2026-IRAN-NUCLEAR-ASSESSMENT.pdf | 06-threat-analysis | Post-strike nuclear assessment |
| 38 | WP-2026-IRAN-WMD-ASSESSMENT.pdf | 06-threat-analysis | Iran WMD program assessment |
| 39 | BW-Assessment-SUBMISSION-FINAL.pdf | 06-threat-analysis | State BW risk assessment |
| 40 | WP-2026-MDO-01-v3.pdf | 07-visualization | Multi-domain operations doctrine |
| 41 | SENI_v4_Global_Map_FINAL.html | 07-visualization | Interactive 374-node enforcement map |
| 42 | WP-2026-MDO-01-console.html | 07-visualization | MDO-01 interactive decision console |
| 43 | WP-2026-CMMC-READINESS-RISK-01.pdf | 12-cmmc-compliance | CMMC Level 2 readiness risk in the U.S. Defense Industrial Base |
SENI v4 Global Intelligence Map 374 georeferenced nodes across multiple threat networks: Russia-China strategic infrastructure, Russian nuclear fuel cycle, Iran WMD program, Makran Coast industrial complex, Hormuz crisis architecture, DPRK nuclear and cyber networks, global cartel and terrorist finance networks, PRC and Russian overseas military basing, Wagner/Africa Corps, IRGC-QF external operations, and BRI strategic infrastructure. Satellite imagery via Esri World Imagery. OSINT basis only. Confidence levels, legal authorities, and enforcement theory carried through per node.
MDO-01 Analytic Console Interactive decision-support interface operationalizing MDO-01 v3.0. Ten modules: three-track comparator (Diplomatic / Overt Warfare / Clandestine), authorities and friction map, adversary stress test (PRC / Russia / DPRK), campaign workflow viewer, confidence matrix, F2T2EA targeting sequence, sanctions case validation, scenario builder, and export brief generator.
A representative selection. Full index: WP-2026-Authority-Index.pdf
| Authority | Type | Primary Application |
|---|---|---|
| EO 14024 (as amended by EO 14114) | U.S. Executive Order | Russia sanctions; foreign financial institution exposure tied to Russia's military-industrial base |
| EO 13382 | U.S. Executive Order | WMD proliferators and their supporters; proliferation-finance targeting |
| EO 13224 | U.S. Executive Order | SDGT blocking; terrorist financing |
| EO 13818 | U.S. Executive Order | Global Magnitsky sanctions for corruption and serious human rights abuse |
| EO 13959 (as amended by EO 14032) | U.S. Executive Order | PRC military-industrial complex companies; securities investment restrictions |
| EO 14105 | U.S. Executive Order | Outbound investment restrictions in PRC sensitive technology sectors |
| IEEPA (50 U.S.C. §§ 1701–1707) | U.S. Statute | Core emergency economic powers / blocking authority |
| IEEPA § 1705 (50 U.S.C. § 1705) | U.S. Statute | Civil and criminal penalties for sanctions violations |
| CAATSA §§ 226, 231, 232 | U.S. Statute | Russia-related sanctions architecture; Russian defense / intelligence sector exposure; certain Russia energy export pipeline activity |
| CISADA (22 U.S.C. § 8513) | U.S. Statute | Iran petroleum and financial messaging sanctions |
| NKSPEA (22 U.S.C. § 9214) | U.S. Statute | DPRK dual-use trade sanctions |
| FEND Off Fentanyl Act (Pub. L. 117-263, § 6216) | U.S. Statute | Fentanyl trafficking as § 5318A predicate offense |
| 31 U.S.C. § 5318A (Section 311) | U.S. Statute | Special measures for jurisdictions, financial institutions, or transactions of primary money laundering concern |
| 31 U.S.C. § 5323 | U.S. Statute | AML whistleblower bounty program |
| 31 U.S.C. § 5318(h) | U.S. Statute | AML program requirements for financial institutions |
| 31 U.S.C. § 5318(g) | U.S. Statute | Suspicious Activity Report (SAR) obligations |
| 18 U.S.C. § 981(k) | U.S. Statute | Asset substitution — seizure from correspondent accounts |
| 18 U.S.C. § 1956 | U.S. Statute | Money laundering |
| 18 U.S.C. § 1960 | U.S. Statute | Unlicensed money transmitting business |
| 18 U.S.C. § 2339B | U.S. Statute | Material support to designated foreign terrorist organizations |
| 18 U.S.C. § 2339D | U.S. Statute | WMD material support |
| 50 U.S.C. § 4819 | U.S. Statute | Export Control Reform Act — criminal penalties |
| 15 C.F.R. § 764.3 | U.S. Regulation | EAR civil penalty provisions |
| 31 C.F.R. Part 501 | U.S. Regulation | OFAC reporting, recordkeeping, and enforcement procedures |
| 31 C.F.R. Chapter V | U.S. Regulation | OFAC sanctions program implementation framework |
