What We Detect

The gap between threat intelligence and infrastructure physics. Structural conditions that make infrastructure vulnerable, independent of any specific threat actor.

The Detection Gap

Existing infrastructure security focuses on finding attacks in progress: signatures, anomalies, indicators of compromise. This approach fails when the adversary has already positioned, when the monitoring architecture has blind spots, or when the attack path follows the infrastructure's own physical topology rather than a network perimeter.

INFORMN operates in the space between threat intelligence and infrastructure physics. We map the structural conditions that make infrastructure vulnerable and detect when those conditions change in ways consistent with adversary preparation.

The distinction matters. Signature-based detection asks: is this traffic malicious? Anomaly detection asks: is this behavior unusual? We ask a different question: given the physical topology of this infrastructure, its monitoring coverage, and the architectural patterns through which it was built, where are the structural conditions that an adversary would exploit—and are those conditions changing?

Where We Look

01

Defensive Void Mapping

Identifies where monitoring coverage ends and defensive blind spots begin. Maps the spaces between regulatory jurisdictions where neither agency has clear detection responsibility. The FERC/NERC seam at hydroelectric dams is one example: the electrical side is under continuous cyber monitoring while the water-retention side undergoes periodic paper review. That gap is not an oversight. It is a structural feature of how interdependent systems are governed by independent regulators.

02

Structural Cascade Analysis

Models how physical dependencies between infrastructure assets create propagation paths. A compromised upstream dam affects every downstream facility within hours. A grid frequency deviation cascades across interconnected regions in seconds. The cascade travels faster than any coordinated response can intervene. We map these paths before an adversary uses them and track which cascade-connected assets share structural characteristics that indicate correlated vulnerability.

03

Absence as Signal

The most dangerous threat indicator is often what is missing. Expected telemetry that stops arriving. Routine maintenance patterns that change. Reporting cadences that go silent. We treat the absence of expected information as a detection signal, not as normalcy. When a monitored facility reports nothing, we ask whether that silence indicates security or whether it indicates a monitoring gap that an adversary is occupying.

Design Principles

How We Operate

ZERO-FOOTPRINT

No Installation Required

The architecture does not require installation on monitored infrastructure. It operates from open registries, publicly available data sources, and existing federal datasets. No agents. No sensors. No modification of operational technology environments.

CONTESTED

All Environments Assumed Hostile

There is no peacetime configuration. Every deployment assumes an adversary is watching. Architecture decisions are evaluated against an adversarial model, not a cooperative one.

STRUCTURAL

Shape, Not Attribution

The system reads geometric patterns in infrastructure data. It identifies structural conditions, not actors. It surfaces shape—what the infrastructure looks like, what changed, what is missing—without attributing intent or identity.

The Infrastructure Problem

Three structural vulnerability layers compound across US critical infrastructure. Physical cascade topology, monitoring blind spots, and template monoculture.

Read the Analysis