Digital Companion · Case File PD-VOL2-FC
The Detective's Field Card
The Procurement Detective: Volume II — Complete Operative Reference
57 terms across 5 acts
Act I
The New Badge
Identity & Personal Code
The Syndicate primary threat
Institutionalised apathy and convenience — not corruption. The system that protects the wrong outcome, signed off in triplicate.
↓ more
High Pillows
Senior executives trading truth for comfort. Live in dashboards that hide the grit. Weapon: "no surprises." Motive: political survival.
↓ more
The Fuzz
Legal. Chokes value in the name of safety. Turns every contract into a prenup before the first cut is even made. Motive: liability avoidance.
↓ more
Highbinders
Finance. Views procurement as an indentured clerical function. Priests of the ledger. Religion: the quarterly balance sheet.
↓ more
Hollow Giant supplier
An incumbent protected by proximity, not performance. Big on paper, empty on delivery. Feeds on comfort renewals and executive apathy.
↓ more
Gold Command
The Lieutenant as anchor of the circle, not a General on a hill. Absorbs political heat so the squad can work. Authority exists only for protection.
↓ more
Matriarchal Duty core philosophy
Leadership defined by the health of the village, not a title. Procurement reframed as obligation to protect the community the system serves.
↓ more
Kava Circle
Inspired by Fijian dispute resolution. Adversarial stakeholders brought to one table, anchored by the PDM. Silos lose their power inside the circle.
↓ more
Subversive Resilience
Strategic patience. Build the evidence base quietly until the organisation cannot make a major decision without the Precinct in the room.
↓ more
Girmityas
The author's Fijian Indo-heritage — indentured labourers under British colonial rule. The source of Generational Resilience as a tactical edge.
↓ more
ABC Manifesto core doctrine
Assume Nothing. Believe Nothing. Challenge Everything. The cognitive firewall against confirmation bias, narrative capture, and the lullabies that let problems hide in plain sight.
↓ more
PDM — Procurement Decision Model
Written decision record: risk, options, accountability, sign-off line. Adapted from the UK NDM. The Syndicate evaporates when truth must be recorded in ink.
↓ more
Allegation of Need
Every requisition treated as an unverified witness statement, not a settled fact. The ABC filter applied at the very first trigger.
↓ more
Crazy-Wall
The ADHD Lieutenant's pattern recognition externalised — a live map of red strings connecting the data points others filter as noise. Cognition as an investigative tool.
↓ more
Act II
The Internal Syndicate
Politics & Power
Gilded Silo danger
A department that looks like a star from the outside but is protected by a culture of silence. Outlives every reformer who tries to fix it.
↓ more
Shadow P&L
Dark ledger of Maverick Spend — money that never sees an RFP, never touches a contract, never appears on a dashboard. The Syndicate's preferred feeding ground.
↓ more
Maverick Spend
Purchasing outside controls, often dressed as urgency. When urgency is a pattern, it's not the market failing — it's a failure of planning inside the house.
↓ more
Quality Fade
The slow, deliberate degradation of supplier performance post-signature. Rarely dramatic. Always expensive. Requires continuous monitoring, not just KPI tick-boxes.
↓ more
Captured Decision-Maker
A stakeholder whose judgment has been compromised by proximity or mutual benefit with a supplier. Protected by the Gilded Silo. Exposed by Link Analysis.
↓ more
PIR — Procurement Incident Register key tool
The Major Enquiry engine — adapted from MIRSAP. Escalates a spend hotspot into a structured investigation with chain-of-custody discipline. Not a spreadsheet — a case file.
↓ more
Link Analysis
Maps connections between actors, suppliers, and decisions. Asks not "What do they want?" but "Who are they protecting, and where is the money flowing?"
↓ more
SARA
Scan · Analyse · Respond · Assess. Problem-Oriented Policing adapted for procurement. Moves the Precinct from reactive order-taking to forensic problem-solving.
↓ more
Spend Hotspot
Repeated urgency, invoice variance, or persistent noise around the same category. Trigger a SARA scan immediately. The Syndicate feeds here.
↓ more
Benford's Law Analysis
Statistical test of invoice number distributions. Unnatural patterns signal manual manipulation — accelerated cash flow, billing fraud, or fabricated transactions.
↓ more
Act III
The Detective Protocol
Method Over Myth
The Sweatbox
The forensic negotiation room. Polished narratives collapse under evidence and pointed questioning. The Detective is the most stable presence in the room.
↓ more
PEACE negotiation
Prepare · Engage · Account · Closure · Evaluate. UK police interview doctrine adapted for forensic negotiation. Get the account before launching the challenge.
↓ more
BCSM
FBI Behavioural Change Stairway Model. Active Listening → Empathy → Rapport → Influence → Behavioural Change. Reserved for siege conditions where leverage is asymmetric.
↓ more
ACH — Matrix of Lies
CIA-derived Analysis of Competing Hypotheses. Forces structural disproof over confirmation. Inconsistent evidence carries more weight than ten confirming pieces.
↓ more
Suspect Dossier
Pre-Sweatbox intelligence file. You know their P&L better than they do before the door is unlocked. Built from OSINT, PIR data, and Link Analysis.
↓ more
Points to Prove
Specific commercial assumptions, gaps, or inefficiencies requiring clarification. Defined in Preparation. Interrogated in Account. The Sweatbox agenda.
