Skip to content
Independent Advisory · Not a Broker or Registered Investment Advisor 2678 Holdings LLC
Research & Intelligence · Detailed framework

The R&I record is the analytical substrate. Everything downstream reads from it; nothing downstream mutates it.

This page describes how a project becomes a Research & Intelligence record — intake through lock — and what quality gates apply before the record becomes input to the Risk Engine.

Download
TCA Research & Intelligence Framework
PDF · 10 KB · methodology paper

Phase 1 — Intake

A new project enters the R&I system as an intake record. Minimal metadata: sponsor, sector, indicative stage, geography, point of contact.

No analytical work happens at intake. The goal is to establish the project in the system with a unique identifier and assign an R&I Analyst. The intake record is not yet analytical data; it is registration.

Intake gates

  • Project is distinct from any existing record (no duplicates)
  • Sponsor identity has been confirmed through documented channels
  • Jurisdictional exposure identified (data residency, sanctions screening)
  • Intake is audit-logged with timestamp, actor, and correlation ID

Phase 2 — In Progress

The R&I Analyst builds the record — iteratively, with version history preserved at every step.

Activity A

Assumption Register Build

Every material analytical claim is entered as a structured assumption: category, statement, stated confidence (high/medium/low), evidence source, citation.

Assumptions are versioned; superseded assumptions remain in the record linked via their successor for full traceability.

Activity B

Source Pack Curation

Documents, datasets, and references are ingested, typed, and indexed. Sponsor-provided materials and externally-sourced materials are distinguished.

Each source pack item stores a SHA-256 content hash; later detection of tampering is trivial.

Activity C

Canonical Model Population

Structured fields of the project model — operator data, asset characteristics, technical parameters, market positioning — are filled from the assumption register.

Activity D

Internal Review

The R&I Analyst self-reviews against a completeness checklist before submitting for Compliance review. Analytical weaknesses are documented in the record itself, not hidden.

Phase 3 — Review and Lock

Compliance reviews the record for completeness, internal consistency, and adequacy of evidence.

Lock semantics

A locked R&I record is immutable for the purposes of downstream work. The version hash (SHA-256 over the entire R&I data) is stored with the lock record. Any later correction requires an explicit Compliance-authorized unlock with a documented reason; the unlock is audit-logged; all prior versions are retained.

Lock gates

  • All assumptions have stated confidence and evidence source
  • Every material project parameter is backed by at least one source pack item
  • Known analytical weaknesses are explicitly documented
  • Jurisdiction and data-handling constraints have been applied
  • Compliance has signed off in the workflow system

Phase 4 — Input to Risk

The locked record becomes read-only input to the Risk Engine. Risk Scorers cannot modify it; they can only consume it.

This separation — architectural, not just procedural — is the foundation of TCA's analytical independence. It's enforced at three layers: authentication, authorization, and the database schema itself.