Research, working papers, and technical writing from the principals of Navarre Industries and its subsidiaries and partners. Academic thought applied to institutional design, adversarial systems, and the architecture of durable organizations.
Working Paper · Navarre IndustriesFORTHCOMING
Protocol Design as Institutional Infrastructure: A Framework for Cross-Jurisdictional Coordination
M. Dow
Proposes a formal framework for designing coordination protocols in multi-jurisdictional environments where traditional hierarchical oversight mechanisms fail. Draws on case studies from cross-border asset recovery, multinational enforcement operations, and distributed financial systems to identify three structural properties — format-nativity, temporal explicitness, and failure-awareness — that distinguish effective coordination protocols from documented but non-functional ones.
ABSTRACT ↓
Technical Report · Meridian Capital PartnersFORTHCOMING
Asymmetric Information Architectures in Adversarial Recovery Environments
M. Dow, Meridian Capital Partners
Examines the role of information filtration — rather than information collection — as the primary determinant of operational advantage in cryptocurrency asset recovery. Introduces a decision-relevance scoring model for intelligence triage in time-constrained adversarial proceedings.
ABSTRACT ↓
Essay · Navarre IndustriesFORTHCOMING
On the Structural Properties of Mission-Finite Organizations
M. Dow
Argues that organizations designed with explicit completion horizons exhibit superior capital allocation, talent deployment, and strategic clarity compared to organizations designed for indefinite continuation. Distinguishes between the container (the holding architecture, designed for durability) and the contents (the operating units, designed for completion).
ABSTRACT ↓
White Paper · Kinetic SystemsFORTHCOMING
Identity as Attack Surface: Threat Modeling for High-Net-Worth Individuals in the Synthetic Media Era
Kinetic Systems Research
Surveys the emerging threat landscape created by generative AI applied to identity fraud, social engineering, and reputational attack. Proposes a layered defense architecture combining cryptographic attestation, behavioral biometrics, and adversarial monitoring to protect individuals whose public profiles make them high-value targets.