↓ more
SCAN / LSI — Forensic Statement Analysis
Pattern detection on written bids. Flags passive voice, temporal lacunae, and lack of conviction — the linguistic fingerprints of deceptive or AI-generated proposals.
↓ more
Temporal Lacunae
Bridging phrases ("Subsequently…", "Afterwards…") that leap over missing steps in the supplier's process narrative. Where Quality Fade hides in bids.
↓ more
Reverse-Turing Test
If a proposal perfectly echoes your RFP with zero nuance, you're reading an LLM hallucination, not a plan. Demand lived experience in the Sweatbox.
↓ more
Relationship Autopsy
The forensic supplier performance dashboard. Surfaces Quality Fade before it kills a project. AI accelerates the build; human judgment determines the verdict.
↓ more
Act IV
The Digital Underworld
AI, SaaS & The Future of the Search
SOR vs SOI
Systems of Record tell you what happened (ERPs). Systems of Intelligence tell you what could happen next. The Syndicate wants you trapped in SOR.
↓ more
Algorithmic Collusion digital threat
AI pricing models converge toward alignment without a single human email sent. No names. No fingerprints. Outputs that look "market-aligned."
↓ more
Digital Handshake
Shared metadata, identical document authors, common bank accounts across "competing" bids. The Indexer finds it before anyone else does.
↓ more
Price Probes
Rapid micro-adjustments bots use to test competitor response. If the market locks in step, a price floor is established — the algorithmic handshake.
↓ more
SaaS Siege
Low-friction entry, then data-gravity lock-in. The vendor changes the locks once your data moves in. Time is the Syndicate's weapon.
↓ more
Shelfware
Licensed seats no one has touched in months. Ghosts haunting the balance sheet. The +40% hike often dissolves once Shelfware is stripped out.
↓ more
The Great Prenup
Negotiating data portability rights, price protection caps, and exit strategy before the marriage begins. Every renewal is a second chance to correct the original sin.
↓ more
Hallucination Trap
GenAI is a probabilistic pattern model — not a truth engine. In procurement it creates fabricated contract clauses and digital phantoms. Guardrail everything.
↓ more
Capability Overhang
When the software — or candidate — is smarter than the user. The Oracle trap. A Clerk with faster fingers is still a Clerk.
↓ more
Hybrid Navigator
The Detective who wields AI as a telescope but remains the astronomer. 80% machine grunt work, 20% irreplaceable human judgment.
↓ more
Chaos Conductor leadership
The CPO as orchestrator of Multi-Agent Systems. Authority exists only for protection and clarity. The successor to the traditional Category Manager.
↓ more
Shortage Hike
Artificially diverting supply to manufacture scarcity and drive up prices. Economic manipulation via algorithmic market cornering.
↓ more
The Spine
The asset AI cannot automate. Disciplined refusal to fold under High Pillow pressure. In 2030, tech fluency is table-stakes. Spine is the differentiator.
↓ more
Act V
Building the Precinct
Team, Legacy & Architecture
The Precinct
Not a metaphor — an operating structure. Centre-led, intelligence-driven. Five commands: Ops Desk, Intelligence Hub, Tactical Sting Team, Supplier Value, Governance & Academy.
↓ more
SIO — Senior Investigating Officer
Case lead. Reconstructs supplier P&Ls, designs award criteria, withstands High Pillow pressure. Does not chase savings targets — prosecutes risk and defends long-term value.
↓ more
Indexer
Intelligence analyst. Performs Link Analysis and OSINT checks. Flags spend hotspots before they become fires. Spots the Digital Handshake before anyone else does.
↓ more
Agent Trainer
Guardian of machine judgment. Designs AI prompts with discipline, enforces guardrails, challenges hallucinations, and refuses to let automation outrun verification.
↓ more
Ethical Gatekeeper
Measures sROI alongside pROI. Performs forensic audits of green claims. Surfaces labour risk in the fourth tier. A 5% saving that causes social harm is a net loss.
↓ more
Curiosity Polygraph
The Precinct's hiring framework. Tests for investigative instinct, not category experience. Hire Curiosity and Spine. Treat every CV as an Allegation of Capability.
↓ more
The Detective Brain
Critical reflection + connectedness + creativity. Asks: "What assumptions are we protecting? Who benefits?" The capability most frameworks ignore.
↓ more
THRIVE-P
Threat · Harm · Risk · Investigation · Vulnerability · Engagement. Risk calibration for contracts AND squads. Burnout is not a wellbeing issue — it is a Control Failure.
↓ more
Forged Blade
Resilience as structural change from impact, not personality. The Advantage of Calamity: conditioned by adversity, the Detective is not shaken by the Syndicate's theatrics.
↓ more
The Long Stakeout
The six-month audit grind where the Syndicate uses Attrition instead of bribes. They wait for your spine to soften. The precinct's most gruelling invisible threat.
↓ more
sROI — Social Return on Investment
Translates environmental, social, and community outcomes into a measurable figure. A Precinct that cannot measure sROI cannot protect the village.
↓ more
Task Force Model
For each Major Incident: 1 SIO + 1 Agent Trainer + 2 Indexers. Assembled for the case. Dissolved back into the Core. No case proceeds under-resourced.
↓ more