| AECA, 22 U.S.C. § 2778 | U.S. Statute | Arms export controls |
| EAR, 15 C.F.R. pts. 730–774 | U.S. Regulation | Export controls; BIS Entity List; FDPR |
| Atomic Energy Act of 1954 (42 U.S.C. §§ 2011 et seq.) | U.S. Statute | Civilian nuclear regulation; licensing; nuclear materials control |
| Atomic Energy Act § 123 | U.S. Statute | Civil nuclear cooperation agreements with foreign states |
| Nuclear Non-Proliferation Act of 1978 | U.S. Statute | Nuclear export controls; safeguards; nonproliferation conditions |
| 10 C.F.R. Part 50 | U.S. Regulation | Domestic licensing of production and utilization facilities |
| 10 C.F.R. Part 52 | U.S. Regulation | Early site permits, standard design approvals, and combined licenses for nuclear plants |
| 10 C.F.R. Part 810 | U.S. Regulation | Assistance to foreign atomic energy activities |
| Federal Power Act (16 U.S.C. §§ 791a et seq.) | U.S. Statute | FERC authority over wholesale electricity markets and transmission |
| Energy Policy Act of 2005 | U.S. Statute | Nuclear loan guarantees, tax incentives, and licensing-related reforms |
| Infrastructure Investment and Jobs Act of 2021 | U.S. Statute | Grid funding, resilience investments, and civil nuclear support programs |
| Inflation Reduction Act of 2022 | U.S. Statute | Clean energy tax credits; nuclear production and investment support |
| AMLA 2020 (Pub. L. 116-283, Div. F) | U.S. Statute | AML modernization; antiquities coverage; beneficial ownership reporting; art-market study / follow-on rulemaking context |
| GENIUS Act (Pub. L. 119-27) | U.S. Statute | Payment stablecoin federal framework; AML/BSA-related treatment in the stablecoin regime |
| FATF Recommendations (2012, as amended Oct. 2025) | International Standard | AML/CFT/CPF framework; not self-executing absent domestic implementation |
| UN SCRs 1267 / 1373 / 2094 / 2231 | UN Security Council | ISIL/Al-Qaida sanctions; counterterrorism obligations; DPRK sanctions; Iran / 2231 historical or scenario-specific application |
| West Virginia v. EPA, 597 U.S. 697 (2022) | U.S. Case Law | Major questions doctrine; caution for aggressive agency interpretations in high-consequence regulatory actions |
| Loper Bright Enters. v. Raimondo, 603 U.S. 369 (2024) | U.S. Case Law | Chevron overrule; de novo judicial review of agency statutory interpretation |
| Van Loon v. Dep't of Treasury, No. 23-50669 (5th Cir. 2024) | U.S. Case Law | Tornado Cash designation upheld; immutable smart contracts as blockable property under IEEPA |
| Al Haramain Islamic Found., Inc. v. U.S. Dep't of Treasury, 686 F.3d 965 (9th Cir. 2012) | U.S. Case Law | OFAC due process framework for SDN designations |
This repository uses only publicly available, open-source information. Sources are primarily classified as Tier 1 (U.S. Government, UN bodies, primary legal texts, peer-reviewed journals) or Tier 2 (credible policy institutions, commercial data providers, congressional testimony with named attribution) as defined in Style Guide v3.0. No classified or controlled information was used or implied. No inference should be made regarding classified capabilities, intelligence sources, or non-public operational methods.
This repository does not constitute legal advice, operational guidance, policy direction, or a recommendation to any government authority. It does not assess, recommend, or facilitate any action against any named or identifiable individual, institution, or network. Analytical conclusions are conditional, evidence-based, scenario-conditioned where indicated, and explicitly bounded by stated confidence levels and limits.
Attribution in this repository reflects public enforcement records, designation histories, and open-source reporting. It does not constitute judicial determination unless explicitly stated. All findings are time-bound to the period specified and should not be interpreted as reflecting current conduct unless explicitly stated.
George, Collin. WP-2026: Independent Policy Research Series. Center for Competitive Statecraft and Strategic Policy, March–April 2026. https://github.com/collingeorge/WP-2026
UNCLASSIFIED // OPEN SOURCE // INDEPENDENT POLICY RESEARCH Center for Competitive Statecraft and Strategic Policy · Collin George · March–April 2026 Licensed under CC BY 4.0 — https://creativecommons.org/licenses/by/4.0/