How it works

Artefact intake → reconstruction → governance lock

1. Intake

Artefacts arrive in batches. Written-only exchange. Non-admissible channels are logged but not used for conclusions.

2. Clock governance

Clock domains are declared. If no authority exists, normalisation is not admissible; the mismatch is preserved as a finding.

3. Event chain

Linear mapping with provenance and truth classes per entry (Hard / Soft / Narrative / Conflict).

4. Break preservation

Where the chain breaks, the break is preserved — without logical completion or narrative closure.

5. Blueprinting

Define minimum artefacts, admissible confirmations, and lock conditions — without designing operational flows.

6. Governance pack

Consolidated records suitable for executive review, audit scrutiny, and evidentiary defensibility.