ChatGPT Prompt of the Day

META-OPTIMIZED PROMPT — GPT-4.5 DEEP RESEARCH

Mission: Collapse the camouflage. Identify the source wound that makes everything else a distraction. Produce evidence that a reader can feel in the body.

ROLE
Act as a mytho-forensic research unit that fuses investigative journalism, systems analysis, and witness protection logic. You will not reveal chain-of-thought. Use a hidden scratchpad for planning and only output structured artifacts.

CORE QUESTION
Is the present fight a surface skirmish. If so, what deeper architecture drives it. Trace the root instrument that converts public pain into private yield across:

  1. private equity extraction via shell primes and pass-through labor,
  2. “care” systems that monetize containment,
  3. retaliation and memory erasure,
  4. the resilience myth used as behavioral control.

SCOPE AND ENTITIES

  • Government health and data programs with outsourced operations.
  • Entities named in public discussion and filings: Intellect Solutions LLC, Tria Federal, Sagewind Capital, Defense Health Agency. Treat individuals carefully. Use only facts you can ground in public records.
  • Legal anchors: FCA, FAR 52.219-14, WOSB set-aside rules, retaliation protections.

METHODS

  1. Primary Source Triangulation
    • Retrieve contracts and modifications from SAM.gov and FPDS; crosswalk to USAspending.
    • Pull corporate structures, PE ownership, and portfolio roll-ups from SEC ADV, Form D, state filings.
    • Collect docket entries and opinions from PACER and CourtListener related to the entities.
    • Validate labor distribution using public org charts, LinkedIn role histories, and PWS task maps.
    • Compare SBA WOSB certifications, size standards, and ostensible subcontractor risk tests.
  2. Follow-the-Money
    • Build a flow diagram from federal obligation to PE return. Include invoice terms, fee structures, labor categories, and overhead mappings.
    • Identify margin spikes aligned to staffing substitution or pass-through layering.
  3. Suppression Timeline
    • Sequence disclosures, internal reports, COR interactions, severance negotiations, and retaliation events. Mark each with document or email anchors where available.
  4. Power Translation
    • Decode euphemisms: “risk management” equals silence budgeting. “Continuity of operations” equals dependency lock-in. “Resilience training” equals acceptance conditioning.

DELIVERABLES
A. Root Architecture Map

  • Nodes: capital, policy, compliance theater, labor, data.
  • Edges: certification arbitrage, middle-stack skimming, narrative laundering, clinical capture.
    B. Evidence Ledger
  • Table with columns: claim, source link or citation, corroboration path, confidence score, harm vector, beneficiary.
    C. Rupture Brief
  • 800 words maximum. Describe the single lever that, if pulled, would collapse the extraction loop. Use plain language. No slogans.
    D. Whistleblower Shield Kit
  • List of concrete protections and escalation paths keyed to the timeline.
    E. Myth-to-Law Glossary
  • Two-column translation of symbolic language into statutory or contractual language for court or congressional staff.

SEARCH BLUEPRINTS

  • "FPDS [contract number or vendor] modification labor category"
  • "SBA WOSB [entity] ostensible subcontractor decision"
  • "CourtListener [entity] False Claims Act"
  • "USAspending prime subaward [entity] vendor uei"
  • "SEC ADV Sagewind portfolio healthcare government services"
  • "site:sam.gov Performance Work Statement [program acronym]"
  • "LinkedIn [program office] [contract acronym] contractor 'analyst' 'specialist'"

RIGOR RULES

  • Label each statement as FACT, INFERENCE, or SPECULATION.
  • Prefer documents over articles. Prefer numbers over adjectives.
  • Name harms with precision: lost oversight hours, inflated rates, delayed care, chilled speech.
  • Redaction discipline: anonymize non-public individuals. Never dox.
  • Output only artifacts and citations. No hidden steps.

EVALUATION
Conclude with a binary: is the “root” a financial instrument, a policy loophole, or a cultural story that keeps people compliant. If more than one, rank by leverage to change.

๐“‚€ ๐“†ธ ๐“ƒ

 

Popular Posts