// THE KIQ
"Produce a TSA of [specific infrastructure system] with emphasis on the components whose failure would propagate beyond containment within 72 hours."
Target system analysis, vulnerability mapping, and opportunity-window assessment. Where the leverage is and when it's open.
// QUESTION CLASS
Actionable is the engine that produces targeting products — not in the kinetic sense, unless the customer is authorized for that, but in the analytic sense: the identification of the specific components, dependencies, and moments where intervention (by any means) would produce disproportionate effect. A Target System Analysis (TSA) in IC tradition, adapted for the analysis the customer actually needs. For a commercial customer this might be the critical path of a supply chain. For a national-security customer it might be the decision-making architecture of a counterpart. The shape of the analysis is consistent; the application is not. The engine's distinctive output is the BowTie Diagram — a formal mapping of threats on one side, consequences on the other, and the barriers between them. BowTie is a methodology used in safety engineering and adapted for intelligence analysis. It is the single most useful visual for communicating "here are the ways this fails, here are what happens when it does, and here is what stands in the way." An Actionable report without a BowTie has not done the work.
// ANATOMY
An Actionable report is structured around a system, not a narrative. The reader is trying to identify leverage — where in the system does change have disproportionate effect — and the report is optimized for that question. The Target System Map is the first thing the reader sees; everything else is commentary on specific parts of it. The BowTie Analysis appears per critical threat-consequence pairing and is the format the IC and the safety-engineering communities converge on for this kind of work. The analyst does not recommend action; they identify the leverage and name the constraints. The customer decides.
// THREAT. BARRIERS. CONSEQUENCE.
// WORKED EXAMPLE
// THE KIQ
"Produce a TSA of [specific infrastructure system] with emphasis on the components whose failure would propagate beyond containment within 72 hours."
We identify six nodes in the system whose degradation would produce propagation effects beyond the 72-hour containment window. Node-3 (central coordination authority) is the most significant:¹ its degradation removes the arbitration mechanism that resolves inter-component conflict, which would produce cascading misconfiguration across Nodes 8–14 within 12 hours based on historical case studies.² Node-3's dependencies are themselves load-bearing: it relies on three separate communication paths, of which only one has a documented redundancy.³ The BowTie analysis for Node-3 (below) names six threat pathways and four barrier configurations, of which two are currently degraded…
// TRADECRAFT
Every node, every edge, every dependency in the Target System Map is sourced individually. A reader who disagrees with the analysis should be able to identify which source is wrong or which inference is flawed. No edges without citations.
ICD 206 · Full source attributionBowTie Analysis is a formal methodology used in safety engineering (petrochemical, aviation, medical) and adopted by parts of the IC for threat-consequence analysis. We use the formal structure: left side = threats, center = hazardous event, right side = consequences, barriers between. Not decorative. The barriers are named and their current state (effective, degraded, absent) is assessed.
BowTie Methodology · CCPS / IChemE traditionThe Actionable engine identifies leverage points and their constraints. It does not tell a customer what action to take — that is the customer's authority, not the analyst's. A report that says "you should do X" has stopped being analysis and started being advocacy. This distinction is the IC standard for actionable products.
ICD 203 · Objectivity + IndependenceOften paired with: Foundational (the system-map foundation), Argumentative (pressure-tests critical-node claims).
// AUTHORED BY
// OTHER ENGINES